A method and system for access control authorization management based on credit information system

A technology of authorization management and access control, which is applied in the direction of transmission system, digital transmission system, data exchange network, etc., can solve the problems of unreasonable management, single authority level and irresponsibility of maintenance staff, so as to reduce operation management cost and manage reasonable effect

Active Publication Date: 2019-07-09
WUHAN FIBERHOME TECHNICAL SERVICES CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. In the current management mode, after the administrator authorizes the maintenance personnel corresponding to each site through the network management server, unless the administrator cancels the authorization, the maintenance personnel will always have the access control authority of the corresponding site; and due to the large number of sites, management Due to the limited energy of the staff, if the authorized authority is only determined by the administrator, it will not be possible to limit the authority of some maintenance personnel with low professionalism in time, and the maintenance personnel with low professionalism will often endanger the Site equipment and property security
[0005] 2. The authority of the maintenance personnel is only determined by the administrator and the authority level is too single. It is impossible to distinguish the business level of the maintenance personnel, and it is impossible to survive the survival of the fittest for a large number of maintenance personnel. Not only is the management unreasonable, but also increases the cost of operation and management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for access control authorization management based on credit information system
  • A method and system for access control authorization management based on credit information system
  • A method and system for access control authorization management based on credit information system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] see figure 1 and figure 2 As shown, the embodiment of the present invention provides a method for access control authorization management based on the credit investigation system, including the following steps:

[0027] Step S1: The maintenance agent completes the registration on the network management server.

[0028] Step S2: The network management server completes the import of the dynamic credit information database. The dynamic credit information database is used to record the authorization level corresponding to each maintenance agent. The level of authorization determines the level of authorization authority of the maintenance personnel, which can be The upper limit of authorized access control and the length of validity period.

[0029] In this embodiment, the authorization levels are divided into three types: 1. Good level: indicates that the maintenance agency has good credit, no accidents and high customer satisfaction; 2. Normal level: indicates that the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access control authorization management method and system based on a credit investigation system and relates to the technical field of smart security protection. The method comprises the steps that maintaining agents finish registering in a network management server; the network management server finishes importing a dynamic credit investigation information base, initializes authorization levels of the maintaining agents finishing registering in the dynamic credit investigation information base, and carries out authorization of corresponding station access control on the maintaining agents; when the maintaining agents initiate door opening application, the network management server searches the authorization levels of the maintaining agents, carries out authority verification after the authorization levels are determined, and judges whether to open access control or not according to an authority verification result and the authorization levels; and after work is finished, the network management server dynamically updates the authorization levels in the credit investigation information base. According to the method and the system, refined management can be carried out on authorization of the maintaining agents, the device property security of the stations is ensured, the management is reasonable, and operation and management costs are reduced.

Description

technical field [0001] The invention relates to the field of intelligent security technology, in particular to an access control authorization management method and system based on a credit investigation system. Background technique [0002] With the increasing progress of Internet technology, the Internet of Things service industry has also ushered in the spring of rapid development, and various intelligent security devices have grown geometrically. At present, the most commonly used is the smart cloud electronic control lock management system, which mainly consists of network management servers, alarm terminals (such as mobile phone alarm terminals held by administrators), maintenance personnel terminals (such as mobile phone terminals held by maintenance personnel) It is composed of work order scheduling system. The network management server authorizes the maintenance agents corresponding to each site (such as outdoor base stations, integrated cabinets, etc.) according t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/06H04L41/28H04L63/10
Inventor 谭敏魏明刘华汉王薪舟
Owner WUHAN FIBERHOME TECHNICAL SERVICES CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products