CN111461372A - Conference room monitoring method and system - Google Patents

Conference room monitoring method and system Download PDF

Info

Publication number
CN111461372A
CN111461372A CN202010227697.1A CN202010227697A CN111461372A CN 111461372 A CN111461372 A CN 111461372A CN 202010227697 A CN202010227697 A CN 202010227697A CN 111461372 A CN111461372 A CN 111461372A
Authority
CN
China
Prior art keywords
conference room
user
list
preset
conference
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010227697.1A
Other languages
Chinese (zh)
Inventor
万光平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Life Insurance Company of China Ltd
Original Assignee
Ping An Life Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Life Insurance Company of China Ltd filed Critical Ping An Life Insurance Company of China Ltd
Priority to CN202010227697.1A priority Critical patent/CN111461372A/en
Publication of CN111461372A publication Critical patent/CN111461372A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/02Reservations, e.g. for tickets, services or events
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management

Abstract

The application is applicable to the technical field of information management, and provides a conference room monitoring method and a system, wherein the conference room monitoring method comprises the following steps: acquiring access time of conference room equipment of a scheduled conference room and a user code of a user of the scheduled conference room; if the access duration of the conference room equipment of the predetermined conference room meets a first preset condition, adding the user code of the user of the predetermined conference room to the first list; detecting the number of the same user codes in the first list within a preset time interval; if the number of the same user code meets a second preset condition, adding the user code to a second list; and locking the conference room reservation authority of the user corresponding to the user code in the second list. The conference room monitoring system automatically monitors the use condition of the scheduled conference room, automatically locks the reservation permission of the illegal user, avoids the user from continuing to perform malicious reservation, effectively releases the conference room resources, avoids causing the conference room resources to be wasted, and realizes the comprehensive monitoring of the use of the conference room.

Description

Conference room monitoring method and system
Technical Field
The application belongs to the technical field of information management, and particularly relates to a conference room monitoring method and system.
Background
For each enterprise, the resources of the conference room are limited, but the current conference room monitoring system has no way to comprehensively monitor the actual use condition of each conference room, and the conference room can be maliciously scheduled, so that the conference room is difficult to reserve and the resources of the conference room are wasted.
In summary, the current conference room monitoring system has the problem that the conference room service condition cannot be comprehensively monitored, so that the resource waste of the conference room is caused.
Disclosure of Invention
The embodiment of the application provides a conference room monitoring method and system, which can solve the problem that the current conference room monitoring system cannot comprehensively monitor the service condition of a conference room, so that the resource of the conference room is wasted.
In a first aspect, an embodiment of the present application provides a conference room monitoring method, including:
acquiring access time of conference room equipment of a scheduled conference room and a user code of a user of the scheduled conference room;
if the access duration of the conference room equipment of the predetermined conference room meets a first preset condition, adding the user code to a first list;
detecting the number of the same user codes in the first list within a preset time interval;
if the number of the same user code meets a second preset condition, adding the user code to a second list;
and locking the conference room reservation authority of the user corresponding to the user code in the second list.
In a possible implementation manner of the first aspect, the conference room monitoring method further includes:
and if the access time of the meeting room equipment of the preset meeting room is more than 0, acquiring the use time of the preset meeting room.
Further, if the access duration of the conference room device in the predetermined conference room is greater than 0, acquiring the use duration of the predetermined conference room, including:
acquiring the access time and disconnection time of the projection equipment of the conference room accessing the client terminal;
and determining the use duration of the scheduled conference room according to the access time and the disconnection time.
Further, the monitoring the usage of the scheduled conference room further comprises:
and if the access duration of the conference room equipment of the predetermined conference room is greater than 0, acquiring the user code of the user using the conference room.
In a possible implementation manner of the first aspect, the conference room monitoring method further includes:
monitoring the use times of meeting rooms of users in the same group;
if the number of times of using the conference room of the users in the same group meets a third preset condition, adding the corresponding group codes to the first list;
calling historical conference monitoring records corresponding to the group codes in the first list, and judging whether violation behaviors exist according to the historical conference monitoring records;
and if the illegal behavior exists, locking the conference room reservation authority of all users corresponding to the group codes.
In a possible implementation manner of the first aspect, the detecting, within a preset time interval, the number of the same user codes in the first list includes:
establishing a timing task based on a database;
and running the timing task to count the number of the same user codes in the first list.
In a possible implementation manner of the first aspect, the conference room monitoring method further includes:
and generating prompt information according to the second list, and sending the prompt information to a target user.
In a second aspect, an embodiment of the present application provides a conference room monitoring system, including:
the monitoring module is used for acquiring the access duration of the conference room equipment of the predetermined conference room and the user code of the user of the predetermined conference room;
the first judgment module is used for adding the user code to a first list if the access duration of the conference room equipment of the preset conference room meets a first preset condition;
the detection module is used for detecting the number of the same user codes in the first list within a preset time interval;
the second judgment module is used for adding the user codes to a second list if the number of the same user codes meets a second preset condition;
and the locking module is used for locking the conference room reservation authority of the user corresponding to the user code in the second list.
In a third aspect, an embodiment of the present application provides a terminal device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of the conference room monitoring method according to the first aspect when executing the computer program.
In a fourth aspect, the present application provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the steps of the conference room monitoring method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a computer program product, which, when running on a terminal device, causes the terminal device to execute the conference room monitoring method according to any one of the first aspect.
It is understood that the beneficial effects of the second aspect to the fifth aspect can be referred to the related description of the first aspect, and are not described herein again.
Compared with the prior art, the embodiment of the application has the advantages that: the conference room monitoring system is used for automatically monitoring the use condition of the scheduled conference room, recording and counting the user codes meeting the first preset condition, automatically locking the reservation permission of the user when the violation times meet the second preset condition, avoiding the user from continuing to perform malicious reservation, effectively releasing the conference room resources, avoiding causing the conference room resource waste, realizing the omnibearing monitoring of the use of the conference room and effectively reducing the condition of the conference room resource waste.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic flow chart illustrating an implementation of a conference room monitoring method according to an embodiment of the present application;
fig. 2 is a schematic flow chart illustrating an implementation of a conference room monitoring method according to another embodiment of the present application;
fig. 3 is a schematic view of an implementation flow of S103 in a conference room monitoring method according to another embodiment of the present application;
fig. 4 is a schematic structural diagram of a conference room monitoring system according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to" determining "or" in response to detecting ". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
Furthermore, in the description of the present application and the appended claims, the terms "first," "second," "third," and the like are used for distinguishing between descriptions and not necessarily for describing or implying relative importance.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise.
The conference room monitoring method provided by the embodiment of the application is applied to a conference room monitoring system, the conference room monitoring system can monitor the conditions of all conference rooms in real time, a user can make a conference room reservation through the conference room monitoring system, then the using condition of the conference room is detected based on conference room equipment (such as projection equipment, photographic equipment, access control equipment and the like), the reservation permission of the user is managed, the reservation permission of illegal personnel is locked, further malicious reservation of the conference room is reduced, and the waste of conference room resources is reduced. The conference room monitoring system can be installed and operated on a mobile phone, a tablet personal computer, a wearable device, an Augmented Reality (AR)/Virtual Reality (VR) device, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, a Personal Digital Assistant (PDA), and other terminal devices, and the embodiment of the present application does not limit the specific type of the terminal device.
Referring to fig. 1, fig. 1 is a schematic flowchart illustrating a conference room monitoring method according to an embodiment of the present application, and as shown in fig. 1, the conference room monitoring method includes the following steps:
s101: the usage of the scheduled conference room is monitored.
Specifically, when the participant uses the conference room, the participant needs to establish a communication connection between the client terminal provided with the terminal code and the conference room device (such as a projection device) of the conference room through a wired or wireless communication mode. And acquiring the terminal code of the client terminal connected with the conference room through the conference room equipment of the conference room, and determining the user code of the user using the conference room according to the terminal code. It should be noted that the user code is unique and corresponds to the user, that is, each user has a unique corresponding user code, and the user codes of different users are different.
It should be noted that the participant needs to connect the client terminal with the conference room device through a data line, or wirelessly connect to the conference room device through presentation playing software, or connect to the conference room device through wireless transmission technologies such as bluetooth, wifi, 433, Zigbee, and the like. The client terminal includes, but is not limited to, a mobile phone, a tablet computer, a wearable device, an Augmented Reality (AR)/Virtual Reality (VR) device, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, a Personal Digital Assistant (PDA), and other terminal devices.
Specifically, the conference room monitoring system binds the user code of each user with the terminal code of the client terminal used by the user code in advance, and stores the association relationship between the user code and the terminal code in the database of the conference room monitoring system.
Specifically, the conference room monitoring system monitors the access time of the conference room of the scheduled conference room, monitors whether the conference room equipment of the scheduled conference room has the client terminal access (when the access time is 0, it indicates that no client terminal is accessed), and if the client terminal is accessed, acquires the access time and the disconnection time.
As an implementation manner of this embodiment, the conference room monitoring method further includes:
and if the access duration of the preset conference room is greater than 0, acquiring the use duration of the preset conference room.
Specifically, whether a client terminal is connected or not is detected within the preset using time of the preset conference room, and if the access duration acquired within the preset using time is 0, it is indicated that the client terminal is not detected to be connected within the preset using time, that is, the conference room is vacant. And if the access duration acquired in the preset using time is greater than 0, indicating that the client terminal is accessed.
It should be noted that the preset use time refers to a conference time set by a user in a preset conference room, and the preset use time can be obtained by reading reservation information through a conference room monitoring system, and is a time period of the reservation start time and the reservation end time.
When a user reserves a conference room, the conference room monitoring system records reservation information such as a reserved conference room number, a reserved start time, a reserved end time, and a user code of the reserved conference room, and the reservation information of the conference room can be viewed through the conference room number.
Specifically, if it is detected that the client terminal is accessed within the preset use time, the access duration of the conference device in the conference room is obtained, and the access duration is the use duration of the conference room. The usage duration is determined by obtaining the access time and the disconnection time of the client terminal.
The disconnection time refers to a time when the disconnection time between the client terminal and the projection device is longer than a preset time threshold. And if the time length of disconnection between the client terminal and the projection equipment is less than a preset time threshold, not recording the moment of disconnection as disconnection time, and considering that the client terminal is not accessed.
Specifically, if the access time of the meeting device in the predetermined meeting room is greater than 0, the obtaining of the use duration of the predetermined meeting room includes the following steps:
acquiring the access time and disconnection time of the projection equipment of the conference room accessing the client terminal;
and determining the use duration of the scheduled conference room according to the access time and the disconnection time.
As another implementation manner of this embodiment, the foregoing S101 further includes the following steps:
and if the access duration of the conference room equipment of the predetermined conference room is greater than 0, acquiring the user code of the user using the conference room.
Specifically, when the access of the client terminal is detected within the preset use time, the terminal code of the accessed client terminal is acquired, and the user code of the user using the conference room is determined.
S102: and if the access duration of the conference equipment of the predetermined conference room meets a first preset condition, adding the user code of the user of the predetermined conference room to a first list.
Specifically, a first preset condition is preset, and whether the preset access duration of the conference room meets the first preset condition is judged through the conference room monitoring system.
Specifically, the first preset condition is that the access time of the conference room device in the conference room is 0. And if the conference room monitoring system monitors that no client terminal is accessed in the predetermined conference room within the predetermined time, determining that the access time of the conference room equipment is 0.
Specifically, the first preset condition is that the access duration of the conference room device in the conference room is less than the determination duration. Note that, the above-described determination time period is a predetermined time period — an allowable empty time period. The allowable spare time length may be set according to actual conditions, and is not limited herein.
Specifically, the first preset condition is that the user using the conference room is not the same user as the user who subscribes to the conference room. If the user code of the user using the conference room is different from the user code of the user reserving the conference room, the user using the conference room and the user reserving the conference room are not the same user.
Specifically, if it is monitored that the access time of the conference room device of the conference room is 0, the user code of the user who reserves the conference room in the time period is searched through the conference room monitoring system, and then the user code is added to the first list. If the service time of the conference room is monitored to be shorter than the judgment time, the terminal code of the client terminal connected with the projection equipment is obtained through the conference room monitoring system, the corresponding user code is searched, and the user code is added into the first list.
Specifically, violations including an empty conference room, a timeout reservation, an identity mismatch, etc. may also be specified while adding the user code to the first list.
Specifically, the first list may be stored in a database of the conference room monitoring system, and after it is monitored that the usage condition of the conference room satisfies a first preset condition, the conference room monitoring system obtains a user code of a user who reserves the conference room, and automatically writes the user code in the first list.
S103: detecting the number of the same user codes in the first list within a preset time interval.
Specifically, the preset time interval may be set according to actual requirements, for example, set to be one month, one quarter, one year, and the like. For example, if the preset time interval is set to 1 month, the number of times that the same user code appears in the first list of each month, that is, the number of times that the same user violates within 1 month, is counted.
In particular, the SQ L language of the database may be used to count the number of identical user codes in this first list.
S104: and if the number of the same user code meets a second preset condition, adding the user code to a second list.
Specifically, the second preset condition is that the number of times that a certain user code in the first list appears is greater than a preset violation number. And if the frequency of the occurrence of a certain user code in the first list is greater than the preset violation frequency, adding the user code to the second list.
Specifically, the number of violations may be set according to the violations. Illustratively, when the violation is an empty meeting room, the preset violation number is set to be 3 times; and when the violation is overtime reservation, setting the preset violation times to be 4 times.
S105: and locking the conference room reservation authority of the user corresponding to the user code in the second list.
Specifically, the reservation authority of the user corresponding to the user code in the second list is locked, so that the user with the conference room reservation authority locked cannot reserve the conference room.
Specifically, the duration of locking the conference room reservation authority may be set, and if the duration of locking the reservation authority is set to be 1 year, the user corresponding to the user code in the second list cannot reserve the conference room in one year.
In an embodiment, the conference room monitoring method further includes the following steps:
and generating prompt information according to the second list, and sending the prompt information to a target user.
Specifically, the conference room monitoring system may add a new page to the display terminal of the terminal device, then periodically export the second list into the corresponding excel file, add a function of sending a mail, and then send the mail containing the excel file to a target user, where the target user may be an offender or a manager.
According to the conference room monitoring method provided by the embodiment, the use condition of the scheduled conference room is automatically monitored through the conference room monitoring system, the user codes meeting the first preset condition are recorded and counted, when the violation times meet the second preset condition, the reservation authority of the user is automatically locked, the user is prevented from continuing to perform malicious reservation, the conference room resources can be effectively released, the waste of the conference room resources is avoided, the use of the conference room is comprehensively monitored, and the waste of the conference room resources is effectively reduced.
Referring to fig. 2, fig. 2 is a schematic diagram illustrating an implementation flow of a conference room monitoring method according to another embodiment of the present application, where the difference between the present embodiment and the previous embodiment is that the conference room monitoring method provided by the present embodiment further includes the following steps:
s201: the number of conference room uses of the same group of users is monitored.
Specifically, the users are divided into different groups, the corresponding relations between the users and the groups are stored, and the number of times of using the conference room of the users in the same group is counted according to the reservation information of the conference room recorded by the conference room monitoring system.
Specifically, the mysql database or the Oracle database is used for counting the use times of the conference rooms of the same group of users, statistics can be made according to the host ip logged in each conference room at different time periods and the reserved user number, and the use times of the conference rooms of the same group of users can be further counted. For example, a timing task is set by using a database, and corresponding data are counted in a preset time interval.
S202: and if the number of times of using the conference room of the users in the same group meets a third preset condition, adding the corresponding group codes to the first list.
Specifically, the third preset condition is that the number of times of using the conference room of the same group of users is greater than a preset number of times. Monitoring whether the meeting room use times of the users in the same group are larger than the preset times, if so, acquiring a terminal code of a client connected with the projection equipment, searching a corresponding user number, acquiring a group code corresponding to the user number, and adding the group code to a first list.
The preset number of times may be set according to the historical reservation data of the group. It should be noted that, by acquiring historical booking data of each group, the booking times of the conference rooms of each group in each month are counted, and the preset times are calculated based on the historical booking times and the floating index. Illustratively, the preset number of times is calculated in the following manner: and Y is X (1+ A%), wherein Y is the preset number, X is the reserved number of the conference room of the group in each month obtained by statistics based on historical reserved data, and A is a floating index. The floating index may be set according to actual conditions, and is not limited herein.
S203: and calling historical conference monitoring records corresponding to the group codes in the first list, and judging whether violation behaviors exist according to the historical conference monitoring records.
Specifically, all meeting monitoring records of the group in the month (or the quarter) are called, whether the participants of each meeting are all users of the group is judged, if yes, no violation behavior exists, and if not, the violation behavior exists.
Specifically, the conference sign-in record of the group is called, and whether the participants are all users of the group is judged according to the sign-in record.
Specifically, whether the participants are all users of the group is judged by calling the conference monitoring video of the group and comparing the conference monitoring video with the human face identification.
S204: and if the illegal behavior exists, locking the conference room reservation authority of all users corresponding to the group codes.
Specifically, if the group has violation behaviors, the reservation rights of all users of the group are locked within a preset time period (one month or one quarter).
The conference room monitoring method provided by the embodiment can monitor the use condition of the conference rooms of each group, can effectively avoid the condition that a group is maliciously reserved, and improves the use ratio of the conference rooms.
Referring to fig. 3, fig. 3 is a flowchart illustrating an implementation flowchart of S103 in a conference room monitoring method according to another embodiment of the present application, where the difference between the present embodiment and the previous embodiment is that S103 in the conference room monitoring method provided by the present embodiment specifically includes the following steps, which are detailed as follows:
s301: a timed task is established based on the database.
Specifically, for the mysql database, a timing task is set through a time scheduler of the mysql database, and the timing task is created by using an SQ L statement after the time scheduler is opened, wherein the timing task comprises a task name, an execution time, an execution task and the like.
Specifically, the SQ L statement for establishing the timed task in the mysql database is as follows:
create event timed task name
ON schedule timing
Do timing task to be executed sql;
specifically, for the ORAC L E database, memory is created first, and then timed tasks are created.
Specifically, the statement that creates memory is:
create or replace PRocedure pro_test
AS
BEGIN
insert into RAW_PERIOD_DATA(ertu_no,mp_no,data_time,code,data_flag)
select 1,level,sysdate,round(dbms_random.value(1,99),2),1from dualconnect by level<=148;
commit;
end pro_test;
the statements that create the timed task are:
Figure BDA0002428247630000121
s302: and running the timing task to count the number of the same user codes in the first list.
Specifically, a timing task is established through a database, a first list is called, the timing task is operated at a timing time, and the task execution content is as follows: the number of the same user code in the first list is counted. For example, the first day of each month (or the first day of each week, the first day of each quarter) reads the first list of the previous month (the previous week, the previous quarter), and counts the number of the same user codes in the first list.
Specifically, the occurrence frequency of the same user code may be counted according to the violations, that is, the number of times that the violations are empty meeting rooms, the number of times that the violations are timeout reservations, and the number of times that the violations are identity inconsistencies are counted, respectively.
According to the method and the device, the occurrence times of the same user code in the first list in the preset time interval are automatically counted by establishing the timing task, the violation times of the user can be automatically counted, and the management efficiency is improved.
Fig. 4 shows a block diagram of a conference room monitoring system provided in the embodiment of the present application, which corresponds to the conference room monitoring method described in the foregoing embodiment, and only shows a part related to the embodiment of the present application for convenience of description.
Referring to fig. 4, the conference room monitoring system includes a monitoring module 11, a first judging module 12, a detecting module 13, a second judging module 14, and a locking module 15.
The monitoring module 11 is configured to acquire an access duration of a conference room device of a predetermined conference room and a user code of a user who reserves the conference room;
the first judging module 12 is configured to add the user code to the first list if the access duration of the conference room device in the predetermined conference room meets a first preset condition;
the detecting module 13 is configured to detect the number of the same user codes in the first list within a preset time interval;
the second judging module 14 is configured to add the user codes to a second list if the number of the same user codes meets a second preset condition;
the locking module 15 is configured to lock the conference room reservation right of the user corresponding to the user code in the second list.
Further, the conference room monitoring system further comprises a use duration acquisition module.
The using duration obtaining module is used for obtaining the using duration of the scheduled meeting room if the access duration of the meeting room equipment of the scheduled meeting room is greater than 0.
Further, the second monitoring unit comprises a recording unit and a determining unit.
The recording unit is used for acquiring the access time and the disconnection time of the conference room equipment of the conference room to the client terminal;
the determining unit is used for determining the use duration of the scheduled conference room according to the access time and the disconnection time.
Further, a third monitoring unit is also included.
The third monitoring unit is configured to acquire a user code of a user using the conference room if the access duration of the conference room device in the predetermined conference room is greater than 0.
Further, the monitoring module 11 is also configured to monitor the number of times of using the conference room of the same group of users.
The first determining module 12 is further configured to add the corresponding group code to the first list if the number of times of using the conference room of the same group of users meets a third preset condition.
The detection module 13 is further configured to retrieve a historical conference monitoring record corresponding to the group code in the first list, and determine whether an illegal action exists according to the historical conference monitoring record.
The locking module 15 is further configured to lock conference room reservation permissions of all users corresponding to the group code if there is an illegal action.
Further, the detection module 13 includes a building unit and an operating unit.
The establishing unit is used for establishing a timing task based on a database;
the running unit is used for running the timing task to count the number of the same user codes in the first list.
Further, the conference room monitoring system further comprises a prompt module.
And the prompt module is used for generating prompt information according to the second list and sending the prompt information to a target user.
It should be noted that, for the information interaction, execution process, and other contents between the above-mentioned devices/units, the specific functions and technical effects thereof are based on the same concept as those of the embodiment of the method of the present application, and specific reference may be made to the part of the embodiment of the method, which is not described herein again.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
Therefore, the conference room monitoring system provided by this embodiment can also automatically monitor the use condition of the scheduled conference room through the conference room monitoring system, and record and count the user codes meeting the first preset condition, when the number of violations meets the second preset condition, the reservation authority of the user is automatically locked, the user is prevented from continuing to perform malicious reservation, conference room resources can be effectively released, the waste of conference room resources is avoided, the use of the conference room is comprehensively monitored, and the waste of conference room resources is effectively reduced.
Fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present application. As shown in fig. 5, the terminal device 5 of this embodiment includes: at least one processor 50 (only one shown in fig. 5), a memory 51, and a computer program 52 stored in the memory 51 and executable on the at least one processor 50, the processor 50 implementing the steps in any of the various conference room monitoring method embodiments described above when executing the computer program 52.
The terminal device 5 may be a desktop computer, a notebook, a palm computer, a cloud terminal device, or other computing devices. The terminal device may include, but is not limited to, a processor 50, a memory 51. Those skilled in the art will appreciate that fig. 5 is only an example of the terminal device 5, and does not constitute a limitation to the terminal device 5, and may include more or less components than those shown, or combine some components, or different components, such as an input-output device, a network access device, and the like.
The processor 50 may be a Central Processing Unit (CPU), and the processor 50 may be other general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, a discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 51 may in some embodiments be an internal storage unit of the terminal device 5, such as a hard disk or a memory of the terminal device 5, the memory 51 may in other embodiments also be an external storage device of the terminal device 5, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a flash memory Card (FlashCard) or the like provided on the terminal device 5 further, the memory 51 may also comprise both an internal storage unit and an external storage device of the terminal device 5, the memory 51 may be used for storing an operating system, applications, a Boot loader (Boot L loader), data and other programs, such as program code of the computer program or the like, the memory 51 may also be used for temporarily storing data that has been or will be output.
Illustratively, the computer program 52 may be divided into one or more units, which are stored in the memory 51 and executed by the processor 50 to accomplish the present application. The one or more units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution process of the computer program 52 in the terminal device 5. For example, the computer program 52 may be divided into a monitoring module, a first determining module, a detecting module, a second determining module and a locking module, and the specific functions of each unit are as follows:
the monitoring module is used for acquiring the access duration of the conference room equipment of the predetermined conference room and the user code of the user of the predetermined conference room;
the first judgment module is used for adding the user code to a first list if the access duration of the conference room equipment of the preset conference room meets a first preset condition;
the detection module is used for detecting the number of the same user codes in the first list within a preset time interval;
the second judgment module is used for adding the user codes to a second list if the number of the same user codes meets a second preset condition;
and the locking module is used for locking the conference room reservation authority of the user corresponding to the user code in the second list.
An embodiment of the present application further provides a network device, where the network device includes: at least one processor, a memory, and a computer program stored in the memory and executable on the at least one processor, the processor implementing the steps of any of the various method embodiments described above when executing the computer program.
The embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the steps in the above-mentioned method embodiments.
The embodiments of the present application provide a computer program product, which when running on a mobile terminal, enables the mobile terminal to implement the steps in the above method embodiments when executed.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, all or part of the processes in the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium and can implement the steps of the embodiments of the methods described above when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include at least: any entity or device capable of carrying computer program code to a photographing apparatus/terminal apparatus, a recording medium, computer Memory, Read-Only Memory (ROM), random-access Memory (RAM), an electrical carrier signal, a telecommunications signal, and a software distribution medium. Such as a usb-disk, a removable hard disk, a magnetic or optical disk, etc. In certain jurisdictions, computer-readable media may not be an electrical carrier signal or a telecommunications signal in accordance with legislative and patent practice.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/network device and method may be implemented in other ways. For example, the above-described apparatus/network device embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (10)

1. A conference room monitoring method, comprising:
acquiring access time of conference room equipment of a scheduled conference room and a user code of a user of the scheduled conference room;
if the access duration of the conference room equipment of the predetermined conference room meets a first preset condition, adding the user code to a first list;
detecting the number of the same user codes in the first list within a preset time interval;
if the number of the same user code meets a second preset condition, adding the user code to a second list;
and locking the conference room reservation authority of the user corresponding to the user code in the second list.
2. The conference room monitoring method as claimed in claim 1, further comprising:
and if the access time of the meeting room equipment of the preset meeting room is more than 0, acquiring the use time of the preset meeting room.
3. The method as claimed in claim 2, wherein the step of obtaining the usage duration of the scheduled conference room if the access duration of the conference room device of the scheduled conference room is greater than 0 includes:
acquiring the access time and disconnection time of meeting room equipment of the meeting room for accessing a client terminal;
and determining the use duration of the scheduled conference room according to the access time and the disconnection time.
4. The conference room monitoring method as claimed in claim 2, further comprising:
and if the access duration of the conference room equipment of the predetermined conference room is greater than 0, acquiring the user code of the user using the conference room.
5. The method of conference room monitoring of claim 1, further comprising:
monitoring the use times of meeting rooms of users in the same group;
if the number of times of using the conference room of the users in the same group meets a third preset condition, adding the corresponding group codes to the first list;
calling historical conference monitoring records corresponding to the group codes in the first list, and judging whether violation behaviors exist according to the historical conference monitoring records;
and if the illegal behavior exists, locking the conference room reservation authority of all users corresponding to the group codes.
6. The conference room monitoring method as claimed in claim 1, wherein said detecting the number of the same user codes in the first list within a preset time interval comprises:
establishing a timing task based on a database;
and running the timing task to count the number of the same user codes in the first list.
7. The conference room monitoring method according to any one of claims 1 to 6, further comprising:
and generating prompt information according to the second list, and sending the prompt information to a target user.
8. A conference room monitoring system, comprising:
the monitoring module is used for acquiring the access duration of the conference room equipment of the predetermined conference room and the user code of the user of the predetermined conference room;
the first judgment module is used for adding the user code to a first list if the access duration of the conference room equipment of the preset conference room meets a first preset condition;
the detection module is used for detecting the number of the same user codes in the first list within a preset time interval;
the second judgment module is used for adding the user codes to a second list if the number of the same user codes meets a second preset condition;
and the locking module is used for locking the conference room reservation authority of the user corresponding to the user code in the second list.
9. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the conference room monitoring method according to any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out a conference room monitoring method according to any one of claims 1 to 7.
CN202010227697.1A 2020-03-27 2020-03-27 Conference room monitoring method and system Pending CN111461372A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010227697.1A CN111461372A (en) 2020-03-27 2020-03-27 Conference room monitoring method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010227697.1A CN111461372A (en) 2020-03-27 2020-03-27 Conference room monitoring method and system

Publications (1)

Publication Number Publication Date
CN111461372A true CN111461372A (en) 2020-07-28

Family

ID=71683514

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010227697.1A Pending CN111461372A (en) 2020-03-27 2020-03-27 Conference room monitoring method and system

Country Status (1)

Country Link
CN (1) CN111461372A (en)

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006323453A (en) * 2005-05-17 2006-11-30 Yamatake Corp Access control system, and access control method
CN101854609A (en) * 2010-05-17 2010-10-06 中兴通讯股份有限公司 Short message monitoring system and method
CN102231888A (en) * 2011-06-24 2011-11-02 中兴通讯股份有限公司 Monitoring method and device
CN104052764A (en) * 2013-03-12 2014-09-17 中兴通讯股份有限公司 Meeting room resource monitoring method and meeting monitoring system
CN106485408A (en) * 2016-09-28 2017-03-08 上海异工同智信息科技有限公司 A kind of engineering construction overall process intelligent management system and its application
CN107220719A (en) * 2017-05-27 2017-09-29 深圳市创维群欣安防科技股份有限公司 A kind of managing reserved method of meeting room, system and storage device
CN108875984A (en) * 2017-05-15 2018-11-23 北京嘀嘀无限科技发展有限公司 Charging monitoring method, device, server, computer equipment and storage medium
CN109299803A (en) * 2018-09-30 2019-02-01 大连亿辉科技有限公司 Enterprise's meeting management system
CN109314785A (en) * 2016-04-08 2019-02-05 韩国电子通信研究院 Method and apparatus for exporting motion prediction information
CN109544117A (en) * 2018-11-27 2019-03-29 北京达佳互联信息技术有限公司 Meeting room information display method, device, terminal, server and storage medium
JP2019074977A (en) * 2017-10-18 2019-05-16 株式会社サテライトオフィス Person presence/absence determination system
CN109919342A (en) * 2019-01-28 2019-06-21 平安科技(深圳)有限公司 Meeting room preordering method, device, storage medium and terminal device
CN109922298A (en) * 2019-02-02 2019-06-21 阿里巴巴集团控股有限公司 Meeting room monitoring method and device
CN110009120A (en) * 2019-04-30 2019-07-12 北京金山安全软件有限公司 Meeting room reservation processing method and device and electronic equipment
CN110263954A (en) * 2019-05-08 2019-09-20 深圳市永兴元科技股份有限公司 Public conference room management method, device, equipment and computer storage medium
CN110473545A (en) * 2018-05-11 2019-11-19 视联动力信息技术股份有限公司 A kind of meeting treating method and apparatus based on meeting room
CN110557645A (en) * 2019-09-24 2019-12-10 腾讯科技(深圳)有限公司 Decoding method, encoding method, device and equipment of intra-frame prediction mode
US20200027036A1 (en) * 2018-07-23 2020-01-23 Mastercard International Incorporated Computer-implemented methods, systems, and computer-readable media for managing reservations
CN110827000A (en) * 2019-11-07 2020-02-21 北京首钢自动化信息技术有限公司 Conference room reservation method and device
CN114997446A (en) * 2022-05-26 2022-09-02 中国平安人寿保险股份有限公司 Conference room reservation method and device, computer equipment and storage medium

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006323453A (en) * 2005-05-17 2006-11-30 Yamatake Corp Access control system, and access control method
CN101854609A (en) * 2010-05-17 2010-10-06 中兴通讯股份有限公司 Short message monitoring system and method
CN102231888A (en) * 2011-06-24 2011-11-02 中兴通讯股份有限公司 Monitoring method and device
CN104052764A (en) * 2013-03-12 2014-09-17 中兴通讯股份有限公司 Meeting room resource monitoring method and meeting monitoring system
CN109314785A (en) * 2016-04-08 2019-02-05 韩国电子通信研究院 Method and apparatus for exporting motion prediction information
CN106485408A (en) * 2016-09-28 2017-03-08 上海异工同智信息科技有限公司 A kind of engineering construction overall process intelligent management system and its application
CN108875984A (en) * 2017-05-15 2018-11-23 北京嘀嘀无限科技发展有限公司 Charging monitoring method, device, server, computer equipment and storage medium
CN107220719A (en) * 2017-05-27 2017-09-29 深圳市创维群欣安防科技股份有限公司 A kind of managing reserved method of meeting room, system and storage device
JP2019074977A (en) * 2017-10-18 2019-05-16 株式会社サテライトオフィス Person presence/absence determination system
CN110473545A (en) * 2018-05-11 2019-11-19 视联动力信息技术股份有限公司 A kind of meeting treating method and apparatus based on meeting room
US20200027036A1 (en) * 2018-07-23 2020-01-23 Mastercard International Incorporated Computer-implemented methods, systems, and computer-readable media for managing reservations
CN109299803A (en) * 2018-09-30 2019-02-01 大连亿辉科技有限公司 Enterprise's meeting management system
CN109544117A (en) * 2018-11-27 2019-03-29 北京达佳互联信息技术有限公司 Meeting room information display method, device, terminal, server and storage medium
CN109919342A (en) * 2019-01-28 2019-06-21 平安科技(深圳)有限公司 Meeting room preordering method, device, storage medium and terminal device
CN109922298A (en) * 2019-02-02 2019-06-21 阿里巴巴集团控股有限公司 Meeting room monitoring method and device
CN110009120A (en) * 2019-04-30 2019-07-12 北京金山安全软件有限公司 Meeting room reservation processing method and device and electronic equipment
CN110263954A (en) * 2019-05-08 2019-09-20 深圳市永兴元科技股份有限公司 Public conference room management method, device, equipment and computer storage medium
CN110557645A (en) * 2019-09-24 2019-12-10 腾讯科技(深圳)有限公司 Decoding method, encoding method, device and equipment of intra-frame prediction mode
CN110827000A (en) * 2019-11-07 2020-02-21 北京首钢自动化信息技术有限公司 Conference room reservation method and device
CN114997446A (en) * 2022-05-26 2022-09-02 中国平安人寿保险股份有限公司 Conference room reservation method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
US20080162707A1 (en) Time Based Permissioning
CN106663035A (en) System and method for resource isolation and consumption in a multitenant application server environment
CN108269386B (en) Short message sending device, short message issuing device and system for emergency early warning information
WO2011054555A1 (en) Method and system for managing security objects
CN107730375B (en) Tax map management method, system and terminal equipment
CN107770146B (en) User data authority control method and device
CN110489994B (en) File authority management method and device for nuclear power station and terminal equipment
CN112217841A (en) Live broadcast room management method and device, computer equipment and storage medium
CN112100034A (en) Service monitoring method and device
CN114780930A (en) Authority management method, device, computer equipment and storage medium
CN111063197A (en) Method and device for processing abnormal behavior information of vehicle in parking lot
US7885976B2 (en) Identification, notification, and control of data access quantity and patterns
US10356104B2 (en) Securing services and intra-service communications
CN110569114B (en) Service processing method, device, equipment and storage medium
CN112100592A (en) Authority management method, device, electronic equipment and storage medium
CN111461372A (en) Conference room monitoring method and system
KR102139062B1 (en) Security Service system based on cloud
CN115033365A (en) Task flow accurate scheduling method based on artificial intelligence and related equipment
CN110706052A (en) Intelligent public rental house comprehensive management system
CN116992476B (en) Control method, device, equipment and storage medium of application permission
CN110689432B (en) User target processing method, device and equipment based on blockchain
CN109903022B (en) Resource distribution method, device, equipment and computer readable storage medium
CN116975893A (en) Access request processing method and device, storage medium and computer equipment
CN109522733B (en) Data sharing method and device and processing equipment
CN112418884A (en) Overseas customer relationship information management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination