CN115273284A - Permission adaptation method and device, storage medium and electronic equipment - Google Patents

Permission adaptation method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN115273284A
CN115273284A CN202210894133.2A CN202210894133A CN115273284A CN 115273284 A CN115273284 A CN 115273284A CN 202210894133 A CN202210894133 A CN 202210894133A CN 115273284 A CN115273284 A CN 115273284A
Authority
CN
China
Prior art keywords
work order
door lock
unlocking
account
intelligent door
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210894133.2A
Other languages
Chinese (zh)
Inventor
欧月华
任艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202210894133.2A priority Critical patent/CN115273284A/en
Publication of CN115273284A publication Critical patent/CN115273284A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The disclosure belongs to the technical field of network security, and relates to a permission adaptation method and device, a storage medium and an electronic device. The method comprises the following steps: acquiring work order information and work order states, wherein the work order states comprise work order effectiveness, work order change and work order failure; determining the unlocking authority of the intelligent door lock in the work order information according to the work order information and the work order state; and unlocking the intelligent door lock according to the unlocking authority. The unlocking authority of the corresponding intelligent door lock is determined according to the work order information and the work order state so as to unlock, the complex authority application process and the condition of unlocking authority abuse are avoided, the safety of ODN outdoor passive box body facilities, optical fiber cables and communication services borne by the optical fiber cables is guaranteed, meanwhile, the intelligent management and control processes of management, operation, maintenance, construction and the like of the ODN outdoor passive box body facilities are optimized, the management and maintenance time is greatly shortened, the operation and maintenance efficiency is improved, the broadband service opening of users is accelerated, and the service quality is optimized.

Description

Permission adaptation method and device, storage medium and electronic equipment
Technical Field
The present disclosure relates to the field of network security technologies, and in particular, to a permission adaptation method, a permission adaptation device, a computer-readable storage medium, and an electronic device.
Background
Outdoor Optical Distribution boxes of conventional ODNs (Optical Distribution networks) adopt common mechanical locks to realize security, and lack an effective management mode.
An operator can unlock the optical distribution network at will by taking a mechanical key, and the management and maintenance efficiency of the ODN passive optical distribution facility is greatly influenced by human factors and is generally unmanageable. When a problem occurs, the reason is difficult to find, and the operation and maintenance management needs to carry out complicated authority application and verification, which affects the operation and maintenance efficiency, has poor maintenance quality, and finally affects the safety of facilities and the broadband service quality of users, so that the image of operators is damaged.
In view of the above, there is a need in the art to develop a new method and apparatus for permission adaptation.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The present disclosure is directed to a method for right adaptation, a device for right adaptation, a computer-readable storage medium, and an electronic device, so as to overcome, at least to some extent, the technical problems of poor security and poor quality of service due to the limitations of the related art.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows, or in part will be obvious from the description, or may be learned by practice of the disclosure.
According to a first aspect of the embodiments of the present invention, there is provided a method for permission adaptation, the method including:
acquiring work order information and work order states, wherein the work order states comprise work order effectiveness, work order change and work order failure;
determining the unlocking authority of the intelligent door lock in the work order information according to the work order information and the work order state;
and unlocking the intelligent door lock according to the unlocking authority.
In an exemplary embodiment of the present invention, the determining the unlocking authority of the intelligent door lock in the work order information according to the work order information and the work order state includes:
when the work order state is that the work order is in effect, matching a corresponding operation account and an intelligent door lock according to the work order information;
and acquiring alarm information corresponding to the intelligent door lock, and determining the unlocking authority of the intelligent door lock according to the operation account and the alarm information.
In an exemplary embodiment of the present invention, the alarm information includes: low battery alarm information and door lock control exception information.
In an exemplary embodiment of the invention, the operating account includes: an application account and a system account;
the unlocking authority comprises: background unlocking authority, application unlocking authority and emergency unlocking authority;
the background unlocking authority is matched with the application account and the system account, the application unlocking authority is matched with the application account, and the emergency unlocking authority is matched with the application account.
In an exemplary embodiment of the present invention, the determining the unlocking authority of the intelligent door lock according to the operation account and the alarm information includes:
when the operation account is the system account and the alarm information does not exist, determining that the unlocking authority of the intelligent door lock is the background unlocking authority;
when the operation account is the application account and the alarm information does not exist, determining that the unlocking authority of the intelligent door lock is the background unlocking authority and the application unlocking authority;
when the operation account is the system account and the alarm information exists, determining that the unlocking authority of the intelligent door lock is the background unlocking authority, the application unlocking authority and the emergency unlocking authority;
and when the operation account is the application account and the alarm information exists, determining that the unlocking authority of the intelligent door lock is the background unlocking authority, the application unlocking authority and the emergency unlocking authority.
In an exemplary embodiment of the present invention, the determining the unlocking authority of the intelligent door lock in the work order information according to the work order information and the work order state includes:
when the work order state is the work order change, matching a corresponding previous operation account, a corresponding current operation account and an intelligent door lock according to the work order information;
and canceling the unlocking authority of the last operation account on the intelligent door lock, and determining the unlocking authority of the current operation account on the intelligent door lock.
In an exemplary embodiment of the invention, after the obtaining of the work order information and the work order status, the method further includes:
when the work order state is that the work order is invalid, matching a corresponding operation account and an intelligent door lock according to the work order information;
and canceling the unlocking authority of the operation account on the intelligent door lock.
According to a second aspect of the embodiments of the present invention, there is provided a permission adaptation apparatus, including:
the information acquisition module is configured to acquire work order information and work order states, wherein the work order states comprise work order effective, work order change and work order failure;
the authority determining module is configured to determine unlocking authority of the intelligent door lock in the work order information according to the work order information and the work order state;
and the door lock unlocking module is configured to unlock the intelligent door lock according to the unlocking authority.
According to a third aspect of embodiments of the present invention, there is provided an electronic apparatus including: a processor and a memory; wherein the memory has stored thereon computer readable instructions which, when executed by the processor, implement the method of rights adaptation in any of the exemplary embodiments described above.
According to a fourth aspect of embodiments of the present invention, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the rights adaptation method in any of the exemplary embodiments described above.
As can be seen from the foregoing technical solutions, the permission adaptation method, the permission adaptation apparatus, the computer storage medium, and the electronic device in the exemplary embodiments of the present disclosure have at least the following advantages and positive effects:
in the method and the device provided by the exemplary embodiment of the disclosure, the unlocking authority of the corresponding intelligent door lock is determined according to the work order information and the work order state so as to unlock, thereby avoiding a complex authority application process and unlocking authority abuse condition, optimizing the intelligent control flows of management, operation, maintenance, construction and the like of the ODN outdoor passive box facility while ensuring the safety of the ODN outdoor passive box facility, the optical fiber cable and the communication service carried by the ODN outdoor passive box facility, greatly shortening the management and maintenance time, improving the operation and maintenance efficiency, accelerating the broadband service opening of a user, and improving the service quality.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without the exercise of inventive faculty.
Fig. 1 schematically illustrates a flow chart of a method for permission adaptation in an exemplary embodiment of the present disclosure;
fig. 2 schematically illustrates a flow chart of a method for determining unlocking authority of an intelligent door lock in an exemplary embodiment of the present disclosure;
fig. 3 schematically illustrates a flow chart of a method for further determining unlocking authority of an intelligent door lock in an exemplary embodiment of the disclosure;
fig. 4 schematically illustrates a flowchart of another method for determining unlocking authority of an intelligent door lock in an exemplary embodiment of the disclosure;
fig. 5 is a schematic flow chart illustrating a method for canceling unlocking authority in an exemplary embodiment of the present disclosure;
fig. 6 schematically illustrates an architecture diagram of a permission adaptation system in an application scenario in an exemplary embodiment of the present disclosure;
fig. 7 schematically illustrates a flowchart of a permission adaptation method in an application scenario in an exemplary embodiment of the present disclosure;
fig. 8 schematically illustrates a structural diagram of a permission adaptation apparatus in an exemplary embodiment of the present disclosure;
fig. 9 schematically illustrates an electronic device for implementing a method for permission adaptation in an exemplary embodiment of the present disclosure;
fig. 10 schematically illustrates a computer-readable storage medium for implementing a rights adaptation method in an exemplary embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the subject matter of the present disclosure can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and the like. In other instances, well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the present disclosure.
The terms "a", "an", "the" and "said" are used in this specification to denote the presence of one or more elements/components/parts/etc.; the terms "comprising" and "having" are intended to be inclusive and mean that there may be additional elements/components/etc. other than the listed elements/components/etc.; the terms "first" and "second," etc. are used merely as labels, and are not limiting on the number of their objects.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities.
Aiming at the problems in the related art, the disclosure provides a permission adaptation method. Fig. 1 shows a flowchart of a rights adaptation method, which, as shown in fig. 1, at least comprises the following steps:
and S110, acquiring work order information and work order states, wherein the work order states comprise work order effectiveness, work order change and work order failure.
And S120, determining the unlocking authority of the intelligent door lock in the work order information according to the work order information and the work order state.
And S130, unlocking the intelligent door lock according to the unlocking authority.
In the exemplary embodiment of the disclosure, the unlocking authority of the corresponding intelligent door lock is determined according to the work order information and the work order state so as to unlock, so that a complicated authority application process and unlocking authority abuse condition are avoided, the safety of ODN outdoor passive box facilities, optical fiber cables and communication services borne by the ODN outdoor passive box facilities is guaranteed, meanwhile, the intelligent management and control processes such as management, operation and maintenance, construction and the like of the ODN outdoor passive box facilities are optimized, the management and maintenance duration is greatly shortened, the operation and maintenance efficiency is improved, the broadband service opening of users is accelerated, and the service quality is improved.
The following describes each step of the rights adaptation method in detail.
In step S110, work order information and work order status are obtained, and the work order status includes work order effective, work order change, and work order invalid.
In an exemplary embodiment of the present disclosure, the work order information may include an ID (Identity) of an intelligent door lock of the optical distribution facility, information of an operator, corresponding operation account information, and the like, and this exemplary embodiment is not particularly limited in this respect.
Wherein, the work order can be in process; the work order failure can be work order completion, withdrawal, order rejection and the like; the work order change may be a work order transfer with an operator change.
In step S120, the unlocking authority of the intelligent door lock in the work order information is determined according to the work order information and the work order state.
In an exemplary embodiment of the disclosure, after the work order information and the work order state are acquired, the unlocking authority of the corresponding intelligent door lock can be determined according to the work order information and the work order state.
In an alternative embodiment, fig. 2 shows a flow chart of a method for determining the unlocking authority of the intelligent door lock, and as shown in fig. 2, the method at least includes the following steps: in step S210, when the work order status is that the work order is valid, the corresponding operation account and the intelligent door lock are matched according to the work order information.
And under the condition that the work order state is that the work order is in effect, the operation account corresponding to the name of the operator in the work order information can be obtained, and the operation account is further matched with the intelligent door lock ID information of the work order information to determine the intelligent door lock.
In step S220, the warning information corresponding to the intelligent door lock is obtained, and the unlocking authority of the intelligent door lock is determined according to the operation account and the warning information.
In an optional embodiment, the warning information includes: low battery alarm information and door lock control exception information.
The low power alarm information can represent that the power of the intelligent door lock is too low; the door lock control abnormality information may be information indicating an abnormality of the intelligent door lock control module or other communication abnormality.
In an alternative embodiment, operating the account includes: an application account and a system account; the unlocking authority includes: background unlocking authority, application unlocking authority and emergency unlocking authority; the background unlocking authority is matched with the application account and the system account, the unlocking authority is matched with the application account, and the emergency unlocking authority is matched with the application account.
The Application account may be an account registered by an APP (Application), and the system account may be an account registered by a Web (World Wide Web) via a PC (Personal Computer), but is not limited to the account registered by the Web.
The background unlocking authority can remotely unlock the intelligent door lock, and the authority can be matched with a system account and an application account; the intelligent door lock can be unlocked by using Bluetooth by applying the unlocking authority, and the authority is only matched with the application account; the emergency unlocking authority can use a Bluetooth authorization electronic key to unlock the intelligent door lock, and the authority only matches with an application account.
In an alternative embodiment, fig. 3 shows a flow chart of a method for further determining the unlocking authority of the intelligent door lock, and as shown in fig. 3, the method at least includes the following steps: in step S310, when the operation account is a system account and there is no warning information, it is determined that the unlocking authority of the smart door lock is the background unlocking authority.
And when no alarm is given, the account is a system account, the background unlocking authority is authorized, and feedback is carried out.
In step S320, when the operation account is an application account and there is no warning information, it is determined that the unlocking authority of the smart door lock is the background unlocking authority and the application unlocking authority.
And when no alarm is given, the account is an application account, the background unlocking authority and the application unlocking authority are authorized, and feedback is carried out.
In step S330, when the operation account is a system account and there is warning information, it is determined that the unlocking right of the intelligent door lock is a background unlocking right, an application unlocking right, and an emergency unlocking right.
When an alarm occurs, the account is a system account, a corresponding application account is added to the system account to authorize all unlocking authorities including the emergency unlocking authority, and feedback is carried out.
In step S340, when the operation account is an application account and there is warning information, it is determined that the unlocking right of the intelligent door lock is a background unlocking right, an application unlocking right, and an emergency unlocking right.
When an alarm is given, the account is an application account, all unlocking authorities including the emergency unlocking authority are authorized, and feedback is carried out.
In the exemplary embodiment, the unlocking authority of the intelligent door lock is determined according to the operation account and the alarm information, the unlocking authority of the account is effective at the same time when the work order takes effect, a tedious authority application process is avoided, the situation that the intelligent door lock is unlocked randomly by using an electronic key is also avoided, and the safety of the intelligent door lock is improved.
In an alternative embodiment, fig. 4 shows a flow chart of another method for determining the unlocking authority of the intelligent door lock, and as shown in fig. 4, the method at least includes the following steps: in step S410, when the work order status is a work order change, the corresponding previous operation account, the current operation account, and the intelligent door lock are matched according to the work order information.
Under the condition that the work order state is the work order change, the last operation account corresponding to the name of the last operator in the work order information and the current operation account corresponding to the name of the transfer operator can be obtained, and the current operation account and the ID information of the intelligent door lock of the work order information are further matched to determine the intelligent door lock.
In step S420, the unlocking authority of the previous operation account on the intelligent door lock is cancelled, and the unlocking authority of the current operation account on the intelligent door lock is determined.
After the last operation account and the current operation account are determined, the unlocking authority of the last operation account of the original operator can be cancelled, and the unlocking authority of the changed current operation account of the operator on the intelligent door lock is authorized to be transferred and fed back.
When the unlocking right of the current operation account on the intelligent door lock is determined, the unlocking right can be determined according to the mode shown in fig. 3, and details are not repeated here.
In the exemplary embodiment, the unlocking authority of the corresponding account can be automatically cancelled and changed when the work order is changed, the unlocking authority is tightly attached to the state and the information of the work order, and the instantaneity of unlocking authority change and the safety of the intelligent door lock are improved.
In an alternative embodiment, fig. 5 shows a flow chart of a method for canceling unlocking right, and as shown in fig. 5, the method at least includes the following steps: in step S510, when the work order status is that the work order is invalid, the corresponding operation account and the intelligent door lock are matched according to the work order information.
When the work order state is the condition that the work order is invalid, the operation account corresponding to the name of the operator in the work order information can be obtained, and the operation account is further matched with the ID information of the intelligent door lock of the work order information to determine the intelligent door lock.
In step S520, the unlocking authority of the intelligent door lock by the operation account is cancelled.
After the operation account and the intelligent door lock are determined, the unlocking authority of the original operation account of the operator on the intelligent door lock can be cancelled and fed back.
In the exemplary embodiment, the unlocking authority of the corresponding account can be automatically cancelled when the work order fails, and the unlocking authority is tightly attached to the state and the information of the work order, so that the instantaneity of unlocking authority cancellation and the safety of the intelligent door lock are improved.
In step S130, the smart door lock is unlocked according to the unlocking authority.
After the unlocking authority is determined, the unlocking authority can be sent to unlock the intelligent door lock.
The following describes the permission adaptation method in the embodiment of the present disclosure in detail with reference to an application scenario.
Fig. 6 shows a schematic architecture diagram of a right adaptation system in an application scenario, and as shown in fig. 6, the right adaptation system includes an access control management module 610, a mobile application 620, an electronic key 630, and an outdoor optical distribution facility 640.
The access control module 610 implements management of the intelligent door lock of the optical distribution facility, and mainly includes implementation of facility management, operation account management, various work order functions, unlocking functions and the like. And, the access control management module 610 is implemented by software.
The access control module 610 further includes an account management module 611, a right adaptation module 612, a work order change analysis module 613, an alarm module 614, and a background unlocking module 615.
Specifically, the account management module 611 manages accounts related to the operation of the intelligent door lock of the optical distribution facility in a unified manner, including a system account logged in through a PC computer mode and an application account logged in through an APP mode. The account management module 611 obtains the unlocking authority information of the account from the authority adaptation module 612. After the account with the authority logs in, the account management module 611 sends the information related to the account unlocking authority to the background unlocking module 615, or the unlocking module 621 is applied, or the authorization transfer module 622 unlocks the intelligent door lock.
The right adaptation module 612 may analyze the work order and the alarm condition, so as to intelligently match, authorize or cancel the unlocking right of the account to the target intelligent door lock, and return the result to the account management module 611.
In addition, the permission adaptation module 612 divides different unlocking permissions according to different unlocking modes, and matches the system account with the application account. And after the account logs in, opening the target intelligent door lock in a specific unlocking mode according to the unlocking authority.
The work order change analysis module 613 acquires a work order generated by an OSS (Operation Support Systems) or a door lock management module. When the work order is generated or the status changes, the work order information and the work order status are synchronously sent to the right adaptation module 612.
The work order information may include the ID of the intelligent door lock of the optical distribution facility, information of an operator, corresponding operation account information, and the like; the work order may be in process; the work order failure can be work order completion, withdrawal, order rejection and the like; the work order change may be a work order transfer with an operator change.
The alarm module 614 provides the associated alarm information to the permission adaptation module 612. If the intelligent door lock has low power or abnormal door lock control and other alarms, the alarm can be used as the premise of the electronic key emergency unlocking permission authorization.
After the permission adaptation authorization, unlocking is realized through the background unlocking module 615, the application unlocking module 621 or the authorization transfer module 622.
The background unlocking module 615 may be an account with unlocking authority, and after logging in a system account and an application account, the background unlocking module 615 remotely unlocks the intelligent door lock through a wireless network after acquiring account unlocking authority information from the account management module 611.
The mobile terminal application 620 achieves management and operation functions of the intelligent door lock of the optical distribution facility through the APP.
The mobile end application 620 includes an application unlocking module 621 and an authorization transfer module 622. The application unlocking module 621 and the authorization transfer module 622 are also implemented in software.
The application unlocking module 621 can be an application account login APP with unlocking authority, the account management module 611 sends account unlocking authority information to the application unlocking module 621, the background unlocking module 615 is accessed through a wireless network to carry out remote unlocking, or the terminal Bluetooth short-range intelligent door lock is used for unlocking.
The authorization transfer module 622 may be an account login APP with an emergency unlocking authority, and after acquiring account unlocking authority information from the account management module 611, transfers authorization to the electronic key 630 through bluetooth, and uses the electronic key 630 to unlock the optical distribution facility door lock.
Electronic key 630 under emergency situation, APP shifts the permission of unblanking to the electronic key and opens intelligent lock.
The outdoor optical distribution facility 640 comprises an intelligent door lock, and the intelligent door lock is installed on the ODN outdoor optical distribution facility, is realized by hardware and software, and can realize management and security of the optical distribution facility.
Fig. 7 is a flowchart illustrating an authority adaptation method in an application scenario, and as shown in fig. 7, in step S710, the work order change analysis module obtains a work order and a state thereof from the OSS or the door lock management module.
The work order information may include the ID of the intelligent door lock of the optical distribution facility, information of the operator, corresponding operation account information, and the like, which is not particularly limited in the present exemplary embodiment.
Wherein, the work order can be in process; the work order failure can be work order completion, withdrawal, order rejection and the like; the work order change may be a work order transfer with an operator change.
In step S720, the permission adaptation module acquires the work order information from the work order change analysis module, and matches the work order operator account and the door lock information with the account management module.
And under the condition that the work order state is that the work order is in effect, the operation account corresponding to the name of the operator in the work order information can be obtained, and the operation account is further matched with the intelligent door lock ID information of the work order information to determine the intelligent door lock.
In step S730, the alarm module is combined to determine whether the intelligent door lock has a low power alarm or a door lock control abnormal alarm.
And acquiring alarm information corresponding to the intelligent door lock, and determining the unlocking authority of the intelligent door lock according to the operation account and the alarm information.
The low power alarm information can represent that the power of the intelligent door lock is too low; the door lock control abnormality information may be information indicating an abnormality of the intelligent door lock control module or other communication abnormality.
Specifically, operating the account includes: an application account and a system account; unlocking authority, including: background unlocking authority, application unlocking authority and emergency unlocking authority; the background unlocking authority matches the application account and the system account, the application unlocking authority matches the application account, and the emergency unlocking authority matches the application account.
The application account can be an account logged in through an APP mode, and the system account can be an account logged in through a PC.
The background unlocking authority can remotely unlock the intelligent door lock, and the authority can be matched with a system account and an application account; the intelligent door lock can be unlocked by using Bluetooth by applying the unlocking authority, and the authority is only matched with an application account; the emergency unlocking authority can use a Bluetooth authorization electronic key to unlock the intelligent door lock, and the authority only matches with an application account.
In step S740, the account is a system account, the background unlocking authority is authorized, and the result is fed back to the account management module.
And when no alarm is given, the account is a system account, the background unlocking authority is authorized, and feedback is carried out.
In step S750, the account is an APP account, the background unlocking authority and the application unlocking authority are authorized, and the result is fed back to the account management module.
And when no alarm is given, the account is an application account, the background unlocking authority and the application unlocking authority are authorized, and feedback is carried out.
In step S760, the account is a system account, added as an APP account, authorized to include all unlocking permissions within the emergency unlocking permission, and the result is fed back to the account management module.
When an alarm occurs, the account is a system account, a corresponding application account is added to the system account to authorize all unlocking authorities including the emergency unlocking authority, and feedback is carried out.
In step S770, the account is an APP account, the authorization includes all unlocking permissions in the emergency unlocking permission, and the result is fed back to the account management module.
When an alarm is given, the account is an application account, all unlocking authorities including the emergency unlocking authority are authorized, and feedback is carried out.
In step S780, the permission adaptation module obtains the work order information from the work order change analysis module, cancels the original unlocking permission of the operator account, authorizes the changed unlocking permission of the work order door lock from the operator account, and feeds back the result to the account management module.
Under the condition that the work order state is the work order change, the last operation account corresponding to the name of the last operator in the work order information and the current operation account corresponding to the name of the transfer operator can be obtained, and the current operation account and the ID information of the intelligent door lock of the work order information are further matched to determine the intelligent door lock.
After the previous operation account and the current operation account are determined, the unlocking authority of the previous operation account of the original operator can be cancelled, and the unlocking authority of the current operation account of the changed operator on the intelligent door lock is authorized to be transferred and fed back.
In step S790, the permission adaptation module obtains the work order information from the work order change analysis module, cancels the original unlocking permission of the operator account, and feeds the result back to the account management module.
When the work order state is the condition that the work order is invalid, the operation account corresponding to the name of the operator in the work order information can be obtained, and the operation account is further matched with the ID information of the intelligent door lock of the work order information to determine the intelligent door lock.
After the operation account and the intelligent door lock are determined, the unlocking authority of the original operation account of the operator on the intelligent door lock can be cancelled and fed back.
After the account with the authority matching authorization logs in, the account management module sends the information related to the account unlocking authority to the background unlocking module, or applies the unlocking module, or authorizes the transfer module to unlock the intelligent door lock.
In summary, when the work order state is valid, the account corresponding to the operator name of the work order is acquired through the account management module, and is matched with the intelligent door lock ID information in the work order, and the corresponding unlocking authority of the account to the door lock is distributed.
And when the work order state is invalid, canceling the unlocking authority of the account on the door lock.
When the operator in the work order changes, the unlocking authority of the original account to the door lock is cancelled, and the unlocking authority of the changed operator account to the door lock is authorized.
And the system account or the application account is adapted to different unlocking permissions. However, the emergency unlocking authority is authorized only under a specific alarm condition. And the permission adaptation module acquires alarm related conditions of the intelligent door lock from the alarm module. Only if the intelligent door lock is out of control or the electric quantity is low, the related alarm is given out to authorize the emergency unlocking permission, and the random unlocking is limited.
According to the permission adaptation method under the application scene, the unlocking permission of the corresponding intelligent door lock is determined according to the work order information and the work order state so as to unlock, the complex permission application process and the condition of unlocking permission abuse are avoided, the safety of ODN outdoor passive box facilities, optical fiber cables and communication services borne by the ODN outdoor passive box facilities is guaranteed, meanwhile, the intelligent management and control processes of management, operation and maintenance, construction and the like of the ODN outdoor passive box facilities are optimized, the management and maintenance duration is greatly shortened, the operation and maintenance efficiency is improved, and the broadband service opening of users is accelerated.
Fig. 8 shows a schematic structure diagram of a rights adaptation device, and as shown in fig. 8, a rights adaptation device 800 may include: an information acquisition module 810, an authority determination module 820, and a door lock unlocking module 830. Wherein:
an information obtaining module 810 configured to obtain work order information and work order states, wherein the work order states include work order effective, work order change and work order invalid;
an authority determining module 820 configured to determine an unlocking authority of the intelligent door lock in the work order information according to the work order information and the work order state;
and the door lock unlocking module 830 is configured to unlock the intelligent door lock according to the unlocking authority.
In an exemplary embodiment of the present invention, the determining the unlocking authority of the intelligent door lock in the work order information according to the work order information and the work order state includes:
when the work order state is that the work order is in effect, matching a corresponding operation account and an intelligent door lock according to the work order information;
and acquiring alarm information corresponding to the intelligent door lock, and determining the unlocking authority of the intelligent door lock according to the operation account and the alarm information.
In an exemplary embodiment of the present invention, the alarm information includes: low battery alarm information and door lock control exception information.
In an exemplary embodiment of the invention, the operating account includes: an application account and a system account;
the unlocking authority comprises: background unlocking authority, application unlocking authority and emergency unlocking authority;
the background unlocking authority is matched with the application account and the system account, the application unlocking authority is matched with the application account, and the emergency unlocking authority is matched with the application account.
In an exemplary embodiment of the present invention, the determining the unlocking authority of the intelligent door lock according to the operation account and the alarm information includes:
when the operation account is the system account and the alarm information does not exist, determining that the unlocking authority of the intelligent door lock is the background unlocking authority;
when the operation account is the application account and the alarm information does not exist, determining that the unlocking authority of the intelligent door lock is the background unlocking authority and the application unlocking authority;
when the operation account is the system account and the alarm information exists, the unlocking permission of the intelligent door lock is determined to be the background unlocking permission, the application unlocking permission and the emergency unlocking permission;
and when the operation account is the application account and the alarm information exists, determining that the unlocking authority of the intelligent door lock is the background unlocking authority, the application unlocking authority and the emergency unlocking authority.
In an exemplary embodiment of the present invention, the determining the unlocking authority of the intelligent door lock in the work order information according to the work order information and the work order state includes:
when the work order state is the work order change, matching a corresponding previous operation account, a corresponding current operation account and an intelligent door lock according to the work order information;
and canceling the unlocking authority of the last operation account on the intelligent door lock, and determining the unlocking authority of the current operation account on the intelligent door lock.
In an exemplary embodiment of the invention, after the obtaining of the work order information and the work order status, the method further includes:
when the work order state is that the work order is invalid, matching a corresponding operation account and an intelligent door lock according to the work order information;
and canceling the unlocking authority of the operation account on the intelligent door lock.
The details of the permission adaptation apparatus 800 have been described in detail in the corresponding permission adaptation method, and therefore are not described herein again.
It should be noted that although several modules or units of the rights adaptation means 800 are mentioned in the above detailed description, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
In addition, in an exemplary embodiment of the present disclosure, an electronic device capable of implementing the above method is also provided.
An electronic device 900 according to such an embodiment of the invention is described below with reference to fig. 9. The electronic device 900 shown in fig. 9 is only an example and should not bring any limitations to the function and scope of use of the embodiments of the present invention.
As shown in fig. 9, the electronic device 900 is embodied in the form of a general purpose computing device. Components of electronic device 900 may include, but are not limited to: the at least one processing unit 910, the at least one storage unit 920, a bus 930 connecting different system components (including the storage unit 920 and the processing unit 910), and a display unit 940.
Wherein the storage unit stores program code that may be executed by the processing unit 910, such that the processing unit 910 performs the steps according to various exemplary embodiments of the present invention described in the above section "exemplary method" of this specification.
The storage unit 920 may include readable media in the form of volatile memory units, such as a random access memory unit (RAM) 921 and/or a cache memory unit 922, and may further include a read only memory unit (ROM) 923.
Storage unit 920 may also include a program/utility 924 having a set (at least one) of program modules 925, such program modules 925 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 930 can be any of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 900 may also communicate with one or more external devices 1100 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 900, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 900 to communicate with one or more other computing devices. Such communication may occur via input/output (I/O) interface 950. Also, the electronic device 900 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN) and/or a public network, such as the Internet) via the network adapter 960. As shown, the network adapter 960 communicates with the other modules of the electronic device 900 via the bus 930. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the electronic device 900, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a terminal device, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
In an exemplary embodiment of the present disclosure, there is also provided a computer-readable storage medium having stored thereon a program product capable of implementing the above-described method of the present specification. In some possible embodiments, aspects of the invention may also be implemented in the form of a program product comprising program code means for causing a terminal device to carry out the steps according to various exemplary embodiments of the invention described in the above-mentioned "exemplary methods" section of the present description, when said program product is run on the terminal device.
Referring to fig. 10, a program product 1000 for implementing the above method according to an embodiment of the present invention is described, which may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product of the present invention is not limited in this regard and, in the present document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
A computer readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (10)

1. A method for permission adaptation, the method comprising:
acquiring work order information and work order states, wherein the work order states comprise work order effectiveness, work order change and work order failure;
determining the unlocking authority of the intelligent door lock in the work order information according to the work order information and the work order state;
and unlocking the intelligent door lock according to the unlocking authority.
2. The permission adaptation method according to claim 1, wherein the determining of the unlocking permission of the intelligent door lock in the work order information according to the work order information and the work order state comprises:
when the work order state is that the work order takes effect, matching a corresponding operation account with the intelligent door lock according to the work order information;
and acquiring alarm information corresponding to the intelligent door lock, and determining the unlocking authority of the intelligent door lock according to the operation account and the alarm information.
3. The permission adaptation method according to claim 2, wherein the alarm information includes: low battery alarm information and door lock control exception information.
4. The permission adaptation method according to claim 2, wherein the operating account includes: an application account and a system account;
the unlocking authority comprises: background unlocking authority, application unlocking authority and emergency unlocking authority;
the background unlocking authority matches the application account and the system account, the application unlocking authority matches the application account, and the emergency unlocking authority matches the application account.
5. The permission adaptation method according to claim 4, wherein the determining of the unlocking permission of the intelligent door lock according to the operation account and the alarm information comprises:
when the operation account is the system account and the alarm information does not exist, determining that the unlocking authority of the intelligent door lock is the background unlocking authority;
when the operation account is the application account and the alarm information does not exist, determining that the unlocking permission of the intelligent door lock is the background unlocking permission and the application unlocking permission;
when the operation account is the system account and the alarm information exists, the unlocking permission of the intelligent door lock is determined to be the background unlocking permission, the application unlocking permission and the emergency unlocking permission;
and when the operation account is the application account and the alarm information exists, determining that the unlocking authority of the intelligent door lock is the background unlocking authority, the application unlocking authority and the emergency unlocking authority.
6. The permission adaptation method according to claim 1, wherein the determining of the unlocking permission of the intelligent door lock in the work order information according to the work order information and the work order state comprises:
when the work order state is the work order change, matching a corresponding previous operation account, a corresponding current operation account and an intelligent door lock according to the work order information;
and canceling the unlocking authority of the last operation account on the intelligent door lock, and determining the unlocking authority of the current operation account on the intelligent door lock.
7. The permission adaptation method of claim 1, wherein after the obtaining of the work order information and the work order status, the method further comprises:
when the work order state is that the work order is invalid, matching a corresponding operation account and an intelligent door lock according to the work order information;
and canceling the unlocking authority of the operation account on the intelligent door lock.
8. An authority adaptation apparatus, comprising:
the information acquisition module is configured to acquire work order information and work order states, wherein the work order states comprise work order effectiveness, work order change and work order failure;
the authority determining module is configured to determine unlocking authority of the intelligent door lock in the work order information according to the work order information and the work order state;
and the door lock unlocking module is configured to unlock the intelligent door lock according to the unlocking authority.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the rights adaptation method of any one of claims 1-7.
10. An electronic device, comprising:
a processor;
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the permission adaptation method of any of claims 1-7 via execution of the executable instructions.
CN202210894133.2A 2022-07-27 2022-07-27 Permission adaptation method and device, storage medium and electronic equipment Pending CN115273284A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210894133.2A CN115273284A (en) 2022-07-27 2022-07-27 Permission adaptation method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210894133.2A CN115273284A (en) 2022-07-27 2022-07-27 Permission adaptation method and device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN115273284A true CN115273284A (en) 2022-11-01

Family

ID=83771192

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210894133.2A Pending CN115273284A (en) 2022-07-27 2022-07-27 Permission adaptation method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN115273284A (en)

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104751544A (en) * 2015-02-10 2015-07-01 国家电网公司 Intelligent lock control system and management method thereof
CN105049653A (en) * 2015-05-29 2015-11-11 深圳光启智能光子技术有限公司 Method and system for controlling unlocking authority of locks based on network
CN106600207A (en) * 2016-11-07 2017-04-26 中广核(深圳)辐射监测技术有限公司 Nuclear power plant access control system and dose management data integrated system and method
CN107240179A (en) * 2017-06-08 2017-10-10 电子科技大学 A kind of base station Intelligent entrance guard management system
CN107767516A (en) * 2017-10-27 2018-03-06 宁波瑞奥物联技术股份有限公司 A kind of intelligent door lock and intelligent key management system
CN108765646A (en) * 2018-05-02 2018-11-06 贵安新区搜床科技有限公司 A kind of control method for door lock and device based on GPS positioning
CN109830007A (en) * 2019-01-16 2019-05-31 常州太平通讯科技有限公司 Outdoor equipment monitoring system and door opening method based on NB-IOT
CN110070650A (en) * 2019-04-25 2019-07-30 成都华立达信息技术有限公司 A kind of intelligent unlocking method and system of intelligent distribution box
WO2019244289A1 (en) * 2018-06-20 2019-12-26 三菱電機株式会社 Electronic lock system, electronic lock management method, and electronic lock management program
CN110992524A (en) * 2019-10-29 2020-04-10 广东纬德信息科技有限公司 Intelligent lock control method and system based on USB
CN111243131A (en) * 2019-12-30 2020-06-05 国网北京市电力公司 Method and device for unlocking lock, storage medium and processor
CN112215999A (en) * 2020-11-05 2021-01-12 深圳市简工智能科技有限公司 Screen cabinet lock control system and method
CN112734357A (en) * 2020-12-24 2021-04-30 重庆中法供水有限公司 Locking management method and system
CN113541950A (en) * 2020-12-21 2021-10-22 南方电网数字电网研究院有限公司 Lock management control method, system and equipment based on digital certificate
CN114038093A (en) * 2021-11-04 2022-02-11 广东纬德信息科技股份有限公司 Intelligent lock management system and method for power distribution network
CN114550353A (en) * 2022-02-24 2022-05-27 广东电网有限责任公司 Intelligent lock control system of transformer substation

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104751544A (en) * 2015-02-10 2015-07-01 国家电网公司 Intelligent lock control system and management method thereof
CN105049653A (en) * 2015-05-29 2015-11-11 深圳光启智能光子技术有限公司 Method and system for controlling unlocking authority of locks based on network
CN106600207A (en) * 2016-11-07 2017-04-26 中广核(深圳)辐射监测技术有限公司 Nuclear power plant access control system and dose management data integrated system and method
CN107240179A (en) * 2017-06-08 2017-10-10 电子科技大学 A kind of base station Intelligent entrance guard management system
CN107767516A (en) * 2017-10-27 2018-03-06 宁波瑞奥物联技术股份有限公司 A kind of intelligent door lock and intelligent key management system
CN108765646A (en) * 2018-05-02 2018-11-06 贵安新区搜床科技有限公司 A kind of control method for door lock and device based on GPS positioning
WO2019244289A1 (en) * 2018-06-20 2019-12-26 三菱電機株式会社 Electronic lock system, electronic lock management method, and electronic lock management program
CN109830007A (en) * 2019-01-16 2019-05-31 常州太平通讯科技有限公司 Outdoor equipment monitoring system and door opening method based on NB-IOT
CN110070650A (en) * 2019-04-25 2019-07-30 成都华立达信息技术有限公司 A kind of intelligent unlocking method and system of intelligent distribution box
CN110992524A (en) * 2019-10-29 2020-04-10 广东纬德信息科技有限公司 Intelligent lock control method and system based on USB
CN111243131A (en) * 2019-12-30 2020-06-05 国网北京市电力公司 Method and device for unlocking lock, storage medium and processor
CN112215999A (en) * 2020-11-05 2021-01-12 深圳市简工智能科技有限公司 Screen cabinet lock control system and method
CN113541950A (en) * 2020-12-21 2021-10-22 南方电网数字电网研究院有限公司 Lock management control method, system and equipment based on digital certificate
CN112734357A (en) * 2020-12-24 2021-04-30 重庆中法供水有限公司 Locking management method and system
CN114038093A (en) * 2021-11-04 2022-02-11 广东纬德信息科技股份有限公司 Intelligent lock management system and method for power distribution network
CN114550353A (en) * 2022-02-24 2022-05-27 广东电网有限责任公司 Intelligent lock control system of transformer substation

Similar Documents

Publication Publication Date Title
CN101232203B (en) Apparatus, methods and system for role-based access in an intelligent electronic device
US10044707B1 (en) Token-based access control
US20080086758A1 (en) Decentralized access control framework
CN105378648A (en) Self-provisioning access control
CN108289098B (en) Authority management method and device of distributed file system, server and medium
CN103489233A (en) Electronic door control system with dynamic password
CN105261096A (en) Network smart lock system
CN107480509A (en) O&M safety auditing system logs in vessel process, system, equipment and storage medium
CN104318650A (en) Dynamic coded lock management and control system
CN1691573B (en) Method and system for displaying and managing security information
CN104318652A (en) Intelligent door lock management method of hydropower station
US20220004999A1 (en) Service kiosk device provisioning
CN103544749A (en) Cloud control access control management system and authentication method thereof
CN112702413A (en) Intelligent escort cash box system, control method, computer equipment and storage medium
CN204390320U (en) A kind of dynamic puzzle-lock system
CN111754161A (en) Express box control method, device and system, express box and storage medium
CN115273284A (en) Permission adaptation method and device, storage medium and electronic equipment
CN112446988A (en) Access control application method, device and storage medium
CN108713199B (en) Authority management method and system, mobile terminal, shared charging equipment and server
CN114257436B (en) Access security management method and system suitable for fort machine, electronic equipment and readable storage medium
CN111734221B (en) Well lid unlocking method, device, equipment, storage medium and system
CN104220984B (en) Information processor, information processing method and computer program
US10846959B2 (en) System and method for opening a vault
CN103295288B (en) Photon lock door control system based on B/S (Browser/Server) framework
CN113660245B (en) Terminal access right control method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination