CN113240846A - Visitor service management method and device, electronic equipment and storage medium - Google Patents

Visitor service management method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113240846A
CN113240846A CN202110452685.3A CN202110452685A CN113240846A CN 113240846 A CN113240846 A CN 113240846A CN 202110452685 A CN202110452685 A CN 202110452685A CN 113240846 A CN113240846 A CN 113240846A
Authority
CN
China
Prior art keywords
information
access
user
detected
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110452685.3A
Other languages
Chinese (zh)
Inventor
柳耀斌
白永申
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lianren Healthcare Big Data Technology Co Ltd
Original Assignee
Lianren Healthcare Big Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lianren Healthcare Big Data Technology Co Ltd filed Critical Lianren Healthcare Big Data Technology Co Ltd
Priority to CN202110452685.3A priority Critical patent/CN113240846A/en
Publication of CN113240846A publication Critical patent/CN113240846A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The embodiment of the invention discloses a visitor service management method, a visitor service management device, electronic equipment and a storage medium, wherein the visitor service management method comprises the following steps: when a user to be detected enters an access area, acquiring face information to be detected of the user to be detected, and matching the face information to be detected with each piece of face information to be matched corresponding to the access area; if the matching is successful, acquiring target access information of the face information to be matched, which is matched with the face information to be detected, and determining the working state of the access control according to the target access information and a preset passing rule; the target access information comprises the corresponding relation between the face information to be matched and the accessed user; and when the entrance guard is determined to be opened, generating push information corresponding to the target access information, and sending the push information to the terminal equipment of the user to be detected. Through the technical scheme of the embodiment of the invention, the efficiency of determining the positions of the visitors is improved, and the technical effects of adjusting the visiting number and time of the visitors according to the requirements are achieved.

Description

Visitor service management method and device, electronic equipment and storage medium
Technical Field
The embodiment of the invention relates to the technical field of visitor management, in particular to a visitor service management method and device, electronic equipment and a storage medium.
Background
With the improvement of safety consciousness of people and the continuous development of internet technology, the safety and convenient standard for visitor personnel to come in and go out in scenes such as enterprise parks, hospital wards, prisons and the like is higher and higher. Only by orderly managing the visitors, the visitors and the addressees can have better experience.
Taking visitor management in a hospital ward as an example, a patient is hospitalized, and family visits all need to manually handle an access card, registration information and deposit through information such as hospital admission certification and the like; then, every time the access card is used for entering and exiting a ward entrance area of a hospital, the staff of the hospital is required to perform troubleshooting and verification on visitors.
The service flow greatly reduces the work efficiency of the hospital and delays the time of visitors. Moreover, the hospital staff provides a large number of access cards to patients and family members every day, and also needs to perform the work of card returning, deposit returning, disinfection and the like, so that the workload of the staff is increased, and the problem of low working efficiency is caused.
In addition, the visitors cannot be managed accurately and recorded through a traditional method, the number of the visitors cannot be limited to be adjusted according to the requirements of the patient, and the rest and rehabilitation of the patient are affected.
Disclosure of Invention
The embodiment of the invention provides a visitor service management method, a visitor service management device, electronic equipment and a storage medium, which are used for improving the efficiency of a visitor for determining the position of a visited person and adjusting the visiting number and time of the visitor according to the requirement, thereby improving the user experience of the visitor and the visited user.
In a first aspect, an embodiment of the present invention provides a guest service management method, including:
when a user to be detected enters an access area, acquiring face information to be detected of the user to be detected, and matching the face information to be detected with each piece of face information to be matched corresponding to the access area;
if the matching is successful, acquiring target access information of the face information to be matched, which is matched with the face information to be detected, and determining the working state of the access control according to the target access information and a preset passing rule; the target access information comprises the corresponding relation between the face information to be matched and the accessed user;
and when the entrance guard is determined to be opened, generating push information corresponding to the target access information, and sending the push information to the terminal equipment of the user to be detected.
In a second aspect, an embodiment of the present invention further provides a guest service management apparatus, including:
the face detection module is used for acquiring the face information to be detected of the user to be detected when the user to be detected enters the access area, and matching the face information to be detected with the face information to be matched corresponding to the access area;
the entrance guard control module is used for acquiring target access information of the face information to be matched, which is matched with the face information to be detected, if the matching is successful, and determining the working state of the entrance guard according to the target access information and a preset passing rule; the target access information comprises the corresponding relation between the face information to be matched and the accessed user;
and the push information sending module is used for generating push information corresponding to the target access information when the entrance guard is determined to be opened, and sending the push information to the terminal equipment of the user to be detected.
In a third aspect, an embodiment of the present invention further provides an electronic device, where the electronic device includes:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement a guest service management method as in any one of the embodiments of the present invention.
In a fourth aspect, the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the guest service management method according to any one of the embodiments of the present invention.
The technical scheme of the embodiment of the invention comprises the steps of acquiring the face information to be detected of a user to be detected when the user to be detected enters an access area, matching the face information to be detected with the face information to be matched corresponding to the access area to determine whether the identity of the user to be detected is legal or not, further, if the matching is successful, acquiring the target access information of the face information to be matched with the face information to be detected, determining the working state of an entrance guard according to the target access information and a preset pass rule, controlling the visiting of a visitor according to the preset target access information and the preset pass rule, generating push information corresponding to the target access information when the entrance guard is determined to be opened, and sending the push information to the terminal equipment of the user to be detected to plan the access path of the user to be detected, so that the visitor cannot accurately determine the position of the visitor, the visitor location determining method and the visitor location determining system have the advantages that the problem that the number of visitors cannot be limited and adjusted by an existing visitor system is solved, the efficiency of determining the positions of visitors by the visitors is improved, the visiting number and time of the visitors can be adjusted according to requirements, and the user experience of the visitors and visited users is improved.
Drawings
In order to more clearly illustrate the technical solutions of the exemplary embodiments of the present invention, a brief description is given below of the drawings used in describing the embodiments. It should be clear that the described figures are only views of some of the embodiments of the invention to be described, not all, and that for a person skilled in the art, other figures can be derived from these figures without inventive effort.
Fig. 1 is a flowchart illustrating a visitor service management method according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a visitor service management method according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a guest service management system according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of a visitor service management apparatus according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device according to a fifth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a flowchart of a visitor service management method according to an embodiment of the present invention, where the method may be applied to a situation where a visitor is checked and recorded when the visitor enters an access area, and the method may be executed by a visitor service management apparatus, and the apparatus may be implemented in the form of software and/or hardware, where the hardware may be an electronic device, and optionally, the electronic device may be a mobile terminal, a PC terminal, and the like.
As shown in fig. 1, the method of this embodiment specifically includes the following steps:
s110, when the user to be detected enters the access area, the face information to be detected of the user to be detected is obtained, and the face information to be detected is matched with the face information to be matched corresponding to the access area.
The user to be detected may be an accessing person, for example: a user visiting a patient in a hospital scenario, a user visiting a certain staff in an enterprise scenario, etc. The face information to be detected may be a face image of the user to be detected acquired using a face recognition device. The access area may be an area that the user to be detected wants to access, for example: each ward area, ward public entrance area and the like in a hospital scene, office building areas, office areas, enterprise campus areas and the like in an enterprise scene. The face information to be matched may be face information which is input in advance, that is, face information which can enter an access area. It can be understood that the face information to be matched in different access areas may be the same or different, and the face information to be matched in the access area may be set and updated according to the requirements of each accessed user in the access area.
Specifically, when a user to be detected enters an access area, an access control system is set to prevent the user from entering the access area in order to ensure the safety of the user in the access area. At the moment, the face information to be detected of the user to be detected can be collected through the face recognition system so as to judge whether the user is a legal user or not and whether the entrance guard can be opened or not. After the face information to be detected is obtained, the face information to be detected is matched with each piece of face information to be matched corresponding to the access area. If the matching fails, it indicates that the user to be detected cannot enter the access area, and at this time, the user to be detected can be informed of the relevant entrance guard transaction flow. If the matching is successful, the next judgment can be carried out.
Optionally, the process of performing face matching on the face information to be detected and each face information to be matched is as follows:
step one, determining the similarity of the face information to be detected and each face information to be matched corresponding to the access area.
And step two, when the similarity between the current face information to be matched and the face information to be matched meets a preset similarity condition, the matching is successful.
And step three, when the similarity of the face information to be detected and all the face information to be matched corresponding to the access area is detected not to meet the preset similarity condition, the matching is failed.
Optionally, when the user to be detected enters the access area, before the face information to be detected of the user to be detected is acquired, the face information that can enter the access area needs to be acquired.
Specifically, the face information of each target user is collected and stored, and the corresponding relation between each target user and the access area is established. The target user may be an accessed user or a guest user capable of accessing the accessed user.
It should be noted that, the advantage of establishing the correspondence between each target user and the access area is that: different face information bases to be matched can be established aiming at different access areas so as to improve the face matching efficiency.
And S120, if the matching is successful, acquiring target access information of the face information to be matched, which is matched with the face information to be detected, and determining the working state of the access control according to the target access information and the preset passing rule.
The target access information comprises the corresponding relation between the face information to be matched and the accessed user. Alternatively, the accessible time and the number of persons set by the accessed user may be determined according to the accessed user. The preset pass rule may be a time rule, such as: the early 6 o 'clock to 10 o' clock late can open entrance guard for the detection user who detects that matches successfully, and it can also be the number of people rule to predetermine the traffic rule, for example: the number of people who access the currently accessed users at the same time is limited to be less than 3, or the number of visitors existing in the currently accessed area at the same time is limited to be less than 10, and the like. It should be noted that the preset traffic rule may be adjusted according to the target access information, that is, adjusted according to the requirements of the accessed user and the access area, and a specific adjustment manner is not specifically limited in this embodiment. The working state of the access control can comprise an opening state or a closing state.
Specifically, if the matching is successful, the next step of judgment is carried out. And acquiring target access information of the face information to be matched, which is matched with the face information to be detected, namely determining an accessed user which the user to be detected wants to access. And further, acquiring the accessible time and/or the number of people and the like set by the accessed user, and judging whether the access control can be opened according to a preset passing rule.
For example, if the face information a 'of the user a to be detected is matched with the face information B' to be matched corresponding to the access area, it may be determined that the user a to be detected may enter the access area. And then, acquiring the information of the accessed user C corresponding to the face information B' to be matched, and acquiring a preset passing rule set for the accessed user C. If the access rule accords with the preset passing rule, the access control can be opened so that the user A to be detected enters the access area; if the access control information does not accord with the preset passing rule, the closing state of the access control can be kept, the user A to be detected is prevented from entering the access area, and the reason that the user A to be detected cannot enter the access area can be informed, such as: the current time is at the rest time of visited user C, please go XX: XX visit before and after; the current number of visitors is too many, please endure for waiting, etc.
S130, when the entrance guard is determined to be opened, push information corresponding to the target access information is generated and sent to the terminal equipment of the user to be detected.
The push information may be path information indicating that the user to be detected goes to the position of the accessed user, and may be, for example, text information, voice information, map navigation information, or the like. The terminal device may be a device capable of receiving push information, such as a smart phone terminal of the user to be detected.
Specifically, when the entrance guard is confirmed to be opened, path information of the user to be detected, who goes to the position of the accessed user, can be generated, and push information is generated according to the path information and sent to the terminal equipment of the user to be detected, so that the user to be detected can accurately and quickly go to the position of the accessed user, and the purpose of access is achieved.
Exemplarily, taking a hospital ward as an example, the visited user corresponding to the user to be detected, namely, the inpatient is determined according to the target access information. Furthermore, the ward information and the bed information of the visited user can be determined, based on which, push information from the current position to the bed position of the visited user is generated, and the push information is sent to the terminal device of the user to be detected, for example: voice prompt' ward position: turning right after entering the door, and enabling the 2 nd ward at the east side; the sickbed position is as follows: number 102 bed. "; the map navigation information may be generated from a GPS (Global Positioning System).
It should be noted that, if the accessed user enters the access area, face recognition detection may also be performed, and when it is determined that the user is the accessed user, the access control is directly opened for the accessed user.
It should be noted that, in order to ensure the security of the access area, when the door access is opened to let the user pass, only one user is allowed to pass at a time.
The technical scheme of the embodiment of the invention comprises the steps of acquiring the face information to be detected of a user to be detected when the user to be detected enters an access area, matching the face information to be detected with the face information to be matched corresponding to the access area to determine whether the identity of the user to be detected is legal or not, further, if the matching is successful, acquiring the target access information of the face information to be matched with the face information to be detected, determining the working state of an entrance guard according to the target access information and a preset pass rule, controlling the visiting of a visitor according to the preset target access information and the preset pass rule, generating push information corresponding to the target access information when the entrance guard is determined to be opened, and sending the push information to the terminal equipment of the user to be detected to plan the access path of the user to be detected, so that the visitor cannot accurately determine the position of the visitor, the visitor location adjusting method and the visitor location adjusting system have the advantages that the problem that the number of visitors cannot be limited and adjusted by an existing visitor system is solved, the efficiency of determining the positions of visitors by the visitors is improved, the technical effect of visitor visiting can be adjusted according to requirements, and the user experience of the visitors and visited users is improved.
Example two
Fig. 2 is a flowchart illustrating a visitor service management method according to a second embodiment of the present invention, where a manner of recording access information is added to the second embodiment, and a specific recording manner may refer to a technical solution of the second embodiment. The same or corresponding terms as those in the above embodiments are not explained in detail herein.
As shown in fig. 2, the method of this embodiment specifically includes the following steps:
s210, when the user to be detected enters the access area, the face information to be detected of the user to be detected is obtained, and the face information to be detected is matched with the face information to be matched corresponding to the access area.
S220, if the matching is successful, acquiring target access information of the face information to be matched, which is matched with the face information to be detected, and determining the working state of the access control according to the target access information and the preset passing rule.
Specifically, if the matching is successful, the target access information of the face information to be matched, which is matched with the face information to be detected, is obtained, that is, the accessed user which the user to be detected wants to access is determined. And further, judging whether the entrance guard can be opened according to a preset passing rule.
Optionally, the preset traffic rule may be a time rule and/or a number of people rule, and then, according to the target access information and the preset traffic rule, the working state of the access control device is determined, which may be any one of the following manners:
the method comprises the steps that a target access time period is determined according to target access information, if the access time corresponding to the target access information is within the target access time period, the entrance guard is determined to be opened, and if not, the entrance guard is determined to be closed.
The target access time period may be a time period allowed to be accessed, and may be a time period set by an accessed user. In the hospital ward management scenario, the target access time period may also be a time period set by an attending doctor of the accessed user. The access time can be the time of acquiring the face information to be detected of the user to be detected, and can also be the current time.
Specifically, a target access time period is determined according to the target access information, and if the access time is within the target access time period, the access time is determined to accord with a time rule in a preset traffic rule, so that the entrance guard can be determined to be opened; if the access time is out of the target access time period, determining that the access time does not conform to the time rule in the preset passing rule, not opening the access control for the user to be detected, keeping the access control in a closed state, and determining that the access control is closed.
Illustratively, the target access time period is determined to be 10 according to the target access information: 00-11:00 and 14:00-16: 00. The access time corresponding to the target access information is the access time of the user a to be detected to access the accessed user B, i.e. the current time 14: 50. And when the time is in the target access time period, the entrance guard can be opened, so that the user A to be detected accesses the accessed user B. The access time corresponding to the target access information is the access time of the user C to be detected to access the accessed user B, i.e. the current time 17: 50. And keeping the entrance guard in a closed state outside the target access time period. Moreover, in order to indicate the reason why the entrance guard cannot be opened, explanation information may be sent to the user C to be detected, for example: now the visited user B cannot be accessed, and the next accessible time is: XXX-XXX, etc.
It should be noted that the target access time period may be the same or different every day, and the specific setting may be set according to the requirement of the accessed user.
And secondly, determining the number of target access people according to the target access information, if the number of people in the access area corresponding to the target access information is less than or equal to the number of target access people, determining that the access control is opened, and otherwise, determining that the access control is closed.
Wherein the target visitor count may include a maximum number of visitors within the visiting area, and the like.
Specifically, the target number of visiting persons is determined according to the target visiting information, and if the number of persons in the visiting area is smaller than or equal to the target number of visiting persons, the current number of visiting persons is determined to accord with a number rule in a preset traffic rule, and the entrance guard can be determined to be opened. If the number of people in the access area is larger than the target number of people, determining that the current number of people does not conform to the number rule in the preset traffic rule, and not opening the access control for the user to be detected, keeping the access control in a closed state, namely determining that the access control is closed.
If the number of people in the access area is the number of visitors including the user to be detected, the number of people in the access area corresponding to the target access information is less than or equal to the target access number, and the entrance guard is determined to be opened; and if the number of the visitors in the access area does not include the number of the visitors to be detected, determining that the number of the visitors in the access area corresponding to the target access information is less than the target access number, and determining that the access control is opened.
Optionally, the number of visiting persons of each visited user may also be increased, which may be: and determining the number of people to be accessed of the accessed user according to the target access information, if the number of people corresponding to the accessed user is less than or equal to the number of people to be accessed, determining that the access control is opened, and otherwise, determining that the access control is closed.
Wherein, the number of people to be visited may be the maximum of the number of people visiting the visited users at the same time, for example: 3 or 5, etc.
It should be noted that the target number of visitors and the number of visitors to be visited can be used in combination as the number rule in the preset traffic rule.
And determining a target access time period and a target access number according to the target access information, if the access time corresponding to the target access information is in the target access time period and the number of people in the access area corresponding to the target access information is less than or equal to the target access number, determining that the access control is opened, and otherwise, determining that the access control is closed.
And S230, when the entrance guard is determined to be opened, generating push information corresponding to the target access information, and sending the push information to the terminal equipment of the user to be detected.
Specifically, when the entrance guard is confirmed to be opened, path information of the user to be detected, which goes to the position of the accessed user, can be generated, and push information is generated according to the path information to be sent to the terminal equipment of the user to be detected, so that the user to be detected can accurately and quickly go to the position of the accessed user.
Optionally, the specific determination manner of the push information is as follows:
determining first position information of an accessed user according to the target access information; and generating a target path based on the first position information and the second position information of the entrance guard, and generating push information according to the target path.
Wherein the first location information may be location information of the accessed user. If the current scene is a scene of a hospital ward, the first position information may be the position information of the bed of the accessed patient. If the visited user is configured with a positioning device such as an Ultra Wide Band (UWB), the current position information of the visited user may be used as the first position information. The second location information may be current location information of the user to be detected, that is, location information of an entrance guard of the access area. The target path may be navigation information from the second location information to the first location information, and may include a travel direction, a travel distance, and the like.
Specifically, the location information of the accessed user may be determined according to the target access information, and the location information may be used as the first location information. And constructing a target path between the two pieces of position information according to the first position information and the second position information of the entrance guard. And then, push information can be generated according to the modes of character information, voice information, map navigation information and the like and pushed to the terminal equipment of the user to be detected.
S240, recording access information corresponding to the user to be detected, and sending the access information to a target client corresponding to the accessed user.
The access information may include the name of the user to be detected, the name of the user to be accessed, and the access time and other information. The target client can be a mobile terminal of the accessed user, can also be a mobile terminal of an authorized user of the accessed user, and can also be a fixed terminal corresponding to the accessed user. For example, in a scenario of a hospital ward, the target client may be a private intelligent terminal of the inpatient, or an intelligent device equipped for the inpatient in the hospital ward, and the target client may also be an intelligent terminal of a family member that attends the inpatient, and the target client may also be a fixed terminal installed at a position such as a front side of a hospital bed of the inpatient, and the installation position is not specifically limited in this embodiment.
Specifically, the access information can be generated according to the user to be detected, and the access information is sent to the target client, so that the accessed user knows that a visitor visits. The access information may also be stored to the guest system for subsequent retrieval and use.
Optionally, in order to generate access information more accurately and provide multiple access routes for the visitor, the following steps may be performed:
the method comprises the steps of obtaining a user identification of a user to be detected, generating access information according to the user identification and access time, and sending the access information to a target client corresponding to an accessed user.
The user identifier may be a unique number, name, identification number, and the like of the user to be detected. The access time may be the time when the user to be detected performs face recognition in the access area.
Specifically, the user identifier of the user to be detected may be obtained, and access information may be generated based on the user identifier and the access time, such as: user A visited at 20 days 17:00, 4 months in 2021. And the access information can be sent to the target client corresponding to the accessed user, so that the accessed user can know in advance.
It should be noted that, if the access information is stored in the visitor system, the access information may be generated according to the user identifier of the user to be detected, the user identifier of the accessed user, the access time, and the like, for example: user A accesses user B at 20 days 17:00, 4 months 2021.
And if the access control is in a closed state, generating instant chat request information according to the user to be detected, and sending the instant chat request information to the target client.
The instant chat request information can be chat messages constructed for the user to be detected and the user to be accessed, can be text chat request information, can also be voice chat request information, can also be video chat request information and the like.
Specifically, if the door access is in a closed state, at this time, the user to be detected is a registered user, but may not enter the access area for access because the preset passing rule is not satisfied. In order to ensure that the user to be detected and the accessed user can communicate in time, instant chat request information can be generated according to the user to be detected and sent to the target client. When the accessed user receives the instant chat request information, the communication access can be completed under the condition that the user to be detected does not enter the access area, and the time waste caused by repeated visits of the user to be detected can be effectively avoided.
In order to combine the subjective intention of the visited user with the guest service management, a secondary confirmation step may be added to the visited user, which specifically may be: if a confirmation instruction corresponding to the access information is received, opening the access control; and if a rejection instruction corresponding to the access information is received or a confirmation instruction corresponding to the access information is not received within a preset time, closing the access control or maintaining the closing state of the access control.
The confirmation instruction may be an instruction generated when the accessed user triggers the confirmation control for the access information, and the instruction may be regarded as an instruction of passing the secondary confirmation. The rejection instruction may be an instruction generated when the accessed user triggers a rejection control for the access information, which may be considered an instruction that the secondary confirmation fails.
Specifically, when the target client corresponding to the accessed user receives the access information, two controls may be displayed, one of which indicates confirmation, that is, allowing the user to be detected to access, and the other indicates rejection, that is, disallowing the user to be detected to access. When the accessed user views the access information and the detected user is allowed to enter, the confirmation control can be triggered to generate a confirmation instruction. And after receiving the confirmation instruction, the access control device can control the entrance guard to be opened, and the user to be detected can enter the access area to access the accessed user. And when the accessed user does not allow the detected user to enter after viewing the access information, triggering a rejection control to generate a rejection instruction. And after the rejection instruction is received, the entrance guard can be closed or the closing state of the entrance guard can be maintained so as to prevent the user to be detected from entering the access area. If the accessed user does not trigger any control within the preset time, the accessed user can be considered to be in a busy state or a rest state and is not suitable for being accessed, and at the moment, a rejection instruction can be generated to reject the access of the detected user.
On the basis of the above embodiments, if the application scenario is a scenario of a hospital ward, the function of service reminding may be added, and may be: and when the accessed user is a hospitalized user, generating reminding information according to the medical advice information, and pushing the reminding information to a target client corresponding to the hospitalized user.
Among them, the inpatient user may be a patient user who is registered when an inpatient procedure is handled. The order information may be an order which is issued by the attending doctor of the inpatient to the inpatient, and may include items and time of examination and examination, type, quantity and time of medicine taking, time of infusion, and the like, and may further include information such as diet advice, and the like. The reminding information can be information generated according to the medical advice information so as to remind the hospitalized user to follow the medical advice.
Specifically, medical advice information of the hospitalized user can be acquired, and corresponding reminding information is generated according to the medical advice information. At suitable time, the reminding information is pushed to the target client side corresponding to the in-patient user, so that the in-patient user can follow the medical advice information to go to the examination and examination, take medicine, have dinner and the like. The reminding information can be reminding similar to an alarm clock, so that the inpatient user can check the reminding information in time, and then the word reminding information can be displayed or the voice reminding information can be played.
For example, when the order information is received and the diet suggestion is included, a target package can be determined from packages provided by the hospital and pushed to a target client for selection by the inpatient user. For example: if the diet suggestion indicates that the inpatient user should eat the liquid diet, the liquid diet such as rice porridge, milk, flour soup, lotus root starch, egg flower soup and the like in the electronic menu of the hospital can be preferentially displayed.
According to the technical scheme, when a user to be detected enters an access area, the face information to be detected of the user to be detected is obtained, the face information to be detected is matched with the face information to be matched corresponding to the access area, whether the identity of the user to be detected is legal or not is determined, further, if the matching is successful, target access information of the face information to be matched, which is matched with the face information to be detected, is obtained, the working state of an entrance guard is determined according to the target access information and a preset passing rule, the visiting of a visitor is controlled according to the preset target access information and the preset passing rule, when the entrance guard is determined to be opened, push information corresponding to the target access information is generated and sent to the terminal equipment of the user to be detected, and the access path of the user to be detected is planned. And the access information corresponding to the user to be detected is recorded and sent to the target client corresponding to the accessed user, so that the access information is managed and recorded conveniently, the problems that the visitor access information cannot be managed and recorded simply and accurately are solved, the visitor access information is recorded quickly, and the visitor information is managed conveniently.
EXAMPLE III
Fig. 3 is a schematic structural diagram of a guest service management system according to a third embodiment of the present invention, where the guest service management system includes an information management module and a service module. The information management module is composed of an information acquisition module, an information processing module and an information interaction module.
The hospital ward scene is taken as an example, and the functions of all modules in the visitor service management system are introduced.
The information acquisition module establishes an information database of the patient according to the data provided when the inpatient is subjected to the inpatient procedure for the first time. In addition, the face information of the patient and the family can be collected through Optical Character Recognition (OCR), and other required identity information can be supplemented. After the information acquisition is completed through the information acquisition module, the acquired information can be subjected to data archiving. The information acquisition module is also used for carrying out face information acquisition on entrance guards (such as a ward public entrance, a certain ward entrance guard, a nurse room and the like) through an OCR face recognition system when a patient or a family member enters a detection area (access area), and uploading the acquired face information to the information processing module in the information management module.
And the information processing module is used for comparing the acquired face information with the face information (the face information of the patient and the family) data in the information database of each patient to determine the similarity. If the similarity is within the range of normal successful authentication, the entrance guard can be opened to allow the user to pass, and only one pass is allowed at a time. If the identification is not successful, the user is refused to pass, and the alarm can be given through the system. When receiving the alarm prompt, the manager can process the alarm through monitoring or going to the site.
And the information interaction module is used for informing the identified result returned by the information processing module to the identified person (the user to be detected) in real time. If the identification is successful, the patient's bed position corresponding to the identified person may be determined, for example: if the identified person is the family of the 102 sick bed patient, the ward position can be prompted by voice, such as the similar prompt of turning right after entering the door, the 2 nd ward at the east side, and the like. And, the visit information (visit information) can be synchronized to the mobile phone client (target client) of the sickbed patient and the family. If the recognition fails, the recognized person can be informed that the person can not enter the reason, and the recognized person can be informed of the acquisition process of the face information and the like.
The information management module can set the following parameters according to requirements: 1. the number and corresponding serial number of the wards; 2. the number of beds in each ward; 3. the number of users allowed to visit per bed; 4. a visionable time period; 5. basic information of the current visitor; 6. the maximum number of the face recognition acquisition photos corresponding to each patient; 7. and (4) passing a similarity threshold of face recognition (for example, passing the similarity when the similarity exceeds 80%).
The service module may be for use by the patient and family members. The patient or family member may be logged in by scanning the doctor's unique two-dimensional code provided by the patient using the client of the service module. The service module may update a package suitable for the patient to eat daily according to the patient's condition, for example: the liquid diet is easy to digest and is not suitable for greasy dishes. Family members can also book family member packages through the service module. The cost for the diet can be recorded in the service module, synchronized to the hospitalization payment database, to be settled together with the hospitalization fee when the patient is discharged.
The family and the patient can also carry out calling service through the service module, such as triggering a calling control and the like. When the call information is received, the call information can be uploaded to a data center through the service module and a corresponding nurse or doctor is informed to process the call information.
The service module also provides order-to-door distribution service of some living goods for the patient during the hospitalization period, so that the patient can be worried about the disease during the hospitalization period, and family members can take care of the patient. Similarly, the order information of the order delivery service can be synchronized to the hospitalization payment database to be settled together with the hospitalization fee when the patient is discharged.
According to the technical scheme, the face information of the patient and the family members is collected and stored through the information management module, the face information of the detection area can be collected to be matched, corresponding treatment is carried out according to the matching result, convenience is provided for the daily life of the patient through the service module, the problems that the visitor visiting information cannot be simply and accurately managed and recorded are solved, the visitor visiting information can be rapidly recorded, and the technical effect of managing the visitor information is facilitated.
Example four
Fig. 4 is a schematic structural diagram of a guest service management apparatus according to a fourth embodiment of the present invention, including: the system comprises a face detection module 410, an access control module 420 and a push information sending module 430.
The face detection module 410 is configured to, when a user to be detected enters an access area, acquire face information to be detected of the user to be detected, and match the face information to be detected with each piece of face information to be matched corresponding to the access area; the entrance guard control module 420 is configured to, if matching is successful, obtain target access information of the face information to be matched, which is matched with the face information to be detected, and determine a working state of an entrance guard according to the target access information and a preset passing rule; the target access information comprises the corresponding relation between the face information to be matched and the accessed user; and the push information sending module 430 is configured to generate push information corresponding to the target access information when it is determined that the access control is opened, and send the push information to the terminal device of the user to be detected.
Optionally, the apparatus further comprises: and the recording module is used for recording the access information corresponding to the user to be detected and sending the access information to the target client corresponding to the accessed user.
Optionally, the apparatus further comprises: the access confirmation module is used for opening the access control if a confirmation instruction corresponding to the access information is received; and if a rejection instruction corresponding to the access information is received or a confirmation instruction corresponding to the access information is not received within a preset time, closing the access control or maintaining the closing state of the access control.
Optionally, the recording module is further configured to obtain a user identifier of the user to be detected, generate access information according to the user identifier and the access time, and send the access information to a target client corresponding to the accessed user; and if the entrance guard is in a closed state, generating instant chat request information according to the user to be detected, and sending the instant chat request information to the target client.
Optionally, the access control module 420 includes at least one of the following operations:
determining a target access time period according to the target access information, if the access time corresponding to the target access information is within the target access time period, determining that the access control is opened, otherwise, determining that the access control is closed;
determining the number of target access people according to the target access information, if the number of people in an access area corresponding to the target access information is less than or equal to the target access people, determining that the access control is opened, otherwise, determining that the access control is closed;
and determining a target access time period and a target access number according to the target access information, if the access time corresponding to the target access information is in the target access time period and the number of people in an access area corresponding to the target access information is less than or equal to the target access number, determining that the access control is opened, and if not, determining that the access control is closed.
Optionally, the push information sending module 430 is further configured to determine first location information of the accessed user according to the target access information; and generating a target path based on the first position information and the second position information of the entrance guard, and generating push information according to the target path.
Optionally, the apparatus further comprises: and the reminding module is used for generating reminding information according to the medical advice information when the accessed user is the inpatient user, and pushing the reminding information to a target client corresponding to the inpatient user.
The technical scheme of the embodiment of the invention comprises the steps of acquiring the face information to be detected of a user to be detected when the user to be detected enters an access area, matching the face information to be detected with the face information to be matched corresponding to the access area to determine whether the identity of the user to be detected is legal or not, further, if the matching is successful, acquiring the target access information of the face information to be matched with the face information to be detected, determining the working state of an entrance guard according to the target access information and a preset pass rule, controlling the visiting of a visitor according to the preset target access information and the preset pass rule, generating push information corresponding to the target access information when the entrance guard is determined to be opened, and sending the push information to the terminal equipment of the user to be detected to plan the access path of the user to be detected, so that the visitor cannot accurately determine the position of the visitor, the visitor location adjusting method and the visitor location adjusting system have the advantages that the problem that the number of visitors cannot be limited and adjusted by an existing visitor system is solved, the efficiency of determining the positions of visitors by the visitors is improved, the technical effect of visitor visiting can be adjusted according to requirements, and the user experience of the visitors and visited users is improved.
The visitor service management device provided by the embodiment of the invention can execute the visitor service management method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method.
It should be noted that, the units and modules included in the apparatus are merely divided according to functional logic, but are not limited to the above division as long as the corresponding functions can be implemented; in addition, specific names of the functional units are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the embodiment of the invention.
EXAMPLE five
Fig. 5 is a schematic structural diagram of an electronic device according to a fifth embodiment of the present invention. FIG. 5 illustrates a block diagram of an exemplary electronic device 50 suitable for use in implementing embodiments of the present invention. The electronic device 50 shown in fig. 5 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiment of the present invention.
As shown in fig. 5, electronic device 50 is embodied in the form of a general purpose computing device. The components of the electronic device 50 may include, but are not limited to: one or more processors or processing units 501, a system memory 502, and a bus 503 that couples the various system components (including the system memory 502 and the processing unit 501).
Bus 503 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or a local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Electronic device 50 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by electronic device 50 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 502 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)504 and/or cache memory 505. The electronic device 50 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 506 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 5, commonly referred to as a "hard drive"). Although not shown in FIG. 5, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to the bus 503 by one or more data media interfaces. System memory 502 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 508 having a set (at least one) of program modules 507 may be stored, for example, in system memory 502, such program modules 507 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may include an implementation of a network environment. Program modules 507 generally perform the functions and/or methodologies of embodiments of the invention as described herein.
The electronic device 50 may also communicate with one or more external devices 509 (e.g., keyboard, pointing device, display 510, etc.), with one or more devices that enable a user to interact with the electronic device 50, and/or with any devices (e.g., network card, modem, etc.) that enable the electronic device 50 to communicate with one or more other computing devices. Such communication may occur via input/output (I/O) interfaces 511. Also, the electronic device 50 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet) via the network adapter 512. As shown, the network adapter 512 communicates with the other modules of the electronic device 50 over the bus 503. It should be appreciated that although not shown in FIG. 5, other hardware and/or software modules may be used in conjunction with electronic device 50, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 501 executes various functional applications and data processing, for example, implementing a guest service management method provided by an embodiment of the present invention, by running a program stored in the system memory 502.
EXAMPLE six
An embodiment of the present invention further provides a storage medium containing computer-executable instructions, which when executed by a computer processor, perform a guest service management method, the method including:
when a user to be detected enters an access area, acquiring face information to be detected of the user to be detected, and matching the face information to be detected with each piece of face information to be matched corresponding to the access area;
if the matching is successful, acquiring target access information of the face information to be matched, which is matched with the face information to be detected, and determining the working state of the access control according to the target access information and a preset passing rule; the target access information comprises the corresponding relation between the face information to be matched and the accessed user;
and when the entrance guard is determined to be opened, generating push information corresponding to the target access information, and sending the push information to the terminal equipment of the user to be detected.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for embodiments of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (10)

1. A guest service management method, comprising:
when a user to be detected enters an access area, acquiring face information to be detected of the user to be detected, and matching the face information to be detected with each piece of face information to be matched corresponding to the access area;
if the matching is successful, acquiring target access information of the face information to be matched, which is matched with the face information to be detected, and determining the working state of the access control according to the target access information and a preset passing rule; the target access information comprises the corresponding relation between the face information to be matched and the accessed user;
and when the entrance guard is determined to be opened, generating push information corresponding to the target access information, and sending the push information to the terminal equipment of the user to be detected.
2. The method of claim 1, further comprising:
and recording access information corresponding to the user to be detected, and sending the access information to a target client corresponding to the accessed user.
3. The method of claim 2, further comprising, after the sending the access information to the target client corresponding to the accessed user:
if a confirmation instruction corresponding to the access information is received, opening the access control;
and if a rejection instruction corresponding to the access information is received or a confirmation instruction corresponding to the access information is not received within a preset time, closing the access control or maintaining the closing state of the access control.
4. The method according to claim 2, wherein the recording access information corresponding to the user to be detected and sending the access information to a target client corresponding to the accessed user comprises:
acquiring a user identifier of a user to be detected, generating access information according to the user identifier and access time, and sending the access information to a target client corresponding to the accessed user;
and if the entrance guard is in a closed state, generating instant chat request information according to the user to be detected, and sending the instant chat request information to the target client.
5. The method of claim 1, wherein determining the operating state of the door control according to the target access information and the preset traffic rule comprises at least one of the following operations:
determining a target access time period according to the target access information, if the access time corresponding to the target access information is within the target access time period, determining that the access control is opened, otherwise, determining that the access control is closed;
determining the number of target access people according to the target access information, if the number of people in an access area corresponding to the target access information is less than or equal to the target access people, determining that the access control is opened, otherwise, determining that the access control is closed;
and determining a target access time period and a target access number according to the target access information, if the access time corresponding to the target access information is in the target access time period and the number of people in an access area corresponding to the target access information is less than or equal to the target access number, determining that the access control is opened, and if not, determining that the access control is closed.
6. The method of claim 1, wherein generating push information corresponding to the target access information comprises:
determining first position information of the accessed user according to the target access information;
and generating a target path based on the first position information and the second position information of the entrance guard, and generating push information according to the target path.
7. The method of claim 1, further comprising:
and when the accessed user is a hospitalized user, generating reminding information according to the medical advice information, and pushing the reminding information to a target client corresponding to the hospitalized user.
8. A guest service management apparatus, comprising:
the face detection module is used for acquiring the face information to be detected of the user to be detected when the user to be detected enters the access area, and matching the face information to be detected with the face information to be matched corresponding to the access area;
the entrance guard control module is used for acquiring target access information of the face information to be matched, which is matched with the face information to be detected, if the matching is successful, and determining the working state of the entrance guard according to the target access information and a preset passing rule; the target access information comprises the corresponding relation between the face information to be matched and the accessed user;
and the push information sending module is used for generating push information corresponding to the target access information when the entrance guard is determined to be opened, and sending the push information to the terminal equipment of the user to be detected.
9. An electronic device, characterized in that the electronic device comprises:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the guest service management method of any one of claims 1-7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the guest service management method of any one of claims 1 to 7.
CN202110452685.3A 2021-04-26 2021-04-26 Visitor service management method and device, electronic equipment and storage medium Pending CN113240846A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110452685.3A CN113240846A (en) 2021-04-26 2021-04-26 Visitor service management method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110452685.3A CN113240846A (en) 2021-04-26 2021-04-26 Visitor service management method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113240846A true CN113240846A (en) 2021-08-10

Family

ID=77129434

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110452685.3A Pending CN113240846A (en) 2021-04-26 2021-04-26 Visitor service management method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113240846A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113793691A (en) * 2021-09-17 2021-12-14 北京声智科技有限公司 Questionnaire survey method, server and terminal equipment
CN113838236A (en) * 2021-09-02 2021-12-24 合肥优恩物联网科技有限公司 Intelligent access control's place inquiry system and device
CN114187696A (en) * 2021-12-09 2022-03-15 软通智慧信息技术有限公司 Personnel access detection method, device, equipment and storage medium
CN115131907A (en) * 2022-08-30 2022-09-30 湖南海讯供应链有限公司 Intelligent access control system and communication method thereof
CN115174668A (en) * 2022-06-30 2022-10-11 广州瀚信通信科技股份有限公司 Information pushing method and device, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004094891A (en) * 2002-07-12 2004-03-25 Matrix:Kk System for measuring the number of visitors
CN104887527A (en) * 2015-06-26 2015-09-09 青岛永乐互联网技术有限公司 Drug taking prompt and feedback method based on medical advice
CN105788040A (en) * 2016-02-22 2016-07-20 国网湖北省电力公司咸宁供电公司 Dynamic authorization system for office building visitors and management method
CN106408703A (en) * 2016-08-31 2017-02-15 广州云系信息科技有限公司 Identification method of visitor information
CN109598831A (en) * 2018-11-20 2019-04-09 北京千丁互联科技有限公司 A kind of visitor's access control system control method and its device based on image recognition
CN109658579A (en) * 2019-02-28 2019-04-19 中新智擎科技有限公司 A kind of access control method, system, equipment and storage medium
CN110322602A (en) * 2019-06-18 2019-10-11 特斯联(北京)科技有限公司 A kind of visitor reserves passing method, system and equipment
US20200051348A1 (en) * 2017-04-19 2020-02-13 JRD Communication (Shenzhen) Ltd. Method, server, smart terminal and storage device for access authentication

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004094891A (en) * 2002-07-12 2004-03-25 Matrix:Kk System for measuring the number of visitors
CN104887527A (en) * 2015-06-26 2015-09-09 青岛永乐互联网技术有限公司 Drug taking prompt and feedback method based on medical advice
CN105788040A (en) * 2016-02-22 2016-07-20 国网湖北省电力公司咸宁供电公司 Dynamic authorization system for office building visitors and management method
CN106408703A (en) * 2016-08-31 2017-02-15 广州云系信息科技有限公司 Identification method of visitor information
US20200051348A1 (en) * 2017-04-19 2020-02-13 JRD Communication (Shenzhen) Ltd. Method, server, smart terminal and storage device for access authentication
CN109598831A (en) * 2018-11-20 2019-04-09 北京千丁互联科技有限公司 A kind of visitor's access control system control method and its device based on image recognition
CN109658579A (en) * 2019-02-28 2019-04-19 中新智擎科技有限公司 A kind of access control method, system, equipment and storage medium
CN110322602A (en) * 2019-06-18 2019-10-11 特斯联(北京)科技有限公司 A kind of visitor reserves passing method, system and equipment

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113838236A (en) * 2021-09-02 2021-12-24 合肥优恩物联网科技有限公司 Intelligent access control's place inquiry system and device
CN113793691A (en) * 2021-09-17 2021-12-14 北京声智科技有限公司 Questionnaire survey method, server and terminal equipment
CN114187696A (en) * 2021-12-09 2022-03-15 软通智慧信息技术有限公司 Personnel access detection method, device, equipment and storage medium
CN114187696B (en) * 2021-12-09 2024-02-02 软通智慧信息技术有限公司 Personnel access detection method, device, equipment and storage medium
CN115174668A (en) * 2022-06-30 2022-10-11 广州瀚信通信科技股份有限公司 Information pushing method and device, electronic equipment and storage medium
CN115174668B (en) * 2022-06-30 2024-03-19 广州瀚信通信科技股份有限公司 Information pushing method and device, electronic equipment and storage medium
CN115131907A (en) * 2022-08-30 2022-09-30 湖南海讯供应链有限公司 Intelligent access control system and communication method thereof

Similar Documents

Publication Publication Date Title
CN113240846A (en) Visitor service management method and device, electronic equipment and storage medium
US20230134823A1 (en) Proximity-Based System for Object Tracking
US20210334481A1 (en) Proximity-Based System for Object Tracking an Automatic Application Initialization
US11335440B1 (en) Health status system, platform, and method
US11335441B2 (en) Health safety system, service, and method
US11710132B2 (en) User controlled event record system
US20020178364A1 (en) Universal secure registry
US9871760B2 (en) Message transmission scheme in a controlled facility
US20130138451A1 (en) Infection spread prevention support system, infection spread prevention support server, examination terminal, mobile terminal and program
US10622104B2 (en) System and method utilizing facial recognition with online (social) network to access casualty health information in an emergency situation
CN109544746A (en) A kind of community's access control system control method and its device
JP2005322164A (en) Movement management system
CN110084930B (en) Hospital supervision system for nurse station based on HIS
US10319056B1 (en) Biased task assignments based on geotracking of discharge vehicles
US20230077823A1 (en) System and method to access casualty health information in an emergency situation
US20230402162A1 (en) Systems and methods for dispensing medications based on proximity to an electronic medication storage cabinet
US8392204B2 (en) System and method for managing and tracking child welfare services
Corte-Real et al. Blockchain technology and universal health coverage: Health data space in global migration
US20210262809A1 (en) Estimation and presentation of total journey time from origin to gate
Epton et al. Reducing hospital admissions for COPD: Perspectives following the Christchurch Earthquake
WO2021019508A1 (en) Property management systems
WO2015051449A1 (en) Method for automatically sending a signal indicative of a position in a queue
US20150073843A1 (en) Secure Facility Resident Grievance / Request FIling System
US20190311103A1 (en) Method Performed By A Computer System for Biometric Authentication of Human Beings of a First or a Second Category
GB2593054A (en) System and method for monitoring and managing interactions being human beings and/or inanimate beings

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210810

RJ01 Rejection of invention patent application after publication