CN106780191A - The method that the security personnel team of safety-protection system authorizes and user authorizes to security personnel team - Google Patents
The method that the security personnel team of safety-protection system authorizes and user authorizes to security personnel team Download PDFInfo
- Publication number
- CN106780191A CN106780191A CN201710080151.6A CN201710080151A CN106780191A CN 106780191 A CN106780191 A CN 106780191A CN 201710080151 A CN201710080151 A CN 201710080151A CN 106780191 A CN106780191 A CN 106780191A
- Authority
- CN
- China
- Prior art keywords
- security personnel
- team
- authorization
- terminal
- safety
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/16—Real estate
- G06Q50/163—Property management
Abstract
The method that security personnel team the invention provides safety-protection system authorizes and user authorizes to security personnel team, receive the addition solicited message that supervisor's security personnel terminal sends, supervisor's security personnel terminal is determined whether according to addition solicited message, if, authorization code then is sent to supervisor's security personnel terminal, so that authorization code is sent to security personnel's terminal by supervisor's security personnel terminal;The authorization code that security personnel's terminal sends is received, according to the corresponding security personnel team ID generations security personnel team authority record of authorization code, and successfully confirmation will be authorized to be sent to security personnel's terminal, and receive the authorization requests information that user terminal sends;According to ID and safety-protection system ID generation authorization codes;Authorization code is sent to user terminal, so that authorization code is sent to security personnel's terminal by user terminal;The authorization code that security personnel's terminal sends is received, authority record is generated according to authorization code, be saved in security system authorization list, and successfully confirmation will be authorized to be sent to security personnel's terminal.
Description
Technical field
The present invention relates to technical field of security and protection, authorize and use more particularly, to the security personnel team of the safety-protection system of safety-protection system
The method that family authorizes to security personnel team.
Background technology
At present, the safety-protection system in cell needs security protection user individually to be awarded to each security personnel in security personnel team
Power, and by upper net operation, can just be monitored, and in the case of occurring unexpectedly, alarmed.Security protection user is to protecting
The mandate of peace team needs to know the ID of the ID of input user terminal and security personnel team that process is complicated, authorizes efficiency low.
The content of the invention
In view of this, the security personnel team it is an object of the invention to provide safety-protection system authorizes and user awards to security personnel team
The method of power, can be such that security protection user is directly authorized to the security personnel of security personnel team, unexpected situation be monitored, so as to improve award
Power efficiency.
In a first aspect, the embodiment of the invention provides the security personnel team authorization method of safety-protection system, it is characterised in that application
In server, methods described includes:
The log-on message that supervisor's security personnel terminal sends is received, terminal replies are responsible for the security personnel according to the log-on message
Response message;
The addition solicited message that supervisor's security personnel terminal sends is received, is determined whether according to the addition solicited message
Supervisor's security personnel terminal, if it is, being responsible for terminal to the security personnel sends authorization code, and is stored in security personnel team authorization code
In table, so that supervisor's security personnel terminal shows the authorization code, and the authorization code is sent to security personnel's terminal;
The authorization code that security personnel's terminal sends is received, according to the corresponding security personnel team ID generations of the authorization code
Security personnel team authority record, security personnel team authority record is stored in security personnel team membership table, and will authorize successfully true
Recognize information and be sent to security personnel's terminal.
With reference in a first aspect, the embodiment of the invention provides the first possible implementation method of first aspect, wherein, institute
State includes according to the corresponding security personnel team ID generations security personnel team authority record of the authorization code:
The security personnel is searched from security personnel team members list according to the security personnel team ID, and judges the security personnel
With the presence or absence of supervisory right;
If there is the supervisory right, then security personnel ID is generated, and by the security personnel ID, supervisor authorization mark and institute
Security personnel team ID is stated to store in the security personnel team members list.
With reference in a first aspect, the embodiment of the invention provides second possible implementation method of first aspect, wherein, institute
Stating log-on message includes materials for registration information and key information.
With reference to second possible implementation method of first aspect, the third of first aspect is the embodiment of the invention provides
Possible implementation method, wherein, the materials for registration information includes less than at least one information:
Team's name information, the address code information of security personnel supervisor's terminal, phone number and industrial and commercial registration number.
Second aspect, the embodiment of the invention provides the user of safety-protection system to security personnel team authorization method, be applied to clothes
Business device, methods described includes:
The log-on message that user terminal sends is received, response letter is replied to the user terminal according to the log-on message
Breath;
The authorization requests information that the user terminal sends is received, the authorization requests information includes safety-protection system identity mark
Know symbol ID and ID;
According to the ID and safety-protection system ID generation authorization codes, and by the authorization code and the corresponding peace
Anti- system identifier is stored in safety-protection system authorization code tables;
The authorization code is sent to the user terminal, so that authorization code described in the user terminal displays, and by institute
State authorization code and be sent to security personnel's terminal;
The authorization code that security personnel's terminal sends is received, authority record is generated according to the authorization code, be saved in
In security system authorization list, and successfully confirmation will be authorized to be sent to security personnel's terminal.
With reference to second aspect, the first possible implementation method of second aspect is the embodiment of the invention provides, wherein, institute
Authorization code is stated for the first authorization code, it is described to be included according to the ID and safety-protection system ID generation authorization codes:
It is the safety-protection system to judge whether the user terminal has according to the ID and the safety-protection system ID
The authority of mandate;
If having authority, first authorization code is generated.
With reference to second aspect, second possible implementation method of second aspect is the embodiment of the invention provides, wherein, institute
Stating method also includes:
The second authorization code of the user terminal transmission and the term of validity of second authorization code are received, described second is judged
Authorization code with the presence or absence of conflict and whether expired, if there is no conflict and without expired, then preserve second authorization code and
The term of validity of second authorization code.
With reference to second aspect, the third possible implementation method of second aspect is the embodiment of the invention provides, wherein, institute
State includes according to authorization code generation authority record:
According to the ID of security personnel's terminal, effective security personnel is determined whether;
If it is valid, searching the corresponding security personnel team ID of the security personnel from security personnel team members list;
The authorization code is searched from the safety-protection system authorization code tables, if finding the authorization code, institute is obtained
State the corresponding safety-protection system ID of authorization code, and the safety-protection system ID and described is preserved in the security system authorization list
Security personnel team ID.
With reference to second aspect, the 4th kind of possible implementation method of second aspect is the embodiment of the invention provides, wherein, institute
Stating log-on message includes less than at least one information:
Station address, name and phone number.
With reference to second aspect, the 5th kind of possible implementation method of second aspect is the embodiment of the invention provides, wherein, institute
Stating method also includes:
The alert notification information that inductor sends is received, and the alert notification information is sent to security personnel's end
End, so that security personnel's terminal of the security personnel team shows the alert notification information and the safety-protection system identification information.
The security personnel team that the embodiment of the invention provides safety-protection system authorizes the method authorized to security personnel team with user, connects
The log-on message that supervisor's security personnel terminal sends is received, according to log-on message to supervisor's security personnel terminal replies response message;Receive security personnel
The addition solicited message that supervisor's terminal sends, supervisor's security personnel terminal is determined whether according to addition solicited message, if it is, to
Supervisor's security personnel terminal sends authorization code, and is stored in security personnel team authorization code tables, so that supervisor's security personnel terminal shows described awarding
Weighted code, and authorization code is sent to security personnel's terminal;The authorization code that security personnel's terminal sends is received, according to the corresponding guarantor of authorization code
Peace team ID generation security personnel team authority record, security personnel team authority record is stored in security personnel team membership table, and will be awarded
Weigh successfully confirmation and be sent to security personnel's terminal, and receive the authorization requests information that user terminal sends, authorization requests letter
Breath includes safety-protection system identification identifier ID and ID;According to ID and safety-protection system ID generation authorization codes, and will authorize
Code and corresponding safety-protection system ID are stored in safety-protection system authorization code tables;Authorization code is sent to user terminal, so that user
Terminal shows authorization code, and authorization code is sent into security personnel's terminal;The authorization code that security personnel's terminal sends is received, according to mandate
Code generation authority record, is saved in security system authorization list, and successfully confirmation will be authorized to be sent to security personnel's terminal, from
And security protection user can be made directly to be authorized to the security personnel of security personnel team, and unexpected situation is monitored, improve and authorize efficiency.
Other features and advantages of the present invention will be illustrated in the following description, also, the partly change from specification
Obtain it is clear that or being understood by implementing the present invention.The purpose of the present invention and other advantages are in specification, claims
And specifically noted structure is realized and obtained in accompanying drawing.
To enable the above objects, features and advantages of the present invention to become apparent, preferred embodiment cited below particularly, and coordinate
Appended accompanying drawing, is described in detail below.
Brief description of the drawings
In order to illustrate more clearly of the specific embodiment of the invention or technical scheme of the prior art, below will be to specific
The accompanying drawing to be used needed for implementation method or description of the prior art is briefly described, it should be apparent that, in describing below
Accompanying drawing is some embodiments of the present invention, for those of ordinary skill in the art, before creative work is not paid
Put, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the security personnel team authorization method flow chart of the safety-protection system that the embodiment of the present invention one is provided;
Fig. 2 is the security personnel team authorization method signaling diagram of the safety-protection system that the embodiment of the present invention one is provided;
Fig. 3 is the user of the safety-protection system that the embodiment of the present invention two is provided to security personnel team authorization method flow chart;
Fig. 4 is the user of the safety-protection system that the embodiment of the present invention two is provided to security personnel team authorization method signaling diagram.
Specific embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with accompanying drawing to the present invention
Technical scheme be clearly and completely described, it is clear that described embodiment is a part of embodiment of the invention, rather than
Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative work premise
Lower obtained every other embodiment, belongs to the scope of protection of the invention.
At present, the safety-protection system in cell needs security protection user individually to be awarded to each security personnel in security personnel team
Power, and by upper net operation, can just be monitored, and in the case of occurring unexpectedly, alarmed.Security protection user is to protecting
Pacifying the mandate of team needs to know the ID of the ID of user terminal and security personnel team that process is complicated, authorizes efficiency low.
The security personnel supervisor of the safety-protection system that the present invention is provided is authorized and security personnel's authorization method, and security protection user can be made direct
Authorized to the security personnel of security personnel team, monitored unexpected situation, it is not necessary to individually authorized to each security personnel, need not be in addition
The ID of upper net operation, the ID that security protection user terminal need not be input into and security personnel team, so as to improve mandate efficiency.
For ease of understanding the present embodiment, the embodiment of the present invention is described in detail below.
Embodiment one:
Fig. 1 is the security personnel team authorization method flow chart of the safety-protection system that the embodiment of the present invention one is provided.
Reference picture 1, executive agent is server, and the method is comprised the following steps:
Step S301, receives the log-on message that supervisor's security personnel terminal sends, and is returned to supervisor's security personnel terminal according to log-on message
Complex response information;
Here, log-on message includes materials for registration information and key information.
Materials for registration information can include less than at least one information:The address of team's name information, supervisor's security personnel terminal
Code information, phone number and industrial and commercial registration number.
Specifically, materials for registration information includes following four situation:First, materials for registration information claims information including community name
With the address code information of supervisor's security personnel terminal;Second, materials for registration information includes the address code information of supervisor's security personnel terminal;The
Three, materials for registration information claims information, the address code information of supervisor's security personnel terminal, phone number and industrial and commercial registration number including community name
Code;4th, materials for registration information includes address code information, phone number and the industrial and commercial registration number of supervisor's security personnel terminal.
Specifically, according to log-on message generation security personnel team ID and security personnel ID, security personnel ID and security personnel team ID is preserved
To in security personnel team members list, the supervisory right mark of newly-increased security personnel team members list record is set, to supervisor security personnel eventually
Reply security personnel team ID and security personnel ID in end.
Step S302, receives the addition solicited message that supervisor's security personnel terminal sends, according to the addition solicited message
Determine whether supervisor's security personnel terminal, if it is, being responsible for terminal to the security personnel sends authorization code, and be stored in security personnel
In team's authorization code tables, so that supervisor's security personnel terminal shows the authorization code, and the authorization code is sent to security personnel
Terminal;
Here, server end can generate authorization code, and be sent to security personnel's terminal;Or, each team has one admittedly
Fixed authorization code, is stored in peace preservation corps's queue table.
Supervisor's security personnel terminal can also generate random or semi-random authorization code, and used as one of solicited message, server is sentenced
Whether disconnected authorization code conflicts with other authorization codes, if do not conflicted, preserves the term of validity of the authorization code and authorization code.
Step S303, receives the authorization code that security personnel's terminal sends, according to the corresponding security personnel of the authorization code
Team ID generation security personnel team authority record, security personnel team authority record is stored in security personnel team membership table, and will
Successfully confirmation is authorized to be sent to security personnel's terminal.
Further, it is described to be included according to the corresponding security personnel team ID generations security personnel team authority record of the authorization code:
The security personnel is searched from security personnel team members list according to the security personnel team ID, and judges the security personnel
With the presence or absence of supervisory right;
If there is the supervisory right, then security personnel ID is generated, and by the security personnel ID, supervisor authorization mark and institute
Security personnel team ID is stated to store in the security personnel team members list.
Here, a team can have multiple supervisors, and then first supervisor's registration team authorize other supervisors or general
Logical team member, team member cannot license to other team members.Supervisor's authorization mark is the mark of Yes/No when authorizing, new for expressing
Whether the security personnel being authorized is supervisor.
Fig. 4 is the security personnel team authorization method signaling diagram of the safety-protection system that the embodiment of the present invention one is provided.
Reference picture 4, the method is comprised the following steps:
Step S401, supervisor's security personnel terminal to server sends log-on message;
Step S402, server sends response message to supervisor's security personnel terminal;
Step S403, supervisor's security personnel terminal to server sends addition solicited message;
Step S404, server determines whether supervisor's security personnel terminal according to addition solicited message;If it is, performing step
Rapid S405;
Step S405, server sends authorization code to supervisor's security personnel terminal, and is stored in security personnel team authorization code tables;
Step S406, supervisor's security personnel terminal sends authorization code to security personnel's terminal;
Step S407, security personnel's terminal to server sends authorization code;
Step S408, server will ensure public security according to the corresponding security personnel team ID generations security personnel team authority record of authorization code
Team's authority record is stored in security personnel team membership table;
Step S409, server sends to security personnel's terminal and authorizes successfully confirmation.
Embodiment two:
Fig. 3 is security personnel's supervisor's authorization method flow chart of the safety-protection system that the embodiment of the present invention two is provided.
Reference picture 1, executive agent is server, and the method is comprised the following steps:
Step S101, receives the log-on message that user terminal sends, and response letter is replied to user terminal according to log-on message
Breath;
Here, log-on message includes less than at least one information:Station address information, name and phone number.Register
Information can be including one or more in station address information, name and phone number.Can by station address information, name and
Phone number is stored in safety-protection system.
Log-on message also includes that the description information of safety-protection system owning user can be differentiated, by above- mentioned information storage in security protection system
In system list.
Step S102, receives the authorization requests information that user terminal sends, and authorization requests information includes safety-protection system identity
Identifier ID and ID;
Here, authorization requests the information also ID including user, password or other identification codes.
Step S103, according to the ID and safety-protection system ID generation authorization codes, and by the authorization code and right
The safety-protection system ID for answering is stored in safety-protection system authorization code tables;
Step S104, the user terminal is sent to by the authorization code, so as to be authorized described in the user terminal displays
Code, and the authorization code is sent to security personnel's terminal;
Here, authorization code can be randomly generated numeral, image in 2 D code or character string, or with semirandom
The algorithm such as generation such as Cryptographic Hash Function MD5, SHA-1, SHA-256.User terminal or server can also specify mandate
The term of validity of code, and the term of validity of authorization code is stored in authorization code tables.
User terminal displays authorization code, and it is presented to security personnel (including non-supervisor security personnel).Can also be by bar code
Encoded Deng other images, be converted into image, and show the image.
In addition, security personnel team there can also be the authorization code oneself fixed, the authorization code is printed upon on paper or including in screen
On curtain, security protection user can be scanned, be input into completion to the mandate of security personnel team.
Step S105, receives the authorization code that security personnel's terminal sends, and note is authorized according to authorization code generation
Record, is saved in security system authorization list, and successfully confirmation will be authorized to be sent to security personnel's terminal.
Further, the authorization code is the first authorization code, described to be given birth to according to the ID and the safety-protection system ID
Include into authorization code:
It is the safety-protection system to judge whether the user terminal has according to the ID and the safety-protection system ID
The authority of mandate;
If having authority, first authorization code is generated.
Further, methods described also includes:
The second authorization code of user terminal transmission and the term of validity of second authorization code are received, judges that described second authorizes
Whether code if there is no conflict and without expired, then preserves second authorization code and described with the presence or absence of conflict and expired
The term of validity of the second authorization code.
Here, beyond server is according to ID and safety-protection system ID generation authorization codes, user terminal can also generate the
Two authorization codes, and the term of validity of authorization code is specified, in the case where server determines in the absence of conflict, preserved.
Further, it is described to be included according to authorization code generation authority record:
According to the ID of security personnel's terminal, effective security personnel is determined whether;
If it is valid, searching the corresponding security personnel team ID of the security personnel from security personnel team members list;
The authorization code is searched from the safety-protection system authorization code tables, if finding the authorization code, institute is obtained
State the corresponding safety-protection system ID of authorization code, and the safety-protection system ID and described is preserved in the security system authorization list
Security personnel team ID.
Here, after authorization code is found from safety-protection system authorization code tables, then to security personnel supervisor terminal replies mandate into
The response message of work(;Or, after safety-protection system ID and security personnel team ID are saved in into security system authorization list, then led to security personnel
Tube terminal is replied and authorizes successful response message.
Further, methods described also includes:
The alert notification information that inductor sends is received, and the alert notification information is sent to security personnel's end
End, so that security personnel's terminal of security personnel team shows the alert notification information and the safety-protection system identification information.
In addition, safety-protection system identification information is stored in the permanent holder of safety-protection system, such as hard disk, memory card;Security protection system
System identification information is together sent to server when alarm is sent, and is then forwarded to security personnel's terminal by server.
Here, there is safety-protection system address information in security system list, security protection address information and safety-protection system are believed
Breath is packaged into alert notification information;Server finds out the security personnel team being authorized according to safety-protection system grant column list;According to security personnel
The ID of each security personnel and its terminal address code in team are found out in Team Member's list;For the security personnel's end based on iOS system
End, is sent a warning by third party's information flat pad (cloud service of such as Apple Inc.) to terminal address, is ensured public security
Member's terminal receives information and shows on a user interface;For the security personnel's terminal based on Android system, security personnel's terminal can be rear
Platform keeps a TCP/IP, and (Transmission Control Protocol/Internet Protocol pass transport control protocol
View/Internet Protocol) link and kept in touch with server, server receives and sends alert notification information by this chain, security personnel
Member's terminal receives information and shows on a user interface.
Fig. 4 is security personnel's supervisor's authorization method signaling diagram of the safety-protection system that the embodiment of the present invention two is provided.
Reference picture 4, the method is comprised the following steps:
Step S201, user terminal sends log-on message to server;
Step S202, server replys response message according to log-on message to user terminal;
Step S203, server receives the authorization requests information that user terminal sends, and authorization requests information includes security protection system
System identification identifier ID and ID;
Step S204, according to the ID and safety-protection system ID generation authorization codes, and by the authorization code and right
The safety-protection system ID for answering is stored in safety-protection system authorization code tables;
Step S205, server sends authorization code to user terminal;
Step S206, user terminal sends authorization code to security personnel's terminal;
Step S207, security personnel's terminal to server sends authorization code;
Step S208, server generates authority record according to authorization code, is saved in security system authorization list;
Step S209, server will authorize successfully confirmation to be sent to security personnel's terminal.
The computer program product that the embodiment of the present invention is provided, including store the computer-readable storage of program code
Medium, the instruction that described program code includes can be used to perform the method described in previous methods embodiment, and implementing to join
See embodiment of the method, will not be repeated here.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description
With the specific work process of device, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
In addition, in the description of the embodiment of the present invention, unless otherwise clearly defined and limited, term " installation ", " phase
Company ", " connection " should be interpreted broadly, for example, it may be being fixedly connected, or being detachably connected, or be integrally connected;Can
Being to mechanically connect, or electrically connect;Can be joined directly together, it is also possible to be indirectly connected to by intermediary, Ke Yishi
Two connections of element internal.For the ordinary skill in the art, with concrete condition above-mentioned term can be understood at this
Concrete meaning in invention.
If the function is to realize in the form of SFU software functional unit and as independent production marketing or when using, can be with
Storage is in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words
The part contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used to so that a computer equipment (can be intelligence
Can mobile phone, personal computer, server, or network equipment etc.) perform each embodiment methods described of the invention whole or
Part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory),
Random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with store program codes
Medium.
In the description of the invention, it is necessary to explanation, term " " center ", " on ", D score, "left", "right", " vertical ",
The orientation or position relationship of the instruction such as " level ", " interior ", " outward " be based on orientation shown in the drawings or position relationship, merely to
Be easy to the description present invention and simplify describe, rather than indicate imply signified device or element must have specific orientation,
With specific azimuth configuration and operation, therefore it is not considered as limiting the invention.Additionally, term " first ", " second ",
" the 3rd " is only used for describing purpose, and it is not intended that indicating or implying relative importance.
Finally it should be noted that:Embodiment described above, specific embodiment only of the invention, is used to illustrate the present invention
Technical scheme, rather than its limitations, protection scope of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair
It is bright to be described in detail, it will be understood by those within the art that:Any one skilled in the art
The invention discloses technical scope in, it can still modify to the technical scheme described in previous embodiment or can be light
Change is readily conceivable that, or equivalent is carried out to which part technical characteristic;And these modifications, change or replacement, do not make
The essence of appropriate technical solution departs from the spirit and scope of embodiment of the present invention technical scheme, should all cover in protection of the invention
Within the scope of.Therefore, protection scope of the present invention described should be defined by scope of the claims.
Claims (10)
1. the security personnel team authorization method of a kind of safety-protection system, it is characterised in that be applied to server, methods described includes:
The log-on message that supervisor's security personnel terminal sends is received, being responsible for terminal replies to the security personnel according to the log-on message responds
Information;
The addition solicited message that supervisor's security personnel terminal sends is received, according to the addition solicited message determines whether
Supervisor's security personnel terminal, if it is, being responsible for terminal to the security personnel sends authorization code, and is stored in security personnel team authorization code tables
In, so that supervisor's security personnel terminal shows the authorization code, and the authorization code is sent to security personnel's terminal;
The authorization code that security personnel's terminal sends is received, according to the corresponding security personnel team ID generations security personnel of the authorization code
Team's authority record, security personnel team authority record is stored in security personnel team membership table, and will authorize successfully true
Recognize information and be sent to security personnel's terminal.
2. the security personnel team authorization method of safety-protection system according to claim 1, it is characterised in that awarded described in the basis
The corresponding security personnel team ID generations security personnel team authority record of weighted code includes:
The security personnel is searched from security personnel team members list according to the security personnel team ID, and whether judges the security personnel
There is supervisory right;
If there is the supervisory right, then security personnel ID is generated, and by the security personnel ID, supervisor authorization mark and the guarantor
Peace team ID storages are in the security personnel team members list.
3. the security personnel team authorization method of safety-protection system according to claim 1, it is characterised in that the log-on message bag
Include materials for registration information and key information.
4. the security personnel team authorization method of safety-protection system according to claim 3, it is characterised in that the materials for registration letter
Breath includes less than at least one information:
Team's name information, the address code information of security personnel supervisor's terminal, phone number and industrial and commercial registration number.
5. a kind of user of safety-protection system is to security personnel team authorization method, it is characterised in that be applied to server, methods described bag
Include:
The log-on message that user terminal sends is received, response message is replied to the user terminal according to the log-on message;
The authorization requests information that the user terminal sends is received, the authorization requests information includes safety-protection system identification identifier
ID and ID;
According to the ID and safety-protection system ID generation authorization codes, and by the authorization code and the corresponding security protection system
System ID is stored in safety-protection system authorization code tables;
The authorization code is sent to the user terminal, so that authorization code described in the user terminal displays, and awarded described
Weighted code is sent to security personnel's terminal;
The authorization code that security personnel's terminal sends is received, authority record is generated according to the authorization code, be saved in security personnel
In system authorization table, and successfully confirmation will be authorized to be sent to security personnel's terminal.
6. the user of safety-protection system according to claim 5 is to security personnel team authorization method, it is characterised in that the mandate
Code is the first authorization code, described to be included according to the ID and safety-protection system ID generation authorization codes:
It is the safety-protection system mandate to judge whether the user terminal has according to the ID and the safety-protection system ID
Authority;
If having authority, first authorization code is generated.
7. the user of safety-protection system according to claim 5 is to security personnel team authorization method, it is characterised in that methods described
Also include:
The second authorization code of the user terminal transmission and the term of validity of second authorization code are received, judges that described second authorizes
Whether code if there is no conflict and without expired, then preserves second authorization code and described with the presence or absence of conflict and expired
The term of validity of the second authorization code.
8. the user of safety-protection system according to claim 5 is to security personnel team authorization method, it is characterised in that the basis
The authorization code generation authority record includes:
According to the ID of security personnel's terminal, effective security personnel is determined whether;
If it is valid, searching the corresponding security personnel team ID of the security personnel from security personnel team members list;
The authorization code is searched from the safety-protection system authorization code tables, if finding the authorization code, is awarded described in acquisition
The corresponding safety-protection system ID of weighted code, and the safety-protection system ID and the security personnel are preserved in the security system authorization list
Team ID.
9. the user of safety-protection system according to claim 5 is to security personnel team authorization method, it is characterised in that the registration
Information includes less than at least one information:
Station address, name and phone number.
10. the user of safety-protection system according to claim 5 is to security personnel team authorization method, it is characterised in that the side
Method also includes:
The alert notification information that inductor sends is received, and the alert notification information is sent to security personnel's terminal, with
Security personnel's terminal of the security personnel team is set to show the alert notification information and the safety-protection system identification information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710080151.6A CN106780191A (en) | 2017-02-14 | 2017-02-14 | The method that the security personnel team of safety-protection system authorizes and user authorizes to security personnel team |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710080151.6A CN106780191A (en) | 2017-02-14 | 2017-02-14 | The method that the security personnel team of safety-protection system authorizes and user authorizes to security personnel team |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106780191A true CN106780191A (en) | 2017-05-31 |
Family
ID=58957089
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710080151.6A Pending CN106780191A (en) | 2017-02-14 | 2017-02-14 | The method that the security personnel team of safety-protection system authorizes and user authorizes to security personnel team |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106780191A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111241508A (en) * | 2019-12-31 | 2020-06-05 | 航天信息股份有限公司 | Method and device for generating picture library authorization code and method and device for using picture library authorization code |
CN112579996A (en) * | 2019-09-29 | 2021-03-30 | 杭州海康威视数字技术股份有限公司 | Temporary authorization method and device |
CN112818302A (en) * | 2021-01-13 | 2021-05-18 | 福州科易软件有限公司 | Method and system for managing file data modification authority |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7982583B1 (en) * | 2006-01-19 | 2011-07-19 | Sprint Spectrum L.P. | Method and system of display validation through varying visual appearance |
CN102646295A (en) * | 2011-02-21 | 2012-08-22 | 中国移动通信集团江苏有限公司 | Intelligent residential community security system and customizing service realizing method thereof |
CN104125063A (en) * | 2013-04-28 | 2014-10-29 | 腾讯科技(深圳)有限公司 | Authentication method, equipment and system |
CN105719376A (en) * | 2016-01-22 | 2016-06-29 | 慧锐通智能科技股份有限公司 | Door access control system and method |
CN106295394A (en) * | 2016-07-22 | 2017-01-04 | 飞天诚信科技股份有限公司 | Resource authorization method and system and authorization server and method of work |
CN106373235A (en) * | 2016-08-31 | 2017-02-01 | 长城汽车股份有限公司 | Authorization method and authorization system for virtual keys and server |
-
2017
- 2017-02-14 CN CN201710080151.6A patent/CN106780191A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7982583B1 (en) * | 2006-01-19 | 2011-07-19 | Sprint Spectrum L.P. | Method and system of display validation through varying visual appearance |
CN102646295A (en) * | 2011-02-21 | 2012-08-22 | 中国移动通信集团江苏有限公司 | Intelligent residential community security system and customizing service realizing method thereof |
CN104125063A (en) * | 2013-04-28 | 2014-10-29 | 腾讯科技(深圳)有限公司 | Authentication method, equipment and system |
CN105719376A (en) * | 2016-01-22 | 2016-06-29 | 慧锐通智能科技股份有限公司 | Door access control system and method |
CN106295394A (en) * | 2016-07-22 | 2017-01-04 | 飞天诚信科技股份有限公司 | Resource authorization method and system and authorization server and method of work |
CN106373235A (en) * | 2016-08-31 | 2017-02-01 | 长城汽车股份有限公司 | Authorization method and authorization system for virtual keys and server |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112579996A (en) * | 2019-09-29 | 2021-03-30 | 杭州海康威视数字技术股份有限公司 | Temporary authorization method and device |
CN112579996B (en) * | 2019-09-29 | 2023-11-03 | 杭州海康威视数字技术股份有限公司 | Temporary authorization method and device |
CN111241508A (en) * | 2019-12-31 | 2020-06-05 | 航天信息股份有限公司 | Method and device for generating picture library authorization code and method and device for using picture library authorization code |
CN112818302A (en) * | 2021-01-13 | 2021-05-18 | 福州科易软件有限公司 | Method and system for managing file data modification authority |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105229986B (en) | Cross-domain services layer resource is propagated | |
US9384479B2 (en) | Mobile phone takeover protection system and method | |
CN109314703B (en) | Method for managing the status of a connected device | |
CN103856640B (en) | Method and system for processing user resource information | |
CN103597799B (en) | service access authentication method and system | |
US20160063479A1 (en) | Transfer information processing method and device | |
WO2015144058A1 (en) | Account binding processing method, apparatus and system | |
CN104023336B (en) | The radio switch-in method and mobile terminal of mobile terminal | |
US10713657B2 (en) | Systems and methods for estimating authenticity of local network of device initiating remote transaction | |
CN102611691B (en) | Method, system and gateway device for detecting phishing websites | |
AU2014294788A1 (en) | Processing electronic tokens | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN106780191A (en) | The method that the security personnel team of safety-protection system authorizes and user authorizes to security personnel team | |
CN108765905A (en) | Electric power cable well lid on-line intelligence prior-warning device based on NB-IoT | |
WO2017166419A1 (en) | Method of identifying false base station, device identifying false base station, and terminal | |
CN105869255A (en) | Intelligent access control method and system based on mobile terminal | |
CN109639419A (en) | Cryptographic key protection method, cipher key storage device and terminal device | |
CN108513267A (en) | Safe verification method, authentication server and the service terminal of communication service | |
WO2017084456A1 (en) | Wifi hotspot processing method, device and system | |
CN113569263A (en) | Secure processing method and device for cross-private-domain data and electronic equipment | |
CN104025551B (en) | Method and communication terminal for transmitting data in a secure manner | |
CN115244896A (en) | Identifying trusted service set identifiers for wireless networks | |
CN108734828A (en) | Yunmen prohibits Information Authentication method, terminal and server | |
CN106779124A (en) | That intelligently lends bookshelf lends method and system | |
KR20170106871A (en) | Gateway Apparatus for Network Security and Operating Method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20180730 Address after: Room 210, 29 Beiwei Road, Ouhai Economic Development Zone, Wenzhou City, Zhejiang Province (Wenzhou Zhongchuang Space Trial Zone) Applicant after: Wenzhou storm Intelligent Technology Co., Ltd. Address before: 325000 the first floor of No. 55 Qin Ye Road, Cha Shan Street, Ouhai District, Wenzhou, Zhejiang. Applicant before: Wenzhou city cloud lock Intelligent Technology Co., Ltd. |
|
TA01 | Transfer of patent application right | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170531 |
|
RJ01 | Rejection of invention patent application after publication |