Unlock instant, AI-driven research and patent intelligence for your innovation.

Visitor management method and related device

A management method and visitor technology, applied in the field of information security, can solve problems affecting visitor user experience, mobile phone leakage, etc.

Pending Publication Date: 2021-03-16
SHENZHEN SKYCOMM CO LTD
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if visitors are prohibited from carrying mobile phones, it will seriously affect the user experience of visitors, and even if visitors are prohibited from using mobile phones to take pictures, record, and make calls, if manual monitoring or machine monitoring is not in place, it will not be able to completely prevent the occurrence of mobile phone leaks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Visitor management method and related device
  • Visitor management method and related device
  • Visitor management method and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0026] The terms "first", "second" and the like in the specification and claims of the present application and the above drawings are used to distinguish different objects, rather than to describe a specific order. Furthermore, the terms "include" and "have", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention discloses a visitor management method and a related device, which are applied to a server. The visitor management method comprise the following steps of: when detectingthat a visitor visits, determining access permission of the visitor according to collected visitor information, wherein the access permission is used for indicating an accessible region of the visitorin an access place; when detecting that the visitor arrives at the accessible region, managing and controlling the use permission of a specified function of a visitor terminal; after the visitor finishes visiting, detecting whether the visitor resides in a visiting region except the accessible region or not; and if not, sending a notification message to the visitor terminal, wherein the notification message is used for authorizing the visitor to leave. According to the visitor management method and the related device of the invention, whether the access of the visitor is legal or not is judged based on the access permission of the visitor, so that the possibility of access place information leakage is reduced.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a visitor management method and related devices. Background technique [0002] At present, mobile phone leaks occur from time to time. In some places where information needs to be kept secret, such as research institutes, laboratories, offices and other places, when visitors visit, the only way is to clearly stipulate that visitors are not allowed to use mobile phones to take pictures, record and make calls. It is even forbidden to carry mobile phones to realize the security control of the place and prevent the occurrence of leaks. However, if visitors are prohibited from carrying mobile phones, it will seriously affect the user experience of visitors, and even if visitors are prohibited from using mobile phones to take pictures, record, and make calls, if manual monitoring or machine monitoring is not in place, mobile phone leaks cannot be completely preve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/25G07C9/27G06K17/00
CPCG07C9/257G07C9/27G06K17/0025
Inventor 戈东侯怀德吴岩潘乐扬
Owner SHENZHEN SKYCOMM CO LTD