CN108449320A - The safe office system of intelligent automation and method - Google Patents
The safe office system of intelligent automation and method Download PDFInfo
- Publication number
- CN108449320A CN108449320A CN201810139185.2A CN201810139185A CN108449320A CN 108449320 A CN108449320 A CN 108449320A CN 201810139185 A CN201810139185 A CN 201810139185A CN 108449320 A CN108449320 A CN 108449320A
- Authority
- CN
- China
- Prior art keywords
- office
- user
- permission
- information
- intelligent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Human Computer Interaction (AREA)
- Telephonic Communication Services (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Present disclose provides a kind of safe office systems of intelligent automation, including:Identification subsystem is used for user identity identification and access, including living things feature recognition equipment and access control system, wherein:Living things feature recognition equipment is used to acquire the biological attribute data of user;Access control system is connected to the living things feature recognition equipment, receives the biological information data of the living things feature recognition equipment acquisition, and receives the access that control signal realizes user;Artificial intelligence secure subsystem receives the biological information data, and realizes the control to access control system, office permission and/or working environment according to the biological information data.By the way that identification system to be combined with artificial intelligence secure subsystem, unified certification and timely processing information is realized, and realize the differentiation rights management under different office situations, further improve Information Security.
Description
Technical field
This disclosure relates to Intelligent office field more particularly to a kind of safe office system of intelligent automation and method.
Background technology
Current most of Company Confidential files are easy leakage, and some even can cause deathblow to company.Although existing
It has been popularized in office systems such as with no paper OA, ERP, but has been all based on account number cipher login, and there is also by it for account information
The risk that other people usurp, and exist to be utilized and carry out the hidden danger such as violation examination & approval or inquiry confidential information.
Therefore, for the above safety and office automatic the problem of, existing Corporation system are carried out using fingerprint, face recognition
The office automatics such as relevant authentication, authority distribution and Examination and approval, but each intelligence system independent operation can not combine unified certification
With timely processing information, office efficiency is not high, and not can effectively prevent secret data in enterprise and leak.
Invention content
(1) technical problems to be solved
Present disclose provides a kind of safe office system of intelligent automation and methods, set forth above at least partly to solve
The technical issues of.
(2) technical solution
According to one aspect of the disclosure, a kind of safe office system of intelligent automation is provided, including:
Identification subsystem is used for user identity identification and access, including:
Living things feature recognition equipment, the biological attribute data for acquiring user;
Access control system is connected to the living things feature recognition equipment, receives the living things feature recognition equipment acquisition
Biological information data, and receive the access that control signal realizes user;
Artificial intelligence secure subsystem receives the biological information data, and according to the biological information number
The factually existing control to access control system, office permission and/or working environment.
In the disclosure some embodiments, the artificial intelligence secure subsystem includes:Authentication and rights management mould
Block will be in the biological information and database after the biological information data for receiving the acquisition of identification subsystem
Information is compared, and obtains the relevant information of the personnel, including access permission information, working environment control information, at least one
Office authority information;Working environment control module receives the working environment of the authentication and authority management module transmission
Information is controlled, the office equipment in user's institute's management and control region is turned on and off;Office automation module receives the authentication
And the office authority information of authority management module transmission, and according to the office authority information automatic distributing task.
In the disclosure some embodiments, the artificial intelligence secure subsystem further includes:Security management and control module is used for
It authorizes after accessing office system, records the operation behavior of licensee, feed back to donor, and in equipment or authorize abnormal conditions
Pass through mail, short message, voice mode automatic early-warning related personnel down.
In the disclosure some embodiments, the access permission information is used for the certification of each gate inhibition of enterprises;It is described to do
The equipment that public context control information is used to determine user's management and control, and control is opened and closed to the equipment of user's management and control;It is described
Office authority information include to the access right of office equipment and to file make increase, deletion, change, check, screenshotss and/
Or replicate the permission of operation.
In the disclosure some embodiments, the office automation module provides data according to the office authority information and receives
Collection, data analysis, automation task assignment, system authentication, permission in batches, node examine function.
In the disclosure some embodiments, long-distance intelligent is handled official business subsystem, including:Intelligent mobile terminal is provided with
The client of OA systems is connected to the artificial intelligence secure subsystem, to the identity characteristic information of upload user
And the pre- operation information that data are carried out of user, while user is also provided in the enterprises file operation permission remotely executed
Audit;Long-distance identity-certifying equipment is connected with the intelligent mobile terminal, for obtaining remote rights certification.
In the disclosure some embodiments, the client of the intelligent mobile terminal also provides authority request service, wherein
User handles official business Permission Levels less than enterprises identification subsystem by the acquiescence that the long-distance identity-certifying equipment obtains
The office Permission Levels obtained afterwards are authenticated, if user needs to obtain higher level-one permission at this time, are sent out by client
Request is sent, is audited by approving person and obtains high level-one permission.
In the disclosure some embodiments, the client of the intelligent mobile terminal also provides permission grant service, including:
When user is not in company, i.e., when not checking card, the user is unavailable in the corresponding authority of intra-company's equipment, only through excessive thing
After intelligent mobile terminal mandate, the permission can be used people in the usage time of setting, and prompting user is before mandate expires
It is no to apply for that party is continuing with.
A kind of method that intelligent automation is handled official business safely another aspect of the present disclosure provides, including:Step
S1 is remotely being recognized to user's progress identity by identification subsystem in office or by long-distance intelligent office subsystem
Card service, and identification authentication data is transmitted to artificial intelligence secure subsystem;Step S2, artificial intelligence secure subsystem is to described
Identification authentication data is judged, corresponding permission is provided a user;Step S3, artificial intelligence secure subsystem is according to user's body
Part authentication data realizes working environment control and office automatic.
In the disclosure some embodiments, in the step S2, after access control system is checked card, just give into personnel's correlation
Processing authority, i.e., after access control system is checked card, indicate people in company, give corresponding first order permission;When user is not in company,
When not checking card, after the long-distance intelligent office subsystem carries out authentication to user, second level permission is given;Work as user
It does not check card in office, then others can not be operated using the user in the corresponding authority of intra-company's equipment, only be passed through
It after crossing party's intelligent mobile terminal mandate, and can be used in setting acquiescence usage time, mandate is reminded before expiring and used
Whether people will apply for that party is continuing with its permission.
In the disclosure some embodiments, in the step S2, when user is when other than Administrative Area, pass through cell phone application
Living things feature recognition certification is carried out when examining or obtaining corresponding authority, enterprise VPN network need to be connected.
In the disclosure some embodiments, in the step S2, passes through intelligent mobile terminal combination fingerprint and/or face knows
Not to obtain permission, and it is read-only file permission by the permission of the acquisition of intelligent mobile terminal.
In the disclosure some embodiments, in the step S3, doing of being administered is automatically analyzed by artificial intelligence system
Public context control information and office authority information, after being checked card by face or fingerprint recognition system after user enters company, from
Dynamic computer, printer, scanning machine, the server for starting institute's jurisdiction, to station after phase entered by living things feature recognition
Relationship is united, and carries out related system authority distribution and each office system examination & approval of auxiliary, packet at work according to identification authentication data
Include provide data collection, data analysis, automation task assignment, system authentication, permission in batches, node examination & approval.
(3) advantageous effect
It can be seen from the above technical proposal that the safe office system of disclosure intelligent automation and method are at least with following
One of advantageous effect:
(1) by the way that identification system to be combined with artificial intelligence secure subsystem, unified certification and in time is realized
Information is handled, access information attendance information, remote authentication information are combined with office authority information, and realizes different office feelings
Differentiation rights management under shape, further increases Information Security;
(2) since access control system and living creature characteristic recognition system to be combined with working environment control, access control system in addition to
It realizes traditional attendance checking function, can also be analyzed by artificial intelligence secure subsystem after triggering attendance according to information is acquired before
Biological characteristic recognition information, control working environment and authority information and improve working environment intelligence to accelerate office efficiency
Degree can be changed;
(3) due to using maltilevel security certification, and according to the safety of practical office space, Auto-matching administer equipment and
File permission effectively prevents secret data in enterprise and leaks.
Description of the drawings
Fig. 1 is the structural schematic diagram of the safe office system of embodiment of the present disclosure intelligent automation.
Fig. 2 is the flow chart of the safe office procedure of embodiment of the present disclosure intelligent automation.
Specific implementation mode
Present disclose provides a kind of safe office system of intelligent automation, disclosure design aims at realization safety intelligent
Energyization is handled official business, and by access control system, monitoring system, desktop virtualization, cell phone application and artificial intelligence fingerprint face identification system are integrated
Change automatic office security system, by artificial intelligence system, by gate inhibition, monitoring, cloud desktop, mobile phone combination integrated intelligent office system
System makes full use of the simple function of each equipment to play the great function more than single equipment, accelerates enterprise intelligentization office step
It cuts down.At the same time it can also implement password, fingerprint, face's equipment various ways certification according to equipment or document degree of secrecy, public affairs are prevented
Classified papers leakage is taken charge of, not only improves working efficiency, but also have powerful security mechanism.
To make the purpose, technical scheme and advantage of the disclosure be more clearly understood, below in conjunction with specific embodiment, and reference
The disclosure is further described in attached drawing.
Disclosure some embodiments will be done with reference to appended attached drawing in rear and more comprehensively describe to property, some of but not complete
The embodiment in portion will be shown.In fact, the various embodiments of the disclosure can be realized in many different forms, and should not be construed
To be limited to this several illustrated embodiment;Relatively, these embodiments are provided so that the disclosure meets applicable legal requirement.
In first exemplary embodiment of the disclosure, a kind of safe office system of intelligent automation is provided.Fig. 1 is
The structural schematic diagram of the safe office system of first embodiment of the present disclosure intelligent automation.As shown in Figure 1, disclosure intelligent automation
Safe office system includes:Identification subsystem, artificial intelligence secure subsystem and long-distance intelligent office subsystem.
The identification subsystem includes living things feature recognition equipment and access control system.The living things feature recognition equipment
Including fingerprint identification device, face recognition device, and/or retinal recognition device.This equipment needs face, fingerprint recognition
Function and/or retinal recognition device, for acquiring face and the finger print data of all staff on board.For example, the biology is special
Sign identification equipment be face recognition device, this equipment can with monitoring camera, can also computer camera or cell-phone camera
Head is mainly used for carrying out facial recognition scan, is used for face scan certification, the purposes such as examination & approval.In different embodiments, the life
Object characteristic identificating equipment can also be Fingerprint Identification Unit, this equipment can be monitoring punched-card machine, can also be that mobile fingerprint is known
Other device individually buys Fingerprint Identification Unit, is mainly used for carrying out fingerprint recognition scanning, for purposes such as finger print identifying, examination & approval.
Access control system receives the biological information data of the living things feature recognition equipment acquisition, by the data transmission
Artificial intelligence secure subsystem is given, realizes daily attendance record function, and provide data to artificial intelligence secure subsystem
Afterwards, and the control signal of artificial intelligent and safe subsystem is received, realizes the judgement to the access of the user.
Traditional access control system is intended only as attendance data acquisition and uses, and access control system can also be according to acquiring before in the disclosure
Information analyzes fingerprint or face recognition information after triggering attendance, the automatic decision certification by artificial intelligence secure subsystem
When the equipment of information institute management and control and judgement are put and are opened and closed automatically, effective to shorten management time and maintenance cost,
And differentiate change authentication information to the increase of fileinfo, deletion, change, check, the authority informations such as screenshotss, to control user behaviour
Make behavior.
Artificial intelligence secure subsystem includes authentication and authority management module, working environment control module, handles official business certainly
Dynamicization module and security management and control module.
The authentication and authority management module receive identification subsystem in artificial intelligence secure subsystem and adopt
After the biological information data of collection, the biological information is compared with the information in database, obtains the personnel
Relevant information, including access permission information, working environment control information, office authority information etc..Wherein access permission information
For the certification of each access control system of enterprises, working environment information includes that control is opened and closed to the equipment of user's management and control,
Office authority information includes to the access right of equipment and making increase to file, deletion, changing, check, screenshotss, and/or multiple
The permission of the operations such as system.
The working environment control module receives the working environment control of the authentication and authority management module transmission
Information processed is turned on and off the office equipment in user's institute's management and control region, such as user is after access control system certification, automatic to start
The office equipment such as computer, printer, scanning machine, the server of institute's jurisdiction.Pass through fingerprint, face recognition intelligent automation
System, user enter company and just automatically open corresponding office equipment and office system, enter working state quickly, do not use equipment
Preceding manually opened relevant device is switched on a few minutes clock time waiting facilities, improves office efficiency.By fingerprint and face recognition come
Certification associated rights and system audit will not be usurped by other people, safety are greatly improved.
The office automation module is a safe and intelligent automated system, receives the authentication and permission pipe
The office authority information of module transfer is managed, and data collection, data analysis, automation times are provided according to the office authority information
Be engaged in appointments, system authentication, permission in batches, node examine etc. functions.
The security management and control module can be after authorizing access office system, and record is received the operation behavior of donor, feedback
To donor, and pass through the modes automatic early-warning related personnel such as mail, short message, voice under equipment or mandate abnormal conditions
The long-distance intelligent office subsystem includes intelligent mobile terminal and long-distance identity-certifying equipment, the intelligent mobile
Terminal can be mobile phone, tablet computer, not be equipped with the client of OA systems thereon.The client is known with the identity
Other equipment is connected, to the pre- operation information carried out to data of the identity characteristic information of upload user and user;Client simultaneously
Audit of the user in the enterprises file operation permission remotely executed is also provided.Preferably, user passes through the intelligent slidings such as mobile phone
Dynamic terminal needs to obtain purview certification in conjunction with fingerprint and face recognition double authentication.
Preferably, the long-distance identity-certifying integration of equipments is on intelligent mobile terminal, for example, by possessed by mobile phone
Camera or fingerprint identification device are described when user needs in remotely progress office operation as long-distance identity-certifying equipment
The client of intelligent mobile terminal identifies the body of user by identification apparatus such as camera, fingerprints by enterprise VPN network
After part characteristic information, it is connected to the artificial intelligence secure subsystem, judges whether the user has permission and is remotely executing institute
State operation information;The user is allowed to pass through operation information described in client executing if having;Otherwise identification apparatus weight is enabled
The identity characteristic information of new acquisition user.
Preferably, user is authenticated by the long-distance identity-certifying equipment and enterprises identification subsystem
Afterwards, the office Permission Levels obtained are different.For example, user is after access control system is checked card, people is indicated in company, gives corresponding the
Level-one permission;If user, by long-distance identity-certifying device authentication, artificial intelligence secure subsystem is that the user distributes automatically
Second level permission, the second level permission are only read-only file permissions, if user needs to obtain higher level-one permission at this time, are needed
It is sent and is asked by client, passed through by approving person's audit, fingerprint could be opened, face's certification examination & approval obtain high level-one power
Limit makes strange land office same safe and reliable as a result,.
In some embodiments, user indicates that people in company, gives corresponding first order permission after access control system is checked card;
When people is not in company, i.e., when not checking card, others can not use the user to carry out first in the corresponding authority of intra-company's equipment
The operation of grade permission, can be used, and acquiescence usage time is arranged only after party's intelligent mobile terminal mandate, authorize
Remind whether user will apply for that party is continuing with first order permission before expiring.
So far, the safe office system introduction of first embodiment of the present disclosure intelligent automation finishes.
In second exemplary embodiment of the disclosure, a kind of method that intelligent automation is handled official business safely is provided, is wrapped
It includes:
Step S1, by identification subsystem office or by long-distance intelligent handle official business subsystem remotely to
Family carries out identity authentication service, and transmits identification authentication data to artificial intelligence secure subsystem;
Step S2, artificial intelligence secure subsystem judge the identification authentication data, provide a user corresponding
Permission;
Step S3, artificial intelligence secure subsystem realize working environment control and automation according to authenticating user identification data
Office.
Preferably, in the step S2, the client of the intelligent mobile terminal also provides authority request service.User is logical
The acquiescence office Permission Levels that the long-distance identity-certifying equipment obtains are crossed less than enterprises identification subsystem to be recognized
The office Permission Levels obtained after card are sent by client and are asked if user needs to obtain higher level-one permission at this time,
It is audited by approving person and obtains high level-one permission.
In the step S2, the client of the intelligent mobile terminal also provides permission grant service.It is beaten in access control system
It after card, just gives into the relevant processing authority of personnel, i.e., after access control system is checked card, indicates people in company, give corresponding the
Level-one permission;When people is not in company, i.e., when not checking card, others can not use the user in the corresponding authority of intra-company's equipment
The operation for carrying out first order permission can be used only after party's intelligent mobile terminal mandate, and acquiescence is arranged and uses
Time, mandate remind whether user will apply for that party is continuing with first order permission before expiring.
When user goes on business or is in corresponding authority is examined or obtains by cell phone application progress fingerprint or face recognition certification
(needing Connected Corp.'s VPN network).It is related to administration by fingerprint, face recognition examination & approval related procedure by using cell-phone customer terminal
Equipment opens mobile phone terminal before solving, and the risk that concern of data is divulged a secret, and needs to tie by intelligent mobile terminals such as mobile phones
Fingerprint and face recognition double authentication are closed to obtain permission, and is only read-only text by the permission of the acquisition of intelligent mobile terminal
Part permission only opens fingerprint, face's certification examination & approval agreement permission to special approving person, makes the same safety of strange land office can
It leans on, not only increases flexibility, but also safe and reliable increase office efficiency.
Wherein, in the step S3, administered equipment and document permission are automatically analyzed by artificial intelligence system, when with
Family enters after company checked card by face or fingerprint recognition system after, the automatic computer for starting institute's jurisdiction, is swept printer
Retouch the office equipment such as machine, server, to station after related system entered by face or fingerprint recognition certification, and recognized according to identity
Card data carry out related system authority distribution and each office system examination & approval of auxiliary at work, including provide data collection, data
Analysis, automation task assignment, system authentication, permission in batches, node examination & approval etc..
The disclosure is mutual by access control and attendance system, monitoring system, cloud desktop, cell-phone customer terminal, artificial intelligence office system
Association enters the fingerprint and face recognition data of trade-after acquisition by user, to carry out the automations such as authority distribution, certification, examination & approval
Office application will be connected by artificial intelligence system data processing centre between each system, calls distribute single realization mutually
Function can start equipment of administering automatically as checked card by artificial intelligence center, lead under equipment or mandate abnormal conditions
The modes automatic early-warning related personnel such as mail, short message, voice is crossed, this, which is individual equipment, to accomplish, effective in this way to save
Management time and maintenance cost.Accelerate Intelligent office development.
In order to achieve the purpose that brief description, in above-described embodiment 1, any technical characteristic narration for making same application is all
And in this, without repeating identical narration.
So far, the method introduction that second embodiment of the present disclosure intelligent automation is handled official business safely finishes.
So far, attached drawing is had been combined the embodiment of the present disclosure is described in detail.It should be noted that in attached drawing or saying
In bright book text, the realization method for not being painted or describing is form known to a person of ordinary skill in the art in technical field, and
It is not described in detail.In addition, the above-mentioned definition to each element and method be not limited in mentioning in embodiment it is various specific
Structure, shape or mode, those of ordinary skill in the art simply can be changed or replaced to it.
Furthermore word "comprising" does not exclude the presence of element or step not listed in the claims.Before element
Word "a" or "an" does not exclude the presence of multiple such elements.
In addition, unless specifically described or the step of must sequentially occur, there is no restriction in the above institute for the sequence of above-mentioned steps
Row, and can change or rearrange according to required design.And above-described embodiment can be based on the considerations of design and reliability, that
This mix and match is used using or with other embodiment mix and match, i.e., the technical characteristic in different embodiments can be freely combined
Form more embodiments.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein.
Various general-purpose systems can also be used together with teaching based on this.As described above, it constructs required by this kind of system
Structure be obvious.In addition, the disclosure is not also directed to any certain programmed language.It should be understood that can utilize various
Programming language realizes content of this disclosure described here, and the description done above to language-specific is to disclose this public affairs
The preferred forms opened.
The disclosure can by means of include several different elements hardware and by means of properly programmed computer come
It realizes.The all parts embodiment of the disclosure can be with hardware realization, or to run on one or more processors
Software module is realized, or is realized with combination thereof.It will be understood by those of skill in the art that can use in practice micro-
Processor or digital signal processor realize some or all components in the relevant device according to the embodiment of the present disclosure
Some or all functions.The disclosure is also implemented as executing some or all of method as described herein
Equipment or program of device (for example, computer program and computer program product).It is such to realize that the program of the disclosure
May be stored on the computer-readable medium, or can be with the form of one or more signal.Such signal can be from
It downloads and obtains on internet website, either provide on carrier signal or provide in any other forms.
Those skilled in the art, which are appreciated that, to carry out adaptively the module in the equipment in embodiment
Change and they are arranged in the one or more equipment different from the embodiment.It can be the module or list in embodiment
Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or
Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it may be used any
Combination is disclosed to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so to appoint
Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power
Profit requires, abstract and attached drawing) disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation
It replaces.Also, in the unit claims listing several devices, several in these devices can be by same hard
Part item embodies.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of each open aspect,
Above in the description of the exemplary embodiment of the disclosure, each feature of the disclosure is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:It is i.e. required to protect
The disclosure of shield requires features more more than the feature being expressly recited in each claim.More precisely, as following
Claims reflect as, open aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following specific implementation mode are expressly incorporated in the specific implementation mode, wherein each claim itself
All as the separate embodiments of the disclosure.
Particular embodiments described above has carried out further in detail the purpose, technical solution and advantageous effect of the disclosure
It describes in detail bright, it should be understood that the foregoing is merely the specific embodiment of the disclosure, is not limited to the disclosure, it is all
Within the spirit and principle of the disclosure, any modification, equivalent substitution, improvement and etc. done should be included in the guarantor of the disclosure
Within the scope of shield.
Claims (13)
1. a kind of safe office system of intelligent automation, including:
Identification subsystem is used for user identity identification and access, including living things feature recognition equipment and access control system,
In:
Living things feature recognition equipment is used to acquire the biological attribute data of user;
Access control system is connected to the living things feature recognition equipment, and the biology for receiving the living things feature recognition equipment acquisition is special
Information data is levied, and receives the access that control signal realizes user;
Artificial intelligence secure subsystem receives the biological information data, and according to biological information data reality
Now to the control of access control system, office permission and/or working environment.
2. the safe office system of intelligent automation according to claim 1, wherein the artificial intelligence secure subsystem packet
It includes:
Authentication and authority management module will be described after receiving the biological information data that identification subsystem acquires
Biological information is compared with the information in database, obtains the relevant information of the personnel, including access permission information, does
Public context control information, at least one office authority information;
Working environment control module receives the working environment control information of the authentication and authority management module transmission,
It is turned on and off the office equipment in user's institute's management and control region;
Office automation module receives the office authority information of the authentication and authority management module transmission, and according to institute
State office authority information automatic distributing task.
3. the safe office system of intelligent automation according to claim 2, wherein the artificial intelligence secure subsystem,
Further include:
Security management and control module, for after authorizing access office system, recording the operation behavior of licensee, feeding back to mandate
People, and pass through mail, short message, voice mode automatic early-warning related personnel under equipment or mandate abnormal conditions.
4. the safe office system of intelligent automation according to claim 2, wherein
The access permission information is used for the certification of each gate inhibition of enterprises;
The equipment that the working environment control information is used to determine user's management and control, and the equipment of user's management and control is opened and closed
Control;
The office authority information include to the access right of office equipment and to file make increase, deletion, change, check,
Screenshotss, and/or the permission for replicating operation.
5. the safe office system of intelligent automation according to claim 2, wherein
The office automation module refers to according to office authority information offer data collection, data analysis, automation task
Group, system authentication, permission in batches, node examine function.
6. the safe office system of intelligent automation according to claim 2, further includes:
Long-distance intelligent office subsystem, including:
Intelligent mobile terminal is provided with the client of OA systems, is connected to the artificial intelligence secure subsystem,
To the pre- operation information carried out to data of the identity characteristic information of upload user and user, while user being also provided and is remotely being held
The audit of capable enterprises file operation permission;
Long-distance identity-certifying equipment is connected with the intelligent mobile terminal, for obtaining remote rights certification.
7. the safe office system of intelligent automation according to claim 6, the client of the intelligent mobile terminal also carry
For authority request service, wherein
User handles official business Permission Levels less than enterprises identification by the acquiescence that the long-distance identity-certifying equipment obtains
System is authenticated the office Permission Levels obtained afterwards, if user needs to obtain higher level-one permission at this time, passes through client
End sends request, is audited by approving person and obtains high level-one permission.
8. the safe office system of intelligent automation according to claim 6, the client of the intelligent mobile terminal also carry
For permission grant service, including:
When user is not in company, i.e., when not checking card, the user is unavailable in the corresponding authority of intra-company's equipment, only passes through
After intelligent mobile terminal mandate, the permission can be used party in the usage time of setting, and mandate is reminded before expiring and used
Whether people will apply for that party is continuing with.
9. a kind of method that intelligent automation is handled official business safely is pacified using such as claim 1-8 any one of them intelligent automation
Full office system, including:
Step S1, by identification subsystem office or by long-distance intelligent handle official business subsystem remotely to user into
Row identity authentication service, and identification authentication data is transmitted to artificial intelligence secure subsystem;
Step S2, artificial intelligence secure subsystem judge the identification authentication data, provide a user corresponding permission;
Step S3, artificial intelligence secure subsystem realize that working environment control and automation are done according to authenticating user identification data
It is public.
10. the safe office procedure of intelligent automation according to claim 9, wherein in the step S2, in access control system
It after checking card, just gives into the relevant processing authority of personnel, i.e., after access control system is checked card, indicates people in company, give corresponding
First order permission;When user is not in company, i.e., when not checking card, the long-distance intelligent office subsystem carries out identity to user to be recognized
After card, second level permission is given;
When user does not check card in office, then others can not be grasped using the user in the corresponding authority of intra-company's equipment
Make, only after party's intelligent mobile terminal mandate, and can be used in setting acquiescence usage time, before mandate expires
Remind whether user will apply for that party is continuing with its permission.
11. the safe office procedure of intelligent automation according to claim 10, wherein in the step S2, when user exists
When other than Administrative Area, living things feature recognition certification is carried out by cell phone application when examining or obtaining corresponding authority, enterprise need to be connected
Industry VPN network.
12. the safe office procedure of intelligent automation according to claim 9, wherein in the step S2, pass through intelligent sliding
Dynamic terminal combination fingerprint and/or face recognition are read-only by the permission of the acquisition of intelligent mobile terminal to obtain permission
File permission.
13. the safe office procedure of intelligent automation according to claim 9, wherein in the step S3, pass through artificial intelligence
Energy system automatically analyzes administered working environment control information and office authority information, passes through face after user enters company
Or after fingerprint recognition system is checked card, automatic computer, printer, scanning machine, the server for starting institute's jurisdiction, to after station
Enter related system by living things feature recognition, and carried out at work according to identification authentication data related system authority distribution and
It assists each office system to examine, including data collection, data analysis, automation task assignment, system authentication, permission point is provided
It criticizes, node examination & approval.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810139185.2A CN108449320B (en) | 2018-02-09 | 2018-02-09 | Intelligent automatic safe office system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810139185.2A CN108449320B (en) | 2018-02-09 | 2018-02-09 | Intelligent automatic safe office system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108449320A true CN108449320A (en) | 2018-08-24 |
CN108449320B CN108449320B (en) | 2020-08-14 |
Family
ID=63192266
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810139185.2A Active CN108449320B (en) | 2018-02-09 | 2018-02-09 | Intelligent automatic safe office system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108449320B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110097332A (en) * | 2019-04-03 | 2019-08-06 | 福建天晴数码有限公司 | The method and computer readable storage medium of privilege review and automatic processing |
CN110351296A (en) * | 2019-07-22 | 2019-10-18 | 深圳市口袋网络科技有限公司 | A kind of application login method, device and its relevant device |
CN110381055A (en) * | 2019-07-16 | 2019-10-25 | 徐州医科大学 | RFID system privacy-protection certification protocol method in healthcare supply chain |
CN110399577A (en) * | 2019-07-24 | 2019-11-01 | 秒针信息技术有限公司 | Office facility sharing method and system |
CN110620782A (en) * | 2019-09-29 | 2019-12-27 | 深圳市珍爱云信息技术有限公司 | Account authentication method and device, computer equipment and storage medium |
CN110633561A (en) * | 2019-09-23 | 2019-12-31 | 湖北师范大学 | Multi-path identity authentication method for OA (office automation) office system |
CN111708758A (en) * | 2020-06-09 | 2020-09-25 | 孟磊 | Construction method and application method of judicial-assisted case management database |
CN113191729A (en) * | 2021-04-26 | 2021-07-30 | 西安雷风电子科技有限公司 | Cloud desktop management method and system |
CN115146250A (en) * | 2022-05-16 | 2022-10-04 | 苏州威达智电子科技有限公司 | General module device of intelligent detection equipment and identification communication system thereof |
CN115238257A (en) * | 2022-09-26 | 2022-10-25 | 深圳市亲邻科技有限公司 | Access control face permission updating method and device, computer equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103729585A (en) * | 2013-12-06 | 2014-04-16 | 南通芯迎设计服务有限公司 | Home automation system |
CN105550562A (en) * | 2015-12-31 | 2016-05-04 | 北京无线电计量测试研究所 | Iris recognition based identity authentication information management system and method |
CN106249609A (en) * | 2016-09-07 | 2016-12-21 | 苏州国锦智承信息科技有限公司 | A kind of smart office system based on Internet of Things |
CN106682881A (en) * | 2017-01-05 | 2017-05-17 | 李铖浩 | Intelligent office automation system |
CN107464054A (en) * | 2017-08-01 | 2017-12-12 | 太仓市智联信息科技有限公司 | Intelligent Office space automated system |
-
2018
- 2018-02-09 CN CN201810139185.2A patent/CN108449320B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103729585A (en) * | 2013-12-06 | 2014-04-16 | 南通芯迎设计服务有限公司 | Home automation system |
CN105550562A (en) * | 2015-12-31 | 2016-05-04 | 北京无线电计量测试研究所 | Iris recognition based identity authentication information management system and method |
CN106249609A (en) * | 2016-09-07 | 2016-12-21 | 苏州国锦智承信息科技有限公司 | A kind of smart office system based on Internet of Things |
CN106682881A (en) * | 2017-01-05 | 2017-05-17 | 李铖浩 | Intelligent office automation system |
CN107464054A (en) * | 2017-08-01 | 2017-12-12 | 太仓市智联信息科技有限公司 | Intelligent Office space automated system |
Non-Patent Citations (1)
Title |
---|
王轩: "采用智能工作流的办公管理系统设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110097332A (en) * | 2019-04-03 | 2019-08-06 | 福建天晴数码有限公司 | The method and computer readable storage medium of privilege review and automatic processing |
CN110381055B (en) * | 2019-07-16 | 2021-06-11 | 徐州医科大学 | RFID system privacy protection authentication protocol method in medical supply chain |
CN110381055A (en) * | 2019-07-16 | 2019-10-25 | 徐州医科大学 | RFID system privacy-protection certification protocol method in healthcare supply chain |
CN110351296A (en) * | 2019-07-22 | 2019-10-18 | 深圳市口袋网络科技有限公司 | A kind of application login method, device and its relevant device |
CN110399577A (en) * | 2019-07-24 | 2019-11-01 | 秒针信息技术有限公司 | Office facility sharing method and system |
CN110633561A (en) * | 2019-09-23 | 2019-12-31 | 湖北师范大学 | Multi-path identity authentication method for OA (office automation) office system |
CN110620782A (en) * | 2019-09-29 | 2019-12-27 | 深圳市珍爱云信息技术有限公司 | Account authentication method and device, computer equipment and storage medium |
CN111708758A (en) * | 2020-06-09 | 2020-09-25 | 孟磊 | Construction method and application method of judicial-assisted case management database |
CN111708758B (en) * | 2020-06-09 | 2022-12-30 | 孟磊 | Construction method and application method of judicial assistance case management database |
CN113191729A (en) * | 2021-04-26 | 2021-07-30 | 西安雷风电子科技有限公司 | Cloud desktop management method and system |
CN115146250A (en) * | 2022-05-16 | 2022-10-04 | 苏州威达智电子科技有限公司 | General module device of intelligent detection equipment and identification communication system thereof |
CN115238257A (en) * | 2022-09-26 | 2022-10-25 | 深圳市亲邻科技有限公司 | Access control face permission updating method and device, computer equipment and storage medium |
CN115238257B (en) * | 2022-09-26 | 2023-01-06 | 深圳市亲邻科技有限公司 | Access control face permission updating method and device, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108449320B (en) | 2020-08-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108449320A (en) | The safe office system of intelligent automation and method | |
AU2019206006B2 (en) | System and method for biometric protocol standards | |
CN104253810B (en) | Safe login method and system | |
JP6932175B2 (en) | Personal number management device, personal number management method, and personal number management program | |
US8713688B2 (en) | Automated security analysis for federated relationship | |
CN106778325B (en) | A kind of information privacy system and its operating method | |
CN109067697B (en) | User account management and control method for hybrid cloud and readable medium | |
CN103176817B (en) | A kind of Linux security policy configuration based on self study | |
US20200168307A1 (en) | Method and system for accessing electronic medical and health records by blockchain | |
CN106302483B (en) | Decentralized management method and system | |
AU2013295701A1 (en) | Method and system for secure authentication and information sharing and analysis | |
CN101741558A (en) | Method for realizing uniform identity authentication | |
CN110362533A (en) | A kind of archives storage and shared system based on alliance's chain | |
CN110175439A (en) | User management method, device, equipment and computer readable storage medium | |
CN107862198A (en) | One kind accesses verification method, system and client | |
CN109948331A (en) | A kind of weak passwurd detection system and method | |
CN107545188A (en) | The management method of application, apparatus and system | |
CN107733842A (en) | Method for authenticating and device based on cloud platform | |
CN107707573A (en) | Data access method and its device and computer installation and its readable storage medium storing program for executing | |
CN107368906A (en) | Preengage the method and device in classroom | |
CN107181753B (en) | Mobile terminal financial system and method | |
CN108377244A (en) | A kind of Intranet uniform authentication method | |
CN109684802A (en) | A kind of method and system providing a user artificial intelligence platform | |
CA2703784A1 (en) | Electronic technical logbook | |
CN108881197A (en) | High score grid system authentication system based on RBAC model |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |