Guest information online management method, device and system

A management method and information line technology, applied in the field of traffic security, can solve problems such as advanced visitor restrictions, and achieve the effect of avoiding identity fraud

Inactive Publication Date: 2019-01-18
QIANLIN HENGXING BEIJING TECH
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the embodiments of the present invention is to provide a visitor information online management method, device and system, by receiving visitor information online, and assigning access rights to visitors to distinguish and manage different visitors, solving the problem of high-level visitors Problems with relatively large restrictions when visiting companies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Guest information online management method, device and system
  • Guest information online management method, device and system
  • Guest information online management method, device and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0033] Such as figure 2 As shown, it is a method for online management of visitor information that can be applied to the above-mentioned access control system provided by a preferred embodiment of the present invention. figure 2 The specific process shown will be described in detail.

[0034] Step S10: receiving visitor profile information of the visitor, and generating first verification information according to the visitor profile information.

[0035] Step S20: Send the first verification information to the visitor platform, so that the visitor platform pushes the first verification information to the first client on the visitor side, so that the visitor can obtain the The first verification information.

[0036] Step S30: receiving the identity data entered by the visitor through the access machine or the first client according to the first verification information.

[0037] Step S40: Determine the visitor level of the visitor according to the visitor profile informat...

no. 2 example

[0069] see Figure 4 , the present invention also provides an online visitor information management device 300 to which the online visitor information management method of the first embodiment can be applied. The device includes: a first verification information generating module 301 , a first verification information sending module 302 , an identity data receiving module 303 , a visitor level confirmation module 304 and an access right assignment module 305 . in:

[0070] The first verification information generating module 301 is configured to receive visitor profile information of a visitor, and generate first verification information according to the visitor profile information.

[0071] The first verification information sending module 302 is configured to send the first verification information to the visitor platform, so that the visitor platform pushes the first verification information to the first client on the visitor side, so as to enabling the visitor to obtain ...

no. 3 example

[0076] The present invention also provides an online visitor information management system, which includes: a local visitor host, a visitor platform, a first client on the visitor's side, and an access machine. specific:

[0077] The local visitor host is configured to receive visitor profile information of the visitor, and generate first verification information according to the visitor profile information.

[0078] The local guest host is further configured to send the first verification information to the guest platform.

[0079] The visitor platform is configured to receive the first verification information, and push the first verification information to the first client, so that the visitor can obtain the first verification information.

[0080] The first client is configured to receive the identity data entered by the visitor according to the first verification information, and send the received identity data to a local visitor host.

[0081] The access machine is con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a guest information online management method, device and system. The method is applied to a local guest host computer, including sending the first authentication information toa visitor platform so that the visitor platform pushes the first authentication information to a first client at the visitor side so that the visitor obtains the first authentication information; Receiving identity data inputted by the visitor through the accessor or the first client according to the first authentication information; Determining a visitor level of the visitor according to the visitor profile information; assigning access rights to the identity data for passing through the access device according to the guest level. The access level of the visitor is determined and assignd withdifferent access rights to distinguish and manage the visitor of different levels, and simultaneously the safety management level of the enterprise is improved.

Description

technical field [0001] The present invention relates to the technical field of traffic safety, in particular to a method, device and system for online management of visitor information. Background technique [0002] With the rapid development of social economy, information exchange and business cooperation between enterprises are becoming more and more frequent, and the process of cooperation and exchange usually takes the form of door-to-door visits. However, at present, each enterprise has corresponding access control regulations to prevent arbitrary entry of outsiders. The method of passing the access control is usually to register the visitor information by the security guard at the door, and then confirm with the interviewee by phone, and then issue the corresponding access control card or number plate. For some high-level VIP visitors, they need to be accompanied by security personnel when entering certain core areas of the enterprise, which greatly affects the visito...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/10G07C9/00
CPCG06Q10/10G07C9/37G07C9/38
Inventor 王洪东林丽娜
Owner QIANLIN HENGXING BEIJING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products