CN116126185A - Security management method, device and medium - Google Patents

Security management method, device and medium Download PDF

Info

Publication number
CN116126185A
CN116126185A CN202211738102.4A CN202211738102A CN116126185A CN 116126185 A CN116126185 A CN 116126185A CN 202211738102 A CN202211738102 A CN 202211738102A CN 116126185 A CN116126185 A CN 116126185A
Authority
CN
China
Prior art keywords
service
auditing
instruction
user
details
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211738102.4A
Other languages
Chinese (zh)
Inventor
杨鸥
董莉萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhonghai Property Management Co ltd
Shenzhen Xinghai IoT Technology Co Ltd
Original Assignee
Zhonghai Property Management Co ltd
Shenzhen Xinghai IoT Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhonghai Property Management Co ltd, Shenzhen Xinghai IoT Technology Co Ltd filed Critical Zhonghai Property Management Co ltd
Priority to CN202211738102.4A priority Critical patent/CN116126185A/en
Publication of CN116126185A publication Critical patent/CN116126185A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/0482Interaction with lists of selectable items, e.g. menus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/16Real estate
    • G06Q50/163Real estate management
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • General Engineering & Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Human Computer Interaction (AREA)
  • Quality & Reliability (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a security management method, equipment and medium suitable for property management, wherein the method comprises the following steps: displaying a service auditing interaction interface, wherein the service auditing interaction interface is provided with a service list to be audited and corresponding operation items; receiving a seventh instruction for selecting the service list to be checked by a fourth user and operating the operation item; obtaining auditing details of the service to be audited corresponding to the operation items in response to a seventh instruction, and displaying the auditing details and the corresponding operation items on the service auditing interactive interface; receiving an eighth instruction for setting the auditing details by a fourth user and operating the operation items of the auditing details; and responding to the eighth instruction, obtaining and displaying a service auditing result, and deleting the service to be audited from the service list to be audited. And the interaction is carried out through the service auditing interaction interface, so that an auditing manager carries out service security auditing management to protect the privacy of the owner from being revealed and maintain the security of the owner.

Description

Security management method, device and medium
Technical Field
The application relates to the field of intelligent property, in particular to a security management method, security management equipment and security management media applicable to property management.
Background
The inventor finds that in the traditional property service, a property owner and a property company sign a long-term service contract, service staff recruit and allocate by the property company, and the property owner cannot directly interface with a service provider, so that the following problems exist: on one hand, when the service personnel of the property company are lost, the service personnel cannot respond to the requirements of the property company in time; on the other hand, since the owners and property companies make long-term service contracts, the owners cannot purchase services on demand, resulting in wasted personnel and wasted funds. Accordingly, there is an urgent need to provide a system that interfaces business owner needs with service providers in real time, thereby enabling more optimal labor configurations.
For a single service, because of the first cooperation, the trust degree problem of both service personnel and owners exists, so that the service personnel need to be checked, and the privacy shielding measure for the owner information is adopted correspondingly, so that the interests of the owners are protected.
Thus, there is a need for a system that further provides security audit management of services to protect the privacy of the owners from disclosure, while at the same time protecting the owners from security.
Disclosure of Invention
The application provides a security management method, security management equipment and security management media suitable for property management, and aims to solve the problems that security audit management on services is lacking in the property management, so that security and benefit of owners are not guaranteed.
The technical proposal is as follows:
in one aspect, a security management method suitable for property management is provided, including the steps of:
displaying a service auditing interaction interface, wherein the service auditing interaction interface is provided with a service list to be audited and corresponding operation items;
receiving a seventh instruction for selecting the service list to be audited by the fourth user to operate the operation item;
obtaining auditing details of the service to be audited corresponding to the operation items in response to the seventh instruction, and displaying the auditing details and the corresponding operation items on a service auditing interactive interface;
receiving an eighth instruction for setting the auditing details by a fourth user and operating the operation items of the auditing details;
and responding to the eighth instruction, obtaining and displaying a service auditing result, and deleting the service to be audited in the service list to be audited.
Further, the list of services to be checked is arranged in chronological order.
Further, the operation items corresponding to the service list to be checked comprise checking and deleting, wherein the deleting is to delete the service to be checked from the service list to be checked.
Further, the audit details are displayed on a first page, which is below the list of services to be audit.
Further, the audit details are displayed on a second page, which is displayed on a different page than the list of services to be audit.
Further, the auditing details include: owner privacy level, server qualification, privacy mask.
Further, the concealment shield includes: number mask, name mask.
Further, before displaying the service audit interactive interface, the method includes:
receiving a ninth instruction of fourth user login;
verifying the fourth user in response to the ninth instruction;
displaying the service audit interactive interface includes:
and responding to the verification passing of the fourth user, and displaying a to-be-verified service list matched with the authority of the fourth user and corresponding operation items thereof on a service verification interactive interface.
In another aspect, there is provided a computer device comprising:
the device comprises a processor, a memory and a communication circuit, wherein the processor is respectively connected with the memory and the communication circuit;
wherein the communication circuit is for communication connection and the memory is for storing a computer program and the processor is for executing the computer program to implement the method of any of the above.
In yet another aspect, the present application provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the security management method of any of the above, as applicable to property management.
The beneficial effects of this application are: by utilizing the scheme, interaction is performed through the service auditing interaction interface, so that an auditing manager can conduct service auditing, thereby realizing automatic safety auditing management of the service, protecting privacy and safety of owners, improving efficiency and reducing labor cost.
Drawings
FIG. 1 is a flow chart of one embodiment of the smart method of the present application;
FIG. 2 is a schematic diagram of an interactive interface of one embodiment of the smart employment method of the present application;
FIG. 3 is a schematic view of a scenario application of an embodiment of the smart employment method of the present application;
FIG. 4 is a flow chart of an embodiment of a work order setup method of the present application;
FIG. 5 is a schematic diagram of an interactive interface of an embodiment of a work order setup method of the present application;
FIG. 6 is a schematic diagram of an interactive interface of an embodiment of a work order setup method of the present application;
FIG. 7 is a schematic diagram of an interactive interface of an embodiment of a work order setup method of the present application;
FIG. 8 is a schematic diagram of an interactive interface of an embodiment of a work order setup method of the present application;
FIG. 9 is a schematic diagram of an interactive interface of an embodiment of a work order setup method of the present application;
FIG. 10 is a schematic diagram of an interactive interface of an embodiment of a work order setup method of the present application;
FIG. 11 is a schematic diagram of an interactive interface of an embodiment of a work order setup method of the present application;
FIG. 12 is a flow chart of an embodiment of a security management method of the present application;
FIG. 13 is a schematic diagram of an interactive interface of an embodiment of a security management method of the present application;
FIG. 14 is a block diagram of an embodiment of a computer device of the present application;
FIG. 15 is a block diagram illustrating the structure of an embodiment of a storage medium readable by a computer of the present application
Detailed Description
In order to facilitate an understanding of the present application, the present application will be described in more detail below with reference to the accompanying drawings and specific examples. Preferred embodiments of the present application are shown in the drawings. This application may, however, be embodied in many different forms and is not limited to the embodiments described herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete.
It is noted that all technical and scientific terms used in this specification have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs unless defined otherwise. The terminology used in the description of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application.
If the technical scheme of the application relates to personal information, the product applying the technical scheme of the application clearly informs the personal information processing rule before processing the personal information, and obtains independent consent of the individual. If the technical scheme of the application relates to sensitive personal information, the product applying the technical scheme of the application obtains individual consent before processing the sensitive personal information, and simultaneously meets the requirement of 'explicit consent'. For example, a clear and remarkable mark is set at a personal information acquisition device such as a camera to inform that the personal information acquisition range is entered, personal information is acquired, and if the personal voluntarily enters the acquisition range, the personal information is considered as consent to be acquired; or on the device for processing the personal information, under the condition that obvious identification/information is utilized to inform the personal information processing rule, personal authorization is obtained by popup information or a person is requested to upload personal information and the like; the personal information processing rule may include information such as a personal information processor, a personal information processing purpose, a processing mode, and a processing personal information type.
As shown in fig. 1, the present application provides an intelligent recruitment method, which includes the steps of:
s100: displaying an intelligent recruitment interactive interface, wherein the intelligent recruitment interactive interface is provided with a service ordering module and a robbery list module, the service ordering module is correspondingly provided with a first operation item, and the robbery list module is correspondingly provided with a second operation item;
s200: receiving a first instruction of a first user for ordering services and operating a first operation item;
s300: responding to the first instruction to obtain an order to be allocated corresponding to the first operation item;
s400: receiving a second instruction of a second user for executing an order taking operation on a second operation item;
s500: and responding to the second instruction, obtaining a robbery result of the order to be distributed, and displaying the robbery result on the intelligent recruitment interactive interface.
As shown in fig. 2, the service requirement of the owner (first user) and the order-robbing requirement of the service provider (second user) are acquired through an intelligent recruitment interactive interface, the interactive interface is provided with a service ordering module and an order-robbing module, the service ordering module is provided with an operation item 11 corresponding to the service ordering module so that the first user can order the service requirement on line, and the order-robbing module is provided with an operation item 12 corresponding to the first user so that the second user can order the service requirement on line.
After the first user operates the service subscription module corresponding to the operation item 11 in the smart recruitment interactive interface,
the server receives a first instruction that is received by the server,
the server responds to the first instruction to obtain the service requirement corresponding to the operation item 11 so as to store the service requirement, and issues the service according to the service requirement.
After the second user operates the corresponding operation item 12 of the order robbery module in the intelligent recruitment interactive interface,
the server receives a second instruction that is received by the server,
the response second instruction server obtains the robbery order information corresponding to the operation item 12 so as to store the robbery order information, and performs robbery order setting of service according to the robbery order information.
The order taking information comprises an order to be allocated selected by a second user, and the order taking setting comprises the steps of obtaining an order taking result of the order to be allocated and displaying the order taking result. The single-break event includes success and failure of the single-break event. If successful, the second user may begin servicing the order, and if unsuccessful, the second user may continue to operate on other orders to be allocated, triggering a second instruction.
Therefore, the online matching and management can be carried out on the demands of the first user and the second user based on the service ordering module and the order robbing module, namely, the owner demands and the service provider are in real-time butt joint, so that more optimized labor allocation is realized, the efficiency is improved, and the labor cost is reduced.
Wherein the first user comprises the owners of a cell, building, etc., and the second user comprises a property professional company, an intensive service provider (e.g., security company, cleaning company), etc.
Further, referring to fig. 2, the smart recruitment interactive interface specifically includes:
and displaying the items under the service ordering module and the corresponding operation items, the single service and the corresponding operation items thereof on the intelligent recruitment interactive interface.
Further, each project includes a plurality of project services.
Where a project service is an overall service for an entire building or cell, and a single service is a specific transaction for a particular customer owner. The project services may be packaged in various combinations to form a project for subscription. The individual services are subscribed individually.
The flexible setting can meet the requirements of more first users. Because the requirements of different owners are different, for example, there are many different requirements of the cell owners and the building owners, the building generally needs more security services and environmental cleaning due to the mobility of personnel, and the cell owners pay more attention to the services of the living environment such as customer service, gardening greening, and the like. Further, more individual services, such as opening doors, unlocking, etc., are required for each individual owner.
Further, the types of the project service include: customer service, security service, environmental cleaning, gardening greening and engineering maintenance.
Further, the types of the single service include: household cleaning, hydropower maintenance, personnel first aid, temporary nursing and unlocking.
A specific embodiment is given, particularly as shown in fig. 3. Among them, the district owner orders the project A (customer service, security service, environmental cleaning, gardening greening, engineering maintenance), the building owner orders the project B (security service, environmental cleaning, gardening greening, engineering maintenance), the hospital owner orders the project C (security service, environmental cleaning). The service providing and robbing-up method comprises property professional companies (community commerce and trade companies, technology limited companies, engineering service limited companies and ecological environment technology limited companies) and centralized service providers (base station engineering maintenance company, cleaning company, security company, landscaping company and third-party labor service company).
Further, displaying the intelligent recruitment interactive interface specifically includes:
and displaying the order to be distributed and the corresponding operation items thereof under the order robbing module on the intelligent recruitment interactive interface.
The to-be-allocated order is a service ordered by the first user through the first operation item, and the service is not allocated to a specific service provider.
Further, the types of orders to be allocated include types of project services and types of individual services.
When the type of order to be allocated is a project service, the order robbing operation may be performed including a professional property company, an intensive service provider (e.g., a security company, a cleaning company), and the like. When the type of order to be allocated is a single service, a property person including flexible employment, such as a water electrician who uses amateur time for service, etc., can perform a robbing operation.
After responding to the second instruction and obtaining the robbery result of the order to be distributed and displaying the robbery result on the intelligent recruitment interactive interface, the method further comprises the steps of:
the order to be allocated is set as an allocated order and the first user is notified.
The notification may be displayed on the interactive interface, or may be notified by information, telephone, mail, or the like. The first user is notified in time so that the user knows the status of the order of his subscription service in time.
Further, service intelligent pushing is performed according to information of the two parties of the first user and the second user, service ordering display is performed in the service ordering module, and ordering can be performed according to distance, grading, idle degree, relation and the like, wherein the relation comprises whether the second user serves the first user or not.
Further, service intelligent pushing is performed according to information of the two parties of the first user and the second user, ordering display of orders to be distributed is performed in the order grabbing module, and ordering can be performed according to distance, grading, idle degree, relation and the like, wherein the relation comprises whether the second user serves the first user or not.
Through service function pushing, requirements of the first user and the second user can be matched more accurately, and service quality and efficiency are improved.
Further, the response second instruction server can also set a timer, and when the condition that the to-be-allocated order has no robbery is detected to exceed the preset threshold time, the order is dispatched. The dispatch object comprises a service provider which is signed and agrees to automatically accept dispatch.
Further, before displaying the intelligent recruitment interactive interface, the method includes:
receiving a fifth instruction of user login, wherein the user comprises a first user and a second user;
authenticating the user in response to the fifth instruction;
displaying the intelligent recruitment interactive interface includes:
and responding to the verification passing of the user, and displaying a service ordering module/robbery list module matched with the user authority and corresponding operation items thereof on the intelligent recruitment interactive interface.
Because the first user and the second user are different in user attribute and have different attention points, the interaction interfaces of different contents can be displayed for the two users according to authority management, so that the efficiency and the user experience are improved.
Further, the first instruction, the second instruction and the fifth instruction may be sent by the user through a man-machine interface of the electronic device where the trigger client software is located, for example: the user clicks the first operation item by using the mouse to generate a first instruction, or inputs characters in the area of the first operation item by using the keyboard to generate the first instruction.
Further, after the instruction is generated, the client software is connected to the server software, and the server software acquires the data of the corresponding instruction, generates display content and sends the display content to the client software. The data transmission between the electronic device where the server software is located and the electronic device where the client software is located can be completed through means such as Ethernet (local area network), WLAN (wireless local area network) and the like.
Alternatively, step S200 may be performed synchronously with step S400, corresponding to rendering and operating on different pages.
As shown in fig. 4, the present application provides a work order setting method, including the steps of:
S610: displaying a work order setting interactive interface, wherein the work order setting interactive interface is provided with a work order time limit module, a personnel configuration module and corresponding operation items;
s620: receiving a third instruction of a third user for setting the work order time limit of the work order and operating the operation item of the work order time limit module;
s630: obtaining a worksheet time limit setting result in response to the third instruction;
s640: receiving a fourth instruction of a third user for performing personnel configuration on the work order and operating operation items of the personnel configuration module;
s650: and responding to the fourth instruction, obtaining a personnel configuration result, and displaying the personnel configuration result on the work order setting interactive interface.
As shown in fig. 5, the limiting conditions such as the execution node, the executor, the execution time and the like of the work order are obtained through the work order setting interactive interface, the interactive interface is provided with a work order time limit module and a personnel configuration module, and the module is provided with the corresponding operation item 21 so as to facilitate the on-line management of the limiting conditions of the work order by a third user.
After the third user operates the operation item corresponding to the work order time limit module in the work order setting interactive interface,
the server receives a third instruction that is received by the server,
the server responds to the third instruction to obtain the time limit corresponding to the operation item so as to store the time limit, and sets the time limit of the work order node according to the time limit.
After the third user operates the personnel configuration module corresponding to the operation item in the work order setting interactive interface,
the server receives the fourth instruction and,
and responding to the fourth instruction, the server obtains personnel information corresponding to the operation item so as to store the personnel information, and carrying out personnel configuration of the work order node according to the personnel information.
Therefore, the on-line time limit and personnel setting can be carried out on the basis of the work order time limit module and the personnel configuration module on the work order nodes to be set, so that the automatic flow management of the work order is realized, the efficiency is improved, and the labor cost is reduced.
The third user includes a manager, for example, in the aforementioned property system, which may be a system manager, and after the first user places a certain service and the second user robs the service, the system manager may set a work order included in the service.
Further, the work order comprises a plurality of nodes, and for each node (or work link), the work order can be operated through the work order setting interactive interface, so that time limit setting and personnel configuration are completed.
Further, referring to fig. 4, the display worksheet setting interactive interface specifically includes:
and displaying the completion time limit of the node time limit and the corresponding operation items, the robbery time limit and the corresponding operation items of the node time limit under the work order time limit module on the work order setting interactive interface.
The completion time limit is used for monitoring the completion condition of the node, for example, when the third instruction server receives the third instruction, the current system time is recorded as the starting time, a timer is started to periodically detect the current system time, and when the value of the detected current system time minus the starting time is equal to the completion time limit, a checking person is informed to check whether the work of the node is completed.
Further, when the node works, the work order node executor can check in and record the completion condition on line through the terminal, so as to be used for on-line inspection of inspectors.
Further, in response to the third instruction server checking in and out on the line at the completion time limit, the notification person and the notification content are determined based on the check result. For example, when the completion time limit is reached, if the node work is not completed, notifying a inspector to perform supervision, and notifying an executive to perform timely execution. When the completion time limit is reached, only the inspector is notified if the node work has been completed.
Further, the time limit of the order taking is used for monitoring the personnel order taking condition of the node, for example, the server records the current system time as the starting time when receiving the third instruction in response to the third instruction, starts the timer to detect the current system time, and when the value of the current system time minus the starting time is detected to be equal to the time limit of the order taking time, informs related personnel to check whether the order taking of the node is completed.
In summary, through the online time limit setting, the work execution of the work order node can be more intelligently reminded and supervised. For example, a work order is to disinfect the elevators of a building, in the prior art, it is necessary for an executive to enter each elevator periodically to disinfect, for example 9 a.m., 1 a.m. and 5 a.m. each time after disinfection, the executive checks in on a check-in meter in the elevator. The inspector periodically checks the check-in condition after this time. The operator needs to manually record whether the operator performs the operation or not, and the inspector also repeatedly performs the inspection of multiple areas. By the method, on one hand, when the work order node reaches the completion time limit, for example, 9 o' clock, an executive can receive a timeout notification, for example, an information prompt, so that the executive can quickly execute the task on site. On the other hand, the inspector does not need to perform multiple times of elevator inspection on site, and can directly acquire the completion condition of the work order node through the notification of the system, so that corresponding measures, such as telephone inquiry of an executive personnel and the like, are taken.
Further, in the time limit of robbing, the node can be signed in by a plurality of staff, and the person who signs in first is the executive of the node. When the time limit of the robbery order is exceeded, if no person signs in, the relevant person needs to be notified to perform personnel configuration, for example, a system manager is notified to designate the executive personnel of the node.
The node can be controlled to rob the time of the node by setting the node rob time limit, so that the response efficiency of the system is improved.
Further, the method for displaying the completion time limit of the node time limit and the corresponding operation items under the work order time limit module on the work order setting interactive interface comprises the following steps:
and setting early warning time limit and corresponding operation items, overtime time limit and corresponding operation items of the early warning time limit and the overtime time limit under the display completion time limit of the interactive interface on the work order.
By further refining the completion time limit to two levels of early warning and timeout, the completion monitoring of the node can be controlled more finely, for example, an executive can be notified when the early warning time limit is reached, so that the executive can respond more quickly, and the work of the node is completed before the timeout time limit.
Further, the step of displaying the robbery time limit of the node time limit under the work order time limit module on the work order setting interactive interface and the corresponding operation items thereof comprises the following steps:
and displaying a confirmation time limit and a corresponding operation item, a dispatch time limit and a corresponding operation item under the time limit of the order robbing on the work order setting interactive interface.
By further refining the time limit for robbing into two categories, namely validation and dispatch, the time for robbing of the node can be controlled more finely, e.g., reaching the validation time limit, no more robbing is allowed, and manual configuration is changed, e.g., by a system administrator configuring the executive of the node so that the executive can respond more quickly. When the dispatch time limit is reached, manual configuration is ended, and system configuration is changed into system configuration, for example, an executive is directly and randomly configured by the system, so that the executive can respond more quickly.
In particular, referring to fig. 5 and 6, an embodiment of a worksheet time limit setting for a worksheet setting interactive interface is presented.
Further, referring to fig. 4, displaying the worksheet setting interactive interface includes:
and displaying appointed personnel of node personnel and corresponding operation items, dynamic configuration and corresponding operation items thereof under the personnel configuration module on the worksheet setting interactive interface.
The node personnel refers to the executive personnel of the work order at a certain node. The designating person is an executive who designates the node by manually designating on the interactive interface, for example, by manually screening by a system administrator. Dynamic configuration is an executive who the system automatically configures the node, and can be randomly designated or automatically matched by setting some conditions.
In particular, referring to fig. 7 and 8, an embodiment of personnel configuration settings of a worksheet setting interactive interface is presented. Fig. 8 shows a plurality of services, and fig. 9 shows personnel configuration of three flow links of a work order, including processing, auditing, and return visit, which can be performed when a certain service is selected. Wherein each link (node) requires two employees (executives) to be configured.
Further, the operation item corresponding to the designated person includes searching for the designated person. Specifically, fig. 10 shows that the staff can be searched according to the staff name when the staff is specified, and the staff can also be searched directly according to the roles.
Further, dynamically configuring the corresponding operational items includes automatically scheduling according to the associated posts. Specifically, FIG. 11 illustrates that, when dynamically configured, posts may be associated, where the posts include an own post and an external post. Once the posts are associated, the system can automatically screen qualified staff as the executive of the node through intelligent scheduling. Further improving the matching degree to achieve the optimal matching of personnel and corresponding time.
The intelligent scheduling is to automatically select staff meeting the post according to a matching algorithm by the system through entering post data and staff data, and generate scheduling data, such as a scheduling table and the like.
Further, before displaying the worksheet setting interactive interface, the method includes:
receiving a sixth instruction of user login, wherein the user comprises a third user;
responding to the sixth instruction to verify the user;
displaying the worksheet setting interactive interface includes:
and responding to the verification passing of the user, and displaying a work order time limit module/personnel configuration module matched with the user permission and corresponding operation items thereof on a work order setting interactive interface.
Further, the third instruction, the fourth instruction and the sixth instruction may be issued by the user through triggering the man-machine interface of the electronic device where the client software is located, for example: the user clicks the operation item by using the mouse to generate a third instruction, or inputs characters in the operation item area by using the keyboard to generate the third instruction.
Further, after the instruction is generated, the client software is connected to the server software, and the server software acquires the data of the corresponding instruction, generates display content and sends the display content to the client software. The data transmission between the electronic device where the server software is located and the electronic device where the client software is located can be completed through means such as Ethernet (local area network), WLAN (wireless local area network) and the like.
Alternatively, step 620 may be performed in synchronization with step S640, corresponding to rendering and operating on different pages.
As shown in fig. 12, the present application further provides a security management method suitable for property management, including the steps of:
s710: displaying a service auditing interaction interface, wherein the service auditing interaction interface is provided with a service list to be audited and corresponding operation items;
s720: receiving a seventh instruction for selecting the service list to be audited by the fourth user to operate the operation item;
s730: obtaining auditing details of the service to be audited corresponding to the operation items in response to the seventh instruction, and displaying the auditing details and the corresponding operation items on a service auditing interactive interface;
s740: receiving an eighth instruction for setting the auditing details by a fourth user and operating the operation items of the auditing details;
S750: and responding to the eighth instruction, obtaining and displaying a service auditing result, and deleting the service to be audited in the service list to be audited.
The fourth user is an audit administrator of the property service platform in the above embodiment. When the owner does not purchase the service and the service side does not rob the list, the list of the service to be checked is empty.
As shown in fig. 13, a list of to-be-inspected services in the purchased services is obtained and displayed through a service inspection interactive interface, after a fourth user operates an operation item corresponding to the to-be-inspected service list in the service inspection interactive interface, a server receives a seventh instruction, and responds to the seventh instruction, the server obtains a number of the to-be-inspected service corresponding to the operation item so as to store the number, performs selected setting of the to-be-inspected service according to the number, and enters an inspection detail interface.
After the fourth user operates the operation item corresponding to the auditing details in the service auditing interaction interface, the server receives the eighth instruction, responds to the eighth instruction, and the server obtains auditing result information corresponding to the operation item so as to store the auditing result information, sets the auditing details according to the auditing result information, and deletes the service to be audited in the service list to be audited.
Therefore, the on-line service audit can be set in detail based on the to-be-audited service list and audit details, so that automatic audit management of the service is realized, the efficiency is improved, and the labor cost is reduced.
Further, the list of services to be checked is arranged in chronological order. Preferably, the first subscribed tier is uppermost in order to more timely audit the services subscribed by the first user.
Further, the operation items corresponding to the service list to be checked comprise checking and deleting, wherein the deleting is to delete the service to be checked from the service list to be checked. When the fourth user operation item selects to audit, entering the next step of the flow of the method; when the fourth user operation item selects to delete, the current service to be checked is directly deleted, and the checking details are not displayed any more.
Further, the audit details are displayed on a first page, which is below the list of services to be audit. This approach is more advantageous for switching between different pending services.
Further, the audit details are displayed on a second page, which is displayed on a different page than the list of services to be audit. This approach is more conducive to the presentation of the detail interface.
Further, the auditing details include: owner privacy level, server qualification, privacy mask. Wherein the higher the owner privacy level, the more terms of the content that are audited. For example, service qualification includes a service person's academic, years of practise, certificates, whether there is a crime record, etc. And (3) checking the service corresponding to the highest owner privacy level according to the qualification of all the paid service parties. If the auditing is not passed, recording that the auditing result of the service is not passed, and prohibiting the service side from carrying out service.
Further, the concealment shield includes: number mask, name mask. The number shielding can be to shield the fixed telephone number or the mobile phone number of the owner.
Further, before displaying the service audit interactive interface, the method includes:
receiving a ninth instruction of fourth user login;
verifying the fourth user in response to the ninth instruction;
displaying the service audit interactive interface includes:
and responding to the verification passing of the fourth user, and displaying a to-be-verified service list matched with the authority of the fourth user and corresponding operation items thereof on a service verification interactive interface.
Further, the seventh, eighth and ninth instructions may be issued by the user through a man-machine interface of the electronic device where the triggering client software is located, for example: the user clicks the operation item by using the mouse to generate an eighth instruction, or inputs characters in the operation item area by using the keyboard to generate the eighth instruction.
Further, after the instruction is generated, the client software is connected to the server software, and the server software acquires the data of the corresponding instruction, generates display content and sends the display content to the client software. The data transmission between the electronic device where the server software is located and the electronic device where the client software is located can be completed through means such as Ethernet (local area network), WLAN (wireless local area network) and the like.
In summary, by providing the service audit portal interface of the owner purchase service, the audit administrator can perform online audit on the service before the service is executed, so that timely, effective and comprehensive audit feedback is realized, labor cost of the property company is saved, and privacy protection and safety protection are provided for the owner.
As shown in FIG. 14, the computer device 20 described in the computer device embodiments of the present application may include a processor 210 and a memory 220. The memory 220 is coupled to the processor 210.
The processor 210 is used to control the operation of the computer device 20, and the processor 210 may also be referred to as a CPU (Central Processing Unit ). The processor 210 may be an integrated circuit chip with signal processing capabilities. Processor 210 may also be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. A general purpose processor may be a microprocessor or the processor 210 may be any conventional processor or the like.
The memory 220 is used to store a computer program, which may be a RAM, a ROM, or other type of storage device. In particular, the memory may include one or more computer-readable storage media, which may be non-transitory. The memory may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory is used to store at least one piece of program code.
The processor 210 is configured to execute computer programs stored in the memory 220 to implement the methods described in the method embodiments of the present application.
In some implementations, the computer device 20 may further include: a peripheral interface 230, and at least one peripheral. The processor 210, memory 220, and peripheral interface 230 may be connected by a bus or signal line. Individual peripheral devices may be connected to peripheral device interface 230 by buses, signal lines, or circuit boards. Specifically, the peripheral device includes: at least one of radio frequency circuitry 240, display 250, audio circuitry 260, and power supply 270.
Peripheral interface 230 may be used to connect at least one Input/output (I/O) related peripheral to processor 210 and memory 220. In some embodiments, processor 210, memory 220, and peripheral interface 230 are integrated on the same chip or circuit board; in some other implementations, either or both of the processor 210, the memory 220, and the peripheral interface 230 may be implemented on separate chips or circuit boards, which is not limited in this embodiment.
The Radio Frequency circuit 240 is used to receive and transmit RF (Radio Frequency) signals, also known as electromagnetic signals. The radio frequency circuit 240 communicates with the communication network and other communication devices via electromagnetic signals, and the radio frequency circuit 240 is a communication circuit of the computer device 20. The radio frequency circuit 240 converts an electrical signal into an electromagnetic signal for transmission, or converts a received electromagnetic signal into an electrical signal. Optionally, the radio frequency circuit 240 includes: antenna systems, RF transceivers, one or more amplifiers, tuners, oscillators, digital signal processors, codec chipsets, subscriber identity module cards, and so forth. The radio frequency circuit 240 may communicate with other terminals via at least one wireless communication protocol. The wireless communication protocol includes, but is not limited to: the world wide web, metropolitan area networks, intranets, generation mobile communication networks (2G, 3G, 4G, and 5G), wireless local area networks, and/or WiFi (Wireless Fidelity ) networks. In some embodiments, the radio frequency circuit 240 may also include NFC (Near Field Communication ) related circuits, which are not limited in this application.
The display 250 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof. When display 250 is a touch display, display 250 also has the ability to collect touch signals at or above the surface of display 250. The touch signal may be input as a control signal to the processor 210 for processing. At this time, the display 250 may also be used to provide virtual buttons and/or virtual keyboards, also referred to as soft buttons and/or soft keyboards. In some embodiments, the display 250 may be one, disposed on the front panel of the computer device 20; in other embodiments, the display 250 may be at least two, each disposed on a different surface of the computer device 20 or in a folded configuration; in other embodiments, the display 250 may be a flexible display disposed on a curved surface or a folded surface of the computer device 20. Even more, the display 250 may be arranged in a non-rectangular irregular pattern, i.e., a shaped screen. The display 250 may be made of LCD (Liquid Crystal Display ), OLED (Organic Light Emitting Diode, organic light emitting diode) or the like.
The audio circuitry 260 may include a microphone and a speaker. The microphone is used for collecting sound waves of users and the environment, converting the sound waves into electric signals, and inputting the electric signals to the processor 210 for processing, or inputting the electric signals to the radio frequency circuit 240 for voice communication. The microphone may be provided in a plurality of different locations of the computer device 20 for stereo acquisition or noise reduction purposes. The microphone may also be an array microphone or an omni-directional pickup microphone. The speaker is used to convert electrical signals from the processor 210 or the radio frequency circuit 240 into sound waves. The speaker may be a conventional thin film speaker or a piezoelectric ceramic speaker. When the speaker is a piezoelectric ceramic speaker, not only the electric signal can be converted into a sound wave audible to humans, but also the electric signal can be converted into a sound wave inaudible to humans for ranging and other purposes. In some embodiments, audio circuit 260 may also include a headphone jack.
Power supply 270 is used to power the various components in computer device 20. Power supply 270 may be an alternating current, a direct current, a disposable battery, or a rechargeable battery. When power supply 270 includes a rechargeable battery, the rechargeable battery may be a wired rechargeable battery or a wireless rechargeable battery. The wired rechargeable battery is a battery charged through a wired line, and the wireless rechargeable battery is a battery charged through a wireless coil. The rechargeable battery may also be used to support fast charge technology.
For detailed descriptions of functions and execution procedures of each functional module or component in the embodiments of the computer device of the present application, reference may be made to the descriptions in the embodiments of each method of the present application, which are not repeated herein.
In the several embodiments provided in this application, it should be understood that the disclosed computer apparatus and methods may be implemented in other ways. For example, the embodiments of a computer device described above are merely illustrative, e.g., the division of modules or units is merely a logical functional division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
Referring to fig. 15, the above-described integrated units, if implemented in the form of software functional units and sold or used as independent products, may be stored in the computer-readable storage medium 300. Based on such understanding, the technical solution of the present application may be embodied essentially or in part or all or part of the technical solution contributing to the prior art or in the form of a software product stored in a storage medium, including several instructions/computer programs to cause a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor (processor) to perform all or part of the steps of the methods of the embodiments of the present application. And the aforementioned storage medium includes: various media such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk or an optical disk, and electronic devices such as a computer, a mobile phone, a notebook computer, a tablet computer, and a camera having the above-described storage media.
The description of the execution of the program data in the computer-readable storage medium may be described with reference to the above embodiments of the methods of the present application, which are not described herein.
The foregoing description is only exemplary embodiments of the present application and is not intended to limit the scope of the present application, and all equivalent structures or equivalent processes using the descriptions and the drawings of the present application, or direct or indirect application in other related technical fields are included in the scope of the present application.
In summary, the present application has the following beneficial effects:
on the one hand, by utilizing the scheme, the purchasing right is determined in the hands of vast owners by quantifying intangible services such as property service, cleaning, engineering, safety and the like into purchasable products, and the purchasing right is very convenient like going to restaurants and ordering dishes. Meanwhile, three principles of first-line salary are set, post work slicing, refinement and task management are carried out, so that workers can freely select, and the staff can flexibly pay and count the salary. Between clients and staff, through demand communication and mutual recognition, efficiency is improved, and labor cost is reduced
Further, the quantitative service is gradually disassembled from the non-quantitative work in the property industry to the quantitative work, the passive service according to the daily work is converted to the active service provided according to the workload, the output and the income of unit time are improved, reasonable income expectation is established, the addition and the retention of excellent talents in the industry are attracted, and the use efficiency of labor cost is improved through the structural optimization of human resources.
Further, on-line time limit and personnel setting are carried out on the work order nodes to be set based on the work order time limit module and the personnel configuration module, so that automatic flow management of the work order is realized, the efficiency is improved, and the labor cost is reduced.
Further, interaction is performed through the service auditing interaction interface, so that an auditing manager can conduct service auditing, thereby realizing automatic security auditing management of the service, protecting privacy and security of owners, improving efficiency and reducing labor cost.

Claims (10)

1. The safety management method suitable for property management is characterized by comprising the following steps:
displaying a service auditing interaction interface, wherein the service auditing interaction interface is provided with a service list to be audited and corresponding operation items;
receiving a seventh instruction for selecting the service list to be checked by a fourth user and operating the operation item;
obtaining auditing details of the service to be audited corresponding to the operation items in response to a seventh instruction, and displaying the auditing details and the corresponding operation items on the service auditing interactive interface;
receiving an eighth instruction for setting the auditing details by a fourth user and operating the operation items of the auditing details;
And responding to the eighth instruction, obtaining and displaying a service auditing result, and deleting the service to be audited from the service list to be audited.
2. The method of claim 1, wherein,
the list of services to be checked is arranged in chronological order.
3. The method of claim 2, wherein,
the operation items corresponding to the service list to be checked comprise checking and deleting, wherein the deleting is to delete the service to be checked from the service list to be checked.
4. The method for security management as defined in claim 3, wherein,
and the auditing details are displayed on a first page, and the first page is arranged below the service list to be audited.
5. The method of claim 4, wherein,
and displaying the auditing details on a second page, wherein the second page is displayed on a page different from the service list to be audited.
6. The method of claim 5, wherein,
the auditing details include: owner privacy level, server qualification, privacy mask.
7. The method of claim 6, wherein,
The concealment shield comprises: number mask, name mask.
8. The method of claim 1, wherein,
before the service auditing interaction interface is displayed, the method comprises the following steps:
receiving a ninth instruction of fourth user login;
verifying the fourth user in response to the ninth instruction;
the display service auditing interactive interface comprises:
and responding to the verification passing of the fourth user, and displaying a to-be-verified service list matched with the authority of the fourth user and corresponding operation items thereof on the service verification interactive interface.
9. A computer device, comprising:
the device comprises a processor, a memory and a communication circuit, wherein the processor is respectively connected with the memory and the communication circuit;
wherein the communication circuit is for communication connection and the memory is for storing a computer program, and the processor is for executing the computer program to implement the method of any of claims 1-8.
10. A computer readable storage medium, characterized in that a computer program is stored, which computer program is executable by a processor to implement the method of any one of claims 1-8.
CN202211738102.4A 2022-12-31 2022-12-31 Security management method, device and medium Pending CN116126185A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211738102.4A CN116126185A (en) 2022-12-31 2022-12-31 Security management method, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211738102.4A CN116126185A (en) 2022-12-31 2022-12-31 Security management method, device and medium

Publications (1)

Publication Number Publication Date
CN116126185A true CN116126185A (en) 2023-05-16

Family

ID=86295046

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211738102.4A Pending CN116126185A (en) 2022-12-31 2022-12-31 Security management method, device and medium

Country Status (1)

Country Link
CN (1) CN116126185A (en)

Similar Documents

Publication Publication Date Title
CN104200536A (en) Attendance-checking system and attendance-checking method based on wechat platform
CN104066053A (en) Mobile after-sales service method
EP3622394B1 (en) Intelligent cloud management based on profile
CN105243493A (en) Information management system and management method for government affair service hall
CN110503409B (en) Information processing method and related device
CN103903077A (en) Danger source supervision system and method
CN105491102A (en) Intelligent monitoring system based on cloud computing technology and device thereof
CN203415004U (en) Intelligent all-purpose government administration card terminal for labor employment
CN115017484A (en) Access control method and device
CN110910159A (en) Electric power quotation method and terminal equipment
CN109726999A (en) A kind of household services card management system
CN116126185A (en) Security management method, device and medium
CN116205588A (en) Service evaluation method, device and medium
CN116228250A (en) Customer evaluation method, equipment and medium
CN116205441A (en) Intelligent engineering method, equipment and medium
CN116205590A (en) Work order setting method, equipment and medium suitable for property management
CN115373784A (en) Working method of business processing platform, electronic equipment and storage medium
CN115063115A (en) Bank approval process operation method, computer equipment and storage medium
CN110458743B (en) Community management method, device, equipment and storage medium based on big data analysis
KR20090001445A (en) Apparatus of special purpose terminal for researching customer satisfaction index
Dharsono Information System Design on Project Supervision Related to Quality Control Effectiveness Using Android-Based Smartphone Applications
KR20160032401A (en) The Construction Method for After Service Cusotmers Management System
CN112085303A (en) Computer informatization work management system based on wireless network
KR20160015426A (en) Concerts, Cultural Festival, Events Companies in the Planning, Management and Operation of Inter subject The Date Management Method and System for Bidirectional Information
CN113486632B (en) Method and device for recording review opinions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination