CN109102600A - Cell access permission management method and system - Google Patents

Cell access permission management method and system Download PDF

Info

Publication number
CN109102600A
CN109102600A CN201810798845.8A CN201810798845A CN109102600A CN 109102600 A CN109102600 A CN 109102600A CN 201810798845 A CN201810798845 A CN 201810798845A CN 109102600 A CN109102600 A CN 109102600A
Authority
CN
China
Prior art keywords
level
instruction
authorized order
user
initiated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810798845.8A
Other languages
Chinese (zh)
Inventor
袁中智
虞明洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Xinbida Technology Co Ltd
Original Assignee
Chongqing Xinbida Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Xinbida Technology Co Ltd filed Critical Chongqing Xinbida Technology Co Ltd
Priority to CN201810798845.8A priority Critical patent/CN109102600A/en
Publication of CN109102600A publication Critical patent/CN109102600A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

Cell access permission management method and system provided by the invention handle the level-one authorized order, authorize primary user end level-one right to complete property management end this method comprises: receiving level-one authorized order;The level-one right includes the first right, the second right and third right;Second level authorized order is received, the second level authorized order is handled, authorizes secondary user's end second level right to complete primary user end;The second level right includes the first right and the second right;Three-level authorized order is received, the three-level authorized order is handled, authorizes three-level user terminal three-level right to complete secondary user end;The three-level right includes the first right;First right is right-of-way;Second right is to authorize other people right-of-way;Third right is to authorize other people the second right, and this method mitigates the management work of property security personnel significantly, and user can invite friends and family to enter cell whenever and wherever possible, can manage the user of oneself authorization whenever and wherever possible.

Description

Cell access permission management method and system
Technical field
The invention belongs to cell entrance guard management technical fields, and in particular to cell access permission management method and system.
Background technique
Cell entrance guard management at present, user just can enter cell after mainly passing through property management authorization, which exists Following problems: (1) user of all disengaging cells is both needed to property management staff's authorization, very big work is brought to property management staff Burden.(2) it when visiting subscriber enters cell, needs to be ensured public security by property and register, the management work task weight of property security personnel.(3) Owner cannot oneself management of buddy, relative, friend etc. enter and leave cell, it is inconvenient to use.(4) ability after casual user needs to register It is inconvenient to use into cell.
Summary of the invention
For the defects in the prior art, the present invention provides cell access permission management method and system, mitigates property and protects The operating pressure of peace, community user can be convenient management visiting personnel.
In a first aspect, a kind of cell access permission management method, comprising:
Level-one authorized order is received, the level-one authorized order is handled, authorizes primary user to complete property management end Hold level-one right;The level-one right includes the first right, the second right and third right;The level-one authorized order includes institute State the instruction that property management end is initiated to the primary user end or the request instruction that the primary user end is initiated to the property management end;
Second level authorized order is received, the second level authorized order is handled, authorizes second level to complete primary user end User terminal second level right;The second level right includes the first right and the second right;The second level authorized order includes described one The request that the instruction or the secondary user end that grade user terminal is initiated to the secondary user end are initiated to the primary user end Instruction;
Three-level authorized order is received, the three-level authorized order is handled, authorizes three-level to complete secondary user end User terminal three-level right;The three-level right includes the first right;The three-level authorized order include the secondary user end to The request instruction that the instruction or the three-level user terminal that the three-level user terminal is initiated are initiated to the secondary user end;
First right is right-of-way;Second right is to authorize other people right-of-way;The third right is to authorize Other people the second rights.
Further, this method further include:
It receives the level-one that property management end is initiated and removes instruction, instruction is removed to the level-one and is handled, to complete property management end Remove the first right, the second right and/or the third right at primary user end;
It receives the second level that primary user end is initiated and removes instruction, instruction is removed to the second level and is handled, to complete one Grade user terminal removes first right and/or the second right at secondary user end;
It receives the three-level that secondary user end is initiated and removes instruction, instruction is removed to the three-level and is handled, to complete two Grade user terminal removes the first right of three-level user terminal.
Further, level-one authorized order, second level authorized order or three-level authorized order are handled, completes authorization tool Body includes:
It is verified according to level-one authorized order, second level authorized order or three-level authorized order;
It completes to authorize according to verification result;
Verification mode include: essential information verifying, short-message verification, group verifying, two dimensional code verifying, system ID number verifying, The customized phrase verifying of user or address list matching;
The essential information includes phone number and/or ID card No..
Further, this method further include:
Receive primary user end, the register instruction that secondary user end or three-level user terminal are initiated, to the register instruction into Row processing, to complete the registration of primary user, secondary user or three-level user.
Further, this method further include:
The information to be identified for receiving visiting subscriber, obtains the identity information of visiting subscriber according to information to be identified;Work as judgement When obtaining visiting subscriber with the first right, visiting subscriber is allowed to enter cell.
Second aspect, a kind of cell access permission management system, including primary user end, secondary user end, three-level user End, property management end and background server;
Background server receives level-one authorized order, handles the level-one authorized order, is awarded with completing property management end Give primary user end level-one right;The level-one right includes the first right, the second right and third right;The level-one authorization Instruction includes that the instruction that the property management end is initiated to the primary user end or the primary user end are initiated to the property management end Request instruction;
Background server receives second level authorized order, handles the second level authorized order, to complete primary user Authorize secondary user's end second level right in end;The second level right includes the first right and the second right;The second level authorized order Instruction from the primary user end to the secondary user end that initiate including or the secondary user end are to the primary user end The request instruction of initiation;
Background server receives three-level authorized order, handles the three-level authorized order, to complete secondary user Authorize three-level user terminal three-level right in end;The three-level right includes the first right;The three-level authorized order includes described two The request that the instruction or the three-level user terminal that grade user terminal is initiated to the three-level user terminal are initiated to the secondary user end Instruction;
First right is right-of-way;Second right is to authorize other people right-of-way;The third right is to authorize Other people the second rights.
Further, background server receive property management end initiate level-one remove instruction, to the level-one removal instruct into Row processing, to complete the first right, the second right and/or the third right that property management end removes primary user end;
Background server receives the second level that primary user end is initiated and removes instruction, removes at instruction to the second level Reason, to complete the first right and/or the second right that primary user end removes secondary user end;
Background server receives the three-level that secondary user end is initiated and removes instruction, removes at instruction to the three-level Reason, to complete the first right that secondary user end removes three-level user terminal.
Further, level-one authorized order, second level authorized order or three-level authorized order are handled, completes authorization tool Body includes:
Background server is verified according to level-one authorized order, second level authorized order or three-level authorized order;
Background server is completed to authorize according to verification result;
Verification mode include: essential information verifying, short-message verification, group verifying, two dimensional code verifying, system ID number verifying, The customized phrase verifying of user or address list matching;
The essential information includes phone number and/or ID card No..
Further, the registration that background server receives that primary user end, secondary user end or three-level user terminal are initiated refers to It enables, the register instruction is handled, to complete the registration of primary user, secondary user or three-level user.
Further, which further includes the identification terminal being set at gate inhibition position;
Identification terminal acquires the information to be identified of visiting subscriber, is sent to background server;
Background server obtains the identity information of visiting subscriber according to information to be identified;Have when judgement obtains visiting subscriber When the first right, generates door open command and be sent to identification terminal;
Identification terminal after receiving door open command, open by access control.
As shown from the above technical solution, cell access permission management method and system provided by the invention have following excellent Point:
1, infrastructure management company only need in use, authorize to primary user (i.e. owner), do not need to manage for the first time it is all into The user of cell out reduces the work load of property management staff.The visiting subscriber of cell is passed in and out all by primary user or second level User, which invites, to be entered.So being not required to be ensured public security by property again and register, mitigation property is ensured public security significantly when visiting subscriber enters cell Management work.
2, primary user and secondary user can invite friends and family to enter cell whenever and wherever possible, can manage whenever and wherever possible The user of oneself authorization, can manage visiting subscriber whenever and wherever possible, easy to use.Casual user could be into after no longer needing to register Enter cell, it is easy to use.
3, according to the relation chain formed in licensing process, relationship tracking can be carried out to the visiting subscriber to violate disciplines.According to Relation chain is authorized, can be convenient the secondary user for searching any visiting subscriber into cell or primary user, thus to entrance The personnel of violating disciplines of cell carry out relationship tracking or even responsibility investigation.
4. according to authorization relation chain, each public affairs can be counted and rented a house all users' disengaging in the locating authorization relation chain of applicant Cell conditions, so as to effectively control behaviors such as " rent and do not live, sublet, group rental " in public management of renting a house.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art are briefly described.In all the appended drawings, similar element Or part is generally identified by similar appended drawing reference.In attached drawing, each element or part might not be drawn according to actual ratio.
Fig. 1 is the flow chart of cell access permission management method provided in this embodiment.
Fig. 2 is the method flow diagram for the vest right that embodiment one provides.
Fig. 3 is the method flow diagram for the removal right that embodiment two provides.
Fig. 4 is the frame diagram for the system that example IV provides.
Specific embodiment
It is described in detail below in conjunction with embodiment of the attached drawing to technical solution of the present invention.Following embodiment is only used for Clearly illustrate technical solution of the present invention, therefore be only used as example, and cannot be used as a limitation and limit protection model of the invention It encloses.It should be noted that unless otherwise indicated, technical term or scientific term used in this application are should be belonging to the present invention The ordinary meaning that field technical staff is understood.
Embodiment one:
A kind of cell access permission management method, referring to Fig. 1,2, comprising:
Level-one authorized order is received, the level-one authorized order is handled, authorizes primary user to complete property management end Hold level-one right;The level-one right includes the first right, the second right and third right;The level-one authorized order includes institute State the instruction that property management end is initiated to the primary user end or the request instruction that the primary user end is initiated to the property management end;
Specifically, level-one right generally licenses to owner by property management personnel.Level-one authorized order include Unsolicited Grant and by Dynamic authorization.Unsolicited Grant is that property management actively authorizes other people right, and property management end can authorize all owners (i.e. when beginning to use Primary user) level-one right.Passive authorization is the property management authorization of primary user end activly request, when owner changes, new industry Master can initiate to request to property management end, oneself level-one right is authorized in request property management.
Second level authorized order is received, the second level authorized order is handled, authorizes second level to complete primary user end User terminal second level right;The second level right includes the first right and the second right;The second level authorized order includes described one The request that the instruction or the secondary user end that grade user terminal is initiated to the secondary user end are initiated to the primary user end Instruction;
Specifically, second level right is generally licensed to the relative, good friend, household etc. of owner by owner.Similarly, second level authorization refers to Enable also includes Unsolicited Grant and passive authorization.Unsolicited Grant is that primary user actively authorizes secondary user's second level right.Passively award Power is the primary user authorization of secondary user end activly request.
Three-level authorized order is received, the three-level authorized order is handled, authorizes three-level to complete secondary user end User terminal three-level right;The three-level right includes the first right;The three-level authorized order include the secondary user end to The request instruction that the instruction or the three-level user terminal that the three-level user terminal is initiated are initiated to the secondary user end;
Specifically, three-level right is generally licensed to the user needed into cell by secondary user, such as: take-away personnel, Service worker, installer, household or the interim good friend for entering cell.Similarly, three-level authorized order also includes Unsolicited Grant With passive authorization.Unsolicited Grant is that secondary user actively authorizes three-level user's three-level right.Passive authorization is three-level user terminal master The authorization of dynamic request secondary user.
First right is right-of-way;Second right is to authorize other people right-of-way;The third right is to authorize Other people the second rights.
Specifically, right-of-way is that can enter the right of cell.Right-of-way includes enterable cell, enterable gate inhibition And enter the effective time of cell.This method can be set user and have the right to pass in and out cell for a long time, and it is interim that user also can be set Pass in and out cell.
It can thus be seen that the right of primary user, secondary user and three-level user is successively successively decreased, the right of primary user Maximum has 3 kinds of rights;The right of secondary user is taken second place, and has 2 kinds of rights;The right of three-level user is minimum, there is a kind of right.
Such as: if user A is primary user, user A can enter cell A, and user A can also invite other people (users B, user C) enter cell, user A can also authorize other people (user D) second right.It is weighed since user A authorizes user D second Benefit can invite other people (user E, user F) to enter cell, user D can also enter cell so user D is secondary user A.User B, user C, user E and user F are three-level user, due to being able to enter cell A by user A or user D invitation.
This method, infrastructure management company only, in use, to primary user (i.e. owner) authorization, need to not need management institute for the first time There is the user of disengaging cell, reduces the work load of property management staff.Pass in and out the visiting subscriber of cell all by primary user or Secondary user, which invites, to be entered.So being not required to be ensured public security by property again and register, mitigation property significantly is protected when visiting subscriber enters cell The management work of peace.Primary user and secondary user can invite friends and family to enter cell whenever and wherever possible, can be whenever and wherever possible The user for managing oneself authorization, can manage visiting subscriber whenever and wherever possible, easy to use.To the casual user of disengaging cell, no It needs just to can enter cell after registering at security personnel again, it is easy to use.
Embodiment two:
Embodiment two increases the following contents on the basis of previous embodiment:
This method is after completing secondary user end and authorizing three-level user terminal three-level right, referring to Fig. 3, further includes:
It receives the level-one that property management end is initiated and removes instruction, instruction is removed to the level-one and is handled, to complete property management end Remove the first right, the second right and/or the third right at primary user end;
Specifically, if property management discovery owner is changed, such as primary user A has sold house, is no longer owner. Property management just needs to remove the level-one right of primary user A.Property management can remove whole rights of primary user, can also remove one The Partial rights of grade user.
It receives the second level that primary user end is initiated and removes instruction, instruction is removed to the second level and is handled, to complete one Grade user terminal removes first right and/or the second right at secondary user end;
Specifically, primary user can remove whole rights of secondary user, can also remove the part power of secondary user Benefit.
It receives the three-level that secondary user end is initiated and removes instruction, instruction is removed to the three-level and is handled, to complete two Grade user terminal removes the first right of three-level user terminal.
Specifically, secondary user can remove the right-of-way of three-level user.
Method provided in this embodiment, property management end, primary user end and secondary user end can as the case may be actively Remove the right of its subordinate subscriber.Higher level user can authorize subordinate subscriber right whenever and wherever possible, can also remove whenever and wherever possible Subordinate subscriber right, it is easy to use.
Method provided by the embodiment of the present invention, to briefly describe, embodiment part does not refer to place, can refer to aforementioned reality Apply corresponding contents in example.
Embodiment three:
Embodiment three increases the following contents on the basis of previous embodiment:
Level-one authorized order, second level authorized order or three-level authorized order are handled, authorization is completed and specifically includes:
It is verified according to level-one authorized order, second level authorized order or three-level authorized order;
It completes to authorize according to verification result;
Verification mode include: essential information verifying, short-message verification, group verifying, two dimensional code verifying, system ID number verifying, The customized phrase verifying of user or address list matching;
The essential information includes phone number and/or ID card No..
Specifically, it in order to guarantee user security, could only be authorized after user is by verifying.Essential information is verified Whether phone number and/or the ID card No. for verifying authorized user are correct.Short-message verification can be to send an SMS to and be awarded User is weighed, authorized user completes to verify according to short message content.Group's verifying can be the group that verifying invited user is added, Link is either sent out in group, invited user is completed to verify by clickthrough.The verifying of system ID number can be verifying system Whether the ID number automatically generated of uniting is correct.The customized phrase verifying of user can be the customized phrase of user, can be number, text Word, symbol etc..When invited user, which inputs, invites user-defined phrase, pass through verifying.
Further, this method is before receiving level-one authorized order, further includes:
Receive primary user end, the register instruction that secondary user end or three-level user terminal are initiated, to the register instruction into Row processing, to complete the registration of primary user, secondary user or three-level user.
Specifically, this method additionally provides registering functional.User can be registered whenever and wherever possible by user terminal, be used It is convenient, solve the defect that user in existing gate inhibition needs to be registered in specified fixed location (or fixed territorial scope).With Family register when need input feature vector information (such as: two dimensional code, ID card information, password, face information, finger print information or iris Information) and phone number etc..
Further, this method is after completing secondary user end and authorizing three-level user terminal three-level right, further includes:
The information to be identified for receiving visiting subscriber, obtains the identity information of visiting subscriber according to information to be identified;Work as judgement When obtaining visiting subscriber with the first right, visiting subscriber is allowed to enter cell.
Specifically, information to be identified can be two dimensional code, ID card information, password, face information, finger print information or iris The characteristic information of the users such as information.The identity of visiting subscriber can be uniquely confirmed by information to be identified, to judge to come to visit Whether user has the first right, if so, allowing access into cell.
Method provided by the embodiment of the present invention, to briefly describe, embodiment part does not refer to place, can refer to aforementioned reality Apply corresponding contents in example.
Example IV:
A kind of cell access permission management system, referring to fig. 4, including primary user end, secondary user end, three-level user End, property management end and background server;
Background server receives level-one authorized order, handles the level-one authorized order, is awarded with completing property management end Give primary user end level-one right;The level-one right includes the first right, the second right and third right;The level-one authorization Instruction includes that the instruction that the property management end is initiated to the primary user end or the primary user end are initiated to the property management end Request instruction;
Background server receives second level authorized order, handles the second level authorized order, to complete primary user Authorize secondary user's end second level right in end;The second level right includes the first right and the second right;The second level authorized order Instruction from the primary user end to the secondary user end that initiate including or the secondary user end are to the primary user end The request instruction of initiation;
Background server receives three-level authorized order, handles the three-level authorized order, to complete secondary user Authorize three-level user terminal three-level right in end;The three-level right includes the first right;The three-level authorized order includes described two The request that the instruction or the three-level user terminal that grade user terminal is initiated to the three-level user terminal are initiated to the secondary user end Instruction;
First right is right-of-way;Second right is to authorize other people right-of-way;The third right is to authorize Other people the second rights.
Further, background server receive property management end initiate level-one remove instruction, to the level-one removal instruct into Row processing, to complete the first right, the second right and/or the third right that property management end removes primary user end;
Background server receives the second level that primary user end is initiated and removes instruction, removes at instruction to the second level Reason, to complete the first right and/or the second right that primary user end removes secondary user end;
Background server receives the three-level that secondary user end is initiated and removes instruction, removes at instruction to the three-level Reason, to complete the first right that secondary user end removes three-level user terminal.
Further, level-one authorized order, second level authorized order or three-level authorized order are handled, completes authorization tool Body includes:
Background server is verified according to level-one authorized order, second level authorized order or three-level authorized order;
Background server is completed to authorize according to verification result;
Verification mode include: essential information verifying, short-message verification, group verifying, two dimensional code verifying, system ID number verifying, The customized phrase verifying of user or address list matching;
The essential information includes phone number and/or ID card No..
Further, the registration that background server receives that primary user end, secondary user end or three-level user terminal are initiated refers to It enables, the register instruction is handled, to complete the registration of primary user, secondary user or three-level user.
Cell access permission management system provided in this embodiment, infrastructure management company only need to be for the first time in use, to level-ones User (i.e. owner) authorization does not need the user for managing all disengaging cells, reduces the work load of property management staff.Disengaging The visiting subscriber of cell, which is invited by primary user or secondary user, to be entered.So being not required to again when visiting subscriber enters cell It is ensured public security and is registered by property, significantly the management work of mitigation property security personnel.Primary user and secondary user can invite whenever and wherever possible Friends and family enters cell, can manage the user of oneself authorization whenever and wherever possible, can manage visiting subscriber whenever and wherever possible, use It is convenient.To the casual user of disengaging cell, it is no longer necessary to it just can enter cell after registering at security personnel, it is easy to use.
System provided by the embodiment of the present invention, to briefly describe, embodiment part does not refer to place, can refer to aforementioned side Corresponding contents in method embodiment.
Embodiment five:
Embodiment five increases the following contents on the basis of example IV:
The system further includes the identification terminal being set at gate inhibition position;
Identification terminal acquires the information to be identified of visiting subscriber, is sent to background server;
Specifically, two dimensional code collector, identity card collector, password collector, face can be equipped on identification terminal to adopt Storage, fingerprint capturer or iris capturing device etc., when visiting subscriber wants to enter into cell, identification terminal obtain user wait know Other information.
Background server obtains the identity information of visiting subscriber according to information to be identified;Have when judgement obtains visiting subscriber When the first right, generates door open command and be sent to identification terminal;
Identification terminal after receiving door open command, open by access control.
Specifically, each gate inhibition is equipped with identification terminal, and identification terminal and gate inhibition bind, and identification terminal acquisition is visiting The information to be identified of user.When background server judges according to information to be identified the identity of visiting subscriber, and this visiting is used When family also has the first right, door opening command is sent to identification terminal, and identification terminal controls corresponding gate inhibition and opens, and allows come to visit and use Family is able to enter cell.
In addition to this, the present embodiment also provides the big data application of the system, is managed to cell.
1, for general cell.
The system can be used for permanent resident population's statistics, such as: according to the owner of property management personnel's authorization and its owner's relation chain The disengaging situation of lower secondary user and three-level user, counts the permanent resident population of cell.If owner often passes in and out cell, can also sentence The fixed house is owner-occupied.It is also used to vacant room monitoring, such as: property management personnel authorizes owner, when owner and its relationship Secondary user and three-level user under the chain in and out records within certain time are sky, then may determine that the house is vacant room. It is also used to Empty nest elderly monitoring, such as: using Empty nest elderly as monitored object, the case where passing in and out gate inhibition to it, is recorded, when In the set time period, when in and out records are empty, then system is reminded.It is also used to group's monitoring, such as: according to property management people Member authorization owner and its owner's relation chain under secondary user and three-level user disengaging situation, when daily disengaging personnel it is more, And when passing in and out frequent, then early warning is carried out, there is the suspicion for carrying out business management at this time;If further according to the residence time of disengaging personnel, Then judge whether the house has the behavior of group rental.According to secondary user under the owner of property management personnel's authorization and its owner's relation chain With the disengaging situation of three-level user, when entering, personnel are more, and after entrance, and when a period of time does not come out, then system carries out early warning, There is the movable suspicion such as multiple level marketing at this time.According to the relation chain formed in licensing process, the visiting subscriber to violate disciplines can be carried out Relationship tracking.According to authorization relation chain, it can be convenient the secondary user for searching any visiting subscriber into cell or level-one used Family, to carry out relationship tracking or even responsibility investigation to the personnel of violating disciplines for entering cell.
2, it rents a house cell for public affairs.
The system can be used for monitoring the public violation situation rented a house.Such as: it rents and does not live, within the scope of setting time, Shen It asks someone and co-applicant's (i.e. primary user) does not pass in and out cell;Simultaneously under its relation chain, also passed in and out without other users small Area then has and rents and suspicion incessantly.Within the scope of setting time, applicant and co-applicant do not pass in and out cell;And in Qi Guan Under tethers, other users pass in and out cell daily, then have the suspicion subleted.Applicant and co-applicant pass in and out cell daily;? Under its relation chain, other users also pass in and out cell daily;Further according to the residence time of other users, to judge its group rental behavior. It is small can be counted according to authorization relation chain for all users' disengaging in the locating authorization relation chain of applicant of renting a house of each public affairs in this way Area's situation, so as to effectively control behaviors such as " rent and do not live, sublet, group rental " in public management of renting a house.
System provided by the embodiment of the present invention, to briefly describe, embodiment part does not refer to place, can refer to aforementioned side Corresponding contents in method embodiment.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme should all cover within the scope of the claims and the description of the invention.

Claims (10)

1. a kind of cell access permission management method characterized by comprising
Level-one authorized order is received, the level-one authorized order is handled, authorizes primary user end one to complete property management end Grade right;The level-one right includes the first right, the second right and third right;The level-one authorized order includes the object The request instruction that the instruction or the primary user end that pipe end is initiated to the primary user end are initiated to the property management end;
Second level authorized order is received, the second level authorized order is handled, authorizes secondary user to complete primary user end Hold second level right;The second level right includes the first right and the second right;The second level authorized order includes that the level-one is used The request instruction that the instruction or the secondary user end that family end is initiated to the secondary user end are initiated to the primary user end;
Three-level authorized order is received, the three-level authorized order is handled, authorizes three-level user to complete secondary user end Hold three-level right;The three-level right includes the first right;The three-level authorized order includes the secondary user end to described The request instruction that the instruction or the three-level user terminal that three-level user terminal is initiated are initiated to the secondary user end;
First right is right-of-way;Second right is to authorize other people right-of-way;The third right is to authorize other people Second right.
2. cell access permission management method according to claim 1, which is characterized in that this method further include:
It receives the level-one that property management end is initiated and removes instruction, instruction is removed to the level-one and is handled, to complete the removal of property management end First right, the second right and/or the third right at primary user end;
It receives the second level that primary user end is initiated and removes instruction, instruction is removed to the second level and is handled, to complete level-one use First right and/or the second right at family end removal secondary user end;
It receives the three-level that secondary user end is initiated and removes instruction, instruction is removed to the three-level and is handled, to complete second level use First right of family end removal three-level user terminal.
3. cell access permission management method according to claim 1, which is characterized in that awarded to level-one authorized order, second level Power instruction or three-level authorized order are handled, and are completed authorization and are specifically included:
It is verified according to level-one authorized order, second level authorized order or three-level authorized order;
It completes to authorize according to verification result;
Verification mode includes: essential information verifying, short-message verification, group's verifying, two dimensional code verifying, the verifying of system ID number, user Customized phrase verifying or address list matching;
The essential information includes phone number and/or ID card No..
4. cell access permission management method according to claim 1, which is characterized in that this method further include: receive level-one The register instruction that user terminal, secondary user end or three-level user terminal are initiated, is handled the register instruction, to complete level-one The registration of user, secondary user or three-level user.
5. cell access permission management method described in any claim in -4 according to claim 1, which is characterized in that this method Further include:
The information to be identified for receiving visiting subscriber, obtains the identity information of visiting subscriber according to information to be identified;When judgement obtains When visiting subscriber has the first right, visiting subscriber is allowed to enter cell.
6. a kind of cell access permission management system, which is characterized in that including primary user end, secondary user end, three-level user End, property management end and background server;
Background server receives level-one authorized order, handles the level-one authorized order, authorizes one to complete property management end Grade user terminal level-one right;The level-one right includes the first right, the second right and third right;The level-one authorized order The instruction initiated including the property management end to the primary user end or the primary user end are asked to what the property management end was initiated Ask instruction;
Background server receives second level authorized order, handles the second level authorized order, is awarded with completing primary user end Give secondary user's end second level right;The second level right includes the first right and the second right;The second level authorized order includes The instruction or the secondary user end that the primary user end is initiated to the secondary user end are initiated to the primary user end Request instruction;
Background server receives three-level authorized order, handles the three-level authorized order, is awarded with completing secondary user end Give three-level user terminal three-level right;The three-level right includes the first right;The three-level authorized order includes that the second level is used The request instruction that the instruction or the three-level user terminal that family end is initiated to the three-level user terminal are initiated to the secondary user end;
First right is right-of-way;Second right is to authorize other people right-of-way;The third right is to authorize other people Second right.
7. cell access permission management system according to claim 6, which is characterized in that
Background server receives the level-one that property management end is initiated and removes instruction, removes instruction to the level-one and handles, to complete First right, the second right and/or the third right at property management end removal primary user end;
Background server receives the second level that primary user end is initiated and removes instruction, removes instruction to the second level and handles, with Complete the first right and/or the second right that primary user end removes secondary user end;
Background server receives the three-level that secondary user end is initiated and removes instruction, removes instruction to the three-level and handles, with Complete the first right that secondary user end removes three-level user terminal.
8. cell access permission management system according to claim 6, which is characterized in that awarded to level-one authorized order, second level Power instruction or three-level authorized order are handled, and are completed authorization and are specifically included:
Background server is verified according to level-one authorized order, second level authorized order or three-level authorized order;
Background server is completed to authorize according to verification result;
Verification mode includes: essential information verifying, short-message verification, group's verifying, two dimensional code verifying, the verifying of system ID number, user Customized phrase verifying or address list matching;
The essential information includes phone number and/or ID card No..
9. cell access permission management system according to claim 6, which is characterized in that
Background server receives the register instruction that primary user end, secondary user end or three-level user terminal are initiated, to the registration Instruction is handled, to complete the registration of primary user, secondary user or three-level user.
10. according to cell access permission management system described in any claim in claim 6-9, which is characterized in that this is System further includes the identification terminal being set at gate inhibition position;
Identification terminal acquires the information to be identified of visiting subscriber, is sent to background server;
Background server obtains the identity information of visiting subscriber according to information to be identified;When judgement obtains visiting subscriber with first When right, generates door open command and be sent to identification terminal;
Identification terminal after receiving door open command, open by access control.
CN201810798845.8A 2018-07-19 2018-07-19 Cell access permission management method and system Pending CN109102600A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810798845.8A CN109102600A (en) 2018-07-19 2018-07-19 Cell access permission management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810798845.8A CN109102600A (en) 2018-07-19 2018-07-19 Cell access permission management method and system

Publications (1)

Publication Number Publication Date
CN109102600A true CN109102600A (en) 2018-12-28

Family

ID=64846824

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810798845.8A Pending CN109102600A (en) 2018-07-19 2018-07-19 Cell access permission management method and system

Country Status (1)

Country Link
CN (1) CN109102600A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109801418A (en) * 2019-01-16 2019-05-24 浙江汉默生链商科技有限公司 User autonomous controllable fining authorization management method and device
CN111079130A (en) * 2019-12-19 2020-04-28 朱倩缘 User authority management system and method based on data analysis
CN112150687A (en) * 2020-09-24 2020-12-29 深圳市万睿智能科技有限公司 User passage authority management method in residential scene and related components thereof
CN113256847A (en) * 2020-12-31 2021-08-13 深圳怡化电脑股份有限公司 Unlocking method and device based on fingerprint identification, computer equipment and storage medium
CN113256847B (en) * 2020-12-31 2024-10-25 深圳怡化电脑股份有限公司 Unlocking method and device based on fingerprint identification, computer equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106567669A (en) * 2016-10-25 2017-04-19 武汉盛硕电子有限公司 Intelligent roller shutter device based on short distance wireless communication and control method
CN107730682A (en) * 2017-10-20 2018-02-23 四川省守望信息科技有限责任公司 Community entrance guard control based on Quick Response Code
US20180061158A1 (en) * 2016-08-24 2018-03-01 Echostar Technologies L.L.C. Trusted user identification and management for home automation systems
CN107862183A (en) * 2017-10-18 2018-03-30 广东汇泰龙科技有限公司 A kind of electronic lock intelligent management and management system
WO2018073642A1 (en) * 2016-10-17 2018-04-26 TARGA TELEMATICS S.r.L. Method, devices and system for improved control of a service means for dedicated use in infrastructures

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180061158A1 (en) * 2016-08-24 2018-03-01 Echostar Technologies L.L.C. Trusted user identification and management for home automation systems
WO2018073642A1 (en) * 2016-10-17 2018-04-26 TARGA TELEMATICS S.r.L. Method, devices and system for improved control of a service means for dedicated use in infrastructures
CN106567669A (en) * 2016-10-25 2017-04-19 武汉盛硕电子有限公司 Intelligent roller shutter device based on short distance wireless communication and control method
CN107862183A (en) * 2017-10-18 2018-03-30 广东汇泰龙科技有限公司 A kind of electronic lock intelligent management and management system
CN107730682A (en) * 2017-10-20 2018-02-23 四川省守望信息科技有限责任公司 Community entrance guard control based on Quick Response Code

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109801418A (en) * 2019-01-16 2019-05-24 浙江汉默生链商科技有限公司 User autonomous controllable fining authorization management method and device
CN111079130A (en) * 2019-12-19 2020-04-28 朱倩缘 User authority management system and method based on data analysis
CN112150687A (en) * 2020-09-24 2020-12-29 深圳市万睿智能科技有限公司 User passage authority management method in residential scene and related components thereof
CN113256847A (en) * 2020-12-31 2021-08-13 深圳怡化电脑股份有限公司 Unlocking method and device based on fingerprint identification, computer equipment and storage medium
CN113256847B (en) * 2020-12-31 2024-10-25 深圳怡化电脑股份有限公司 Unlocking method and device based on fingerprint identification, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN209265530U (en) A kind of community visitor intelligence register system
CN109741498A (en) A method of intelligence registration community visitor
CN104240342B (en) Access control method and device based on identity authentication
JP6081859B2 (en) Entrance / exit management system and entrance / exit management method
CN104751573A (en) Safety intelligent cabinet system for article/express delivery and method thereof
CN113724428B (en) Gate system for identity recognition and health detection of community owners and management method
CN109074682A (en) System and method for remotely accessing permission and verifying
CN110276872B (en) Automatic access control authorization method based on face recognition
CN109102600A (en) Cell access permission management method and system
CN108492412A (en) A kind of management method of intelligent building, apparatus and system
CN104156799A (en) Floating population information management method and system
CN109816829A (en) A kind of visitor's vehicle pass-through system
CN108961006A (en) A kind of identity card real-name authentication system based on block chain
CN105869255A (en) Intelligent access control method and system based on mobile terminal
CN109215191A (en) Nobody a kind of intelligent access control system and its working method on duty
CN107578502A (en) A kind of cell caller management method and device
CN109885994A (en) A kind of offline identity authorization system, equipment and computer readable storage medium
CN109712291A (en) Open method, device and the server of electronic gate
CN108985977A (en) A kind of property intelligent supervision management system
CN108615286A (en) A kind of cell intelligent management method and system
CN109410389A (en) A kind of visiting personnel information acquisition management system of Property Management of residence
CN109816497A (en) A kind of control method of house viewing system
CN107516363A (en) Management method, device, mobile terminal and the storage medium of intelligent residential district
CN110246250A (en) A kind of laboratory safety access management system
CN107578361A (en) Management method, device, server and the storage medium of intelligent residential district

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181228