User interaction method and device based on access control system

An access control system and user technology, applied in the direction of user identity/authority verification, instruments, time registers, etc., can solve the problem that hidden danger information is difficult to guarantee the authenticity, and achieve the effect of guaranteeing the authenticity

Active Publication Date: 2014-12-24
KINGBIRD COMP SOFTWARE
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Based on this, it is necessary to provide a user interaction method and device based on the access control system for the technical problem that the hidden danger information reported by the floating population is difficult to guarantee the authenticity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User interaction method and device based on access control system
  • User interaction method and device based on access control system
  • User interaction method and device based on access control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0023] Such as figure 1 As shown, in one embodiment, a user interaction method based on an access control system is provided, and this embodiment is described by taking the method applied to an application server as an example. The method specifically includes the following steps:

[0024] Step 102, receiving a login request carrying the first account from the first terminal.

[0025] The first description of the first terminal is used to distinguish it from the second terminal and the third terminal described below. The first terminal can run a specified application client, and the application ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user interaction method based on an access control system. The method comprises the steps as follows: a login request which is sent by a first terminal and carried with a first account number is received; the login request is responded, verification of related access control permission is performed on the first account number, if the verification is passed, the state of the first account number is in an online state, and the first terminal is informed; hidden danger reporting information reported after the first terminal is logged in is received and stored; and a query interface which is used for inquiring the stored hidden danger reporting information and/or statistic data generated according to the stored hidden danger reporting information is provided. According to the user interaction method based on the access control system, through login of the access control system and verification of related access control permission, the identity authenticity of floating population such as tenants and the like using the access control system is guaranteed to a great extent; and the hidden danger reporting information reported after the first terminal logged in is received and stored, so that the authenticity of the reported hidden danger information can be guaranteed to a certain extent. The invention further provides a user interaction device based on the access control system.

Description

technical field [0001] The invention relates to the technical field of access control, in particular to a user interaction method and device based on an access control system. Background technique [0002] With the gradual deepening of the life of the floating population in the city, the floating population expands different life and development needs in the city. Many of the floating population have the intention to stabilize and have the need to integrate into the local life. The floating population's awareness of equal participation and rights protection Awareness has also been continuously enhanced, and the floating population also has rights and obligations such as expressing needs and reporting hidden dangers. However, precisely because of the mobility of the floating population, the management of the floating population itself is a difficult problem, making it difficult to guarantee the authenticity of the hidden danger information reported by the floating population....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00H04L9/32
Inventor 叶建辉
Owner KINGBIRD COMP SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products