CN106780191A - The method that the security personnel team of safety-protection system authorizes and user authorizes to security personnel team - Google Patents

The method that the security personnel team of safety-protection system authorizes and user authorizes to security personnel team Download PDF

Info

Publication number
CN106780191A
CN106780191A CN201710080151.6A CN201710080151A CN106780191A CN 106780191 A CN106780191 A CN 106780191A CN 201710080151 A CN201710080151 A CN 201710080151A CN 106780191 A CN106780191 A CN 106780191A
Authority
CN
China
Prior art keywords
security personnel
team
authorization
terminal
safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710080151.6A
Other languages
Chinese (zh)
Inventor
林勇
郭伟峰
祝金龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wenzhou storm Intelligent Technology Co., Ltd.
Original Assignee
Wenzhou City Cloud Lock Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wenzhou City Cloud Lock Intelligent Technology Co Ltd filed Critical Wenzhou City Cloud Lock Intelligent Technology Co Ltd
Priority to CN201710080151.6A priority Critical patent/CN106780191A/en
Publication of CN106780191A publication Critical patent/CN106780191A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/16Real estate
    • G06Q50/163Property management

Abstract

The method that security personnel team the invention provides safety-protection system authorizes and user authorizes to security personnel team, receive the addition solicited message that supervisor's security personnel terminal sends, supervisor's security personnel terminal is determined whether according to addition solicited message, if, authorization code then is sent to supervisor's security personnel terminal, so that authorization code is sent to security personnel's terminal by supervisor's security personnel terminal;The authorization code that security personnel's terminal sends is received, according to the corresponding security personnel team ID generations security personnel team authority record of authorization code, and successfully confirmation will be authorized to be sent to security personnel's terminal, and receive the authorization requests information that user terminal sends;According to ID and safety-protection system ID generation authorization codes;Authorization code is sent to user terminal, so that authorization code is sent to security personnel's terminal by user terminal;The authorization code that security personnel's terminal sends is received, authority record is generated according to authorization code, be saved in security system authorization list, and successfully confirmation will be authorized to be sent to security personnel's terminal.

Description

The method that the security personnel team of safety-protection system authorizes and user authorizes to security personnel team
Technical field
The present invention relates to technical field of security and protection, authorize and use more particularly, to the security personnel team of the safety-protection system of safety-protection system The method that family authorizes to security personnel team.
Background technology
At present, the safety-protection system in cell needs security protection user individually to be awarded to each security personnel in security personnel team Power, and by upper net operation, can just be monitored, and in the case of occurring unexpectedly, alarmed.Security protection user is to protecting The mandate of peace team needs to know the ID of the ID of input user terminal and security personnel team that process is complicated, authorizes efficiency low.
The content of the invention
In view of this, the security personnel team it is an object of the invention to provide safety-protection system authorizes and user awards to security personnel team The method of power, can be such that security protection user is directly authorized to the security personnel of security personnel team, unexpected situation be monitored, so as to improve award Power efficiency.
In a first aspect, the embodiment of the invention provides the security personnel team authorization method of safety-protection system, it is characterised in that application In server, methods described includes:
The log-on message that supervisor's security personnel terminal sends is received, terminal replies are responsible for the security personnel according to the log-on message Response message;
The addition solicited message that supervisor's security personnel terminal sends is received, is determined whether according to the addition solicited message Supervisor's security personnel terminal, if it is, being responsible for terminal to the security personnel sends authorization code, and is stored in security personnel team authorization code In table, so that supervisor's security personnel terminal shows the authorization code, and the authorization code is sent to security personnel's terminal;
The authorization code that security personnel's terminal sends is received, according to the corresponding security personnel team ID generations of the authorization code Security personnel team authority record, security personnel team authority record is stored in security personnel team membership table, and will authorize successfully true Recognize information and be sent to security personnel's terminal.
With reference in a first aspect, the embodiment of the invention provides the first possible implementation method of first aspect, wherein, institute State includes according to the corresponding security personnel team ID generations security personnel team authority record of the authorization code:
The security personnel is searched from security personnel team members list according to the security personnel team ID, and judges the security personnel With the presence or absence of supervisory right;
If there is the supervisory right, then security personnel ID is generated, and by the security personnel ID, supervisor authorization mark and institute Security personnel team ID is stated to store in the security personnel team members list.
With reference in a first aspect, the embodiment of the invention provides second possible implementation method of first aspect, wherein, institute Stating log-on message includes materials for registration information and key information.
With reference to second possible implementation method of first aspect, the third of first aspect is the embodiment of the invention provides Possible implementation method, wherein, the materials for registration information includes less than at least one information:
Team's name information, the address code information of security personnel supervisor's terminal, phone number and industrial and commercial registration number.
Second aspect, the embodiment of the invention provides the user of safety-protection system to security personnel team authorization method, be applied to clothes Business device, methods described includes:
The log-on message that user terminal sends is received, response letter is replied to the user terminal according to the log-on message Breath;
The authorization requests information that the user terminal sends is received, the authorization requests information includes safety-protection system identity mark Know symbol ID and ID;
According to the ID and safety-protection system ID generation authorization codes, and by the authorization code and the corresponding peace Anti- system identifier is stored in safety-protection system authorization code tables;
The authorization code is sent to the user terminal, so that authorization code described in the user terminal displays, and by institute State authorization code and be sent to security personnel's terminal;
The authorization code that security personnel's terminal sends is received, authority record is generated according to the authorization code, be saved in In security system authorization list, and successfully confirmation will be authorized to be sent to security personnel's terminal.
With reference to second aspect, the first possible implementation method of second aspect is the embodiment of the invention provides, wherein, institute Authorization code is stated for the first authorization code, it is described to be included according to the ID and safety-protection system ID generation authorization codes:
It is the safety-protection system to judge whether the user terminal has according to the ID and the safety-protection system ID The authority of mandate;
If having authority, first authorization code is generated.
With reference to second aspect, second possible implementation method of second aspect is the embodiment of the invention provides, wherein, institute Stating method also includes:
The second authorization code of the user terminal transmission and the term of validity of second authorization code are received, described second is judged Authorization code with the presence or absence of conflict and whether expired, if there is no conflict and without expired, then preserve second authorization code and The term of validity of second authorization code.
With reference to second aspect, the third possible implementation method of second aspect is the embodiment of the invention provides, wherein, institute State includes according to authorization code generation authority record:
According to the ID of security personnel's terminal, effective security personnel is determined whether;
If it is valid, searching the corresponding security personnel team ID of the security personnel from security personnel team members list;
The authorization code is searched from the safety-protection system authorization code tables, if finding the authorization code, institute is obtained State the corresponding safety-protection system ID of authorization code, and the safety-protection system ID and described is preserved in the security system authorization list Security personnel team ID.
With reference to second aspect, the 4th kind of possible implementation method of second aspect is the embodiment of the invention provides, wherein, institute Stating log-on message includes less than at least one information:
Station address, name and phone number.
With reference to second aspect, the 5th kind of possible implementation method of second aspect is the embodiment of the invention provides, wherein, institute Stating method also includes:
The alert notification information that inductor sends is received, and the alert notification information is sent to security personnel's end End, so that security personnel's terminal of the security personnel team shows the alert notification information and the safety-protection system identification information.
The security personnel team that the embodiment of the invention provides safety-protection system authorizes the method authorized to security personnel team with user, connects The log-on message that supervisor's security personnel terminal sends is received, according to log-on message to supervisor's security personnel terminal replies response message;Receive security personnel The addition solicited message that supervisor's terminal sends, supervisor's security personnel terminal is determined whether according to addition solicited message, if it is, to Supervisor's security personnel terminal sends authorization code, and is stored in security personnel team authorization code tables, so that supervisor's security personnel terminal shows described awarding Weighted code, and authorization code is sent to security personnel's terminal;The authorization code that security personnel's terminal sends is received, according to the corresponding guarantor of authorization code Peace team ID generation security personnel team authority record, security personnel team authority record is stored in security personnel team membership table, and will be awarded Weigh successfully confirmation and be sent to security personnel's terminal, and receive the authorization requests information that user terminal sends, authorization requests letter Breath includes safety-protection system identification identifier ID and ID;According to ID and safety-protection system ID generation authorization codes, and will authorize Code and corresponding safety-protection system ID are stored in safety-protection system authorization code tables;Authorization code is sent to user terminal, so that user Terminal shows authorization code, and authorization code is sent into security personnel's terminal;The authorization code that security personnel's terminal sends is received, according to mandate Code generation authority record, is saved in security system authorization list, and successfully confirmation will be authorized to be sent to security personnel's terminal, from And security protection user can be made directly to be authorized to the security personnel of security personnel team, and unexpected situation is monitored, improve and authorize efficiency.
Other features and advantages of the present invention will be illustrated in the following description, also, the partly change from specification Obtain it is clear that or being understood by implementing the present invention.The purpose of the present invention and other advantages are in specification, claims And specifically noted structure is realized and obtained in accompanying drawing.
To enable the above objects, features and advantages of the present invention to become apparent, preferred embodiment cited below particularly, and coordinate Appended accompanying drawing, is described in detail below.
Brief description of the drawings
In order to illustrate more clearly of the specific embodiment of the invention or technical scheme of the prior art, below will be to specific The accompanying drawing to be used needed for implementation method or description of the prior art is briefly described, it should be apparent that, in describing below Accompanying drawing is some embodiments of the present invention, for those of ordinary skill in the art, before creative work is not paid Put, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the security personnel team authorization method flow chart of the safety-protection system that the embodiment of the present invention one is provided;
Fig. 2 is the security personnel team authorization method signaling diagram of the safety-protection system that the embodiment of the present invention one is provided;
Fig. 3 is the user of the safety-protection system that the embodiment of the present invention two is provided to security personnel team authorization method flow chart;
Fig. 4 is the user of the safety-protection system that the embodiment of the present invention two is provided to security personnel team authorization method signaling diagram.
Specific embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with accompanying drawing to the present invention Technical scheme be clearly and completely described, it is clear that described embodiment is a part of embodiment of the invention, rather than Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative work premise Lower obtained every other embodiment, belongs to the scope of protection of the invention.
At present, the safety-protection system in cell needs security protection user individually to be awarded to each security personnel in security personnel team Power, and by upper net operation, can just be monitored, and in the case of occurring unexpectedly, alarmed.Security protection user is to protecting Pacifying the mandate of team needs to know the ID of the ID of user terminal and security personnel team that process is complicated, authorizes efficiency low.
The security personnel supervisor of the safety-protection system that the present invention is provided is authorized and security personnel's authorization method, and security protection user can be made direct Authorized to the security personnel of security personnel team, monitored unexpected situation, it is not necessary to individually authorized to each security personnel, need not be in addition The ID of upper net operation, the ID that security protection user terminal need not be input into and security personnel team, so as to improve mandate efficiency.
For ease of understanding the present embodiment, the embodiment of the present invention is described in detail below.
Embodiment one:
Fig. 1 is the security personnel team authorization method flow chart of the safety-protection system that the embodiment of the present invention one is provided.
Reference picture 1, executive agent is server, and the method is comprised the following steps:
Step S301, receives the log-on message that supervisor's security personnel terminal sends, and is returned to supervisor's security personnel terminal according to log-on message Complex response information;
Here, log-on message includes materials for registration information and key information.
Materials for registration information can include less than at least one information:The address of team's name information, supervisor's security personnel terminal Code information, phone number and industrial and commercial registration number.
Specifically, materials for registration information includes following four situation:First, materials for registration information claims information including community name With the address code information of supervisor's security personnel terminal;Second, materials for registration information includes the address code information of supervisor's security personnel terminal;The Three, materials for registration information claims information, the address code information of supervisor's security personnel terminal, phone number and industrial and commercial registration number including community name Code;4th, materials for registration information includes address code information, phone number and the industrial and commercial registration number of supervisor's security personnel terminal.
Specifically, according to log-on message generation security personnel team ID and security personnel ID, security personnel ID and security personnel team ID is preserved To in security personnel team members list, the supervisory right mark of newly-increased security personnel team members list record is set, to supervisor security personnel eventually Reply security personnel team ID and security personnel ID in end.
Step S302, receives the addition solicited message that supervisor's security personnel terminal sends, according to the addition solicited message Determine whether supervisor's security personnel terminal, if it is, being responsible for terminal to the security personnel sends authorization code, and be stored in security personnel In team's authorization code tables, so that supervisor's security personnel terminal shows the authorization code, and the authorization code is sent to security personnel Terminal;
Here, server end can generate authorization code, and be sent to security personnel's terminal;Or, each team has one admittedly Fixed authorization code, is stored in peace preservation corps's queue table.
Supervisor's security personnel terminal can also generate random or semi-random authorization code, and used as one of solicited message, server is sentenced Whether disconnected authorization code conflicts with other authorization codes, if do not conflicted, preserves the term of validity of the authorization code and authorization code.
Step S303, receives the authorization code that security personnel's terminal sends, according to the corresponding security personnel of the authorization code Team ID generation security personnel team authority record, security personnel team authority record is stored in security personnel team membership table, and will Successfully confirmation is authorized to be sent to security personnel's terminal.
Further, it is described to be included according to the corresponding security personnel team ID generations security personnel team authority record of the authorization code:
The security personnel is searched from security personnel team members list according to the security personnel team ID, and judges the security personnel With the presence or absence of supervisory right;
If there is the supervisory right, then security personnel ID is generated, and by the security personnel ID, supervisor authorization mark and institute Security personnel team ID is stated to store in the security personnel team members list.
Here, a team can have multiple supervisors, and then first supervisor's registration team authorize other supervisors or general Logical team member, team member cannot license to other team members.Supervisor's authorization mark is the mark of Yes/No when authorizing, new for expressing Whether the security personnel being authorized is supervisor.
Fig. 4 is the security personnel team authorization method signaling diagram of the safety-protection system that the embodiment of the present invention one is provided.
Reference picture 4, the method is comprised the following steps:
Step S401, supervisor's security personnel terminal to server sends log-on message;
Step S402, server sends response message to supervisor's security personnel terminal;
Step S403, supervisor's security personnel terminal to server sends addition solicited message;
Step S404, server determines whether supervisor's security personnel terminal according to addition solicited message;If it is, performing step Rapid S405;
Step S405, server sends authorization code to supervisor's security personnel terminal, and is stored in security personnel team authorization code tables;
Step S406, supervisor's security personnel terminal sends authorization code to security personnel's terminal;
Step S407, security personnel's terminal to server sends authorization code;
Step S408, server will ensure public security according to the corresponding security personnel team ID generations security personnel team authority record of authorization code Team's authority record is stored in security personnel team membership table;
Step S409, server sends to security personnel's terminal and authorizes successfully confirmation.
Embodiment two:
Fig. 3 is security personnel's supervisor's authorization method flow chart of the safety-protection system that the embodiment of the present invention two is provided.
Reference picture 1, executive agent is server, and the method is comprised the following steps:
Step S101, receives the log-on message that user terminal sends, and response letter is replied to user terminal according to log-on message Breath;
Here, log-on message includes less than at least one information:Station address information, name and phone number.Register Information can be including one or more in station address information, name and phone number.Can by station address information, name and Phone number is stored in safety-protection system.
Log-on message also includes that the description information of safety-protection system owning user can be differentiated, by above- mentioned information storage in security protection system In system list.
Step S102, receives the authorization requests information that user terminal sends, and authorization requests information includes safety-protection system identity Identifier ID and ID;
Here, authorization requests the information also ID including user, password or other identification codes.
Step S103, according to the ID and safety-protection system ID generation authorization codes, and by the authorization code and right The safety-protection system ID for answering is stored in safety-protection system authorization code tables;
Step S104, the user terminal is sent to by the authorization code, so as to be authorized described in the user terminal displays Code, and the authorization code is sent to security personnel's terminal;
Here, authorization code can be randomly generated numeral, image in 2 D code or character string, or with semirandom The algorithm such as generation such as Cryptographic Hash Function MD5, SHA-1, SHA-256.User terminal or server can also specify mandate The term of validity of code, and the term of validity of authorization code is stored in authorization code tables.
User terminal displays authorization code, and it is presented to security personnel (including non-supervisor security personnel).Can also be by bar code Encoded Deng other images, be converted into image, and show the image.
In addition, security personnel team there can also be the authorization code oneself fixed, the authorization code is printed upon on paper or including in screen On curtain, security protection user can be scanned, be input into completion to the mandate of security personnel team.
Step S105, receives the authorization code that security personnel's terminal sends, and note is authorized according to authorization code generation Record, is saved in security system authorization list, and successfully confirmation will be authorized to be sent to security personnel's terminal.
Further, the authorization code is the first authorization code, described to be given birth to according to the ID and the safety-protection system ID Include into authorization code:
It is the safety-protection system to judge whether the user terminal has according to the ID and the safety-protection system ID The authority of mandate;
If having authority, first authorization code is generated.
Further, methods described also includes:
The second authorization code of user terminal transmission and the term of validity of second authorization code are received, judges that described second authorizes Whether code if there is no conflict and without expired, then preserves second authorization code and described with the presence or absence of conflict and expired The term of validity of the second authorization code.
Here, beyond server is according to ID and safety-protection system ID generation authorization codes, user terminal can also generate the Two authorization codes, and the term of validity of authorization code is specified, in the case where server determines in the absence of conflict, preserved.
Further, it is described to be included according to authorization code generation authority record:
According to the ID of security personnel's terminal, effective security personnel is determined whether;
If it is valid, searching the corresponding security personnel team ID of the security personnel from security personnel team members list;
The authorization code is searched from the safety-protection system authorization code tables, if finding the authorization code, institute is obtained State the corresponding safety-protection system ID of authorization code, and the safety-protection system ID and described is preserved in the security system authorization list Security personnel team ID.
Here, after authorization code is found from safety-protection system authorization code tables, then to security personnel supervisor terminal replies mandate into The response message of work(;Or, after safety-protection system ID and security personnel team ID are saved in into security system authorization list, then led to security personnel Tube terminal is replied and authorizes successful response message.
Further, methods described also includes:
The alert notification information that inductor sends is received, and the alert notification information is sent to security personnel's end End, so that security personnel's terminal of security personnel team shows the alert notification information and the safety-protection system identification information.
In addition, safety-protection system identification information is stored in the permanent holder of safety-protection system, such as hard disk, memory card;Security protection system System identification information is together sent to server when alarm is sent, and is then forwarded to security personnel's terminal by server.
Here, there is safety-protection system address information in security system list, security protection address information and safety-protection system are believed Breath is packaged into alert notification information;Server finds out the security personnel team being authorized according to safety-protection system grant column list;According to security personnel The ID of each security personnel and its terminal address code in team are found out in Team Member's list;For the security personnel's end based on iOS system End, is sent a warning by third party's information flat pad (cloud service of such as Apple Inc.) to terminal address, is ensured public security Member's terminal receives information and shows on a user interface;For the security personnel's terminal based on Android system, security personnel's terminal can be rear Platform keeps a TCP/IP, and (Transmission Control Protocol/Internet Protocol pass transport control protocol View/Internet Protocol) link and kept in touch with server, server receives and sends alert notification information by this chain, security personnel Member's terminal receives information and shows on a user interface.
Fig. 4 is security personnel's supervisor's authorization method signaling diagram of the safety-protection system that the embodiment of the present invention two is provided.
Reference picture 4, the method is comprised the following steps:
Step S201, user terminal sends log-on message to server;
Step S202, server replys response message according to log-on message to user terminal;
Step S203, server receives the authorization requests information that user terminal sends, and authorization requests information includes security protection system System identification identifier ID and ID;
Step S204, according to the ID and safety-protection system ID generation authorization codes, and by the authorization code and right The safety-protection system ID for answering is stored in safety-protection system authorization code tables;
Step S205, server sends authorization code to user terminal;
Step S206, user terminal sends authorization code to security personnel's terminal;
Step S207, security personnel's terminal to server sends authorization code;
Step S208, server generates authority record according to authorization code, is saved in security system authorization list;
Step S209, server will authorize successfully confirmation to be sent to security personnel's terminal.
The computer program product that the embodiment of the present invention is provided, including store the computer-readable storage of program code Medium, the instruction that described program code includes can be used to perform the method described in previous methods embodiment, and implementing to join See embodiment of the method, will not be repeated here.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description With the specific work process of device, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
In addition, in the description of the embodiment of the present invention, unless otherwise clearly defined and limited, term " installation ", " phase Company ", " connection " should be interpreted broadly, for example, it may be being fixedly connected, or being detachably connected, or be integrally connected;Can Being to mechanically connect, or electrically connect;Can be joined directly together, it is also possible to be indirectly connected to by intermediary, Ke Yishi Two connections of element internal.For the ordinary skill in the art, with concrete condition above-mentioned term can be understood at this Concrete meaning in invention.
If the function is to realize in the form of SFU software functional unit and as independent production marketing or when using, can be with Storage is in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words The part contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, including some instructions are used to so that a computer equipment (can be intelligence Can mobile phone, personal computer, server, or network equipment etc.) perform each embodiment methods described of the invention whole or Part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), Random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with store program codes Medium.
In the description of the invention, it is necessary to explanation, term " " center ", " on ", D score, "left", "right", " vertical ", The orientation or position relationship of the instruction such as " level ", " interior ", " outward " be based on orientation shown in the drawings or position relationship, merely to Be easy to the description present invention and simplify describe, rather than indicate imply signified device or element must have specific orientation, With specific azimuth configuration and operation, therefore it is not considered as limiting the invention.Additionally, term " first ", " second ", " the 3rd " is only used for describing purpose, and it is not intended that indicating or implying relative importance.
Finally it should be noted that:Embodiment described above, specific embodiment only of the invention, is used to illustrate the present invention Technical scheme, rather than its limitations, protection scope of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair It is bright to be described in detail, it will be understood by those within the art that:Any one skilled in the art The invention discloses technical scope in, it can still modify to the technical scheme described in previous embodiment or can be light Change is readily conceivable that, or equivalent is carried out to which part technical characteristic;And these modifications, change or replacement, do not make The essence of appropriate technical solution departs from the spirit and scope of embodiment of the present invention technical scheme, should all cover in protection of the invention Within the scope of.Therefore, protection scope of the present invention described should be defined by scope of the claims.

Claims (10)

1. the security personnel team authorization method of a kind of safety-protection system, it is characterised in that be applied to server, methods described includes:
The log-on message that supervisor's security personnel terminal sends is received, being responsible for terminal replies to the security personnel according to the log-on message responds Information;
The addition solicited message that supervisor's security personnel terminal sends is received, according to the addition solicited message determines whether Supervisor's security personnel terminal, if it is, being responsible for terminal to the security personnel sends authorization code, and is stored in security personnel team authorization code tables In, so that supervisor's security personnel terminal shows the authorization code, and the authorization code is sent to security personnel's terminal;
The authorization code that security personnel's terminal sends is received, according to the corresponding security personnel team ID generations security personnel of the authorization code Team's authority record, security personnel team authority record is stored in security personnel team membership table, and will authorize successfully true Recognize information and be sent to security personnel's terminal.
2. the security personnel team authorization method of safety-protection system according to claim 1, it is characterised in that awarded described in the basis The corresponding security personnel team ID generations security personnel team authority record of weighted code includes:
The security personnel is searched from security personnel team members list according to the security personnel team ID, and whether judges the security personnel There is supervisory right;
If there is the supervisory right, then security personnel ID is generated, and by the security personnel ID, supervisor authorization mark and the guarantor Peace team ID storages are in the security personnel team members list.
3. the security personnel team authorization method of safety-protection system according to claim 1, it is characterised in that the log-on message bag Include materials for registration information and key information.
4. the security personnel team authorization method of safety-protection system according to claim 3, it is characterised in that the materials for registration letter Breath includes less than at least one information:
Team's name information, the address code information of security personnel supervisor's terminal, phone number and industrial and commercial registration number.
5. a kind of user of safety-protection system is to security personnel team authorization method, it is characterised in that be applied to server, methods described bag Include:
The log-on message that user terminal sends is received, response message is replied to the user terminal according to the log-on message;
The authorization requests information that the user terminal sends is received, the authorization requests information includes safety-protection system identification identifier ID and ID;
According to the ID and safety-protection system ID generation authorization codes, and by the authorization code and the corresponding security protection system System ID is stored in safety-protection system authorization code tables;
The authorization code is sent to the user terminal, so that authorization code described in the user terminal displays, and awarded described Weighted code is sent to security personnel's terminal;
The authorization code that security personnel's terminal sends is received, authority record is generated according to the authorization code, be saved in security personnel In system authorization table, and successfully confirmation will be authorized to be sent to security personnel's terminal.
6. the user of safety-protection system according to claim 5 is to security personnel team authorization method, it is characterised in that the mandate Code is the first authorization code, described to be included according to the ID and safety-protection system ID generation authorization codes:
It is the safety-protection system mandate to judge whether the user terminal has according to the ID and the safety-protection system ID Authority;
If having authority, first authorization code is generated.
7. the user of safety-protection system according to claim 5 is to security personnel team authorization method, it is characterised in that methods described Also include:
The second authorization code of the user terminal transmission and the term of validity of second authorization code are received, judges that described second authorizes Whether code if there is no conflict and without expired, then preserves second authorization code and described with the presence or absence of conflict and expired The term of validity of the second authorization code.
8. the user of safety-protection system according to claim 5 is to security personnel team authorization method, it is characterised in that the basis The authorization code generation authority record includes:
According to the ID of security personnel's terminal, effective security personnel is determined whether;
If it is valid, searching the corresponding security personnel team ID of the security personnel from security personnel team members list;
The authorization code is searched from the safety-protection system authorization code tables, if finding the authorization code, is awarded described in acquisition The corresponding safety-protection system ID of weighted code, and the safety-protection system ID and the security personnel are preserved in the security system authorization list Team ID.
9. the user of safety-protection system according to claim 5 is to security personnel team authorization method, it is characterised in that the registration Information includes less than at least one information:
Station address, name and phone number.
10. the user of safety-protection system according to claim 5 is to security personnel team authorization method, it is characterised in that the side Method also includes:
The alert notification information that inductor sends is received, and the alert notification information is sent to security personnel's terminal, with Security personnel's terminal of the security personnel team is set to show the alert notification information and the safety-protection system identification information.
CN201710080151.6A 2017-02-14 2017-02-14 The method that the security personnel team of safety-protection system authorizes and user authorizes to security personnel team Pending CN106780191A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710080151.6A CN106780191A (en) 2017-02-14 2017-02-14 The method that the security personnel team of safety-protection system authorizes and user authorizes to security personnel team

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710080151.6A CN106780191A (en) 2017-02-14 2017-02-14 The method that the security personnel team of safety-protection system authorizes and user authorizes to security personnel team

Publications (1)

Publication Number Publication Date
CN106780191A true CN106780191A (en) 2017-05-31

Family

ID=58957089

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710080151.6A Pending CN106780191A (en) 2017-02-14 2017-02-14 The method that the security personnel team of safety-protection system authorizes and user authorizes to security personnel team

Country Status (1)

Country Link
CN (1) CN106780191A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111241508A (en) * 2019-12-31 2020-06-05 航天信息股份有限公司 Method and device for generating picture library authorization code and method and device for using picture library authorization code
CN112579996A (en) * 2019-09-29 2021-03-30 杭州海康威视数字技术股份有限公司 Temporary authorization method and device
CN112818302A (en) * 2021-01-13 2021-05-18 福州科易软件有限公司 Method and system for managing file data modification authority

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7982583B1 (en) * 2006-01-19 2011-07-19 Sprint Spectrum L.P. Method and system of display validation through varying visual appearance
CN102646295A (en) * 2011-02-21 2012-08-22 中国移动通信集团江苏有限公司 Intelligent residential community security system and customizing service realizing method thereof
CN104125063A (en) * 2013-04-28 2014-10-29 腾讯科技(深圳)有限公司 Authentication method, equipment and system
CN105719376A (en) * 2016-01-22 2016-06-29 慧锐通智能科技股份有限公司 Door access control system and method
CN106295394A (en) * 2016-07-22 2017-01-04 飞天诚信科技股份有限公司 Resource authorization method and system and authorization server and method of work
CN106373235A (en) * 2016-08-31 2017-02-01 长城汽车股份有限公司 Authorization method and authorization system for virtual keys and server

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7982583B1 (en) * 2006-01-19 2011-07-19 Sprint Spectrum L.P. Method and system of display validation through varying visual appearance
CN102646295A (en) * 2011-02-21 2012-08-22 中国移动通信集团江苏有限公司 Intelligent residential community security system and customizing service realizing method thereof
CN104125063A (en) * 2013-04-28 2014-10-29 腾讯科技(深圳)有限公司 Authentication method, equipment and system
CN105719376A (en) * 2016-01-22 2016-06-29 慧锐通智能科技股份有限公司 Door access control system and method
CN106295394A (en) * 2016-07-22 2017-01-04 飞天诚信科技股份有限公司 Resource authorization method and system and authorization server and method of work
CN106373235A (en) * 2016-08-31 2017-02-01 长城汽车股份有限公司 Authorization method and authorization system for virtual keys and server

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112579996A (en) * 2019-09-29 2021-03-30 杭州海康威视数字技术股份有限公司 Temporary authorization method and device
CN112579996B (en) * 2019-09-29 2023-11-03 杭州海康威视数字技术股份有限公司 Temporary authorization method and device
CN111241508A (en) * 2019-12-31 2020-06-05 航天信息股份有限公司 Method and device for generating picture library authorization code and method and device for using picture library authorization code
CN112818302A (en) * 2021-01-13 2021-05-18 福州科易软件有限公司 Method and system for managing file data modification authority

Similar Documents

Publication Publication Date Title
CN105229986B (en) Cross-domain services layer resource is propagated
US9384479B2 (en) Mobile phone takeover protection system and method
CN109314703B (en) Method for managing the status of a connected device
CN103856640B (en) Method and system for processing user resource information
CN103597799B (en) service access authentication method and system
US20160063479A1 (en) Transfer information processing method and device
WO2015144058A1 (en) Account binding processing method, apparatus and system
CN104023336B (en) The radio switch-in method and mobile terminal of mobile terminal
US10713657B2 (en) Systems and methods for estimating authenticity of local network of device initiating remote transaction
CN102611691B (en) Method, system and gateway device for detecting phishing websites
AU2014294788A1 (en) Processing electronic tokens
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN106780191A (en) The method that the security personnel team of safety-protection system authorizes and user authorizes to security personnel team
CN108765905A (en) Electric power cable well lid on-line intelligence prior-warning device based on NB-IoT
WO2017166419A1 (en) Method of identifying false base station, device identifying false base station, and terminal
CN105869255A (en) Intelligent access control method and system based on mobile terminal
CN109639419A (en) Cryptographic key protection method, cipher key storage device and terminal device
CN108513267A (en) Safe verification method, authentication server and the service terminal of communication service
WO2017084456A1 (en) Wifi hotspot processing method, device and system
CN113569263A (en) Secure processing method and device for cross-private-domain data and electronic equipment
CN104025551B (en) Method and communication terminal for transmitting data in a secure manner
CN115244896A (en) Identifying trusted service set identifiers for wireless networks
CN108734828A (en) Yunmen prohibits Information Authentication method, terminal and server
CN106779124A (en) That intelligently lends bookshelf lends method and system
KR20170106871A (en) Gateway Apparatus for Network Security and Operating Method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20180730

Address after: Room 210, 29 Beiwei Road, Ouhai Economic Development Zone, Wenzhou City, Zhejiang Province (Wenzhou Zhongchuang Space Trial Zone)

Applicant after: Wenzhou storm Intelligent Technology Co., Ltd.

Address before: 325000 the first floor of No. 55 Qin Ye Road, Cha Shan Street, Ouhai District, Wenzhou, Zhejiang.

Applicant before: Wenzhou city cloud lock Intelligent Technology Co., Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20170531

RJ01 Rejection of invention patent application after publication