CN115907931A - Novel Internet house renting management method - Google Patents

Novel Internet house renting management method Download PDF

Info

Publication number
CN115907931A
CN115907931A CN202211178341.9A CN202211178341A CN115907931A CN 115907931 A CN115907931 A CN 115907931A CN 202211178341 A CN202211178341 A CN 202211178341A CN 115907931 A CN115907931 A CN 115907931A
Authority
CN
China
Prior art keywords
information
data
house
key
management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211178341.9A
Other languages
Chinese (zh)
Inventor
杨刚
苏文辉
水军
杨静
李小祥
王庆
曾仲樑
黄树文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Xindehui Information Technology Co ltd
Original Assignee
Zhuhai Xindehui Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Xindehui Information Technology Co ltd filed Critical Zhuhai Xindehui Information Technology Co ltd
Priority to CN202211178341.9A priority Critical patent/CN115907931A/en
Publication of CN115907931A publication Critical patent/CN115907931A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a novel Internet house renting management method, which comprises the following steps: s1, a rented house operator registers unit information, department information and house source information hung on a contracted house platform; s2, initiating relevant department examination and approval of the house source information needing to be examined; s3, carrying out standardized management on the units and departments of the rental house operator; s4, obtaining order information of the network contract house platform; s5, registering and authenticating the tenants; s6, registering and check-in; s7, order condition verification, and key verification, wherein whether the living people are key people with specific responsibility is judged, and key person labels are set and marked for the key people; s8, finishing the room returning, room changing or renting of the people who live in and forming records; s9, pushing a message notice to a user for reference; and S10, forming a statistical form. The invention can effectively solve the pain points of difficult checking of the house resources of the cyber-contracting rooms, difficult registration of real people, difficult investigation of hidden dangers and the like.

Description

Novel Internet house renting management method
Technical Field
The invention relates to the technical field of house renting management, in particular to a novel internet house renting management method.
Background
Under the promotion of economic development, the urban and rural development speed is gradually increased, and a large number of people rush into cities. In solving the living problem of floating population, a rental house occupies an important position in a city.
Traditional management of rented houses usually relies on manual management, such as: manual release of lease information, manual house-watching with a leaser, manual lease and manual house-recycling, and the like, and the work efficiency is low.
The existing network contract room platform enables the rented room masses to check out the rented room information through the network contract room platform and then live in. However, the network contract room has the static management problems of difficult house source check, difficult actual resident registration, difficult hidden danger troubleshooting and fuzzy verification base number, and simultaneously, the network contract room cannot effectively manage the conditions of contradiction disputes and complaints caused by prominent potential safety hazards, lack of standardized management and moral order and the like.
Disclosure of Invention
The invention aims to provide a novel Internet house renting management method, which can effectively solve the pain points of difficult house source check, difficult real person registration, difficult hidden danger troubleshooting and the like of a net contracted house.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows.
The novel Internet house renting management method comprises the following steps:
s1, a rented house operator registers unit information, department information and house source information hung on a contracted house platform;
s2, the management platform manages the registered house resources and initiates relevant departments to examine and approve the house resource information needing to be examined and approved;
s3, the management platform carries out standardized management on the units and departments of the rental house operator;
s4, the management platform is in butt joint with each large contracted building platform interface to obtain order information of the contracted building platform;
s5, registering and authenticating the management platform by a house renting crowd of the network contracting house platform;
s6, the front desk of the out-of-house renter operator acquires information of the house renter crowd in a code scanning mode, and fills and submits check-in registration information after field check is completed;
s7, the management platform checks the order condition according to the submitted registration check-in information and the obtained order information, and mainly checks whether the check-in crowd is a key person with specific responsibility, sets and marks a key person label for the key person, and carries out classification desensitization storage on the verified personal relevant basic information data and the marked label data;
s8, finishing the room returning, room changing or renting of the people on the management platform and forming records;
s9, the management platform pushes various notifications to the user in a message mode to be referred by the user;
and S10, the management platform compares and analyzes the data on the management platform, deduces an incidence relation and a trend prejudgment according to the collision trend of the key characteristic value and the overlapping condition of the relation elements and forms a statistical form so as to facilitate tracking, analysis and real-time follow-up of specific measures and prevent potential safety hazards.
Preferably, in step S2, before initiating the approval of the relevant department, the house source information to be initiated for the audit is confirmed again, and if the house information needs to be modified, the "house source modification" is clicked to complete the information adjustment.
Preferably, the unit management in step S3 is: the unit accurate search can be carried out through the unit/operation name, the registration type, the identity, the state and the registration time of a registered person, the newly added unit is clicked, and the modification and logout operations of the modified and logout unit are clicked; when the record in the state of 'to be confirmed' can be subjected to 'withdrawing', the process is withdrawn to the initiator after the record is withdrawn, and the withdrawn document can be subjected to modification, submission and deletion operations; the addition of the employees and the managers can be completed in corresponding units by clicking the 'newly added employees' or the 'managers';
the department management can start to search for departments accurately by department names, department responsible persons, identity categories and registration time; clicking 'newly added' to finish the newly added department, clicking 'modified' and 'deleted' to finish the modification and cancellation operation of the department; clicking the 'newly added staff' or the 'administrator' can finish adding the staff and the administrator in the corresponding unit.
Preferably, in the step S4, the order information may be searched and queried on the management platform through the order number, the name of the house operator, or the name information of the subscriber.
Preferably, in the step S5, a face intelligent recognition technology is adopted to perform real-name authentication, and identity data related to the identification information is encrypted, decrypted, signed and signed-checked, so that multiple encryption of the data is completed, and the integrity and privacy of the information are ensured;
the identity data is encrypted and decrypted by an asymmetric encryption method;
the identity data uses an asymmetric encryption method to judge whether the original text is tampered by comparing message digests to finish signing and signature verification;
the multiple encryption of the data generates a dynamic key by dynamically selecting a primary encryption algorithm, and hash calculation is carried out on the dynamic key and the encrypted data by utilizing a hash algorithm; meanwhile, a secondary encryption algorithm is dynamically selected by using a fixed key, an encryption key is generated by encrypting a dynamic key, and information of a generated information header and a data area and encapsulated data are used for ensuring that the encryption results of the same data are different each time.
Preferably, the step S6 of obtaining the tenant information in a code scanning manner is as follows: the foreground acquires the personal basic information code recorded with the personal basic information of the single person under the network contract room platform through the management platform and avoids repeated filling by scanning the personal basic information code and associating the personal basic information.
Preferably, the step S7, the management platform checks the order condition according to the submitted check-in information and the obtained order information as follows: gathering registered check-in information data and order information data, checking personnel key information and carrying out multidimensional analysis, calling a personal basic information code to obtain personal related basic information data;
the key point verifies whether the living people are key persons with specific responsibilities and sets and marks key person labels for the key persons as follows: the management platform is in butt joint with the key person system, and the personnel information is synchronously updated through regular/irregular data; generally, a key person with specific responsibility is taken as a core, the identity basic information and the association of a specific scene are compared and analyzed, and key person labels are set and marked for the key person; in the process of the key people's check-in, the public safety influence degree is judged through the verification of the label information so as to reserve a coping strategy; the key person labels comprise abnormal related records A, abnormal related records B, abnormal related records C and abnormal related scenes and state abnormalities;
the personal relevant basic information data adopts an invalidation desensitization mode; and the tag class data adopts a symmetric encryption desensitization mode.
Preferably, the specific method of step S10 is:
s101, determining a key characteristic value: according to the business requirements, a key characteristic value library is established, basic data are structured, structured data are characterized, key characteristic values of the basic data are established for reading and tracking, and the characteristic value library is convenient to call and analyze data after aggregation;
s102, data collision and comparison analysis.
Preferably, the specific steps of step S102 are:
s1021, determining key features, namely, determining the key features as basic clue data to clarify specific elements of the key features;
s1022, determining the range of data collision, namely planning a comparison boundary;
s1023, comparing and analyzing the intersection data by data collision comparison; taking multiple data intersections as breakthrough directions of key clues;
s1024, classifying and converging data;
and S1025, forming an analysis report.
Due to the adoption of the technical scheme, the technical progress of the invention is as follows.
The invention actively follows the development trend of economic society through the established novel house renting management method of the Internet, actively explores the thought, method and measure of the new-state service management of the cyber-contracted house, develops the construction of the cyber-contracted house intelligent management and control platform, realizes the real-name system supervision of the cyber-contracted house, realizes the rapid convergence and information storage of the real-name, real-number, real-situation and real-time accommodation information of the cyber-contracted house, realizes the traceability of the information of the inhabitants, further promotes the full coverage of the cyber-contracted house real-name registration, effectively solves the pain point of the cyber-contracted house, effectively breaks the pain points of difficult checking of the house source, difficult registering of the real person, difficult troubleshooting of hidden danger and the like, and provides a stable social security environment and a good operator environment for accelerating city construction.
Drawings
FIG. 1 is a block flow diagram of the present invention;
FIG. 2 is a block diagram of the key person tag of the present invention;
FIG. 3 is a block diagram of a data collision and alignment analysis process according to the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
An internet novel house renting management method is shown in fig. 1, and comprises the following steps:
s1, a rented house operator registers unit information, department information and house source information on a network contracted house platform.
And the collection of unit information, department information and house source information on a network contracted house platform rented by a rented house operator is completed through information registration.
And S2, the management platform manages the registered house resources and initiates relevant department examination and approval on the house resource information needing to be examined and approved.
The house source information is collected and sorted through house source management, a house source to be issued and a house source to be checked are formed for an unverified house source, relevant personnel check collected house source declaration information on the background by initiating relevant department examination and approval, and the house source information is preliminarily examined and approved to form examination and approval records so as to ensure the accuracy and reliability of the house source (house) information.
The house resource management can realize the reconfirmation of house resource information needing to be audited, if the house resource information needs to be modified, the 'house resource modification' is clicked to complete the information adjustment. After the house source (house) information is approved, the approval information can be checked in the house source information, and the house source (house) information comprises the following components: address information of the house source, basic information of the house source, a photograph of the house source, house source information and other information (including approval information).
And S3, the management platform carries out standardized management on the units and departments of the out-renting house operator.
Unit management: unit accurate search can be carried out through unit/operation names, registration types, registrant identities, states and registration time; clicking the newly added finishing unit, and clicking the modification and cancellation operation of the modification and cancellation finishing unit; meanwhile, the record with the state of 'to be confirmed' can be subjected to 'withdrawing', if the record is withdrawn, the process is withdrawn to the initiator, and the withdrawn documents can be subjected to modification, submission and deletion operations; clicking the 'newly added staff' or the 'administrator' can finish adding the staff and the administrator in the corresponding unit.
Department management: department accurate search can be performed by starting with the department name, the department responsible person, the identity category and the registration time; clicking 'adding' to finish the new adding of the department, clicking 'modifying' and 'deleting' to finish the modifying and logout operations of the department; clicking the 'newly added staff' or the 'administrator' can finish adding the staff and the administrator in the corresponding unit.
And S4, the management platform is in butt joint with each large contracted building platform interface to obtain order information of the contracted building platform.
And (3) connecting interfaces of all large network contract platforms, and searching and inquiring the order information on the management platform according to the order number, the name of a house operator, the name of a reservation person and other information of the order information synchronized by the management platform, so that information display and specific detail check are performed on the management platform.
And S5, registering the management platform and authenticating the real name by the house renting people of the network contracting house platform.
Aiming at the conditions that the registration of a person who enters the house is difficult, the information checking process is complex, and the information is missing, wrong and missed, in the process of registering the person, the person identity is checked by adopting a face energy recognition technology and relying on the biological feature recognition of the face, namely the real-name authentication of the person is realized, and the 'verification and the body righting' of the person identity is completed.
And the identity data related in the identification information is encrypted, decrypted, signed and checked, so that multiple encryption of the data is completed, and the integrity and the privacy of the information are ensured.
The identity data is encrypted and decrypted by an asymmetric encryption method, completely different secret keys are used in the encryption and decryption process, and the encrypted file is opened by taking a public key and a private key as centers. The public key can be used publicly, but the private key needs to be kept by an owner and has absolute confidentiality.
After the data receiving party receives the data, the private key stored by the data receiving party must be input to complete the decryption process, so that the possibility that the data is stolen or intercepted in the key transmission process is effectively avoided. Similarly, the asymmetric encryption method is used for judging whether the original text is falsified by comparing the message digests to complete the whole process of signature and signature verification, and the method comprises the following steps:
1) And the signer distributes the signature verification public key to the message receiver.
2) And the signer uses the private signature key to generate a signature for the data.
3) The signer communicates the data and the signature to the message recipient.
4) And after the message receiver obtains the data and the signature, the validity of the signature is verified by using the public key aiming at the data.
For the problem of data multiple encryption, a dynamic key is generated by dynamically selecting a one-time encryption algorithm, and the hash algorithm is utilized to perform hash calculation on the dynamic key and the encrypted data. Meanwhile, a secondary encryption algorithm is dynamically selected by using a fixed key, an encryption key is generated by encrypting a dynamic key, information of an information header and a data area is generated, and the same data is ensured to have different encryption results each time by packaging the data, so that the security of the data is greatly improved.
And S6, acquiring the information of the tenants by the front desk of the tenant operator in a code scanning mode, and filling and submitting the check-in registration information after the on-site check is completed.
The foreground acquires the personal basic information code recorded with the personal basic information of the single person under the network contract room platform through the management platform and avoids repeated filling by scanning the personal basic information code and associating the personal basic information. For example, the ordering personnel are mobile residents in Guangdong province, association is carried out by acquiring personal basic information of Guangdong residence codes of the residents, repeated filling of the basic information is avoided, the use experience of the network appointment rooms is improved, and the network appointment rooms are rapidly handled and handled by bright codes.
And S7, the management platform checks the order condition according to the submitted registration check-in information and the obtained order information, and mainly checks whether the check-in crowd is a key person with specific responsibility, sets and marks a key person label for the key person, and performs classification desensitization storage on the verified individual related basic information data and the marked label data.
Gathering data such as registered check-in information and network contract room order information, check-in personnel, check-in houses and the like acquired by a network contract room platform, checking and multidimensional analysis through personnel key information, calling a personal basic information code to acquire personal related basic information data, calling Guangdong code personal basic information if the Guangdong province region is concerned, calling Guangdong code decryption service to acquire personal related basic information data when the Guangdong code is checked, generating a two-dimensional code by the encryption and signature data after the check is passed, and then scanning, decoding and checking the whole process.
People with specific responsibilities have unstable factors and can become unstable factors damaging the public environment, and a common check-in management system cannot judge and analyze whether check-in people are key people with specific responsibilities, so that a specific scene or an emergency is easily caused to burst. The management platform is in butt joint with the key person system, and the personnel information is synchronously updated through regular/irregular data. Generally, with a key person having a specific responsibility as a core, performing comparative analysis on the identity basic information and the association of a specific scene, and setting and marking key person labels for the key persons, for example: abnormal record A, abnormal record B, abnormal record C, abnormal condition and special scene, etc. as shown in FIG. 2. During the process of the key people's check-in, the public safety influence degree is judged through the verification of the label information so as to reserve the coping strategy.
And (3) carrying out classification desensitization storage on the verified personal related basic information class data and the marked label class data, namely, different data characteristic values are processed in different desensitization modes:
1) And (3) adopting an invalidation desensitization mode for the human-related basic information data.
Under the condition of determining a desensitization rule and a policy, the sensitive data is desensitized, namely privacy removal, by truncating, encrypting and hiding the data value of the designated field. For example, using special characters (, x) instead of real values prevents data from leaking in unsafe situations, as shown in the table below.
Serial number Name (I) Identity card number Time of arrival
1 Zhang Xiao 440102********1234 2022/5/15
2 Wang Fang 440105********5678 2022/5//10
3 Zhao Xiaogang 440108********9012 2022/4//11
2) And (4) adopting a symmetric encryption desensitization mode for the label data.
On the premise of ensuring the security, the sensitive data is encrypted through an encryption algorithm, as shown in the following table, the ciphertext format is kept consistent with the original data in the logic rule, and the original data can be recovered and checked through key decryption.
Serial number Name (I) Telephone number Time of arrival Type of label
1 Zhang Xiao 15012345678 2022/5/15 aertagna8sg
2 Wang Fang 15012345679 2022/5/10 riw4gjeretw
3 Zhao Xiaogang 15012345680 2022/4/11 ghaoira0wfa2
And S8, finishing the room returning, room changing or renting of the people on the management platform and forming records.
If people live in the house to change the house or renew the lease, the house changing or renewing operation can be completed in one step according to the actual demand, which is as follows:
room changing: the people who live in the house with the state of 'effective' can change the house, and only one record in the list can be selected when changing the house, click 'change the house' to pop up other room numbers under the corresponding address for the people to select, the selection is determined to be successful, a prompt of 'will change the house to the room', the current residence information is automatically cancelled, and whether the residence information continues? "; the original recorded information is in a log-off state; whether the house number is the same as the original house number or not needs to be judged, if yes, the fact that the house number is the same as the original house number is prompted, and the user needs to reselect. "is used.
Renewing lease: the renting of the entering masses with the state of valid can be continued, the system displays the initial time of the original renting, and the start time of the renting can only select the date after the time of the original ending of the renting. And selecting and determining the renewal start time and the renewal end time, and finishing the renewal process after clicking 'submit'.
And S9, the management platform pushes various notifications to the user in a message mode to be referred by the user.
The notification of the management platform is pushed to the user for looking up in a message mode, the user can look up various messages and notifications pushed by the management platform in the message notification, and the specific notification mode and the looking up mode are as follows:
the notification mode comprises the following steps: the new messages are displayed in a navigation bar of a page 'message notification' in a red icon mode, the number of the new messages is automatically accumulated under the condition that a user does not read the new messages, and the notification icon disappears after the user finishes looking up the messages.
The consulting mode is as follows: the user can carry out accurate search through the message title, the message state and the message time, the new messages are arranged in a time-reverse-narrative mode, and the user can conveniently look up the previous new message and the next new message on the message page.
And S10, the management platform compares and analyzes the data on the management platform, deduces an incidence relation and a trend prejudgment according to the collision trend of the key characteristic value and the overlapping condition of the relation elements and forms a statistical form so as to facilitate tracking, analysis and real-time follow-up of specific measures and prevent potential safety hazards.
The specific method comprises the following steps:
s101, determining a key characteristic value: according to the business requirements, a key characteristic value library is established, basic data are structured, structured data are characterized, key characteristic values of the basic data are established for reading and tracking, and the characteristic value library is converged to facilitate calling and data analysis.
S102, data collision and comparison analysis.
As shown in fig. 3, the steps and descriptions of the data collision and comparison are as follows:
s1021, determining key features, namely, determining the key features as basic clue data to clarify specific elements of the key features;
and S1022, determining the data collision range, namely planning a comparison boundary. Such as check-in data or check-out data between certain specials, age characteristics, gender characteristics of certain designated room-type users, etc.
And S1023, comparing data collision, namely, comparing and analyzing intersection data. Because of the diversity of the key feature values, multiple data intersections in the comparison process may be used as breakthrough directions of key clues.
And S1024, classifying and converging the data, namely summarizing and summarizing.
And S1025, forming an analysis report.
And a statistical report is formed on the characteristic value analysis condition, so that the tracking, analysis and real-time follow-up of specific measures are facilitated.
When the system is used, a new ecological security element, namely the network contract room, is mastered in real time through a novel Internet room renting management mode, the supervision loopholes are blocked, the management and control of the security element are strengthened, the management capability of the network contract room is practically improved, the current situation that the network contract room is difficult to manage is improved, and the more standard and healthy development of the network contract room industry management is promoted.
The invention provides related management for unit information and department information of a leased house operator and house source information on a network contracted house platform, provides verification of registration, forms a house source to be issued and a house source to be checked for an unchecked house source, and leads related personnel to check the house source declaration information collected by the system at the background and preliminarily approve the house source information to form an approval record to ensure high reliability of the house source. Meanwhile, the management system can carry out standardized management on the operators of the rented houses as units, and realizes real-name check-in supervision, safety supervision and site management and control implementation of the network contracted houses.

Claims (9)

1. The novel Internet house renting management method is characterized by comprising the following steps: the method comprises the following steps:
s1, a rented house operator registers unit information, department information and house source information hung on a contracted house platform;
s2, the management platform manages the registered house resources and initiates relevant departments to examine and approve the house resource information needing to be examined and approved;
s3, the management platform carries out standardized management on the units and departments of the rental house operator;
s4, the management platform is in butt joint with each large contracted building platform interface to obtain order information of the contracted building platform;
s5, registering and authenticating the management platform by a house renting crowd of the network contracting house platform;
s6, the house hiring operator foreground acquires the information of the house hiring people in a code scanning mode, and fills and submits check-in registration information after field check is completed;
s7, the management platform checks the order condition according to the submitted registration check-in information and the obtained order information, and mainly checks whether the check-in crowd is a key person with specific responsibility, sets and marks a key person label for the key person, and carries out classification desensitization storage on the verified personal relevant basic information data and the marked label data;
s8, finishing the room returning, room changing or renting of the people on the management platform and forming records;
s9, the management platform pushes various notifications to the user in a message mode to be referred by the user;
and S10, the management platform compares and analyzes the data on the management platform, deduces an incidence relation and a trend prejudgment according to the collision trend of the key characteristic value and the overlapping condition of the relation elements and forms a statistical form so as to facilitate tracking, analysis and real-time follow-up of specific measures and prevent potential safety hazards.
2. The internet novel house renting management method according to claim 1, characterized in that: and in the step S2, before the approval of the relevant department is initiated, the house source information needing to be initiated and audited is confirmed again, and if the house information needs to be modified, the house source is clicked to complete the information adjustment.
3. The internet novel house renting management method according to claim 1, characterized in that: in the step S3, the unit management is: the unit accurate search can be carried out through the unit/operation name, the registration category, the identity, the state and the registration time of a registered person, the newly added unit is completed by clicking, and the modification and logout operations of the unit are completed by clicking the modification and the logout; when the record in the state of 'to be confirmed' can be subjected to 'withdrawing', the process is withdrawn to the initiator after the record is withdrawn, and the withdrawn document can be subjected to modification, submission and deletion operations; the addition of the employees and the managers can be completed in corresponding units by clicking the 'newly added employees' or the 'managers';
the department management can start to search for departments accurately by department names, department responsible persons, identity categories and registration time; clicking 'newly added' to finish the newly added department, clicking 'modified' and 'deleted' to finish the modification and cancellation operation of the department; clicking the 'newly added staff' or the 'administrator' can finish adding the staff and the administrator in the corresponding unit.
4. The internet novel house renting management method according to claim 1, characterized in that: in the step S4, the search and query of the order information can be realized on the management platform through the order number, the name of the house operator, or the name information of the subscriber.
5. The internet novel house renting management method according to claim 1, characterized in that: in the step S5, a face intelligent recognition technology is adopted for real-name authentication, and identity data related to the recognition information is encrypted, decrypted, signed and checked to finish multiple encryption of the data and ensure the integrity and the privacy of the information;
the identity data is encrypted and decrypted by an asymmetric encryption method;
the identity data uses an asymmetric encryption method to judge whether the original text is tampered by comparing message digests to finish signing and signature verification;
the multiple encryption of the data generates a dynamic key by dynamically selecting a primary encryption algorithm, and hash calculation is carried out on the dynamic key and the encrypted data by utilizing a hash algorithm; meanwhile, a secondary encryption algorithm is dynamically selected by using a fixed key, an encryption key is generated by encrypting a dynamic key, and information of a generated information header and a data area and encapsulated data are used for ensuring that the encryption results of the same data are different each time.
6. The internet novel house renting management method according to claim 1, characterized in that: the step S6 of obtaining the tenant information in a code scanning manner is as follows: the foreground acquires the personal basic information code recorded with the personal basic information of the single person under the network contract room platform through the management platform and avoids repeated filling by scanning the personal basic information code and associating the personal basic information.
7. The internet novel house renting management method according to claim 1, characterized in that: in step S7, the management platform checks the order condition according to the submitted registration check-in information and the obtained order information as follows: gathering registered check-in information data and order information data, and calling personal basic information codes to obtain personal related basic information data through personnel key information checking and multidimensional analysis;
the key point verifies whether the living people are key persons with specific responsibilities and sets and marks key person labels for the key persons as follows: the management platform is in butt joint with the key person system, and personnel information updating is completed synchronously through regular/irregular data; generally, a key person with specific responsibility is taken as a core, the identity basic information and the association of a specific scene are compared and analyzed, and key person labels are set and marked for the key persons; in the process of the key people's check-in, the public safety influence degree is judged through the verification of the label information so as to reserve a coping strategy; the key person labels comprise abnormal related records A, abnormal related records B, abnormal related records C and abnormal related scenes and state abnormalities;
the personal relevant basic information data adopts an invalidation desensitization mode; and the tag class data adopts a symmetric encryption desensitization mode.
8. The internet novel house renting management method according to claim 1, characterized in that: the specific method of the step S10 is as follows:
s101, determining a key characteristic value: according to the service requirements, a key characteristic value library is established, basic data are structured, structured data are characterized, key characteristic values of the basic data are established for reading and tracking, and the characteristic value library is convenient to call and analyze data after aggregation;
s102, data collision and comparison analysis.
9. The internet new house renting management method according to claim 8, characterized in that: the specific steps of step S102 are:
s1021, determining key features, namely, determining the key features as basic clue data to clarify specific elements of the key features;
s1022, determining the range of data collision, namely planning a comparison boundary;
s1023, comparing data collision, namely comparing and analyzing intersection data; taking multiple data intersections as breakthrough directions of key clues;
s1024, classifying and converging data;
and S1025, forming an analysis report.
CN202211178341.9A 2022-09-23 2022-09-23 Novel Internet house renting management method Pending CN115907931A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211178341.9A CN115907931A (en) 2022-09-23 2022-09-23 Novel Internet house renting management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211178341.9A CN115907931A (en) 2022-09-23 2022-09-23 Novel Internet house renting management method

Publications (1)

Publication Number Publication Date
CN115907931A true CN115907931A (en) 2023-04-04

Family

ID=86475048

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211178341.9A Pending CN115907931A (en) 2022-09-23 2022-09-23 Novel Internet house renting management method

Country Status (1)

Country Link
CN (1) CN115907931A (en)

Similar Documents

Publication Publication Date Title
US20200183654A1 (en) Data processing systems for identity validation of data subject access requests and related methods
WO2021184836A1 (en) Method and apparatus for training recognition model, device, and readable storage medium
CN111460495B (en) Data hierarchical management system and method
CN111079197B (en) Audit result data storage method and device, electronic equipment and medium
CN108122109B (en) Electronic credential identity management method and device
WO2020182005A1 (en) Method for information processing in digital asset certificate inheritance transfer, and related device
US11386224B2 (en) Method and system for managing personal digital identifiers of a user in a plurality of data elements
CN110689415B (en) Public resource transaction platform management system
CN103745156B (en) Method and device for prompting risk information in search engine
US20020157006A1 (en) Signature verifying method and its apparatus
JP2003196476A (en) Security policy creation support system and security measure determination support system
CN113326488A (en) Personal information protection system and method
CN116720824B (en) Electronic license library management system and method based on blockchain
CN110648443B (en) Access control verification method, device, equipment and medium
CN115907931A (en) Novel Internet house renting management method
CN115756255A (en) Method, device and equipment for processing equipment parameters of parking lot equipment and storage medium
CN115758456A (en) Engineering supervision data management method, system and storage medium
CN109636578A (en) Risk checking method, device, equipment and the readable storage medium storing program for executing of credit information
CN113271591B (en) Two-standard four-real data encryption interaction method and device based on 5G slice network
CN114706932A (en) Method and system for encryption desensitization and query of geographic information
CN113807679A (en) Management system for park law enforcement
CN106658396A (en) Self-organizing method based on mobile terminal and device thereof
CN113378241B (en) Safety technology protection engineering design system and method
US20230308450A1 (en) Authentication management computer for identity authentication, and identity authentication system and identity authentication method using authentication management computer
CN112069231B (en) User information processing method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination