Detailed Description
Features and exemplary embodiments of various aspects of the present invention will be described in detail below, and in order to make objects, technical solutions and advantages of the present invention more apparent, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not to be construed as limiting the invention. It will be apparent to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present invention by illustrating examples of the present invention.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The following describes an intelligent management method, apparatus and system according to an embodiment of the present invention in detail with reference to the accompanying drawings.
The visitor intelligence management method provided by the embodiment of the invention can be applied to a visitor intelligence management apparatus, and fig. 1 is a schematic structural diagram of a specific application example of the visitor intelligence management apparatus according to an embodiment of the invention. As shown in fig. 1, the visitorintelligent management apparatus 200 is capable of information interaction with thevisitor terminal 10 and theaddressee terminal 20. The visitor may be a person of the enterprise, such as a client, a partner, a maintenance person, etc. who needs to access an employee inside the enterprise, i.e., an initiator of the visitor's behavior. The interviewee is an internal employee of the enterprise and is also a demand party needing to apply the intelligent visitor management method.
Thevisitor terminal 10 and thevisitor terminal 20 may be mobile or fixed terminals such as a mobile phone and a tablet computer, and a user may implement the visitor intelligent management method according to the embodiment of the present invention by installing an intelligent visitor intelligent management APP, other client application software, or accessing a web page supporting HTML 5. Further, in some embodiments, the guestsmart management apparatus 200 may be integrated in theinterviewee terminal 20 or a server inside an enterprise. Of course, the visitor intelligent management method can also be directly realized by matching the server of the enterprise with the visitors and the mobile terminals held by the visitors.
The intelligent visitor management device provided by the embodiment of the invention can be applied to office places of enterprises such as group companies, bases, professional institutions and the like so as to meet the requirement of visitor management of each office place. The address book of an enterprise can be maintained reasonably by using the registration information data of the visitors, so that the management efficiency of the visitors is improved, and the risk of missing customer information and the subsequent potential communication cost are reduced.
FIG. 2 is a flow diagram illustrating a guest intelligence management method provided according to one embodiment of the present invention. As shown in fig. 2, the visitor intelligence management method in the present embodiment includes the following steps.
And step S101, obtaining visitor information and an access request input by a visitor.
When a visitor needs to access an employee inside a business, the visitor information and an access request input by the visitor need to be acquired first. The visitor information includes: the name, the mobile phone number, the company name, the job title, the ID card number and other information of the visitor. And the access request includes: the name, department, mobile phone number and the like of the interviewee (namely, the staff in the enterprise).
The method for acquiring the visitor information and the access request of the visitor comprises the following steps: and providing a form for the visitor, wherein the listed items in the form comprise the visitor information and various contents in the access request, and when the visitor completes the listed items in the form correspondingly, the form filled by the visitor needs to be received. The visitor information and the access request can be collected through the form. In addition, the integrity and accuracy of each content filled in the form can be verified, if the visitor has wrong filling or incomplete filling information, the visitor can be prompted to re-input, and if the filling is correct and complete, the next operation can be carried out according to the visitor information and the access request.
In one specific example, for example, the interviewee is a person employee A in a power company who is responsible for putting a developed product into production, and the visitor is a person employee B in a market division of a device supplier. When the employee B communicates with the corresponding research and development product from the certain power company, the employee A needs to be visited. At this moment, the employee B can download the visitor intelligent management APP or log in the visitor intelligent management webpage for operation in a mode of scanning the two-dimensional code. Specifically, the visitor intelligent management APP or the log-in visitor intelligent management page may display a "visitor application" button to the visitor, and after the visitor clicks the button, an access trigger instruction from the visitor is received. And then providing a form capable of recording visitor information and an access request for the visitor, acquiring the form filled with the name, the mobile phone number, the identity number, the company name and the post of the visitor and the name, the department and the mobile phone number of the employee A, and initiating an access application to the employee A after detecting that the visitor clicks a 'submit' button. If the information is completely filled, the success of submission is displayed, and if the information is not completely filled, the visitor is prompted to further supplement and perfect the corresponding information.
In an alternative embodiment, the guest intelligence management method may be implemented directly by a server of the enterprise. At this time, after the server of a certain power company receives an access trigger instruction from a visitor, the server sends visitor information to be collected and a collection instruction of an access request to the employee B. Illustratively, the visitor may be asked to reply with a short message "name + mobile phone number + identification number + company name + post; the name of the visitor, the department and the mobile phone number so that the server of the enterprise executes the next operation after collecting the visitor information and the access request.
And S102, analyzing the visitor information to acquire the identity identification information and the additional identity information of the visitor.
The visitor information acquired in step S101 is parsed in accordance with a predetermined format specification to identify the identification information and the additional identification information contained therein from among the plurality of items of content contained in the visitor information. The identification information refers to information that can distinguish the identity of a visitor among a plurality of items of information contained in the visitor information, for example: one or more of a name, a cell phone number, and a company name. And the additional identity information refers to information contained in the guest information other than the identification information, such as: one or more of name, mobile phone number, identification number, company name and post.
For example, a device supplier typically provides a mobile phone to an employee in the market segment, so that the mobile phone number used by employee b should be identification information that identifies the identity of the employee assigned by the device supplier (i.e., employee b) for employee a. Therefore, the identity identification information of the employee B included in the access information is a mobile phone number; and the additional identity information of employee b includes: name, identification number, company name and job title. In other exemplary embodiments, the visitor identification information included in the visitor entered access information may also be a name and a company name, for example, when a device supplier typically assigns a fixed employee to access an electric power company, the employee b identification information is the name and the company name. The reason why the identification information may be a mobile phone number or a name and a company name is that the mobile phone number is unique to the visitor because the mobile phone number is unique. However, if the identification information is simply a name or a company name, in some special cases, there is a high possibility that the same company name or coincidence of the same name cannot accurately distinguish the identity of the visitor, so the identification information may also be in the form of a combination of a name and a company name.
Step S103, accessing the pre-stored address list by using the identification information.
After the identification information and the additional identification information in the visitor information are acquired, the acquired identification information can be used for accessing a pre-stored address book (hereinafter referred to as an address book) of the visitor so as to check whether the address book contains the additional identification information corresponding to the identification information input by the visitor, namely whether the address book stores contact information of the visitor. Of course, the address book may be stored in the mobile terminal of the addressee or in the server of the enterprise, corresponding to the above-described embodiment.
According to the embodiment in the step S102, the identification information is the mobile phone number of the employee b, and in this step, the address book of the employee a of the addressee is accessed by using the mobile phone number of the employee b. Whether the contact information corresponding to the mobile phone number of the employee B is stored in the address book of the employee A is inquired, for example, a mode of traversing the pre-stored contact information in the address book can be adopted, and certainly, the pre-stored address book can be accessed to search in other modes.
And step S104, when the identity identification information exists in the address book, comparing whether the additional identity information input by the visitor is consistent with the additional identity information corresponding to the identity identification information in the address book.
And step S105, when the additional identity information input by the visitor is inconsistent with the additional identity information corresponding to the identity identification information in the pre-stored address book, updating the additional identity information in the pre-stored address book by using the additional identity information input by the visitor so as to update the pre-stored address book.
When the identification information of the visitor exists in the address book, whether the additional identification information contained in the visitor information input by the visitor is consistent with the stored additional identification information corresponding to the identification information of the visitor in the address book needs to be compared.
In the specific implementation process, the address book of the addressee is retrieved mainly by using the identification information of the visitor, and the query result is returned to execute the next action. The query results may be represented in numbers, letters, or other characters or strings. For example, the query result may be represented by a number 0 or 1, after querying the address book, if 1 is returned, the identification information indicating that the visitor exists in the address book, and whether the additional identification information included in the visitor information input by the visitor is consistent with the additional identification information corresponding to the identification information input by the visitor in the address book needs to be further compared; if 0 is returned, the identification information indicating that the visitor does not exist in the address book prestored in the addressee, and the following step S110 or steps S111 to S114 may be further performed.
Illustratively, employee b of the market department, for example, the equipment provider mentioned above, is taken over the original employee c (and the contact information of employee c, such as name, mobile phone number, identification number, company name and job, is already stored in the address book pre-stored in employee a), so that the mobile phone number of the mobile phone held by employee b is identical to the mobile phone number of employee c. Therefore, the employee b will return to the address book 1 after accessing the address book of the employee a by using the identification information of the employee b, and whether the additional identification information included in the visitor information input by the employee b is consistent with the additional identification information corresponding to the identification information of the employee b in the address book needs to be further compared. Of course, in other embodiments, the name of the employee b and the company name may be simultaneously searched in the address book pre-stored in the employee a, so as to determine whether the contact information of the employee b is already stored in the address book pre-stored in the employee a.
And comparing whether the additional identity information contained in the visitor information input by the visitor is consistent with the additional identity information corresponding to the identity identification information input by the visitor in the address book, and simultaneously returning a comparison result. The comparison result may also be represented in numbers, letters, or other characters or character strings. For example, the comparison result may be represented by a number, and if 2 is returned, it indicates that the additional identity information of the visitor is inconsistent with the additional identity information stored in the address book and corresponding to the identity identification information of the visitor, and at this time, the address book needs to be updated; and if 0 is returned, the additional identity information of the visitor is consistent with the additional identity information which is stored in the address book of the visited person and corresponds to the identity identification information of the visitor, and the action can be stopped at the moment.
Because the address book of the interviewee stores the contact information of the employee C, the name, the identity card number, the company name and the position of the employee B are inconsistent with the name, the identity card number, the company name and the position corresponding to the mobile phone number of the employee B in the address book pre-stored in the employee A through comparison (because the personal contact information of the employee C is stored in the address book). Therefore, after comparing the additional identity information of the employee B with the additional identity information corresponding to the mobile phone number of the employee B in the address book, returning to step 2, namely, the operation of updating the address book is required to be executed.
Since the identification information (i.e., the mobile phone number) contained in the visitor information acquired from the employee b already exists in the address book, and the additional identification information in the visitor information is inconsistent with the additional identification information in the address book corresponding to the identification information contained in the visitor information, it is indicated that the employee of the market department dispatched by the equipment supplier is not the original employee c. Then the additional identity information of employee c in the address book needs to be updated. Namely, the additional identity information in the visitor information input by the employee b is required to replace the additional identity information of the employee c which is stored in the address book. In the embodiment, the name, the identification number, the company name and the job of the employee C which are already stored in the address book are replaced by the name, the identification number, the company name and the job of the employee B. And the mobile phone number of the employee B can be associated with the mobile phone number of the employee B in the address list and stored so as to update the stored address list.
Therefore, the visitor information of the visitor can be acquired when the visitor visits, the address book pre-stored by the enterprise can be updated timely by effectively utilizing the visitor information, and the contact information of the visitor who has visited can be quickly found in the updated address book when the visitor needs to be communicated and contacted again. Therefore, the visitor intelligent management method of the embodiment of the invention reasonably utilizes the registration information of visitor visits, simultaneously avoids the prior complex operation process of manually maintaining and updating the contact information in the address book, simultaneously saves the subsequent communication cost of enterprises, and realizes the effective maintenance of the client address book in the enterprises (which can be the personal client address book of staff in the enterprises). Meanwhile, a large amount of working time can be avoided being wasted in information data inputting work, and the maintenance efficiency of the address list is improved. The problem of omission or error in manual address book updating can be avoided, and therefore the accuracy of the contact information in the address book is improved.
Fig. 3 shows a flowchart of a visitor intelligence management method according to another embodiment of the present invention, and the same reference numerals are used for the same or equivalent steps of fig. 3 and fig. 2. Steps S101 to S104 in fig. 3 are the same as steps S101 to S104 in fig. 2, except that the guest intelligence management method shown in fig. 3 further includes steps S106 to S109.
And step S106, when the additional identity information input by the visitor is inconsistent with the additional identity information corresponding to the identity identification information in the pre-stored address list, processing the identity identification information and the additional identity information input by the visitor according to the specified format requirement to form an updating prompt message.
And step S107, pushing an update prompting message to the interviewee.
Before the step of updating the address book with the additional identity information input by the visitor in the above embodiment, the method may further include sending an update prompt message to the addressee, and receiving an instruction sent by the addressee, so as to perform further operation processing according to the instruction of the addressee.
For example, in order to determine whether to update the additional identity information corresponding to the identity identification information of the visitor in the address book by the addressee, the identity identification information and the additional identity information input by the visitor need to be sent to the addressee in the form of an update prompt message. In some embodiments, it is necessary to push the update prompting message to the addressee through a specified channel, where the specified channel may include one or more of a mobile terminal short message channel, a client application software channel, and a web page reminding page channel, where the client application software channel may be a WeChat channel, for example.
In the specific operation steps, it should be noted that if the identification information and the additional identification information of the visitor are to be sent out, the interface specification of the associated interface needs to be met, and therefore, format specification processing needs to be performed on the identification information and the additional identification information in the visitor information. The format specification processing step may specifically include, but is not limited to, encrypting key information, synthesizing information, converting XML to JSON, cleaning redundant data, and encapsulating information data. Because some important personal information exists in the identification information and the additional identification information, some important contents such as the acquired identification number may need to be encrypted in the process of information data transmission, so that the security of the personal information of the visitor is ensured. In addition, in order to improve guest management efficiency, the order of respective information included in guest information may also be adjusted in a predetermined order.
In a specific example, the following interface links may be constructed, and the content included in the identification information and the additional identification information analyzed in step S102 is filled in the interface links to generate an update prompting message, and the update prompting message is further sent to the addressee through a short message platform or a message pushing framework.
Illustratively, for example, the name of employee b above is: zhang III; the company name is specifically: XX science and technology Inc.; the mobile phone number is: 18888888888, the interface link is specifically "http:// monitor. ah.cmcc/sendmessage. phpfrom. zhang san & company. XX. science and technology & tel ═ 18888888888& to li total & science and technology & phone ═ 15888888888& secrecy ═ ydcoqksaoce + iq ═ q".
After the prompt message is generated, the prompt message needs to be sent to the addressee, so that the next operation processing is performed according to the instruction of the addressee. Illustratively, the update prompting message can be displayed to the interviewee in a form of a short message or an APP message pushing mode, wherein the update prompting message is sent to an information sending interface of the short message platform needing to be called by the interviewee by using the short message, and the update prompting message is sent to the interviewee by using the APP message pushing mode needing to call a push-like message pushing frame. Of course, the method for pushing the update prompt message to the addressee in the embodiment of the present invention is not limited, and other methods included in the prior art may also be used for pushing.
And step S108, receiving an updating indication sent by the interviewee based on the updating prompt message, and responding to the updating indication.
And step S109, updating the additional identity information in the pre-stored address book by using the additional identity information input by the visitor so as to update the pre-stored address book.
And sending the update prompt message to the addressee, wherein the final purpose of the update prompt message is to show the relevant visitor information to the addressee, inquire whether the addressee needs to update the contact information in the address list or not, and receive and respond to the indication when the addressee makes further indication according to the update prompt message. So as to carry out the next operation according to the instruction sent by the interviewee.
For example, after receiving the update instruction sent by the addressee, in response to the update instruction, the step of "using the additional identity information in the visitor information to update the additional identity information in the pre-stored address book" in step S105 in the embodiment shown in fig. 2 may be further performed, and the content to be updated is the same as that in the embodiment shown in fig. 2, and therefore, the details are not repeated.
In some specific exemplary embodiments, the visitor smart management APP or the server can present the update prompt message to the addressee in a readable manner. For example, the interviewee may be presented in the form of an approval form that includes: the name, phone number, identification number, company name, and post of the visitor, and a prompt message "is the visitor's information changed, updated? And configuring corresponding processing buttons of 'approve updating' and 'reject updating'. When receiving the indication of 'approving to update' or 'rejecting to update' sent by the addressee, the method can carry out corresponding operation. For example, when the visitor employee a checks the update prompt message, and finds that the visitor of the equipment provider changes, the additional identity information of the employee c that has been stored in the address book needs to be replaced with the additional identity information of the employee b, the update instruction sent by the visitor is received. If the interviewee employee A finds that employee B is only a temporary person sent by the equipment supplier, the interviewee receives an update refusal indication from the interviewee.
Fig. 4 shows a flowchart of a visitor intelligence management method according to yet another embodiment of the invention, and the same reference numerals are used for the same or equivalent steps of fig. 4 and fig. 2. Steps S101 to S104 in fig. 4 are the same as steps S101 to S104 in fig. 2, except that the guest intelligence management method shown in fig. 4 further includes steps S110 to S113.
And step S110, when the identity identification information does not exist in the pre-stored address list, processing the identity identification information and the additional identity information input by the visitor according to the specified format requirement to form an adding prompt message.
And step S111, pushing an addition prompt message to the addressee.
In this embodiment, before the step of correspondingly adding the identification information and the additional identification information input by the visitor to the address book to update the address book in the above embodiment, the method may further include pushing an addition prompting message to the addressee, and further executing corresponding operation processing according to an instruction sent by the addressee based on the addition prompting message.
Illustratively, in order to decide whether to add contact information of the visitor to the address book through the addressee, identification information and additional identification information input by the visitor need to be sent to the addressee in the form of an addition prompt message. In some embodiments, it is necessary to push an addition prompting message to the addressee through a specified channel, where the specified channel may include one or more of a mobile terminal short message channel, a client application software channel, and a web page reminding page channel, where the client application software channel may be a WeChat channel, for example.
The manner of generating the addition prompting message and the manner of pushing the addition prompting message to the addressee in this step are similar to the method flow shown in fig. 3, so the process of generating the addition prompting message and the process of pushing the addition prompting message are not described again.
And step S112, receiving an adding instruction sent by the interviewee based on the adding prompt message, and responding to the adding instruction.
And step S113, correspondingly adding the identification information and the additional identification information input by the visitor to the pre-stored address book so as to update the pre-stored address book.
And sending an addition prompt message to the interviewee for the final purpose of showing relevant visitor information to the interviewee and inquiring whether the interviewee needs to add contact information in the address list or not, and receiving and responding to the indication when the interviewee makes further indication according to the addition prompt message. So as to carry out the next operation according to the instruction sent by the interviewee.
For example, after receiving an addition instruction sent by a visitor, in response to the addition instruction, the identification information and the additional identification information included in the visitor information of the visitor may be correspondingly added to the address book to update the address book.
For example, the identification information and the additional identification information of the employee b need to be associated and stored in a pre-stored address book, so that the contact information of the employee b can be recorded in time, and the information of the employee b can be quickly found in the updated address book when communication and contact are needed again. Therefore, the visitor intelligent management method provided by the embodiment of the invention can reasonably utilize the registration information of visitor visits, simultaneously, the complicated operation process of manually adding contact information in the address list is avoided, and the subsequent communication cost of enterprises is also saved.
In some specific exemplary embodiments, the visitor intelligent management APP or the server can present the addition prompting message to the addressee in a readable manner. For example, the interviewee may be presented in the form of an approval form that includes: the name, cell phone number, identification number, company name, and job of the visitor, and also accompanied by a prompt message "is visitor information added to the address book? And configuring corresponding processing buttons of 'approving addition' and 'rejecting addition'. And when the instruction of 'adding approval' or 'adding refusal' sent by the interviewee is received, corresponding operation can be carried out. For example, after the employee a of the visitor checks the addition prompt message, if a new client or a partner visits, the addition instruction sent by the visitor is received, and at this time, the identification information and the additional identification information included in the visitor information of the visitor need to be added to the address list.
Fig. 5 shows a flowchart of a visitor intelligence management method according to a further embodiment of the invention, and steps of fig. 5 that are the same as or equivalent to those of fig. 2 use the same reference numerals. Steps S101 and S102 in fig. 5 are the same as steps S101 and S102 in fig. 2, except that the guest intelligence management method shown in fig. 5 further includes steps S114 to S116. In addition, steps S103 to S105 in the embodiment of fig. 2 may be performed before step S114 or simultaneously with step S114, or may be performed after step S116, which is not limited herein.
Step S114, the identification information and the additional identification information input by the visitor are processed according to the specified format requirement to form an access message.
And step S115, pushing the access message to the addressee.
After the step of parsing the visitor information and acquiring the identification information and the additional identification information of the visitor in the embodiment shown in fig. 2, the visitor intelligent management method in the embodiment of the invention further includes pushing an access message to the addressee so as to perform relevant processing according to the indication of the addressee.
Exemplarily, in order to push the identification information and the additional identification information included in the visitor information to the addressee, the identification information and the additional identification information need to be processed according to the format specification required by the association interface, and the generation process and the pushing manner of the access message are similar to those in the embodiment shown in fig. 3, and therefore are not described again.
And step S116, receiving an access approval instruction sent by the interviewee based on the access message, responding to the access approval instruction, and accepting or rejecting the access request of the visitor.
The final purpose of sending the visit message to the interviewee is also to show the relevant visitor information to the interviewee and ask the interviewee whether to accept the visit, and when the interviewee makes further instructions according to the visit message, the instructions are received and responded. So as to carry out the next operation according to the instruction sent by the interviewee.
Specifically, after receiving an access approval instruction for accepting access sent by an interviewee based on an access message, the interviewee can respond to the access approval instruction and accept an access request of a visitor; on the contrary, after receiving the access approval indication of denying access sent by the interviewee, the visitor can respond to the access approval indication to deny the access request of the visitor.
In some specific exemplary embodiments, the visitor intelligent management APP or the server can display the addition prompting message to the addressee through the addressee held terminal in a readable manner. For example, the interviewee may be presented in the form of an approval form that includes: the visitor's name, cell phone number, identification number, company name, job title, etc., and also accompanied by a prompt message "do you receive the visitor's access? And configuring corresponding processing buttons of accepting access and rejecting access. When the approval indication of 'accepting access' or 'rejecting access' sent by the interviewee is received, corresponding subsequent operation can be carried out.
In addition, after receiving the access approval instruction of the visited person, the visitor can further generate an approval message according to the access approval instruction, and send the approval message to the visitor so as to be displayed to the visitor through the terminal held by the visitor, so that the visitor can read the approval message and select to continue or stop the action. Thereby, the closed loop flow for guest access is completed. In a specific example, the access approval indication sent by the visitor may be subjected to corresponding parsing operation, and the parsed access approval indication may be subjected to format specification processing according to an interface specification of the push channel association interface or other protocols, so as to generate an approval message, and further push the approval message to the visitor.
In addition, the specific process of inquiring whether the interviewee accepts the access request and selecting to accept or reject the access request of the visitor according to the approval indication sent by the interviewee can be executed after the steps of analyzing the visitor information and acquiring the identity identification information and the additional identity information of the visitor. Of course, the operation of inquiring whether the interviewee accepts the current access request may be performed simultaneously with the step of accessing the pre-stored address book by using the identification information of the visitor, which is not limited herein.
According to the visitor intelligent management method provided by the embodiment of the invention, on the basis of realizing the access approval process when the visitor visits, the pre-stored address book is accessed by using the identification information in the visitor visiting record, so that whether the identification information in the visitor information provided by the visitor exists in the address book is judged. So that when the identification information of the visitor does not exist in the address book, the identification information and the additional identification information contained in the visitor information are associated with each other and stored in time. When the identity identification information of the visitor exists in the address book, the change condition of the personal contact information of the contact in the address book can be timely found by further comparing whether the additional identity information corresponding to the identity identification information of the visitor stored in the address book is consistent with the additional identity information input by the visitor.
Therefore, the visitor can be guided to maintain the address book (of course, the address book in the enterprise) by utilizing the visitor information provided when the visitor visits. Therefore, the intelligent visitor management method solves the defect that the traditional visitor management cannot effectively manage and analyze data, enhances the interaction between visitors and interviewees, realizes the effective association between the intelligent visitor management and the contact information maintenance, and reasonably utilizes the visitor information provided by visitors during visiting. And can utilize the intelligent APP can read and write the functional characteristic of address book, guide the visitor to utilize the visitor to carry out in time maintenance to the address book of prestoring with the information of registration when visitor's visit. The information management efficiency of the enterprise is improved, the risk of client information omission and subsequent potential communication cost of the enterprise are reduced, and the client viscosity can be improved.
It is to be understood that the invention is not limited to the specific arrangements and instrumentality described above and shown in the drawings. A detailed description of known methods is omitted herein for the sake of brevity. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present invention are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications and additions or change the order between the steps after comprehending the spirit of the present invention.
Fig. 6 is a detailed structural diagram of the visitorintelligence management apparatus 200 according to an embodiment of the present invention, and as shown in fig. 6, the visitorintelligence management apparatus 200 includes: anacquisition module 201, aparsing module 202, aquery module 203, acomparison module 204, and anupdate module 205.
An obtainingmodule 201, configured to obtain the visitor information and the access request input by the visitor.
And theanalysis module 202 is configured to analyze the visitor information to obtain identity identification information and additional identity information of the visitor.
And thequery module 203 is used for accessing the pre-stored address list by using the identification information.
Thecomparison module 204 is configured to, when the pre-stored address book has the identification information, compare whether the additional identification information input by the visitor is consistent with the additional identification information corresponding to the identification information in the pre-stored address book.
And an updatingmodule 205, configured to update the additional identity information in the pre-stored address book with the additional identity information input by the visitor to update the pre-stored address book when the additional identity information input by the visitor is inconsistent with the additional identity information in the pre-stored address book corresponding to the identity identifying information.
Therefore, the visitor information of the visitor can be acquired when the visitor visits, and the address book pre-stored in the enterprise can be timely updated by the visitor information, so that the contact information of the visitor who has visited can be quickly found in the updated address book when the visitor needs to be communicated and contacted again. Therefore, the visitor intelligent management method of the embodiment of the invention reasonably utilizes the registration information of visitor visits, simultaneously avoids the prior complex operation process of manually maintaining and updating the contact information in the address book, simultaneously saves the subsequent communication cost of enterprises, and realizes the effective maintenance of the client address book in the enterprises (which can be the personal client address book of staff in the enterprises). Meanwhile, a large amount of working time wasted in information data entry work can be reduced, and the maintenance efficiency of the address list is improved. The problem of omission or error in manual address book updating can be avoided, and therefore the accuracy of the contact information in the address book is improved.
In an optional embodiment, the obtainingmodule 201 is specifically configured to: and providing the form for the visitor, and acquiring the identification information and the additional identification information of the visitor and the identification information of the addressee through the form.
Therefore, the information of the visitor can be recorded in time, the contact information of the visitor who has visited can be quickly found in the updated address book when communication is needed again, the subsequent communication cost of an enterprise is saved, and the effective maintenance of the address book of the enterprise can be realized.
Fig. 7 is a schematic diagram illustrating a specific structure of a guestintelligent management apparatus 300 according to another embodiment of the present invention, and the same or equivalent modules in fig. 7 and 6 are numbered the same. As shown in fig. 7, the guestsmart management apparatus 300 is different from the guestsmart management apparatus 200 in that the guestsmart management apparatus 300 may further include: amessage generating module 301, amessage pushing module 302, aprocessing module 303 and an addingmodule 304.
Themessage generating module 301 is configured to process the identification information and the additional identification information input by the visitor according to a specified format requirement, and form an update prompt message.
And amessage pushing module 302, configured to push an update prompting message to the addressee.
And theprocessing module 303 is configured to receive an update instruction sent by the interviewee based on the update prompting message, and respond to the update instruction.
As an alternative embodiment, themessage generating module 301 is further configured to process the identification information and the additional identification information input by the visitor according to a specified format requirement, so as to form an add prompt message.
Themessage pushing module 302 is further configured to push an addition prompting message to the addressee.
Theprocessing module 303 is further configured to receive an addition indication sent by the interviewee based on the addition prompting message, and respond to the addition indication.
And an addingmodule 304, configured to correspondingly add the identification information and the additional identification information input by the visitor to a pre-stored address book, so as to update the pre-stored address book.
As another alternative, themessage generating module 301 is further configured to process the identification information and the additional identification information input by the visitor according to a specified format requirement to form an access message.
Themessage pushing module 302 is further configured to push the access message to the addressee.
Theprocessing module 303 is further configured to receive an access approval indication sent by the addressee based on the access message, respond to the access approval indication, and accept or reject the access request of the visitor.
Of course, the guest smart management apparatus may further include a storage module so that the collected guest information and the access request may be temporarily stored in the storage module.
In addition, the visitorintelligent management apparatus 300 according to the embodiment of the present invention may further include an approval module (not shown in the figure), and at this time, the process of generating the access message and pushing the access message to the addressee may be further performed by the approval module. In addition, the modules in the embodiment of the present invention may exist independently or integrated with each other.
The visitor intelligence management apparatus according to the embodiment of the present invention may correspond to an execution subject in the visitor intelligence management method according to the embodiment of the present invention, and the above and other operations and/or functions of each module in the visitor intelligence management apparatus are respectively for implementing corresponding flows of each method shown in fig. 2 to 5, and are not described herein again for brevity.
Still another embodiment of the present invention further provides a computer-readable storage medium, in which instructions are stored, and when the instructions are run on a computer, the instructions cause the computer to execute the visitor intelligence management method in the above-mentioned embodiment of the present invention.
For simplicity of description, when the instructions are executed on the computer, the computer may refer to corresponding processes of the methods in fig. 2 to fig. 5 for performing the guest intelligence management method in the foregoing embodiment of the present invention, and details are not described herein again.
The guest intelligence management method and apparatus according to an embodiment of the present invention described in conjunction with fig. 1 to 7 may be implemented by a guest intelligence management system detachably or fixedly installed in an enterprise server. Fig. 8 is a block diagram illustrating an exemplary hardware architecture of a guest intelligence management system capable of implementing the guest intelligence management method and apparatus according to an embodiment of the present invention. As shown in fig. 8, guest intelligence management system 400 includes an input device 401, an input interface 402, a central processor 403, a memory 404, an output interface 405, and an output device 406. The input interface 402, the central processing unit 403, the memory 404, and the output interface 405 are connected to each other through a bus 410, and the input device 401 and the output device 406 are connected to the bus 410 through the input interface 402 and the output interface 405, respectively, and further connected to other components of the visitor intelligent management system 400. Specifically, the input device 401 receives input information from the outside (e.g., a data acquisition apparatus), and transmits the input information to the central processor 403 through the input interface 402; the central processor 403 processes the input information based on computer-executable instructions stored in the memory 404 to generate output information, stores the output information temporarily or permanently in the memory 404, and then transmits the output information to the output device 406 through the output interface 405; the output device 406 outputs the output information to the outside of the guest intelligence management system 400 for use by the user. Of course, the pre-stored address book may also be stored in the memory 404.
That is, the guest intelligence management system 400 shown in fig. 8 can also be implemented to include: a memory storing computer-executable instructions; and a processor which, when executing computer executable instructions, may implement the guest intelligence management method and apparatus described in connection with fig. 1-7. Here, the processor may communicate with the visitor smart mobile terminal and the addressee smart mobile terminal (or an enterprise server) to execute the computer executable instructions based on the relevant information from the visitor smart mobile terminal and/or the addressee smart mobile terminal (or an enterprise server), thereby implementing the visitor smart management method and apparatus described in conjunction with fig. 1 to 7.
By the visitor intelligent management method, the visitor intelligent management device and the visitor intelligent management system, data linkage between the visitor and an addressee in an enterprise can be realized, and management operation of the visitor is effectively associated with contact information maintenance operation in an address list in the enterprise.
As will be apparent to those skilled in the art, for convenience and brevity of description, the specific working processes of the systems, modules and units described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. It should be understood that the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present invention, and these modifications or substitutions should be covered within the scope of the present invention.