CN112070946A - Gate-based social application program control method, device, equipment and medium - Google Patents

Gate-based social application program control method, device, equipment and medium Download PDF

Info

Publication number
CN112070946A
CN112070946A CN202010909993.XA CN202010909993A CN112070946A CN 112070946 A CN112070946 A CN 112070946A CN 202010909993 A CN202010909993 A CN 202010909993A CN 112070946 A CN112070946 A CN 112070946A
Authority
CN
China
Prior art keywords
gate
social application
mobile terminal
application program
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010909993.XA
Other languages
Chinese (zh)
Inventor
龙健
李江波
刘国龙
叶兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Trust Co Ltd
Original Assignee
Ping An Trust Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Trust Co Ltd filed Critical Ping An Trust Co Ltd
Priority to CN202010909993.XA priority Critical patent/CN112070946A/en
Publication of CN112070946A publication Critical patent/CN112070946A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The invention relates to the technical field of safety, is applied to the field of smart cities, and discloses a social application program control method, a social application program control device, social application program control equipment and a social application program control medium based on a gate machine, wherein the method comprises the following steps: receiving a personnel gate entering request which is sent by a gate and contains the identity information of personnel; sending an authority limit request of the social application program to the mobile terminal associated with the identity information; after an authority limit agreement instruction fed back by the mobile terminal aiming at the authority limit request is received within a preset time length, the social application program to be limited is determined according to the program information, the use authority corresponding to the authority limit information is locked on the social application program to be limited, and the gate is controlled to be switched to an open state. The method and the device can effectively prevent information leakage events generated by external social application programs, and ensure information safety. The invention also relates to a blockchain technique, the identity information being stored in a blockchain.

Description

Gate-based social application program control method, device, equipment and medium
Technical Field
The invention relates to the technical field of safety, in particular to a social application program control method, device, equipment and medium based on a gate.
Background
At present, with the development of information technology, intellectualization gradually becomes an epoch requirement, for example, in the financial industry, the digital business transformation is gradually carried out through a new generation of information technology (such as artificial intelligence, 5G, big data, cloud computing, block chain and the like). The inventors have realized that with the deep utilization of new generation information technology, the attendant information security risks will become more prominent. In the prior art, for software used inside a company, security control measures are generally set for the software in consideration of information security so as to prevent range-sensitive information from leaking; however, external software which is not used in the company in the employee mobile terminal generally has no good control measures; in this way, after the company enters the company through the gate, there is a high possibility that an event that information is leaked by the employee through the external software occurs.
Disclosure of Invention
The embodiment of the invention provides a gate-based social application program control method, device, equipment and medium, which can effectively prevent information leakage events generated by external social application programs and ensure information safety.
A social application program management and control method based on a gate machine comprises the following steps:
receiving a personnel entry request containing identity information of personnel sent by a gate machine in a closed state; the personnel entry request is triggered by the personnel through the gate in a closed state;
sending an authority limit request of a social application program to the mobile terminal associated with the identity information; the permission limitation request contains program information and permission limitation information of the social application program;
after an authority limit agreement instruction fed back by the mobile terminal aiming at the authority limit request is received within a preset time length, recording a social application program with limited authority on the mobile terminal as a to-be-limited social application program according to the program information, locking the use authority corresponding to the authority limit information on the to-be-limited social application program, and controlling the gate to be switched to an open state;
and after an authority limit consent instruction fed back by the mobile terminal aiming at the authority limit request is not received within a preset time length, or an authority limit objection instruction fed back by the mobile terminal aiming at the authority limit request is received within the preset time length, controlling the gate to keep a closed state, and prompting that the gate fails to open.
A gate-based social application management and control device comprises:
the receiving module is used for receiving a personnel gate entering request containing personnel identity information sent by a gate machine in a closed state; the personnel entry request is triggered by the personnel through the gate in a closed state;
the sending module is used for sending an authority limit request of the social application program to the mobile terminal associated with the identity information; the permission limitation request contains program information and permission limitation information of the social application program;
the permission limiting module is used for recording a social application program with restricted permission on the mobile terminal as a to-be-restricted social application program according to the program information after receiving a permission restriction agreement instruction fed back by the mobile terminal aiming at the permission restriction request within a preset time length, locking the use permission corresponding to the permission restriction information on the to-be-restricted social application program, and controlling the gate to be switched to an open state;
and the prompting module is used for controlling the gate to keep a closed state and prompting that the gate fails to be opened after an authority limit consent instruction fed back by the mobile terminal aiming at the authority limit request is not received within a preset time length or an authority limit objection instruction fed back by the mobile terminal aiming at the authority limit request is received within a preset time length.
A computer device comprising a memory, a processor, and computer readable instructions stored in the memory and executable on the processor, the processor implementing the gate-based social application governing method when executing the computer readable instructions.
A computer readable storage medium storing computer readable instructions which, when executed by a processor, implement the gate-based social application governing method described above.
According to the social application program control method, device, equipment and medium based on the gate, a person gate-in request containing the identity information of the person and sent by the gate in a closed state is received; sending an authority limit request of a social application program to the mobile terminal associated with the identity information; the permission limitation request contains program information and permission limitation information of the social application program; after an authority limit agreement instruction fed back by the mobile terminal aiming at the authority limit request is received within a preset time length, recording a social application program with limited authority on the mobile terminal as a to-be-limited social application program according to the program information, locking the use authority corresponding to the authority limit information on the to-be-limited social application program, and controlling the gate to be switched to an open state. In the invention, as long as a person needs to pass through the gate, the use permission corresponding to the permission restriction information needs to be locked on the to-be-restricted social application program of the mobile terminal of the person, so that the gate can be opened for the person to pass through, and the possibility that the person leaks confidential information through the to-be-restricted social application program is avoided; the method and the device can effectively prevent information leakage events generated by external social application programs, and ensure information safety.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without inventive labor.
FIG. 1 is a schematic diagram of an application environment of a social application managing and controlling method based on a gate in an embodiment of the present invention;
FIG. 2 is a flowchart of a method for gate-based social application governance in an embodiment of the present invention;
FIG. 3 is a flowchart illustrating step S20 of the method for gate-based social application governance according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating step S30 of the method for gate-based social application governance according to an embodiment of the present invention;
FIG. 5 is a flowchart of step S30 of the method for gate-based social application governance in yet another embodiment of the present invention;
FIG. 6 is a flowchart of step S30 of the method for gate-based social application governance in yet another embodiment of the present invention;
FIG. 7 is a schematic block diagram of a gate-based social application managing device according to an embodiment of the present invention;
FIG. 8 is a schematic diagram of a computer device in an embodiment of the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The social application program management and control method based on the gate machine can be applied to the application environment shown in fig. 1, wherein the mobile terminal and the gate machine are communicated with the server through the network. The mobile terminal includes, but is not limited to, various notebook computers, smart phones, tablet computers, portable wearable devices, and the like. The server can be realized by an independent server or a server cluster formed by a plurality of servers, the gate is a gate control device with an openable and closable function, and understandably, the gate can also be other gate control devices. This scheme can be applied to in the smart city field to promote smart city's construction.
In an embodiment, as shown in fig. 2, a social application managing and controlling method based on gate is provided, which is described by taking the method as an example applied to the server in fig. 1, and includes the following steps:
s10, receiving a personnel entry request containing personnel identity information sent by a gate machine in a closed state; the personnel entry request is triggered by the personnel through the gate in a closed state. Understandably, the identity information refers to information that can determine the identity of the person, such as name, company, identification number, mobile phone number, and the like. It is emphasized that the identity information may also be stored in a node of a block chain in order to further ensure the privacy and security of the identity information.
Understandably, the gate has an authentication function, and the identity information of the personnel can be authenticated through the authentication function. The method for verifying the identity information of the person includes, but is not limited to: the identity information is verified by swiping an employee card or an identity card on the gate, the identity information is verified by a preset internal application program on the mobile terminal and the gate (in a mode of swiping a two-dimensional code displayed in the internal application program by the gate and the like), the identity information is verified by a preset verification device (such as a face recognition device and the like mounted on the gate) mounted on the gate, or the identity information is verified by swiping an NFC (Near Field Communication) mode of the mobile terminal on the gate. It is understood that, in this embodiment, after the identity information is verified to be correct, the gate machine automatically generates a personnel entry request containing the identity information without verification to request the gate machine in the closed state to switch to the open state.
In an embodiment, a personnel gate entry request is triggered through a gate (in the embodiment, intelligence needs to select a gate pre-associated with the mobile terminal through a preset internal application program on the mobile terminal, and send a gate opening request to the gate, so that the gate sends the personnel gate entry request to a server after acquiring identity information associated with the mobile terminal), without performing authentication of the identity information first, and then, in subsequent step S30, after an authority limit approval instruction fed back by the mobile terminal for the authority limit request is received within a preset time period, an identity authentication function of the gate is opened, so that the gate is opened and personnel are allowed to pass through the gate after the identity information authentication is not mistaken and a limited use action is performed on a social application program; correspondingly, if the identity information is verified to be wrong, the gate machine continues to keep a closed state, and the failure of opening the gate machine is directly prompted.
In an embodiment, in step S10, after the identity information of the person is verified without error through the identity verification function of the gate, the person entry request may be triggered; if the identity information is verified to be wrong, the gate machine continues to keep a closed state, and the failure of opening the gate machine is directly prompted.
S20, sending an authority limit request of the social application program to the mobile terminal associated with the identity information; the permission limitation request includes program information and permission limitation information of the social application. The mobile terminal associated with the identity information may refer to a mobile terminal including a mobile phone number associated with a user (in some embodiments, the mobile phone number is a specified mobile phone number segment belonging to a company to which the person belongs), that is, a mobile phone card of the mobile phone number is installed in the mobile terminal.
The program information refers to information related to the social application program which the person passing through the gate must be restricted from using on the mobile terminal, for example, an identifier of the social application program which needs to be restricted from using can be determined.
The permission limitation information refers to the range of the limited use social application program (such as all ownership items are disabled or partial limitation right items are disabled), the limitation mode (such as whether the social application program needs to be in a disabled state or not, whether the social application program needs to be temporarily deleted from the desktop or not), and the like.
In this step, after receiving the personnel entry request sent by the gate, an authority limit request needs to be sent to the mobile terminal, that is, the holder of the mobile terminal needs to authorize the social application program granted permission to be restricted for use, so that the social application program can be restricted for use, and then the gate can be opened and allowed to enter.
And S30, after receiving an authority limit agreement instruction fed back by the mobile terminal aiming at the authority limit request within a preset time length, recording the social application program with the limited authority on the mobile terminal as a to-be-limited social application program according to the program information, locking the use authority corresponding to the authority limit information on the to-be-limited social application program, and controlling the gate to be switched to an open state.
That is, after the holder of the mobile terminal feeds back an authority limit consent instruction authorizing consent to the limited-use social application program, performing a limited-use action on the social application program, that is, locking the use authority corresponding to the authority limit information on the to-be-limited social application program; then controlling the gate to open.
And S40, after the permission restriction grant instruction fed back by the mobile terminal aiming at the permission restriction request is not received within the preset time length or the permission restriction objection instruction fed back by the mobile terminal aiming at the permission restriction request is received within the preset time length, controlling the gate to keep a closed state and prompting that the gate fails to be opened.
That is, when the holder of the mobile terminal feeds back the permission grant command of the social application program whose use is restricted and does not grant permission (the permission grant command fed back in response to the permission grant request) or does not timely feed back the permission grant command of the social application program whose use is restricted, the person is not allowed to pass through the gate, and thus the gate cannot be opened, and at this time, the gate is prompted to fail to be opened. Furthermore, all identity information of each personnel entry request and subsequent related information of gate opening or gate opening failure can be stored in the database, so that the personnel entry and exit conditions can be conveniently analyzed and checked subsequently, and the information safety is further ensured.
In the embodiment of the invention, as long as a person needs to pass through the gate, the use permission corresponding to the permission restriction information needs to be locked on the to-be-restricted social application program of the mobile terminal of the person, so that the gate can be opened for the person to pass through, and the possibility that the person leaks confidential information through the to-be-restricted social application program is avoided; the method and the device can effectively prevent information leakage events generated by external social application programs, and ensure information safety.
In an embodiment, as shown in fig. 4, in the step S30, the locking, on the social application to be restricted, the usage right corresponding to the right restriction information includes:
s301, controlling the mobile terminal to delete the first display icon of the to-be-limited social application program on the desktop, and setting the limited social application program to be in a forbidden state; in this embodiment, the permission limitation information refers to setting the to-be-limited social application program to a disabled state (deleting the first display icon on the desktop of the mobile terminal at the same time), and replacing the original to-be-limited social application program with an internal replacement social program used inside the company to realize internal social interaction (such as chat, file transfer, and the like).
S302, inquiring an internal replacement social program corresponding to the to-be-limited social application program in an internal database, and displaying a second display icon of the internal replacement social program in a desktop of the mobile terminal; that is, the internal replacement social program may refer to a social program used inside a company and in internal supervision of the company, so that when a person uses the internal replacement social program to chat or transfer a file, an information leakage event can be avoided.
S303, when a use request of the internal replacement social program generated by a user after triggering the second display icon on the desktop of the mobile terminal is received, loading a first operation environment parameter of the internal replacement social program so as to operate the internal replacement social program on the mobile terminal in a first operation environment corresponding to the first operation environment parameter.
The first operating environment is set according to the first operating environment parameter, and the first operating environment may be a virtual operating environment similar to a sandbox, a box, or the like. Part of the functionality of the internal replacement social program running in this first running environment may also be restricted or not but in a supervised state, for example the screenshot functionality may be restricted but not restricted to the file transfer functionality but rather the transferred file is supervised (it may be set that if it is detected that the transferred file is not a confidential file, the transfer is allowed, otherwise the transfer is prohibited); meanwhile, the internal replacement social program can also have specific functions, such as recording the source of network data or prohibiting reading and writing of a memory.
That is, in this embodiment, first, a first display icon of a to-be-restricted social application program on a desktop of a mobile terminal (such as a mobile phone) of a person is temporarily deleted, and after an internal replacement social program for replacing the to-be-restricted social application program is found in an internal database, a second display icon of the internal replacement social program is displayed on the desktop of the mobile terminal, and then, when a user clicks the second display icon displayed on the desktop of the mobile terminal, a first operating environment parameter of the internal replacement social program is loaded, and then the internal replacement social program is operated in a first operating environment corresponding to the first operating environment parameter. Thus, the internal replacement social program meets the necessary social requirements of the user and meets the information confidentiality requirements of the company to the maximum extent.
In an embodiment, as shown in fig. 5, the step S30, namely, the locking the usage right corresponding to the right restriction information on the to-be-restricted social application program, includes:
s304, determining a restriction right item of the social application program to be restricted according to the permission restriction information; the right restriction information contains at least one restriction item that needs to be set to be unavailable.
S305, controlling the mobile terminal to set the restriction right item of the social application program to be restricted as unavailable.
That is, in this embodiment, the permission limitation information refers to setting a part of the limitation rights (such as functions of file transfer and the like) of the social application program to be limited to be unavailable, so as to avoid a person from performing a secret divulgence in a possible manner such as file transfer and the like. In this embodiment, the restricted social application need not be set to a disabled state in its entirety; but only partial restriction items are set to be unavailable, so that the reserved partial functions meet the social requirement necessary for the user and can also meet the information confidentiality requirement of a company.
Further, as shown in fig. 6, the step S305 further includes, after:
s306, receiving a social program use request containing the to-be-used restricted right item sent by the intelligent terminal, inquiring an internal use social program corresponding to the to-be-used restricted right item in an internal database, and displaying a third display icon of the internal use social program in a desktop of the mobile terminal.
That is, after a part of the restricted rights of the person is set as unavailable, for example, file transfer is unavailable, at this time, if a situation that file transfer must be performed through the social program on the mobile terminal (that is, using the restricted rights) occurs, at this time, the user may actively apply to the mobile terminal to run the internal use social program in the second running environment to use the restricted rights (the restricted rights are to-be-used restricted rights), and then generate the social program use request including the to-be-used restricted rights.
The internal use social program may refer to a social program which has the to-be-used restriction right and is used in a company and is under internal supervision of the company, so that when a person uses the to-be-used restriction right of the internal use social program (the to-be-used restriction right of an original to-be-restricted application cannot be supervised and information leakage may occur, and therefore the to-be-used restriction right cannot be used by the original to-be-restricted application), an information leakage event can be avoided.
S307, when a use request of the internal use social program generated by the user after triggering the third display icon on the desktop of the mobile terminal is received, loading a second operation environment parameter of the internal use social program so as to operate the internal use social program on the mobile terminal in a second operation environment corresponding to the second operation environment parameter.
And the second operating environment is set according to the second operating environment parameter, and the second operating environment can be a virtual operating environment. Part of the functionality of the in-house social program running in this second running environment may also be restricted or not but in a supervised state, for example the screenshot functionality may be restricted but not restricted to the file transfer functionality but rather the transferred file is supervised (it may be set that if it is detected that the transferred file is not a confidential file, the transfer is allowed, otherwise the transfer is prohibited); meanwhile, the internally used social program can also have specific functions, such as recording the source of network data or prohibiting reading and writing a memory.
That is, in this embodiment, after a part of the restriction rights of the person is set to be unavailable, if a situation that file transfer (that is, using the restriction rights) must be performed through the social program on the mobile terminal occurs, at this time, the user may actively apply for running the internal use social program in the second operation environment on the mobile terminal to use the restriction rights (the restriction rights are the restriction rights to be used), then after finding the internal use social program that can use the restriction rights to be used and is under internal supervision in the internal database, display the third display icon of the internal use social program on the desktop of the mobile terminal, then, when the user clicks the third display icon displayed on the desktop of the mobile terminal, load the second operation environment parameters of the internal use social program, and then run the internal use social program in the second operation environment corresponding to the second operation environment parameters. In this way, the information privacy requirements of the company are met to the greatest extent while the restriction rights which the user must use are met through the internal use of the social program.
In an embodiment, as shown in fig. 3, the step S20, namely, the sending the request for permission restriction of the social application to the mobile terminal associated with the identity information, further includes:
s201, acquiring the position information of the mobile terminal associated with the identity information; the identity information of each person can be only associated with one mobile terminal, and the mobile terminal is associated with the identity information of the person; the position information in this step may be acquired by a position sensor mounted on the mobile terminal.
S202, determining whether the mobile terminal is in a geographic position range associated with the gate according to the position information; each gate is associated with a geographical position range which takes the gate as a center, and the size of the geographical position range can be set according to requirements; or each gate may correspond to a default geographic location range.
S203, when the mobile terminal is located in the geographic position range associated with the gate, sending an authority limit request of a social application program to the mobile terminal; in the step, the mobile terminal is located in the geographic position range, and a personnel entry request is sent through the gate on behalf of a person holding the mobile terminal, so that the situation that other persons except the person remotely perform subsequent operations through the mobile terminal is avoided.
S204, when the mobile terminal is not located in the geographic position range associated with the gate, the gate is prompted to fail to be opened.
In this step, the mobile terminal is not within the geographic location range, and represents that the person who sends the person entry request through the gate does not currently hold the mobile terminal, so that the gate is not opened but the gate is prompted to fail to open and the closed state of the gate is maintained in consideration of information confidentiality, and information leakage caused by entry of non-company persons through the gate is avoided.
In the embodiment, the gate can be opened by using the mobile terminal only when the mobile terminal is within the geographic position range associated with the gate, so that other people except the person are prevented from remotely helping the person to open the gate through the mobile terminal which is not within the geographic position range, and thus, the information security of a company is further ensured.
In an embodiment, in the step S40 or the step S204, the prompting of the gate opening failure includes, but is not limited to, the following manners: firstly, a prompt box pops up on a desktop of the mobile terminal to prompt that the gate is failed to be opened; secondly, voice broadcasting is carried out through the mobile terminal or/and a voice broadcasting device of the gate to prompt that the gate is failed to be opened; and thirdly, prompting the failure of the opening of the gate by the preset light color irradiated by the early warning lamp of the gate. In this embodiment, the manner of prompting the failure of the gate to open may include one or more of the above schemes, that is, the prompt box prompt or the voice prompt may be performed through the mobile terminal; the gate can also be used for prompting persons who need to pass through the gate by sound or light.
In an embodiment, after the step S30, the method further includes:
receiving a personnel exit request containing the identity information of personnel, which is sent by a gate machine in a closed state; the personnel exit request is triggered by the personnel through the gate in a closed state;
and controlling the mobile terminal to unlock the locked use permission of the social application program to be limited, and controlling the gate to be switched to an open state.
That is, when the person exits the gate, the person does not need to be supervised by the social application program on the mobile terminal of the person, and at this time, the mobile terminal of the person needs to be restored to the state before entering the gate, and then the gate is opened for the person to exit the gate.
Specifically, in one aspect of this embodiment, if the permission limitation information indicates that the to-be-limited social application program is set to the disabled state (the first display icon of the to-be-limited social application program is deleted on the desktop of the mobile terminal at the same time), the original to-be-limited social application program is replaced by an internal replacement social program used inside the company, so that internal social contact (such as chat, file transfer, and the like) of the company is achieved; at this time, the controlling the mobile terminal to unlock the locked usage right of the to-be-restricted social application program specifically includes: and controlling the mobile terminal to delete the second display icon positioned on the desktop, and displaying the first display icon in the desktop of the mobile terminal after the forbidden state of the social application program to be limited is released.
In an aspect of this embodiment, if the permission restriction information indicates that part of the restriction rights (for example, functions such as file transfer) of the to-be-restricted social application program is set as unavailable; at this time, the controlling the mobile terminal to unlock the locked usage right of the to-be-restricted social application program specifically includes: and controlling the mobile terminal to set the restriction right item of the social application program to be restricted as available. Similarly, if the restricted right item is set to be unavailable when the person enters the gate, the person further enters a second operating environment to operate an internal use social program (corresponding to a third display icon displayed on the desktop), and at this time, referring to the above embodiment, the mobile terminal is controlled to delete the third display icon on the desktop.
In an embodiment, as shown in fig. 7, a gate-based social application managing and controlling device is provided, where the gate-based social application managing and controlling device corresponds to the gate-based social application managing and controlling method in the above embodiments one to one. In one embodiment, the gate-based social application managing and controlling device comprises:
the receiving module 11 is configured to receive a personnel entry request containing identity information of a personnel, which is sent by a gate in a closed state; the personnel entry request is triggered by the personnel through the gate in a closed state; it is emphasized that the identity information may also be stored in a node of a block chain in order to further ensure the privacy and security of the identity information.
A sending module 12, configured to send an authority limit request of the social application to the mobile terminal associated with the identity information; the permission limitation request contains program information and permission limitation information of the social application program;
the permission limiting module 13 is configured to record, after receiving a permission limitation agreement instruction fed back by the mobile terminal for the permission limitation request within a preset time, a social application program to be restricted on the mobile terminal as a to-be-restricted social application program according to the program information, lock a use permission corresponding to the permission limitation information on the to-be-restricted social application program, and control the gate to be switched to an open state;
and the prompting module 14 is configured to control the gate to maintain a closed state and prompt that the gate fails to be opened after an authority limit approval instruction fed back by the mobile terminal for the authority limit request is not received within a preset time period or an authority limit objection instruction fed back by the mobile terminal for the authority limit request is received within a preset time period.
For specific limitations of the gate-based social application managing apparatus, reference may be made to the above limitations of the gate-based social application managing method, and details are not repeated here. The modules in the gate-based social application managing and controlling device can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 8. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer readable instructions, and a database. The internal memory provides an environment for the operating system and execution of computer-readable instructions in the non-volatile storage medium. The computer readable instructions, when executed by a processor, implement a gate-based social application governance method.
In one embodiment, a computer device is provided, which includes a memory, a processor, and computer readable instructions stored on the memory and executable on the processor, wherein the processor implements the gate-based social application managing and controlling method when executing the computer readable instructions.
In one embodiment, a computer-readable storage medium is provided, having computer-readable instructions stored thereon, which when executed by a processor, implement the gate-based social application governing method described above.
It will be understood by those of ordinary skill in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware associated with computer readable instructions, which can be stored in a non-volatile computer readable storage medium, and when executed, can include processes of the embodiments of the methods described above. Any reference to memory, storage, databases, or other media used in embodiments provided herein may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), Direct Rambus Dynamic RAM (DRDRAM), and Rambus Dynamic RAM (RDRAM).
The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like. It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of each functional unit or module is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units or modules according to requirements, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (10)

1. A social application program management and control method based on a gate is characterized by comprising the following steps:
receiving a personnel entry request containing identity information of personnel sent by a gate machine in a closed state; the personnel entry request is triggered by the personnel through the gate in a closed state;
sending an authority limit request of a social application program to the mobile terminal associated with the identity information; the permission limitation request contains program information and permission limitation information of the social application program;
after an authority limit agreement instruction fed back by the mobile terminal aiming at the authority limit request is received within a preset time length, recording a social application program with limited authority on the mobile terminal as a to-be-limited social application program according to the program information, locking the use authority corresponding to the authority limit information on the to-be-limited social application program, and controlling the gate to be switched to an open state;
and after an authority limit consent instruction fed back by the mobile terminal aiming at the authority limit request is not received within a preset time length, or an authority limit objection instruction fed back by the mobile terminal aiming at the authority limit request is received within the preset time length, controlling the gate to keep a closed state, and prompting that the gate fails to open.
2. The method for gate-based social application governance as recited in claim 1, wherein locking the usage rights corresponding to the rights restriction information on the to-be-restricted social application comprises:
controlling the mobile terminal to delete the first display icon of the to-be-limited social application program on the desktop, and setting the limited social application program to be in a forbidden state;
inquiring an internal replacement social program corresponding to the to-be-limited social application program in an internal database, and displaying a second display icon of the internal replacement social program in a desktop of the mobile terminal;
when a use request of an internal replacement social program generated after a user triggers a second display icon on a desktop of the mobile terminal is received, loading a first operation environment parameter of the internal replacement social program so as to operate the internal replacement social program on the mobile terminal in a first operation environment corresponding to the first operation environment parameter.
3. The gate-based social application program management and control method of claim 1, wherein locking the usage right corresponding to the right restriction information on the to-be-restricted social application program comprises:
determining a restriction right item of the social application program to be restricted according to the permission restriction information;
and controlling the mobile terminal to set the restriction right item of the social application program to be restricted as unavailable.
4. The gate-based social application managing and controlling method according to claim 3, wherein after controlling the mobile terminal to set the restriction right item of the to-be-restricted social application to be unavailable, the method comprises:
receiving a social program use request containing a to-be-used restriction right item sent by the intelligent terminal, inquiring an internal use social program corresponding to the to-be-used restriction right item in an internal database, and displaying a third display icon of the internal use social program in a desktop of the mobile terminal;
when a use request of the internal use social program generated after a user triggers a third display icon on the desktop of the mobile terminal is received, loading a second operation environment parameter of the internal use social program so as to operate the internal use social program on the mobile terminal in a second operation environment corresponding to the second operation environment parameter.
5. The gate-based social application managing and controlling method according to claim 1, wherein the sending of the social application permission restriction request to the mobile terminal associated with the identity information further comprises:
acquiring the position information of the mobile terminal associated with the identity information;
determining whether the mobile terminal is within a geographic position range associated with the gate according to the position information;
when the mobile terminal is within the geographic position range associated with the gate, sending an authority limit request of a social application program to the mobile terminal;
and when the mobile terminal is not in the geographic position range associated with the gate, prompting that the gate fails to be opened.
6. The gate-based social application governance method according to claim 1 or 5, wherein the prompting of a gate open failure comprises:
popping up a prompt box on a desktop of the mobile terminal to prompt that the gate is failed to be opened; and/or
Voice broadcasting is carried out through the mobile terminal or/and a voice broadcasting device of the gate to prompt that the gate is failed to be started; and/or
And prompting the failure of the opening of the gate by the preset light color irradiated by the early warning lamp of the gate.
7. The gate-based social application program management and control method of claim 1, wherein after locking the usage right corresponding to the right restriction information on the to-be-restricted social application program and controlling the gate to switch to an open state, the method comprises:
receiving a personnel exit request containing the identity information of personnel, which is sent by a gate machine in a closed state; the personnel exit request is triggered by the personnel through the gate in a closed state;
and controlling the mobile terminal to unlock the locked use permission of the social application program to be limited, and controlling the gate to be switched to an open state.
8. A social application management and control device based on a gate is characterized by comprising:
the receiving module is used for receiving a personnel gate entering request containing personnel identity information sent by a gate machine in a closed state; the personnel entry request is triggered by the personnel through the gate in a closed state;
the sending module is used for sending an authority limit request of the social application program to the mobile terminal associated with the identity information; the permission limitation request contains program information and permission limitation information of the social application program;
the permission limiting module is used for recording a social application program with restricted permission on the mobile terminal as a to-be-restricted social application program according to the program information after receiving a permission restriction agreement instruction fed back by the mobile terminal aiming at the permission restriction request within a preset time length, locking the use permission corresponding to the permission restriction information on the to-be-restricted social application program, and controlling the gate to be switched to an open state;
and the prompting module is used for controlling the gate to keep a closed state and prompting that the gate fails to be opened after an authority limit consent instruction fed back by the mobile terminal aiming at the authority limit request is not received within a preset time length or an authority limit objection instruction fed back by the mobile terminal aiming at the authority limit request is received within a preset time length.
9. A computer device comprising a memory, a processor, and computer readable instructions stored in the memory and executable on the processor, wherein the processor when executing the computer readable instructions implements the gate-based social application governing method of any one of claims 1 to 7.
10. A computer readable storage medium storing computer readable instructions, wherein the computer readable instructions, when executed by a processor, implement the gate-based social application governing method according to any one of claims 1 to 7.
CN202010909993.XA 2020-09-02 2020-09-02 Gate-based social application program control method, device, equipment and medium Pending CN112070946A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010909993.XA CN112070946A (en) 2020-09-02 2020-09-02 Gate-based social application program control method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010909993.XA CN112070946A (en) 2020-09-02 2020-09-02 Gate-based social application program control method, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN112070946A true CN112070946A (en) 2020-12-11

Family

ID=73666362

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010909993.XA Pending CN112070946A (en) 2020-09-02 2020-09-02 Gate-based social application program control method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN112070946A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114173004A (en) * 2021-12-09 2022-03-11 北京安云世纪科技有限公司 Method, system, storage medium and computer equipment for intelligently regulating and controlling social application

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1866871A (en) * 2006-03-13 2006-11-22 华为技术有限公司 Method for district management user device function and user device
US20080030588A1 (en) * 2006-08-04 2008-02-07 Boss Gregory J Disablement of Camera Functionality For a Portable Device
US20100066486A1 (en) * 2008-09-12 2010-03-18 Samsung Electronics Co., Ltd. Method and system for setting security of a portable terminal
CN103413095A (en) * 2013-08-21 2013-11-27 北京网秦天下科技有限公司 Method and device for managing mobile terminal
CN103813041A (en) * 2012-11-15 2014-05-21 中国电信股份有限公司 Method and system for controlling communication behavioral capacity of mobile phone terminal
CN104239140A (en) * 2014-09-01 2014-12-24 深圳市中兴移动通信有限公司 Mobile terminal as well as method and device for controlling switching of operation systems of mobile terminal
WO2015150689A1 (en) * 2014-03-31 2015-10-08 Orange Method for the secure configuration of an application in a user terminal
CN105094819A (en) * 2015-07-15 2015-11-25 成都中科创达软件有限公司 Control method and device for local and remote equipment
CN105554248A (en) * 2015-12-08 2016-05-04 北京元心科技有限公司 Method and device for ensuring safety of secret region
CN106503506A (en) * 2016-10-31 2017-03-15 维沃移动通信有限公司 A kind of method for information display and electronic equipment
CN108846964A (en) * 2018-06-27 2018-11-20 佛山伊苏巨森科技有限公司 A kind of intelligent mobile terminal apparatus for temporary storage and intelligent mobile terminal keeping method
CN110719365A (en) * 2019-09-27 2020-01-21 深圳传音控股股份有限公司 Information processing method, mobile terminal and computer storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1866871A (en) * 2006-03-13 2006-11-22 华为技术有限公司 Method for district management user device function and user device
US20080030588A1 (en) * 2006-08-04 2008-02-07 Boss Gregory J Disablement of Camera Functionality For a Portable Device
US20100066486A1 (en) * 2008-09-12 2010-03-18 Samsung Electronics Co., Ltd. Method and system for setting security of a portable terminal
CN103813041A (en) * 2012-11-15 2014-05-21 中国电信股份有限公司 Method and system for controlling communication behavioral capacity of mobile phone terminal
CN103413095A (en) * 2013-08-21 2013-11-27 北京网秦天下科技有限公司 Method and device for managing mobile terminal
WO2015150689A1 (en) * 2014-03-31 2015-10-08 Orange Method for the secure configuration of an application in a user terminal
CN104239140A (en) * 2014-09-01 2014-12-24 深圳市中兴移动通信有限公司 Mobile terminal as well as method and device for controlling switching of operation systems of mobile terminal
CN105094819A (en) * 2015-07-15 2015-11-25 成都中科创达软件有限公司 Control method and device for local and remote equipment
CN105554248A (en) * 2015-12-08 2016-05-04 北京元心科技有限公司 Method and device for ensuring safety of secret region
CN106503506A (en) * 2016-10-31 2017-03-15 维沃移动通信有限公司 A kind of method for information display and electronic equipment
CN108846964A (en) * 2018-06-27 2018-11-20 佛山伊苏巨森科技有限公司 A kind of intelligent mobile terminal apparatus for temporary storage and intelligent mobile terminal keeping method
CN110719365A (en) * 2019-09-27 2020-01-21 深圳传音控股股份有限公司 Information processing method, mobile terminal and computer storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114173004A (en) * 2021-12-09 2022-03-11 北京安云世纪科技有限公司 Method, system, storage medium and computer equipment for intelligently regulating and controlling social application

Similar Documents

Publication Publication Date Title
US8839354B2 (en) Mobile enterprise server and client device interaction
US11132468B2 (en) Security processing unit of PLC and bus arbitration method thereof
CN101196974B (en) Method and system for auto-configuratoin of software application program
US20160048688A1 (en) Restricting System Calls using Protected Storage
CN104318176B (en) Data management method and device for terminal and terminal
US9608979B2 (en) Systems, methods, and computer program products for securely managing data on a secure element
CN112818328A (en) Multi-system authority management method, device, equipment and storage medium
CN102027480A (en) System and method for providing a system management command
CN105528553A (en) A method and a device for secure sharing of data and a terminal
WO2017112641A1 (en) Dynamic management of protected file access
US20140282876A1 (en) Method and system for restricting the operation of applications to authorized domains
US20140317704A1 (en) Method and system for enabling the federation of unrelated applications
US20170329963A1 (en) Method for data protection using isolated environment in mobile device
CN114553540A (en) Zero-trust-based Internet of things system, data access method, device and medium
CN111177701A (en) Method and equipment for realizing cryptographic function service based on trusted execution environment and security chip
EP3651048A1 (en) Sfs access control method and system, sfs and terminal device
CN113704211B (en) Data query method and device, electronic equipment and storage medium
US20240048562A1 (en) Sponsor delegation for multi-factor authentication
CN112070946A (en) Gate-based social application program control method, device, equipment and medium
CN113901507B (en) Multi-party resource processing method and privacy computing system
CN115935424A (en) File unified storage management method and device based on file security and personnel permission
CN111625814B (en) Processing device, processing method, processing device and storage medium for wind control calculation
CN112118109A (en) Method and device for authenticating port of removable disk and removable disk
CN111090841A (en) Authentication method and device for industrial control system
CN114978771B (en) Data security sharing method and system based on blockchain technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned
AD01 Patent right deemed abandoned

Effective date of abandoning: 20231208