CN109102600A - Cell access permission management method and system - Google Patents
Cell access permission management method and system Download PDFInfo
- Publication number
- CN109102600A CN109102600A CN201810798845.8A CN201810798845A CN109102600A CN 109102600 A CN109102600 A CN 109102600A CN 201810798845 A CN201810798845 A CN 201810798845A CN 109102600 A CN109102600 A CN 109102600A
- Authority
- CN
- China
- Prior art keywords
- level
- instruction
- authorized order
- user
- initiated
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
Cell access permission management method and system provided by the invention handle the level-one authorized order, authorize primary user end level-one right to complete property management end this method comprises: receiving level-one authorized order;The level-one right includes the first right, the second right and third right;Second level authorized order is received, the second level authorized order is handled, authorizes secondary user's end second level right to complete primary user end;The second level right includes the first right and the second right;Three-level authorized order is received, the three-level authorized order is handled, authorizes three-level user terminal three-level right to complete secondary user end;The three-level right includes the first right;First right is right-of-way;Second right is to authorize other people right-of-way;Third right is to authorize other people the second right, and this method mitigates the management work of property security personnel significantly, and user can invite friends and family to enter cell whenever and wherever possible, can manage the user of oneself authorization whenever and wherever possible.
Description
Technical field
The invention belongs to cell entrance guard management technical fields, and in particular to cell access permission management method and system.
Background technique
Cell entrance guard management at present, user just can enter cell after mainly passing through property management authorization, which exists
Following problems: (1) user of all disengaging cells is both needed to property management staff's authorization, very big work is brought to property management staff
Burden.(2) it when visiting subscriber enters cell, needs to be ensured public security by property and register, the management work task weight of property security personnel.(3)
Owner cannot oneself management of buddy, relative, friend etc. enter and leave cell, it is inconvenient to use.(4) ability after casual user needs to register
It is inconvenient to use into cell.
Summary of the invention
For the defects in the prior art, the present invention provides cell access permission management method and system, mitigates property and protects
The operating pressure of peace, community user can be convenient management visiting personnel.
In a first aspect, a kind of cell access permission management method, comprising:
Level-one authorized order is received, the level-one authorized order is handled, authorizes primary user to complete property management end
Hold level-one right;The level-one right includes the first right, the second right and third right;The level-one authorized order includes institute
State the instruction that property management end is initiated to the primary user end or the request instruction that the primary user end is initiated to the property management end;
Second level authorized order is received, the second level authorized order is handled, authorizes second level to complete primary user end
User terminal second level right;The second level right includes the first right and the second right;The second level authorized order includes described one
The request that the instruction or the secondary user end that grade user terminal is initiated to the secondary user end are initiated to the primary user end
Instruction;
Three-level authorized order is received, the three-level authorized order is handled, authorizes three-level to complete secondary user end
User terminal three-level right;The three-level right includes the first right;The three-level authorized order include the secondary user end to
The request instruction that the instruction or the three-level user terminal that the three-level user terminal is initiated are initiated to the secondary user end;
First right is right-of-way;Second right is to authorize other people right-of-way;The third right is to authorize
Other people the second rights.
Further, this method further include:
It receives the level-one that property management end is initiated and removes instruction, instruction is removed to the level-one and is handled, to complete property management end
Remove the first right, the second right and/or the third right at primary user end;
It receives the second level that primary user end is initiated and removes instruction, instruction is removed to the second level and is handled, to complete one
Grade user terminal removes first right and/or the second right at secondary user end;
It receives the three-level that secondary user end is initiated and removes instruction, instruction is removed to the three-level and is handled, to complete two
Grade user terminal removes the first right of three-level user terminal.
Further, level-one authorized order, second level authorized order or three-level authorized order are handled, completes authorization tool
Body includes:
It is verified according to level-one authorized order, second level authorized order or three-level authorized order;
It completes to authorize according to verification result;
Verification mode include: essential information verifying, short-message verification, group verifying, two dimensional code verifying, system ID number verifying,
The customized phrase verifying of user or address list matching;
The essential information includes phone number and/or ID card No..
Further, this method further include:
Receive primary user end, the register instruction that secondary user end or three-level user terminal are initiated, to the register instruction into
Row processing, to complete the registration of primary user, secondary user or three-level user.
Further, this method further include:
The information to be identified for receiving visiting subscriber, obtains the identity information of visiting subscriber according to information to be identified;Work as judgement
When obtaining visiting subscriber with the first right, visiting subscriber is allowed to enter cell.
Second aspect, a kind of cell access permission management system, including primary user end, secondary user end, three-level user
End, property management end and background server;
Background server receives level-one authorized order, handles the level-one authorized order, is awarded with completing property management end
Give primary user end level-one right;The level-one right includes the first right, the second right and third right;The level-one authorization
Instruction includes that the instruction that the property management end is initiated to the primary user end or the primary user end are initiated to the property management end
Request instruction;
Background server receives second level authorized order, handles the second level authorized order, to complete primary user
Authorize secondary user's end second level right in end;The second level right includes the first right and the second right;The second level authorized order
Instruction from the primary user end to the secondary user end that initiate including or the secondary user end are to the primary user end
The request instruction of initiation;
Background server receives three-level authorized order, handles the three-level authorized order, to complete secondary user
Authorize three-level user terminal three-level right in end;The three-level right includes the first right;The three-level authorized order includes described two
The request that the instruction or the three-level user terminal that grade user terminal is initiated to the three-level user terminal are initiated to the secondary user end
Instruction;
First right is right-of-way;Second right is to authorize other people right-of-way;The third right is to authorize
Other people the second rights.
Further, background server receive property management end initiate level-one remove instruction, to the level-one removal instruct into
Row processing, to complete the first right, the second right and/or the third right that property management end removes primary user end;
Background server receives the second level that primary user end is initiated and removes instruction, removes at instruction to the second level
Reason, to complete the first right and/or the second right that primary user end removes secondary user end;
Background server receives the three-level that secondary user end is initiated and removes instruction, removes at instruction to the three-level
Reason, to complete the first right that secondary user end removes three-level user terminal.
Further, level-one authorized order, second level authorized order or three-level authorized order are handled, completes authorization tool
Body includes:
Background server is verified according to level-one authorized order, second level authorized order or three-level authorized order;
Background server is completed to authorize according to verification result;
Verification mode include: essential information verifying, short-message verification, group verifying, two dimensional code verifying, system ID number verifying,
The customized phrase verifying of user or address list matching;
The essential information includes phone number and/or ID card No..
Further, the registration that background server receives that primary user end, secondary user end or three-level user terminal are initiated refers to
It enables, the register instruction is handled, to complete the registration of primary user, secondary user or three-level user.
Further, which further includes the identification terminal being set at gate inhibition position;
Identification terminal acquires the information to be identified of visiting subscriber, is sent to background server;
Background server obtains the identity information of visiting subscriber according to information to be identified;Have when judgement obtains visiting subscriber
When the first right, generates door open command and be sent to identification terminal;
Identification terminal after receiving door open command, open by access control.
As shown from the above technical solution, cell access permission management method and system provided by the invention have following excellent
Point:
1, infrastructure management company only need in use, authorize to primary user (i.e. owner), do not need to manage for the first time it is all into
The user of cell out reduces the work load of property management staff.The visiting subscriber of cell is passed in and out all by primary user or second level
User, which invites, to be entered.So being not required to be ensured public security by property again and register, mitigation property is ensured public security significantly when visiting subscriber enters cell
Management work.
2, primary user and secondary user can invite friends and family to enter cell whenever and wherever possible, can manage whenever and wherever possible
The user of oneself authorization, can manage visiting subscriber whenever and wherever possible, easy to use.Casual user could be into after no longer needing to register
Enter cell, it is easy to use.
3, according to the relation chain formed in licensing process, relationship tracking can be carried out to the visiting subscriber to violate disciplines.According to
Relation chain is authorized, can be convenient the secondary user for searching any visiting subscriber into cell or primary user, thus to entrance
The personnel of violating disciplines of cell carry out relationship tracking or even responsibility investigation.
4. according to authorization relation chain, each public affairs can be counted and rented a house all users' disengaging in the locating authorization relation chain of applicant
Cell conditions, so as to effectively control behaviors such as " rent and do not live, sublet, group rental " in public management of renting a house.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art
Embodiment or attached drawing needed to be used in the description of the prior art are briefly described.In all the appended drawings, similar element
Or part is generally identified by similar appended drawing reference.In attached drawing, each element or part might not be drawn according to actual ratio.
Fig. 1 is the flow chart of cell access permission management method provided in this embodiment.
Fig. 2 is the method flow diagram for the vest right that embodiment one provides.
Fig. 3 is the method flow diagram for the removal right that embodiment two provides.
Fig. 4 is the frame diagram for the system that example IV provides.
Specific embodiment
It is described in detail below in conjunction with embodiment of the attached drawing to technical solution of the present invention.Following embodiment is only used for
Clearly illustrate technical solution of the present invention, therefore be only used as example, and cannot be used as a limitation and limit protection model of the invention
It encloses.It should be noted that unless otherwise indicated, technical term or scientific term used in this application are should be belonging to the present invention
The ordinary meaning that field technical staff is understood.
Embodiment one:
A kind of cell access permission management method, referring to Fig. 1,2, comprising:
Level-one authorized order is received, the level-one authorized order is handled, authorizes primary user to complete property management end
Hold level-one right;The level-one right includes the first right, the second right and third right;The level-one authorized order includes institute
State the instruction that property management end is initiated to the primary user end or the request instruction that the primary user end is initiated to the property management end;
Specifically, level-one right generally licenses to owner by property management personnel.Level-one authorized order include Unsolicited Grant and by
Dynamic authorization.Unsolicited Grant is that property management actively authorizes other people right, and property management end can authorize all owners (i.e. when beginning to use
Primary user) level-one right.Passive authorization is the property management authorization of primary user end activly request, when owner changes, new industry
Master can initiate to request to property management end, oneself level-one right is authorized in request property management.
Second level authorized order is received, the second level authorized order is handled, authorizes second level to complete primary user end
User terminal second level right;The second level right includes the first right and the second right;The second level authorized order includes described one
The request that the instruction or the secondary user end that grade user terminal is initiated to the secondary user end are initiated to the primary user end
Instruction;
Specifically, second level right is generally licensed to the relative, good friend, household etc. of owner by owner.Similarly, second level authorization refers to
Enable also includes Unsolicited Grant and passive authorization.Unsolicited Grant is that primary user actively authorizes secondary user's second level right.Passively award
Power is the primary user authorization of secondary user end activly request.
Three-level authorized order is received, the three-level authorized order is handled, authorizes three-level to complete secondary user end
User terminal three-level right;The three-level right includes the first right;The three-level authorized order include the secondary user end to
The request instruction that the instruction or the three-level user terminal that the three-level user terminal is initiated are initiated to the secondary user end;
Specifically, three-level right is generally licensed to the user needed into cell by secondary user, such as: take-away personnel,
Service worker, installer, household or the interim good friend for entering cell.Similarly, three-level authorized order also includes Unsolicited Grant
With passive authorization.Unsolicited Grant is that secondary user actively authorizes three-level user's three-level right.Passive authorization is three-level user terminal master
The authorization of dynamic request secondary user.
First right is right-of-way;Second right is to authorize other people right-of-way;The third right is to authorize
Other people the second rights.
Specifically, right-of-way is that can enter the right of cell.Right-of-way includes enterable cell, enterable gate inhibition
And enter the effective time of cell.This method can be set user and have the right to pass in and out cell for a long time, and it is interim that user also can be set
Pass in and out cell.
It can thus be seen that the right of primary user, secondary user and three-level user is successively successively decreased, the right of primary user
Maximum has 3 kinds of rights;The right of secondary user is taken second place, and has 2 kinds of rights;The right of three-level user is minimum, there is a kind of right.
Such as: if user A is primary user, user A can enter cell A, and user A can also invite other people (users
B, user C) enter cell, user A can also authorize other people (user D) second right.It is weighed since user A authorizes user D second
Benefit can invite other people (user E, user F) to enter cell, user D can also enter cell so user D is secondary user
A.User B, user C, user E and user F are three-level user, due to being able to enter cell A by user A or user D invitation.
This method, infrastructure management company only, in use, to primary user (i.e. owner) authorization, need to not need management institute for the first time
There is the user of disengaging cell, reduces the work load of property management staff.Pass in and out the visiting subscriber of cell all by primary user or
Secondary user, which invites, to be entered.So being not required to be ensured public security by property again and register, mitigation property significantly is protected when visiting subscriber enters cell
The management work of peace.Primary user and secondary user can invite friends and family to enter cell whenever and wherever possible, can be whenever and wherever possible
The user for managing oneself authorization, can manage visiting subscriber whenever and wherever possible, easy to use.To the casual user of disengaging cell, no
It needs just to can enter cell after registering at security personnel again, it is easy to use.
Embodiment two:
Embodiment two increases the following contents on the basis of previous embodiment:
This method is after completing secondary user end and authorizing three-level user terminal three-level right, referring to Fig. 3, further includes:
It receives the level-one that property management end is initiated and removes instruction, instruction is removed to the level-one and is handled, to complete property management end
Remove the first right, the second right and/or the third right at primary user end;
Specifically, if property management discovery owner is changed, such as primary user A has sold house, is no longer owner.
Property management just needs to remove the level-one right of primary user A.Property management can remove whole rights of primary user, can also remove one
The Partial rights of grade user.
It receives the second level that primary user end is initiated and removes instruction, instruction is removed to the second level and is handled, to complete one
Grade user terminal removes first right and/or the second right at secondary user end;
Specifically, primary user can remove whole rights of secondary user, can also remove the part power of secondary user
Benefit.
It receives the three-level that secondary user end is initiated and removes instruction, instruction is removed to the three-level and is handled, to complete two
Grade user terminal removes the first right of three-level user terminal.
Specifically, secondary user can remove the right-of-way of three-level user.
Method provided in this embodiment, property management end, primary user end and secondary user end can as the case may be actively
Remove the right of its subordinate subscriber.Higher level user can authorize subordinate subscriber right whenever and wherever possible, can also remove whenever and wherever possible
Subordinate subscriber right, it is easy to use.
Method provided by the embodiment of the present invention, to briefly describe, embodiment part does not refer to place, can refer to aforementioned reality
Apply corresponding contents in example.
Embodiment three:
Embodiment three increases the following contents on the basis of previous embodiment:
Level-one authorized order, second level authorized order or three-level authorized order are handled, authorization is completed and specifically includes:
It is verified according to level-one authorized order, second level authorized order or three-level authorized order;
It completes to authorize according to verification result;
Verification mode include: essential information verifying, short-message verification, group verifying, two dimensional code verifying, system ID number verifying,
The customized phrase verifying of user or address list matching;
The essential information includes phone number and/or ID card No..
Specifically, it in order to guarantee user security, could only be authorized after user is by verifying.Essential information is verified
Whether phone number and/or the ID card No. for verifying authorized user are correct.Short-message verification can be to send an SMS to and be awarded
User is weighed, authorized user completes to verify according to short message content.Group's verifying can be the group that verifying invited user is added,
Link is either sent out in group, invited user is completed to verify by clickthrough.The verifying of system ID number can be verifying system
Whether the ID number automatically generated of uniting is correct.The customized phrase verifying of user can be the customized phrase of user, can be number, text
Word, symbol etc..When invited user, which inputs, invites user-defined phrase, pass through verifying.
Further, this method is before receiving level-one authorized order, further includes:
Receive primary user end, the register instruction that secondary user end or three-level user terminal are initiated, to the register instruction into
Row processing, to complete the registration of primary user, secondary user or three-level user.
Specifically, this method additionally provides registering functional.User can be registered whenever and wherever possible by user terminal, be used
It is convenient, solve the defect that user in existing gate inhibition needs to be registered in specified fixed location (or fixed territorial scope).With
Family register when need input feature vector information (such as: two dimensional code, ID card information, password, face information, finger print information or iris
Information) and phone number etc..
Further, this method is after completing secondary user end and authorizing three-level user terminal three-level right, further includes:
The information to be identified for receiving visiting subscriber, obtains the identity information of visiting subscriber according to information to be identified;Work as judgement
When obtaining visiting subscriber with the first right, visiting subscriber is allowed to enter cell.
Specifically, information to be identified can be two dimensional code, ID card information, password, face information, finger print information or iris
The characteristic information of the users such as information.The identity of visiting subscriber can be uniquely confirmed by information to be identified, to judge to come to visit
Whether user has the first right, if so, allowing access into cell.
Method provided by the embodiment of the present invention, to briefly describe, embodiment part does not refer to place, can refer to aforementioned reality
Apply corresponding contents in example.
Example IV:
A kind of cell access permission management system, referring to fig. 4, including primary user end, secondary user end, three-level user
End, property management end and background server;
Background server receives level-one authorized order, handles the level-one authorized order, is awarded with completing property management end
Give primary user end level-one right;The level-one right includes the first right, the second right and third right;The level-one authorization
Instruction includes that the instruction that the property management end is initiated to the primary user end or the primary user end are initiated to the property management end
Request instruction;
Background server receives second level authorized order, handles the second level authorized order, to complete primary user
Authorize secondary user's end second level right in end;The second level right includes the first right and the second right;The second level authorized order
Instruction from the primary user end to the secondary user end that initiate including or the secondary user end are to the primary user end
The request instruction of initiation;
Background server receives three-level authorized order, handles the three-level authorized order, to complete secondary user
Authorize three-level user terminal three-level right in end;The three-level right includes the first right;The three-level authorized order includes described two
The request that the instruction or the three-level user terminal that grade user terminal is initiated to the three-level user terminal are initiated to the secondary user end
Instruction;
First right is right-of-way;Second right is to authorize other people right-of-way;The third right is to authorize
Other people the second rights.
Further, background server receive property management end initiate level-one remove instruction, to the level-one removal instruct into
Row processing, to complete the first right, the second right and/or the third right that property management end removes primary user end;
Background server receives the second level that primary user end is initiated and removes instruction, removes at instruction to the second level
Reason, to complete the first right and/or the second right that primary user end removes secondary user end;
Background server receives the three-level that secondary user end is initiated and removes instruction, removes at instruction to the three-level
Reason, to complete the first right that secondary user end removes three-level user terminal.
Further, level-one authorized order, second level authorized order or three-level authorized order are handled, completes authorization tool
Body includes:
Background server is verified according to level-one authorized order, second level authorized order or three-level authorized order;
Background server is completed to authorize according to verification result;
Verification mode include: essential information verifying, short-message verification, group verifying, two dimensional code verifying, system ID number verifying,
The customized phrase verifying of user or address list matching;
The essential information includes phone number and/or ID card No..
Further, the registration that background server receives that primary user end, secondary user end or three-level user terminal are initiated refers to
It enables, the register instruction is handled, to complete the registration of primary user, secondary user or three-level user.
Cell access permission management system provided in this embodiment, infrastructure management company only need to be for the first time in use, to level-ones
User (i.e. owner) authorization does not need the user for managing all disengaging cells, reduces the work load of property management staff.Disengaging
The visiting subscriber of cell, which is invited by primary user or secondary user, to be entered.So being not required to again when visiting subscriber enters cell
It is ensured public security and is registered by property, significantly the management work of mitigation property security personnel.Primary user and secondary user can invite whenever and wherever possible
Friends and family enters cell, can manage the user of oneself authorization whenever and wherever possible, can manage visiting subscriber whenever and wherever possible, use
It is convenient.To the casual user of disengaging cell, it is no longer necessary to it just can enter cell after registering at security personnel, it is easy to use.
System provided by the embodiment of the present invention, to briefly describe, embodiment part does not refer to place, can refer to aforementioned side
Corresponding contents in method embodiment.
Embodiment five:
Embodiment five increases the following contents on the basis of example IV:
The system further includes the identification terminal being set at gate inhibition position;
Identification terminal acquires the information to be identified of visiting subscriber, is sent to background server;
Specifically, two dimensional code collector, identity card collector, password collector, face can be equipped on identification terminal to adopt
Storage, fingerprint capturer or iris capturing device etc., when visiting subscriber wants to enter into cell, identification terminal obtain user wait know
Other information.
Background server obtains the identity information of visiting subscriber according to information to be identified;Have when judgement obtains visiting subscriber
When the first right, generates door open command and be sent to identification terminal;
Identification terminal after receiving door open command, open by access control.
Specifically, each gate inhibition is equipped with identification terminal, and identification terminal and gate inhibition bind, and identification terminal acquisition is visiting
The information to be identified of user.When background server judges according to information to be identified the identity of visiting subscriber, and this visiting is used
When family also has the first right, door opening command is sent to identification terminal, and identification terminal controls corresponding gate inhibition and opens, and allows come to visit and use
Family is able to enter cell.
In addition to this, the present embodiment also provides the big data application of the system, is managed to cell.
1, for general cell.
The system can be used for permanent resident population's statistics, such as: according to the owner of property management personnel's authorization and its owner's relation chain
The disengaging situation of lower secondary user and three-level user, counts the permanent resident population of cell.If owner often passes in and out cell, can also sentence
The fixed house is owner-occupied.It is also used to vacant room monitoring, such as: property management personnel authorizes owner, when owner and its relationship
Secondary user and three-level user under the chain in and out records within certain time are sky, then may determine that the house is vacant room.
It is also used to Empty nest elderly monitoring, such as: using Empty nest elderly as monitored object, the case where passing in and out gate inhibition to it, is recorded, when
In the set time period, when in and out records are empty, then system is reminded.It is also used to group's monitoring, such as: according to property management people
Member authorization owner and its owner's relation chain under secondary user and three-level user disengaging situation, when daily disengaging personnel it is more,
And when passing in and out frequent, then early warning is carried out, there is the suspicion for carrying out business management at this time;If further according to the residence time of disengaging personnel,
Then judge whether the house has the behavior of group rental.According to secondary user under the owner of property management personnel's authorization and its owner's relation chain
With the disengaging situation of three-level user, when entering, personnel are more, and after entrance, and when a period of time does not come out, then system carries out early warning,
There is the movable suspicion such as multiple level marketing at this time.According to the relation chain formed in licensing process, the visiting subscriber to violate disciplines can be carried out
Relationship tracking.According to authorization relation chain, it can be convenient the secondary user for searching any visiting subscriber into cell or level-one used
Family, to carry out relationship tracking or even responsibility investigation to the personnel of violating disciplines for entering cell.
2, it rents a house cell for public affairs.
The system can be used for monitoring the public violation situation rented a house.Such as: it rents and does not live, within the scope of setting time, Shen
It asks someone and co-applicant's (i.e. primary user) does not pass in and out cell;Simultaneously under its relation chain, also passed in and out without other users small
Area then has and rents and suspicion incessantly.Within the scope of setting time, applicant and co-applicant do not pass in and out cell;And in Qi Guan
Under tethers, other users pass in and out cell daily, then have the suspicion subleted.Applicant and co-applicant pass in and out cell daily;?
Under its relation chain, other users also pass in and out cell daily;Further according to the residence time of other users, to judge its group rental behavior.
It is small can be counted according to authorization relation chain for all users' disengaging in the locating authorization relation chain of applicant of renting a house of each public affairs in this way
Area's situation, so as to effectively control behaviors such as " rent and do not live, sublet, group rental " in public management of renting a house.
System provided by the embodiment of the present invention, to briefly describe, embodiment part does not refer to place, can refer to aforementioned side
Corresponding contents in method embodiment.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to
So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into
Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution
The range of scheme should all cover within the scope of the claims and the description of the invention.
Claims (10)
1. a kind of cell access permission management method characterized by comprising
Level-one authorized order is received, the level-one authorized order is handled, authorizes primary user end one to complete property management end
Grade right;The level-one right includes the first right, the second right and third right;The level-one authorized order includes the object
The request instruction that the instruction or the primary user end that pipe end is initiated to the primary user end are initiated to the property management end;
Second level authorized order is received, the second level authorized order is handled, authorizes secondary user to complete primary user end
Hold second level right;The second level right includes the first right and the second right;The second level authorized order includes that the level-one is used
The request instruction that the instruction or the secondary user end that family end is initiated to the secondary user end are initiated to the primary user end;
Three-level authorized order is received, the three-level authorized order is handled, authorizes three-level user to complete secondary user end
Hold three-level right;The three-level right includes the first right;The three-level authorized order includes the secondary user end to described
The request instruction that the instruction or the three-level user terminal that three-level user terminal is initiated are initiated to the secondary user end;
First right is right-of-way;Second right is to authorize other people right-of-way;The third right is to authorize other people
Second right.
2. cell access permission management method according to claim 1, which is characterized in that this method further include:
It receives the level-one that property management end is initiated and removes instruction, instruction is removed to the level-one and is handled, to complete the removal of property management end
First right, the second right and/or the third right at primary user end;
It receives the second level that primary user end is initiated and removes instruction, instruction is removed to the second level and is handled, to complete level-one use
First right and/or the second right at family end removal secondary user end;
It receives the three-level that secondary user end is initiated and removes instruction, instruction is removed to the three-level and is handled, to complete second level use
First right of family end removal three-level user terminal.
3. cell access permission management method according to claim 1, which is characterized in that awarded to level-one authorized order, second level
Power instruction or three-level authorized order are handled, and are completed authorization and are specifically included:
It is verified according to level-one authorized order, second level authorized order or three-level authorized order;
It completes to authorize according to verification result;
Verification mode includes: essential information verifying, short-message verification, group's verifying, two dimensional code verifying, the verifying of system ID number, user
Customized phrase verifying or address list matching;
The essential information includes phone number and/or ID card No..
4. cell access permission management method according to claim 1, which is characterized in that this method further include: receive level-one
The register instruction that user terminal, secondary user end or three-level user terminal are initiated, is handled the register instruction, to complete level-one
The registration of user, secondary user or three-level user.
5. cell access permission management method described in any claim in -4 according to claim 1, which is characterized in that this method
Further include:
The information to be identified for receiving visiting subscriber, obtains the identity information of visiting subscriber according to information to be identified;When judgement obtains
When visiting subscriber has the first right, visiting subscriber is allowed to enter cell.
6. a kind of cell access permission management system, which is characterized in that including primary user end, secondary user end, three-level user
End, property management end and background server;
Background server receives level-one authorized order, handles the level-one authorized order, authorizes one to complete property management end
Grade user terminal level-one right;The level-one right includes the first right, the second right and third right;The level-one authorized order
The instruction initiated including the property management end to the primary user end or the primary user end are asked to what the property management end was initiated
Ask instruction;
Background server receives second level authorized order, handles the second level authorized order, is awarded with completing primary user end
Give secondary user's end second level right;The second level right includes the first right and the second right;The second level authorized order includes
The instruction or the secondary user end that the primary user end is initiated to the secondary user end are initiated to the primary user end
Request instruction;
Background server receives three-level authorized order, handles the three-level authorized order, is awarded with completing secondary user end
Give three-level user terminal three-level right;The three-level right includes the first right;The three-level authorized order includes that the second level is used
The request instruction that the instruction or the three-level user terminal that family end is initiated to the three-level user terminal are initiated to the secondary user end;
First right is right-of-way;Second right is to authorize other people right-of-way;The third right is to authorize other people
Second right.
7. cell access permission management system according to claim 6, which is characterized in that
Background server receives the level-one that property management end is initiated and removes instruction, removes instruction to the level-one and handles, to complete
First right, the second right and/or the third right at property management end removal primary user end;
Background server receives the second level that primary user end is initiated and removes instruction, removes instruction to the second level and handles, with
Complete the first right and/or the second right that primary user end removes secondary user end;
Background server receives the three-level that secondary user end is initiated and removes instruction, removes instruction to the three-level and handles, with
Complete the first right that secondary user end removes three-level user terminal.
8. cell access permission management system according to claim 6, which is characterized in that awarded to level-one authorized order, second level
Power instruction or three-level authorized order are handled, and are completed authorization and are specifically included:
Background server is verified according to level-one authorized order, second level authorized order or three-level authorized order;
Background server is completed to authorize according to verification result;
Verification mode includes: essential information verifying, short-message verification, group's verifying, two dimensional code verifying, the verifying of system ID number, user
Customized phrase verifying or address list matching;
The essential information includes phone number and/or ID card No..
9. cell access permission management system according to claim 6, which is characterized in that
Background server receives the register instruction that primary user end, secondary user end or three-level user terminal are initiated, to the registration
Instruction is handled, to complete the registration of primary user, secondary user or three-level user.
10. according to cell access permission management system described in any claim in claim 6-9, which is characterized in that this is
System further includes the identification terminal being set at gate inhibition position;
Identification terminal acquires the information to be identified of visiting subscriber, is sent to background server;
Background server obtains the identity information of visiting subscriber according to information to be identified;When judgement obtains visiting subscriber with first
When right, generates door open command and be sent to identification terminal;
Identification terminal after receiving door open command, open by access control.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810798845.8A CN109102600A (en) | 2018-07-19 | 2018-07-19 | Cell access permission management method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810798845.8A CN109102600A (en) | 2018-07-19 | 2018-07-19 | Cell access permission management method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109102600A true CN109102600A (en) | 2018-12-28 |
Family
ID=64846824
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810798845.8A Pending CN109102600A (en) | 2018-07-19 | 2018-07-19 | Cell access permission management method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109102600A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109801418A (en) * | 2019-01-16 | 2019-05-24 | 浙江汉默生链商科技有限公司 | User autonomous controllable fining authorization management method and device |
CN111079130A (en) * | 2019-12-19 | 2020-04-28 | 朱倩缘 | User authority management system and method based on data analysis |
CN112150687A (en) * | 2020-09-24 | 2020-12-29 | 深圳市万睿智能科技有限公司 | User passage authority management method in residential scene and related components thereof |
CN113256847A (en) * | 2020-12-31 | 2021-08-13 | 深圳怡化电脑股份有限公司 | Unlocking method and device based on fingerprint identification, computer equipment and storage medium |
CN113256847B (en) * | 2020-12-31 | 2024-10-25 | 深圳怡化电脑股份有限公司 | Unlocking method and device based on fingerprint identification, computer equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106567669A (en) * | 2016-10-25 | 2017-04-19 | 武汉盛硕电子有限公司 | Intelligent roller shutter device based on short distance wireless communication and control method |
CN107730682A (en) * | 2017-10-20 | 2018-02-23 | 四川省守望信息科技有限责任公司 | Community entrance guard control based on Quick Response Code |
US20180061158A1 (en) * | 2016-08-24 | 2018-03-01 | Echostar Technologies L.L.C. | Trusted user identification and management for home automation systems |
CN107862183A (en) * | 2017-10-18 | 2018-03-30 | 广东汇泰龙科技有限公司 | A kind of electronic lock intelligent management and management system |
WO2018073642A1 (en) * | 2016-10-17 | 2018-04-26 | TARGA TELEMATICS S.r.L. | Method, devices and system for improved control of a service means for dedicated use in infrastructures |
-
2018
- 2018-07-19 CN CN201810798845.8A patent/CN109102600A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180061158A1 (en) * | 2016-08-24 | 2018-03-01 | Echostar Technologies L.L.C. | Trusted user identification and management for home automation systems |
WO2018073642A1 (en) * | 2016-10-17 | 2018-04-26 | TARGA TELEMATICS S.r.L. | Method, devices and system for improved control of a service means for dedicated use in infrastructures |
CN106567669A (en) * | 2016-10-25 | 2017-04-19 | 武汉盛硕电子有限公司 | Intelligent roller shutter device based on short distance wireless communication and control method |
CN107862183A (en) * | 2017-10-18 | 2018-03-30 | 广东汇泰龙科技有限公司 | A kind of electronic lock intelligent management and management system |
CN107730682A (en) * | 2017-10-20 | 2018-02-23 | 四川省守望信息科技有限责任公司 | Community entrance guard control based on Quick Response Code |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109801418A (en) * | 2019-01-16 | 2019-05-24 | 浙江汉默生链商科技有限公司 | User autonomous controllable fining authorization management method and device |
CN111079130A (en) * | 2019-12-19 | 2020-04-28 | 朱倩缘 | User authority management system and method based on data analysis |
CN112150687A (en) * | 2020-09-24 | 2020-12-29 | 深圳市万睿智能科技有限公司 | User passage authority management method in residential scene and related components thereof |
CN113256847A (en) * | 2020-12-31 | 2021-08-13 | 深圳怡化电脑股份有限公司 | Unlocking method and device based on fingerprint identification, computer equipment and storage medium |
CN113256847B (en) * | 2020-12-31 | 2024-10-25 | 深圳怡化电脑股份有限公司 | Unlocking method and device based on fingerprint identification, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN209265530U (en) | A kind of community visitor intelligence register system | |
CN109741498A (en) | A method of intelligence registration community visitor | |
CN104240342B (en) | Access control method and device based on identity authentication | |
JP6081859B2 (en) | Entrance / exit management system and entrance / exit management method | |
CN104751573A (en) | Safety intelligent cabinet system for article/express delivery and method thereof | |
CN113724428B (en) | Gate system for identity recognition and health detection of community owners and management method | |
CN109074682A (en) | System and method for remotely accessing permission and verifying | |
CN110276872B (en) | Automatic access control authorization method based on face recognition | |
CN109102600A (en) | Cell access permission management method and system | |
CN108492412A (en) | A kind of management method of intelligent building, apparatus and system | |
CN104156799A (en) | Floating population information management method and system | |
CN109816829A (en) | A kind of visitor's vehicle pass-through system | |
CN108961006A (en) | A kind of identity card real-name authentication system based on block chain | |
CN105869255A (en) | Intelligent access control method and system based on mobile terminal | |
CN109215191A (en) | Nobody a kind of intelligent access control system and its working method on duty | |
CN107578502A (en) | A kind of cell caller management method and device | |
CN109885994A (en) | A kind of offline identity authorization system, equipment and computer readable storage medium | |
CN109712291A (en) | Open method, device and the server of electronic gate | |
CN108985977A (en) | A kind of property intelligent supervision management system | |
CN108615286A (en) | A kind of cell intelligent management method and system | |
CN109410389A (en) | A kind of visiting personnel information acquisition management system of Property Management of residence | |
CN109816497A (en) | A kind of control method of house viewing system | |
CN107516363A (en) | Management method, device, mobile terminal and the storage medium of intelligent residential district | |
CN110246250A (en) | A kind of laboratory safety access management system | |
CN107578361A (en) | Management method, device, server and the storage medium of intelligent residential district |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181228 |