CN115379389A - Paperless data processing system for message notification - Google Patents

Paperless data processing system for message notification Download PDF

Info

Publication number
CN115379389A
CN115379389A CN202211318921.3A CN202211318921A CN115379389A CN 115379389 A CN115379389 A CN 115379389A CN 202211318921 A CN202211318921 A CN 202211318921A CN 115379389 A CN115379389 A CN 115379389A
Authority
CN
China
Prior art keywords
user
target
event
terminal
area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211318921.3A
Other languages
Chinese (zh)
Other versions
CN115379389B (en
Inventor
唐红武
黄少卿
申震云
李睿
王殿胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Travelsky Mobile Technology Co Ltd
Original Assignee
China Travelsky Mobile Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Travelsky Mobile Technology Co Ltd filed Critical China Travelsky Mobile Technology Co Ltd
Priority to CN202211318921.3A priority Critical patent/CN115379389B/en
Publication of CN115379389A publication Critical patent/CN115379389A/en
Application granted granted Critical
Publication of CN115379389B publication Critical patent/CN115379389B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/40Business processes related to the transportation industry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a paperless data processing system for message notification, which comprises a verification terminal and a plurality of mobile terminals; the authentication terminal is configured to perform the following step, S110, in response to reaching the first target time t1 tar The method comprises the steps of obtaining a user information set U corresponding to a target event to be executed, S120, obtaining a target user identification set H from U, wherein the H comprises a plurality of target user identifications, the target user identification is a user identification corresponding to an unexecuted first related event in the U, S130, obtaining a candidate user identification sent by at least one target device to obtain a candidate user identification set G, the target device is a mobile terminal which is in wireless communication connection with a verification terminal at present, S140, obtaining an intersection K1 of the H and the G, S150, and if the K1 is not an empty set, controlling a publishing device to play a first notification message in a voice mode. Thus, the present inventionThe frequency of data processing system operational anomalies can be reduced.

Description

Paperless data processing system for message notification
Technical Field
The invention relates to the field of data processing, in particular to a paperless data processing system for message notification.
Background
In the aviation industry, passengers with a journey to be departed are authenticated before boarding, and if at least part of the passengers with the journey to be departed are not boarding yet when approaching the boarding end time corresponding to the journey to be departed, broadcast notification is required.
Whether a broadcast notification is needed or not can be determined by a boarding system at present, a level system comprises a verification terminal and a server, and the verification terminal is connected with the server; when the level system is used, the passenger information of the corresponding journey to be started can be stored through the verification terminal, when the time for determining whether to perform broadcast notification is reached, the verification terminal is required to determine whether the passenger who is boarding currently is all passengers corresponding to the journey to be started, if not, the verification terminal is required to send a broadcast request to the corresponding server, and the server receives the broadcast request and then controls the broadcast equipment in the control center to perform broadcast notification.
However, in addition to a plurality of verification terminals being provided in an airport and each corresponding to a number of trips to be started every day, a large number of devices in the airport other than the verification terminals need to perform data transmission with a server, and furthermore, the data transmission pressure of the server is high, and the frequency of failure of the server is high, so the frequency of abnormal operation of the boarding system is high.
Disclosure of Invention
Aiming at the technical problems, the technical scheme adopted by the invention is as follows:
a paperless data processing system for message notification comprises an authentication terminal and a plurality of mobile terminals; the mobile terminal is configured to be in a state that the distance between the mobile terminal and the verification terminal is less than a preset distance d set And then establishing wireless communication connection with the verification terminal.
The authentication terminal is used for executing the following steps:
s110, responding to the first target time t1 tar Acquiring a user information set U = (U) corresponding to a target event to be executed 1 ,u 2 ,...,u i1 ,...,u n1 ),u i1 =(D i1 ,S i1 ),i1=1,2,...,n1。
Wherein, t1 tar =t fly -T1,t fly The event execution time of the target event to be executed is T1, and the first preset duration is T1; u. u i1 The user information of the (i 1) th user corresponding to the target event to be executed is obtained, and n1 is the number of users corresponding to the target event to be executed; d i1 The user identifier of the ith 1 st user corresponding to the target event to be executed, S i1 A first associated event execution identifier corresponding to an i1 st user corresponding to a target event to be executed; s i1 = S1 or S2, S i1 = S1 for indicating that the corresponding user does not execute the first associated event, S, of the target event to be executed i1 = s2 is used to indicate that the corresponding user has executed the first associated event of the target event to be executed.
S120, obtaining a target user identification set H = (H) from U 1 ,h 2 ,...,h j1 ,...,h m1 ),j1=1,2,...,m1。
Wherein h is j1 The number of the j 1-th target user identifier is the user identifier which satisfies the corresponding first associated event execution identifier s1 in the U, m1 is the number of the user identifiers which satisfies the corresponding first associated event execution identifier s1 in the U, and m1 is less than or equal to n1.
S130, obtaining candidate user identifiers sent by at least one target device to obtain a candidate user identifier set G = (G) 1 ,g 2 ,...,g q ,...,g ber ),q=1,2,...,ber。
Wherein, g q And identifying candidate user identifications corresponding to the qth target device, wherein the target devices are mobile terminals which are in wireless communication connection with the verification terminal at present, and ber is the number of the target devices.
S140, acquiring an intersection K1 of the H and the G.
S150, if the K1 is not an empty set, controlling the issuing equipment to play the first notification message in a voice mode.
The invention has at least the following beneficial effects:
at the time of arrival at t1 tar If the intersection K1 of the H and the G is not an empty set, it indicates that the users corresponding to at least part of the target user identifiers in the H are located near the verification terminal, and further, the issuing device can be controlled to play the first notification message; compared with the prior art, after at least part of users corresponding to the target event to be executed do not execute the first associated event, the server can control the notification device to issue the notification according to the received request sent by the verification terminal, the acquisition H, G, K and the control of the notification device to play the first notification message in the voice mode are both executed by the verification terminal, data transmission between the verification terminal and the server is not needed, the pressure of the server corresponding to the verification terminal can be reduced, the frequency of the fault of the server is reduced, and the data transmission quantity of the verification terminal is far smaller than that of the server corresponding to the verification terminal, so the frequency of the abnormal work of the data processing system can be reduced. Further, the verification terminal controls the issuing device to play the first notification message when the intersection K1 of the H and the G is not an empty set, and compared with the related art that the notification is issued only when there is a user who does not execute the first associated event, the present invention does not play the first notification message when there is no mobile terminal near the verification terminal, that is, the first notification message may not be played when the user who does not execute the first associated event has no time to execute the first associated event, so that the issuing amount of the invalid first notification message is reduced, and the efficiency of the first notification message issued by the issuing device can be increased.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of a method for performing message notification according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without inventive step based on the embodiments of the present invention, are within the scope of protection of the present invention.
A paperless data processing system for message notification will be described below.
The data processing system comprises a verification terminal and a plurality of mobile terminals; the mobile terminal is configured to be in a state that the distance between the mobile terminal and the verification terminal is less than a preset distance d set And then, establishing wireless communication connection with the verification terminal.
In a possible implementation manner, the verification terminal may be a smart device placed at any boarding gate in an airport, and the mobile terminal may be configured as a mobile terminal such as a mobile phone or a smart watch; d set Can be 3-10 m, preferably, d set And may be 5 meters.
Referring to the flow chart of the method for notifying the message shown in fig. 1, the authentication terminal is configured to perform the following steps:
s110, responding to the first target time t1 tar Acquiring a user information set U = (U) corresponding to a target event to be executed 1 ,u 2 ,...,u i1 ,...,u n1 ),u i1 =(D i1 ,S i1 ),i1=1,2,...,n1。
Wherein, t1 tar =t fly -T1,t fly The event execution time of the target event to be executed is T1, and the first preset duration is T1; u. of i1 The user information of the (i 1) th user corresponding to the target event to be executed is obtained, and n1 is the number of the users corresponding to the target event to be executed; d i1 The user identifier of the ith 1 st user corresponding to the target event to be executed, S i1 The (i 1) th corresponding to the target event to be executedA first associated event execution identifier corresponding to a user; s i1 = S1 or S2, S i1 = S1 for indicating that the i1 st user does not execute the first associated event, S, of the target event to be executed i1 = s2 is used to indicate that the i1 st user has executed the first associated event of the target to-be-executed event.
In a possible implementation manner, the target event to be executed may be a flight itinerary, and the gate corresponding to the flight itinerary is a gate corresponding to the verification terminal; t1 may be 15 to 30 minutes, preferably, T1 is 20 minutes, and the event execution time may be the takeoff time of the corresponding target event to be executed; the user corresponding to the target event to be executed can target the passenger corresponding to the event to be executed; the user identifier may be a unique identifier of a corresponding user, for example, the user identifier may be an identity card number or a unique user name of the corresponding user, the first correlation event may be boarding, and if any user of the target event to be executed passes verification through the verification terminal, the user has executed the first correlation event, that is, the user has boarded; authenticating a terminal in response to reaching t1 tar And obtaining U.
S120, obtaining a target user identification set H = (H) from the U 1 ,h 2 ,...,h j1 ,...,h m1 ),j1=1,2,...,m1。
Wherein h is j1 The number of the j 1-th target user identifier is the user identifier which satisfies the corresponding first associated event execution identifier s1 in the U, m1 is the number of the user identifiers which satisfies the corresponding first associated event execution identifier s1 in the U, and m1 is less than or equal to n1.
In a possible implementation manner, after obtaining U, the verification terminal may obtain H from U, where a user corresponding to each target user identifier in H is a user that has not executed the first associated event of the target event to be executed.
S130, obtaining candidate user identifications sent by at least one target device to obtain a candidate user identification set G = (G) 1 ,g 2 ,...,g q ,...,g ber ),q=1,2,...,ber。
Wherein, g q A candidate user mark corresponding to the qth target equipmentThe target equipment is a mobile terminal which is in wireless communication connection with the verification terminal at present, and ber is the number of the target equipment.
In a possible implementation manner, a target application program may be installed in each mobile terminal, the target application program may be an application program developed by an airline company for purchasing an air ticket and loading an electronic boarding pass, and the candidate user identifier may be a user identifier of a user to be boarded corresponding to the electronic boarding pass of the corresponding target device; after the H is obtained, the candidate user identifier sent by each target device may be obtained in a wireless communication connection manner, so as to obtain G.
S140, acquiring an intersection K1 of the H and the G.
In a possible implementation manner, after obtaining H and G, the verification terminal may obtain that the user corresponding to each element in K1, K1 is the user whose corresponding mobile terminal is near the verification terminal and does not execute the first associated event of the target event to be executed.
S150, if the K1 is not the empty set, controlling the issuing equipment to play the first notification message in a voice mode.
In one possible embodiment, the issuing device may be a broadcasting device, and the issuing device may be located close to the verification terminal or mounted on the verification terminal, for example, the distance between the issuing device and the verification terminal is less than d set The first notification message may be used to prompt the user of the target to-be-executed event to board the aircraft as soon as possible at the verification terminal. In addition, the distribution device may also play the first notification message in a voice form and a video form, for example, the distribution device may be a display screen.
Thus, at arrival t1 tar If the intersection K1 of the H and the G is not an empty set, it indicates that the users corresponding to at least part of the target user identifiers in the H are located near the verification terminal, and further, the issuing device can be controlled to play the first notification message; compared with the related art, the method is to be performed at the targetAfter at least part of users corresponding to the execution event do not execute the first associated event, the server can control the notification device to issue the notification according to the request sent by the verification terminal, the acquisition H, G, K and the control of the notification device to play the first notification message in a voice mode are both executed by the verification terminal, data transmission between the verification terminal and the server is not needed, the pressure of the server corresponding to the verification terminal can be reduced, the frequency of the fault of the server is reduced, and the data transmission quantity of the verification terminal is far smaller than that of the server corresponding to the verification terminal, so the frequency of the abnormal work of the data processing system can be reduced. Further, the verification terminal controls the issuing device to play the first notification message when the intersection K1 of the H and the G is not an empty set, and compared with the related art that the notification is issued only when there is a user who does not execute the first associated event, the present invention does not play the first notification message when there is no mobile terminal near the verification terminal, that is, the first notification message may not be played when the user who does not execute the first associated event has no time to execute the first associated event, so that the issuing amount of the invalid first notification message is reduced, and the efficiency of the first notification message issued by the issuing device can be increased.
Optionally, step S110 includes:
s111, responding to the first target time t1 tar Acquiring a user information set U = (U) corresponding to a target event to be executed 1 ,u 2 ,...,u i1 ,...,u n1 ),u i1 =(D i1 ,S i1 ,V i1 ),i1=1,2,...,n1;
Wherein, V i1 A second associated event execution identifier, V, corresponding to the ith 1 st user corresponding to the target event to be executed i1 = V1 or V2, V i1 = V1 for indicating that the i1 st user does not execute the second associated event of the target event to be executed, V i1 = v2 is used for indicating that the i1 st user has executed the second associated event of the target to-be-executed event; the event execution time of the first associated event corresponding to any user is positioned behind the event execution time of the second associated event corresponding to the user;
at this time, the target user identifier in step S120 is a user identifier that satisfies the corresponding first associated event execution identifier S1 and the corresponding second associated event execution identifier v2 in U; m1 is the number of user identifiers satisfying the corresponding first associated event execution identifier s1 and the corresponding second associated event execution identifier v2 in U.
In one possible embodiment, the second associated event may be a security check; therefore, the present invention is achieved by reaching t1 tar When the first notification message is issued, the possibility that the first notification message is issued to the user who does not execute the first correlation event due to the fact that the user who does not execute the second correlation event is reduced, the issue amount of invalid first notification messages is further reduced, and the efficiency of the first notification message issued by the issuing device is further increased.
Optionally, the system further includes a first server and a second server, the verification terminal is connected to the second server through a public network, and the verification terminal is connected to the first server through a local area network;
after step S130, the authentication terminal is further configured to perform the following steps:
s160, acquiring a relative complement set K2= (K2) of G in H 1 ,k2 2 ,...,k2 i2 ,...,k2 y ) I2=1,2, ·, y; wherein, k2 i2 Identifying the ith 2 target users which do not belong to G in H; y is the number of target user identifications which do not belong to G in H;
s170, if the K2 is not an empty set, sending the K2 to a second server;
the second server is used for executing the following steps:
s210, responding to the connectionReceiving K2, obtaining an information DATA set DATA = (DATA) corresponding to K2 1 ,data 2 ,...,data i2 ,...,data y ),data i2 =(k2 i2 ,bio1 i2 ,seat i2 ) (ii) a Wherein, the data i2 Is k2 i2 Information data of the corresponding user, bio1 i2 Is k2 i2 Corresponding face image information of the user, seat i2 Is k2 i2 Mobile end location data of a corresponding user;
s220, sending the DATA to a first server;
the first server is used for executing the following steps on the DATA:
s310, responding to the received DATA, determining seat in the DATA i2 Area identification area of corresponding target area i2 ;seat i2 Located within a corresponding target region;
s320, mixing bio1 i2 And area i2 Sent to area i2 A corresponding AR device; AR devices for use according to bio1 i2 Determining bio1 in the corresponding target region i2 And (4) the corresponding user.
In one possible embodiment, the first server may be a local server located within the airport and the second server may be a cloud server located at a location remote from the airport; after step S130, if the relative complement set K2 of G in H is not an empty set, it indicates that the user with a high probability corresponding to each target user identifier in K2 has not reached the vicinity of the verification terminal, at this time, K2 is sent to the second server, the second server may obtain the face image information corresponding to each target user identifier in K2 and the position DATA of the corresponding mobile terminal, so as to obtain DATA, and send DATA to the first server, after receiving DATA, the first server determines a target area corresponding to each position DATA in DATA, and then sends the area identifier corresponding to the position DATA and the face image information to a certain AR device, where the AR device is an AR device corresponding to the area identifier, and for example, the AR device may be an AR glasses; then, the staff can carry the AR device to the target area to search for the user corresponding to the received facial image information, and remind the user to go to the vicinity of the verification terminal to execute the first correlation event, so that the possibility that the user corresponding to the target event to be executed does not execute the first correlation event on time can be reduced, and the possibility that the user of the target event to be executed cannot successfully execute the target event to be executed when the event execution time is reached is further reduced.
Optionally, area i2 Corresponding to a plurality of AR devices;
step S320, including:
s321, taking area i2 Determining the AR equipment in the non-working state in each corresponding AR equipment as area i2 A corresponding candidate AR device; the default state of each AR device is a non-working state;
s322, taking area i2 Location and seat in corresponding candidate AR devices i2 The candidate AR device with the minimum position distance is taken as the area i2 A corresponding target AR device;
s323, taking area i2 The corresponding target AR equipment is switched to a working state;
s324, mixing bio1 i2 And area i2 Sent to area i2 A corresponding target AR device; area i2 The corresponding target AR equipment is used for determining bio1 i2 The corresponding user is switched to a non-working state.
In one possible embodiment, the first server may obtain and store location information for each AR device and perform periodic updates, where the first server determines the seat in the DATA i2 Area identification area of corresponding target area i2 Then, can be from area i2 Determining one of the corresponding AR devices in a non-working state and at a position and a seat i2 The corresponding AR device with the minimum distance between the positions is taken as a target AR device, the target AR device can be switched to be in a working state, and then bio1 is used i2 And area i2 Sending the information to the target AR equipment, and using the target AR equipment to determine bio1 by the staff i2 After the corresponding user, the target AR equipment can be manually switched to a non-working state; for example, after the target AR device is switched to the working state, the working state identifier corresponding to the target AR device in the first server is 1, and the target AR device is switched to the working stateAfter the AR device is switched to the non-working state, the working state identifier corresponding to the target AR device in the first server is 0, and then the first server can confirm whether the AR device is in the working state through the working state identifier corresponding to each AR device.
Thus, bio1 i2 And area i2 Can be sent to and from the area i2 Corresponding, in the non-operating state and with seat i2 In the corresponding AR equipment with the minimum position distance, namely the distance between the staff carrying the AR equipment and the user to be determined is smaller at the moment, and then the staff can arrive at the target area corresponding to the AR equipment as soon as possible and start to determine bio1 i2 And the efficiency of determining the user in the corresponding target area by using the AR equipment by the staff is improved.
In another possible implementation, either AR device is receiving bio1 i2 And area i2 Then a warning tone can be given and bio1 is displayed on the AR device i2 Corresponding image information and area i2
Optionally, area i2 Corresponding to a plurality of AR devices; the first server is used for storing a processing value corresponding to each AR device, and the initial value of each processing value is 0;
step S320, including:
s325, area i2 Each corresponding AR device is determined to be area i2 A corresponding candidate AR device;
s326, area is processed i2 Taking the candidate AR device with the minimum current corresponding processing value as area from the plurality of corresponding candidate AR devices i2 A corresponding target AR device;
s327, extracting area i2 Adding 1 to the processing value of the corresponding target AR equipment;
s328, mixing bio1 i2 And area i2 Sent to area i2 A corresponding target AR device; area i2 The corresponding target AR equipment determines bio1 i2 And after the corresponding user, subtracting 1 from the processing value corresponding to the target AR equipment.
In a possible implementation manner, the processing value corresponding to the AR device is to be determined by the current AR deviceFor example, if the processing value corresponding to any AR device is 3, it indicates that the AR device needs to determine 3 users currently. Thus, bio1 i2 And area i2 Can be sent to and from the area i2 In the corresponding AR device with the least number of users to be determined, bio1 can be further enabled i2 And area i2 Is sent to the AR device with the least workload currently, so that the AR device can determine bio1 as soon as possible i2 And the corresponding user improves the efficiency of determining the user in the corresponding target area by using the AR equipment by the staff.
Optionally, step S140 includes:
s141, acquiring the intersection K1= (K1) of H and G 1 ,k1 2 ,...,k1 a ,...,k1 b ) A =1,2, ·, b; wherein, k1 a Identifying the a-th candidate user belonging to H in G; b is the number of candidate user identifications belonging to H in G;
the authentication terminal is also used for K1 in K1 a The following steps are carried out:
s180, responding to the reaching of the second target time t2 tar Determining k1 a Whether a corresponding target user executes a first associated event of a target event to be executed; if not, then k1 is added a Sending to a first server; t2 tar =t bro +T2,t bro The start execution time of step S150, T2 is a second preset duration;
the second server is further configured to perform the steps of:
s230, responding to the reception of the k1 sent by the first server a Obtaining k1 a Corresponding face image information bio2 a
S240, mixing bio2 a Sending to a first server;
the first server is further configured to perform the steps of:
s330, in response to receiving bio2 a Introduction of bio2 a Sending the information to AR equipment corresponding to the verification terminal; the AR equipment corresponding to the verification terminal is used for verifying the bio2 a Determining bio2 within a reference region a A corresponding user; the distance between any position in the reference area and the verification terminal is smaller than d set
In one possible embodiment, T2 may be 1.5 to 3 minutes; the verification terminal may perform the following processing for each candidate user identifier in K1: in response to reaching the second target time t2 tar Determining k1 a Whether a corresponding target user executes a first associated event of a target event to be executed; if not, then k1 is indicated a The corresponding target user is near the verification terminal but does not finish boarding, and k1 is used a Sending to a first server; finally verifying that AR equipment corresponding to the terminal can receive k1 a Corresponding face image information bio2 a The staff can determine the bio2 in the reference area through the AR equipment corresponding to the verification terminal a The corresponding user.
Therefore, if a certain user is near the verification terminal but the user still does not execute the first associated event within the time T2 after the first notification message is played by the issuing device in the form of voice, the AR glasses can be used for determining the user by referring to the area, and the possibility that the user corresponding to the target event to be executed does not execute the first associated event on time can be reduced.
In another possible implementation, verifying that the AR device corresponding to the terminal receives bio2 a Then a warning tone may be sounded and bio2 displayed on the AR device a Corresponding image information.
Optionally, after step S141, the authentication terminal is further configured to perform the following steps:
and S190, if the K1 is not the empty set, sending a second notification message to the target device corresponding to each candidate user identifier corresponding to the K1 through wireless communication connection.
In a possible implementation manner, the second notification message may be a short message used for prompting the user of the target event to be executed to board the aircraft as soon as possible at the verification terminal, so that if any user corresponding to the target event to be executed is located near the verification terminal and does not execute the first correlation event, the mobile terminal corresponding to the user may also receive the second notification message, and the possibility that the user corresponding to the target event to be executed does not execute the first correlation event on time may be further reduced.
Optionally, T2= γ × T1; wherein gamma is a preset coefficient, and gamma is more than 0 and less than 0.5.
Preferably, γ =0.1; therefore, the smaller T1 is, the smaller T2 is, the greater the possibility of T2 corresponding to the smaller T1 is reduced, and further, the shorter the time for the issuing device to play the first notification message and the event execution time of the corresponding target event to be executed is, the faster the AR device corresponding to the verification terminal can be used to determine the user who does not execute the first associated event, and the further, the possibility that the user corresponding to the target event to be executed does not execute the first associated event on time when T1 is smaller is reduced.
Optionally, after step S150, the verification terminal is further configured to perform the following steps:
s200, in response to t being reached fly Deletion U, H, G and K1.
Thus, when t is reached fly And U, H, G and K1 related to the first associated event of the target to-be-executed event in the verification terminal can be deleted, so that the storage space of the verification terminal can be saved.
Optionally, the mobile terminal is configured to determine whether the distance between the mobile terminal and the verification terminal is less than the preset distance d set Then, establishing Bluetooth connection with a verification terminal; the bluetooth connection may reduce network pressure to authenticate the terminal.
Further, the data processing system may be further configured to perform data modification, and the specific scheme is as follows:
the data processing system can also comprise a plurality of verification terminals which are completely the same as the verification terminals, each verification terminal is provided with a unique corresponding geographic position, each verification terminal is used for storing at least one event information set of an event to be executed corresponding to the corresponding geographic position of the verification terminal, and the same event to be executed only corresponds to one verification terminal at the same time; each authentication terminal is connected with at least some of the other authentication terminals.
In a possible implementation manner, each verification terminal may be a smart device placed at any security check gate or any boarding gate of an airport, based on which, the geographic location corresponding to the verification terminal may be the security check gate or the boarding gate corresponding to the verification terminal, and the event to be executed may beMaking a flight itinerary; each verification terminal is used for performing identity verification on each execution user corresponding to the corresponding to-be-executed event, and the distance between each verification terminal and each execution user can be smaller than a preset value d dis The other verification terminals are connected in a wireless or wired mode, and the other verification terminals corresponding to a certain verification terminal are verification terminals except the verification terminal in the plurality of verification terminals.
Each authentication terminal is further configured to perform the following steps:
s410, a data change request DEL = (a 1, h, a 2) sent by the first server is received.
Wherein, a1 is a terminal identifier of a verification terminal receiving DEL, h is an event identifier of any event to be executed corresponding to the verification terminal receiving DEL, and a2 is a terminal identifier of any verification terminal different from the verification terminal receiving DEL among a plurality of verification terminals.
In a possible implementation manner, the terminal identifier may be a unique identifier of the corresponding authentication terminal, for example, the terminal identifier may be a terminal id (Identity document), a physical address or a hardware address of the corresponding terminal; the event identifier can be a unique code of the corresponding event to be executed, and the unique code can be a code consisting of a flight number and takeoff time corresponding to the corresponding event to be executed; if the geographic position corresponding to the event to be executed corresponding to the h is changed from the geographic position corresponding to the a1 to the geographic position corresponding to the a2, the first server generates a DEL and sends the DEL to the verification terminal corresponding to the a1 according to the a1 in the DEL, at this time, the verification terminal corresponding to the a1 can receive the DEL, and other verification terminals except the verification terminal corresponding to the a1 in the verification terminals cannot receive the DEL.
And S420, determining an event information set EVE = (h, F) of the event to be executed corresponding to h.
And F is an execution user information set of the event to be executed corresponding to h.
In one possible implementation, the authentication terminal corresponding to a1 may determine an event information set EVE corresponding to the event to be executed in response to receiving DEL.
S430, determining whether the verification terminal corresponding to the a2 is connected with the verification terminal corresponding to the a 1; and if so, sending the EVE to the verification terminal corresponding to the a 2.
In a possible implementation manner, after the authentication terminal corresponding to a1 determines the EVE, it may be determined whether the authentication terminal corresponding to a2 is connected with the authentication terminal corresponding to a1, and if so, the authentication terminal corresponding to a1 sends the EVE to the authentication terminal corresponding to a 2; otherwise, the verification terminal corresponding to a1 needs to send the EVE to the first server, and the first server sends the EVE to the verification terminal corresponding to a 2.
Therefore, when the geographic position corresponding to the event to be executed corresponding to h is changed from the geographic position corresponding to a1 to the geographic position corresponding to a2, the EVE needs to be sent to the verification terminal corresponding to a2, at this time, the first server may send the data change request DEL to the verification terminal corresponding to a1, and if the verification terminal corresponding to a1 is connected to the verification terminal corresponding to a2, the verification terminal corresponding to a1 may directly send the EVE to the verification terminal corresponding to a 2; compared with the prior art that the data transmission is carried out between the verification terminals through the first server, the verification terminal corresponding to a1 in the invention can directly carry out EVE transmission with the verification terminal corresponding to a2, the data transmission quantity between the verification terminal and the first server is reduced, the pressure of the first server can be further reduced, the failure frequency of the first server can be reduced, and the data transmission quantity of the verification terminal is far smaller than that of the first server, so the invention can reduce the abnormal working frequency of the data processing system.
Optionally, the system further includes a plurality of mobile terminals; the mobile terminal is configured to be at a distance smaller than a preset distance d from a verification terminal set Then, establishing wireless communication connection with the verification terminal; each mobile terminal stores a corresponding reference user identifier; the reference user identification and the execution user identification of the same user are the same;
step S420, including:
s421, determining an event information set EVE = (h, F) of the event to be executed corresponding to h, and F = (F) 1 ,f 2 ,...,f i ,...,f n ) I =1,2, ·, n; wherein f is i For h corresponding to the event pair to be executedThe corresponding ith execution user identifier, i is the number of execution users corresponding to the event to be executed corresponding to h;
after step S420, the authentication terminal corresponding to a1 is further configured to perform the following steps:
s440, obtain a first reference user identity set L1= (L1) sent by at least one first candidate mobile terminal 1 ,l1 2 ,...,l1 k ,...,l1 p ) K =1,2, ·, p; wherein, l1 k For the reference user identifier stored in the kth first candidate mobile terminal, the first candidate mobile terminal is the mobile terminal currently establishing wireless communication connection with the verification terminal corresponding to a1, and p is the number of the first candidate mobile terminals;
s450, acquiring the intersection S1= (S1) of L1 and F 1 ,s1 2 ,...,s1 var ,...,s1 y ) Var =1,2, ·, y; wherein, s1 var The identifier of the var-th reference user belonging to F in L1; y is the number of reference user identities belonging to F in L1;
s460, sending a first notification message to each first candidate mobile station corresponding to S1 through a wireless communication connection.
In a possible implementation manner, a target application program may be installed in each mobile terminal, the target application program may be an application program developed by an airline company and used for purchasing an air ticket and loading an electronic boarding pass, the reference user identifier may be a user unique identifier of a user to be boarded corresponding to the electronic boarding pass in the corresponding first candidate mobile terminal, and the user unique identifier may be an identification number or a unique user name of the corresponding user; the mobile terminal can be set as mobile equipment such as a mobile phone or a smart watch; d is a radical of set Can be 3-10 m, preferably, d set May be 5 meters; the executive user corresponding to the event to be executed can be the passenger corresponding to the event to be executed.
Therefore, according to the above-mentioned solution, if the executing user corresponding to the event to be executed carries the mobile terminal corresponding to the event to be executed to the location where the wireless communication connection is established with the verifying terminal corresponding to a1, it is indicated that the executing user has a large probability that it does not know that the verifying terminal corresponding to the event to be executed has been changed to the verifying terminal corresponding to a2, at this time, the verifying terminal may send a first notification message to the mobile terminal, where the first notification message may be used to prompt that the verifying terminal corresponding to the event to be executed has been changed from the verifying terminal corresponding to a1 to the verifying terminal corresponding to a2, and prompt the corresponding user to go to the notifying message at the verifying terminal corresponding to a2, so that the possibility that the executing user corresponding to the event to be executed waits at the verifying terminal corresponding to a1 because it has not known that the verifying terminal corresponding to the event to be executed has been changed to the verifying terminal corresponding to a2 can be reduced.
Optionally, the verification terminal corresponding to a1 is further configured to perform the following steps:
s470, in response to reaching the first time t1, obtaining a second reference user identification set L2= (L2) 1 ,l2 2 ,...,l2 j ,...,l2 m ) J =1,2, · m; wherein t1= ts + Δ t 1 (ii) a ts is the start execution time of step S460, Δ t 1 Is a first preset time length; l2 j For reference user identification stored in the jth reference mobile terminal, the reference mobile terminal is a mobile terminal which establishes wireless communication connection with the verification terminal corresponding to a1 when t1 is reached, and m is the number of the reference mobile terminals;
s480, obtain the relative complement S2= (S2) of L2 in S1 1 ,s2 2 ,...,s2 u ,...,s2 v ) U =1,2, ·, v; wherein, s2 u The identity of the u-th reference user which does not belong to the L2 in the S1 is identified; v is the number of reference user identifiers not belonging to L2 in S1;
s490, delete satisfying F in F i E.g., the executing user identification of S2.
In one possible embodiment, Δ t 1 May be 1 minute.
Therefore, after the first time t1 is reached, the first notification message is sent to each first candidate mobile terminal corresponding to S1 through the wireless communication connection at the time Δ t has elapsed 1 If the verification terminal corresponding to a1 determines that any mobile terminal receiving the first notification message does not establish wireless communication connection with the verification terminal corresponding to a1 at present, it indicates that the user corresponding to the mobile terminal leaves from the verification terminal corresponding to a1 after receiving the first notification message, and at this time, the executive user corresponding to the user may be deleted from FAnd marking, and further saving the storage space of the authentication terminal corresponding to the a 1.
Optionally, after step S490, the authentication terminal corresponding to a1 is further configured to perform the following steps:
s510, determining whether the F is an empty set, if so, entering S220; otherwise, go to S230;
s520, deleting the EVE;
s530, determining whether the verification terminal corresponding to the a2 is connected with the verification terminal corresponding to the a 1; if yes, acquiring a third reference user identification set L3= (L3) from the verification terminal corresponding to a2 1 ,l3 2 ,...,l3 qt ,...,l3 z ) Qt =1,2, ·, z; wherein, l3 qt A reference user identifier stored in a qth second candidate mobile terminal is stored, the second candidate mobile terminal is a mobile terminal which currently establishes wireless communication connection with the verification terminal corresponding to a2, and z is the number of the second candidate mobile terminals;
s540, deleting the F meeting the requirement in the F i E.g. the executing user identification of L3.
In a possible implementation manner, after step S490, if the current authentication terminal corresponding to a2 is connected to the authentication terminal corresponding to a1, the authentication terminal corresponding to a1 may send an information request to the authentication terminal corresponding to a2, the authentication terminal corresponding to a2 obtains L3 in response to receiving the information request, and sends L3 to the authentication terminal corresponding to a1, further, each reference user identifier in L3 is a user identifier corresponding to a user that has reached the vicinity of the authentication terminal corresponding to a2, and if f is, then, the user identifier is a user identifier corresponding to a user that has reached the vicinity of the authentication terminal corresponding to a2 i E.g. L3, it indicates that the user near the verification terminal corresponding to a2 is the user corresponding to the event to be executed, at this time, it is not necessary to send a notification message to the user, and the execution user identifier F corresponding to the user is directly deleted in F i That is, for the change message that the verification terminal corresponding to the event to be executed is changed from the verification terminal corresponding to a1 to the verification terminal corresponding to a2, the present invention can reduce the possibility of sending the notification message to the user who knows the change message, and reduce the communication pressure of the verification terminal corresponding to a 1.
Optionally, each verification terminal is connected to the first server through a local area network, the system further includes a second server, and each verification terminal is connected to the second server through a public network;
after step S540, the authentication terminal corresponding to a1 is further configured to perform the following steps:
s550, determining whether the F is an empty set, if so, entering S220; otherwise, go to S260;
s560, determine the current F as M = (M) 1 ,m 2 ,...,m c ,...,m e ) C =1,2, ·, e; wherein m is c E is the number of the c-th executive user identifier in the current F;
s570, sending the M to a second server;
the second server is used for executing the following steps:
s610, responding to the received M, obtaining M in M c Corresponding position information seat of mobile terminal c
S620, determining seat c Whether the corresponding position is located in a preset area or not; if yes, then go to m c The corresponding mobile terminal sends a second notification message; each verification terminal is located in a preset area; the first notification message differs from the second notification message in message content.
In a possible embodiment, the first server may be a local server placed in an airport, the second server may be a cloud server placed in a location far away from the airport, and the preset area may be set as an area where the airport is located; after step S540, if F in the authentication terminal corresponding to a1 is still not an empty set, it indicates that there is a user corresponding to the to-be-executed event that the authentication terminal corresponding to a1 does not confirm that the user does not need to be notified and is not notified, at this time, the current F may be determined as M, and M is sent to the second server, the second server may obtain location information corresponding to each executed user identifier in M, and determine whether a location corresponding to each location information is within a preset area, if yes, it indicates that there is a high possibility that the executed user corresponding to the location information reaches the authentication terminal corresponding to a2 before the first specified time to perform authentication, the first specified time is an authentication end time corresponding to the to-be-executed event corresponding to h, at this time, a second notification message may be sent to the mobile terminal corresponding to the location information, and the second notification message may be a notification message that urges the corresponding user to go to the authentication terminal corresponding to a2 as soon as possible to perform authentication.
Optionally, step S620 includes:
s621, determining seat c Whether the corresponding position is located in a preset area or not; if yes, then go to m c The corresponding mobile terminal sends a second notification message; otherwise, to m c The corresponding mobile terminal sends a third notification message; the first notification message and the second notification message are both different from the third notification message.
In a possible implementation manner, if a location corresponding to location information corresponding to any executive user identifier in M is not within a preset area, it indicates that there is a low possibility that the executive user corresponding to the location information reaches the authentication terminal corresponding to a2 before the first specified time to perform authentication, at this time, a third notification message may be sent to the mobile terminal corresponding to the location information, and the second notification message may be a notification message that prompts that the corresponding user may not normally execute the event to be executed corresponding to h.
Optionally, before step S410, the second server is further configured to perform the following steps;
s630, in response to reaching the second time t2, obtaining the event information subset eve = (h, F) 1 ),F 1 =(f 1 ,f 2 ,...,f num ) (ii) a Wherein t2= t0- Δ t 2 T2 is less than ts, t0 is the event execution time corresponding to the event to be executed corresponding to h, t1 is less than t0, delta t 2 A second preset duration; f 1 To perform a subset of user information; num is the number of executing users related to the event to be executed corresponding to h before t2, and num is less than n;
s640, sending F to the verification terminal corresponding to the a1 1
S650, starting from the second time t2, periodically carrying out data transmission processing;
the data transmission processing includes:
acquiring an execution user identifier associated with the event to be executed corresponding to h in the corresponding period;
sending an execution user identifier associated with the event to be executed corresponding to h in the corresponding period to the verification terminal corresponding to a 1;
step S420, including:
s421, f sent by the second server num+1 、f num+2 、...、f n-1 And f n Adding the EVE to F in the EVE sent by the second server to obtain EVE; f. of num+1 、f num+2 、...、f n-1 And f n Are all the executing user identifications associated with the to-be-executed events corresponding to h after the second time t 2.
In a possible implementation manner, before step S410, the EVE needs to be stored in the verification terminal corresponding to a1, t2 may be a switching time for switching the on-line check-in machine to the on-site check-in machine for the check-in machine of the event to be executed corresponding to h, t0 is a takeoff time for the event to be executed corresponding to h, Δ t 2 The time period can be 20-40 minutes, and the correlation with the to-be-executed event corresponding to h is the value machine for completing the to-be-executed event corresponding to h. Thus, F in EVE can be generated for both on-line and field-line check-in modes.
Optionally, the verification terminals corresponding to a1 are further configured to perform the following steps:
and S580, in response to t0, deleting the EVE if the EVE is stored.
Therefore, after the to-be-executed event corresponding to h is started to be executed, if the EVE is still stored in the authentication terminal corresponding to a1, the EVE can be deleted, and the storage space of the authentication terminal corresponding to a1 is saved.
Optionally, after step S450, the authentication terminal corresponding to a1 is further configured to perform the following steps:
s590, if the S1 is not the empty set, controlling the releasing equipment to play the fourth notification message in a voice form; the issuing equipment is connected with the verification terminal.
In a possible implementation manner, the issuing device may be a broadcasting device, and the issuing device may be located close to the verification terminal corresponding to a1 or installed on the verification terminal corresponding to a 1. The fourth notification message may be a notification message for prompting that the authentication terminal corresponding to the event to be executed has been changed from the authentication terminal corresponding to a1 to the authentication terminal corresponding to a 2.
Further, the data processing system can also be used for identity verification, and the specific scheme is as follows:
the verification terminal is provided with a first collector for collecting biological information.
In a possible implementation manner, the verification terminal may be a smart device placed at any security checkpoint or any boarding gate in an airport, and the mobile terminal may be a mobile device such as a mobile phone or a smart watch; d set Can be 3-10 m, preferably, d set May be 5 meters; the biological information can be information such as human face, fingerprint, iris and/or palm print.
The authentication terminal is used for executing the following steps to finish the identity authentication of the user to be authenticated:
s700, responding to the biological information of the user to be verified acquired by the first acquirer, and acquiring the identification information p of the user to be verified corresponding to the biological information 0
In a possible implementation manner, when the first collector collects the biological information of the user to be verified, the verification terminal may obtain the user identifier p to be verified corresponding to the biological information according to the biological information 0 (ii) a Wherein p is 0 One-to-one correspondence with the user to be authenticated, e.g. p 0 Can be an identification number or a unique user name, etc.
S800, obtaining a first subscriber identity sent by at least one target mobile terminal to obtain a subscriber identity set P = (P) 1 ,p 2 ,...,p sin ,...,p son ),sin=1,2,...,son。
Wherein p is sin The number of the son target mobile terminals is the number of the first user identification sent by the sin target mobile terminal; each first user identification is stored in a corresponding target mobile terminal; the target mobile terminal is a mobile terminal which is in wireless communication connection with the verification terminal at present; the user identification information to be verified corresponding to the same user is the same as the first user identification.
In one possible implementation, each mobile terminal may have a target application installed therein, and the target application may beThe first user identification can be a user unique identification of a user to be boarded corresponding to the electronic boarding pass of the corresponding target mobile terminal, and the user unique identification can be an identity card number or a unique user name of the corresponding user; in the formation of p 0 And then, acquiring the first user identifier sent by each target mobile terminal in a wireless communication connection mode to obtain P.
S900, if p 0 And E, the identity of the user to be authenticated passes the authentication.
In one possible embodiment, if p 0 E, if the electronic boarding check corresponding to the son target mobile terminal contains the electronic boarding check of the user to be verified, the identity verification of the user to be verified is passed; and the identity authentication of the user to be authenticated can add an image corresponding to the authentication stamp on the corresponding electronic boarding check of the target mobile terminal.
Therefore, when the identity of the user to be authenticated is authenticated, the authentication terminal can obtain the p corresponding to the biological information according to the obtained biological information of the user to be authenticated 0 Then, the verification terminal can automatically obtain the first subscriber identity in the mobile terminal in a wireless connection state with the verification terminal to obtain P, if P is 0 E.g. P, now state P 0 And the first user identification in the P is the information of the user to be verified, the identity verification of the user to be verified is passed, so that the automatic identity verification of the user to be verified is realized, and compared with the prior art that a worker verifies the identity of the user to be verified through naked eyes and according to a certificate held by the user to be verified, the efficiency of the identity verification of the user to be verified can be improved; in addition, when the distance between the mobile terminal and the verification terminal is less than d set In the invention, the mobile terminals connected with the verification terminal at the same time are fewer, so that the data transmission quantity between the verification terminal and the mobile terminals at any time is smaller, and the aim of reducing the data transmission pressure of the verification terminal is fulfilled; further, inIn the invention, if the first user identification and the p corresponding to any mobile terminal with wireless communication connection with the verification terminal are provided 0 If the identity of the user to be authenticated is the same, the authentication of the user to be authenticated is passed; compared with the prior art, if the first user identifier corresponding to the mobile terminal closest to the verification terminal is the same as the user identifier to be verified, the identity verification of the user to be verified is passed; according to the invention, the next user to be authenticated, which carries out identity authentication after the user to be authenticated, can be located at a position close to the authentication terminal for waiting, so that after the user to be authenticated finishes identity authentication, the next user to be authenticated can move to a position close to the first collector for identity authentication quickly, and further, the time interval for carrying out identity authentication on any two adjacent users to be authenticated can be smaller, thereby improving the efficiency of carrying out identity authentication on a plurality of users to be authenticated.
Optionally, step S700 includes:
s701, responding to the biological information of the user to be verified acquired by the first acquisition device, and acquiring the identification information p of the user to be verified corresponding to the biological information from the local database 0 (ii) a The local database is arranged in the verification terminal.
In one possible implementation, the local database may store local user information of a plurality of local users, where each local user information includes a local user identifier of a corresponding local user and biometric information corresponding to each local user; the user to be verified is any one of a plurality of local users, and after the verification terminal acquires the biological information of the user to be verified through the first acquisition device, the local user identifier corresponding to the biological information can be acquired from the local database to serve as the user identifier information p to be verified corresponding to the biological information 0
Therefore, the verification terminal can directly obtain p corresponding to the biological information in the local database 0 Compared with the prior art that p is acquired from the server corresponding to the verification terminal 0 The data transmission pressure of the server corresponding to the verification terminal can be reduced, the failure frequency of the first server can be further reduced, and the data transmission quantity of the verification terminal is far smaller than that of the verification terminalThe data transmission quantity of the server is correspondingly increased, so that the frequency of the abnormal work of the data processing system can be reduced.
Optionally, the verification terminal is further provided with a second collector for collecting image information of the articles in the preset area to be collected; the biological information is first portrait information;
step S701 includes:
s711, in response to the first portrait information of the user to be verified is acquired through the first acquirer, controlling the second acquirer to acquire an image of the entity certificate in a preset area to be acquired so as to obtain the image information to be verified; the entity certificate is uniquely corresponding to the user to be verified; the entity certificate is provided with original portrait information displayed in an image form and a second user identification displayed in a text form; the user identification to be verified, the first user identification and the second user identification corresponding to the same user are the same;
s712, if the first portrait information and the original portrait information in the image information to be verified meet the preset comparison condition, the step S713 is executed; otherwise, the identity authentication of the user to be authenticated fails;
s713, obtaining the user identification information p to be verified corresponding to the first portrait information from the local database 0
S714, if the user identification information p to be verified 0 And the second user identifier is the same as the second user identifier in the image information to be verified, the process goes to step S800.
In a possible embodiment, the first personal image information may be face image information, and the entity certificate may be an identity card or passport of the corresponding user; after the verification terminal collects the first portrait information of the user to be verified through the first collector, the entity certificate of the user to be verified, which is placed in a preset area to be collected, is collected through the second collector, so that the image information to be verified is obtained according to the entity certificate; in addition, the preset comparison condition may be that the similarity between the first portrait information and the original portrait information in the image information to be verified is greater than a preset threshold, optionally, the preset threshold may be 90% to 99%, and preferably, the preset threshold may be 95%.
Optionally, the verification terminal is further provided with a second collector for collecting image information of the articles in the preset area to be collected; the biological information is first portrait information;
step S700, including:
s721, in response to the first portrait information of the user to be verified is acquired through the first acquirer, controlling the second acquirer to acquire images of the entity certificates in the preset area to be acquired so as to obtain the image information to be verified; the entity certificate is uniquely corresponding to the user to be verified; the entity certificate is provided with original portrait information displayed in an image form and a second user identification displayed in a text form;
s722, if the first portrait information and the original portrait information in the image information to be verified meet the preset comparison condition, the step S723 is executed; otherwise, the identity authentication of the user to be authenticated fails;
s723, determining a second user identifier in the image information to be verified as a user identifier p to be verified 0 And proceeds to step S800.
Therefore, the verification terminal can directly determine the second user identifier in the image information to be verified as p 0 P corresponding to the acquisition of biological information from a local database 0 According to the scheme, the local user information of a plurality of local users does not need to be stored in the local database of the verification terminal, the storage capacity of the verification terminal can be reduced, and the storage space of the verification terminal is saved.
Optionally, a cache List is stored in the verification terminal, and the cache List is configured to store at most amo third user identifiers;
the target mobile terminal is a mobile terminal which is in wireless communication connection with the verification terminal at present and in which the first user identification stored in the target mobile terminal is not in the cache List;
p sin the distance between the corresponding target mobile terminal and the verification terminal is d sin ,d 1 <d 2 <...<d sin <...<d son <d set
Step S900 is replaced with the following steps:
s910, if N < amo, p is added 1 ,p 2 ,...,p x Adding the third user identifier into the cache List; wherein, N is the number of the current third user identifiers in the cache List; x = amo-N;
s920, if p 0 And e, list, the identity authentication of the user to be authenticated is passed.
In one possible embodiment, amo can be set to 2-10, preferably, amo can be set to 5; the cache list can be a linear list in the verification terminal; after the terminal is verified to obtain the List, if p 0 E, belonging to List, and passing the identity authentication of the user to be authenticated; after the identity authentication of the user to be authenticated passes, the user can be identified with p in the List 0 And adding an image corresponding to the verification stamp on the electronic boarding check of the target mobile terminal of the same third user identification.
Optionally, after step S920, the authentication terminal is further configured to perform the following steps:
s930, mixing List with p 0 The same third subscriber identity is deleted from the List.
In one possible embodiment, in p 0 E.g. List, can be associated with p in List 0 The same third subscriber identity is deleted from the List. Therefore, p is in the cache List at this time 0 Different third user identifications are still kept in the List, and when the identity of the next user to be verified is verified, the data stored in the List do not need to be obtained again, so that the data processing amount of the verification terminal can be reduced.
Optionally, after step S930, the verification terminal is further configured to perform the following steps:
s940, p is 0 The corresponding mobile terminal is marked as a verified mobile terminal; the verified mobile terminal cannot be determined as the target mobile terminal within a preset time.
In one possible embodiment, at p 0 E List, p can be put 0 The corresponding mobile terminal is marked as a verified mobile terminal; therefore, the verified mobile terminal cannot be determined as the target mobile terminal within the preset time, compared with the related art that the verified mobile terminal can still be determined as the target mobile terminal after the identity authentication of the user to be authenticated passesThe scheme can reduce the data transmission quantity between the verified mobile terminal and the verified terminal, and further can reduce the data transmission pressure of the verified terminal.
Optionally, the preset time T = T × amo, and T is a preset unit duration.
In one possible implementation, T may be set to 30 seconds, and as the corresponding amo of the List is larger, T will also be longer.
Optionally, after step S910, the authentication terminal is further configured to perform the following steps:
s950, if p 0 ∉ List, the authentication of the user to be authenticated fails.
Although some specific embodiments of the present invention have been described in detail by way of illustration, it should be understood by those skilled in the art that the above illustration is only for the purpose of illustration and is not intended to limit the scope of the invention. It will also be appreciated by those skilled in the art that various modifications may be made to the embodiments without departing from the scope and spirit of the invention. The scope of the invention is defined by the appended claims.

Claims (10)

1. A paperless data processing system for message notification is characterized by comprising an authentication terminal and a plurality of mobile terminals; the mobile terminal is configured to be in a state that the distance between the mobile terminal and the verification terminal is less than a preset distance d set Then, establishing wireless communication connection with the verification terminal;
the verification terminal is used for executing the following steps:
s110, responding to the first target time t1 tar Acquiring a user information set U = (U) corresponding to a target event to be executed 1 ,u 2 ,...,u i1 ,...,u n1 ),u i1 =(D i1 ,S i1 ) I1=1,2, ·, n1; wherein, t1 tar =t fly -T1,t fly The event execution time of the target event to be executed is T1, and the first preset duration is T1; u. of i1 The user information of the (i 1) th user corresponding to the target event to be executed is obtained, and n1 is the number of users corresponding to the target event to be executed;D i1 a user identifier of the (i 1) th user corresponding to the target event to be executed, S i1 Executing identification for a first associated event corresponding to the (i 1) th user corresponding to the target event to be executed; s i1 = S1 or S2, S i1 = S1 for indicating that the i1 st user does not execute the first associated event, S, of the target event to be executed i1 = s2 for indicating that the i1 st user has executed the first associated event of the target event to be executed;
s120, obtaining a target user identification set H = (H) from U 1 ,h 2 ,...,h j1 ,...,h m1 ) J1=1,2, ·, m1; wherein h is j1 The number of the target user identifications is j1, the target user identifications are user identifications which meet the corresponding first associated event execution identification s1 in U, m1 is the number of the user identifications which meet the corresponding first associated event execution identification s1 in U, and m1 is not more than n1;
s130, obtaining candidate user identifications sent by at least one target device to obtain a candidate user identification set G = (G) 1 ,g 2 ,...,g q ,...,g ber ) Q =1,2, ·, ber; wherein, g q Identifying candidate user identifications corresponding to a qth target device, wherein the target device is a mobile terminal which is in wireless communication connection with the verification terminal at present, and ber is the number of the target devices;
s140, acquiring an intersection K1 of H and G;
s150, if the K1 is not an empty set, controlling the issuing equipment to play the first notification message in a voice mode.
2. The system according to claim 1, wherein the step S110 comprises:
s111, responding to the first target time t1 tar Acquiring a user information set U = (U) corresponding to the target event to be executed 1 ,u 2 ,...,u i1 ,...,u n1 ),u i1 =(D i1 ,S i1 ,V i1 ),i1=1,2,...,n1;
Wherein, V i1 A second association corresponding to the ith 1 st user corresponding to the target event to be executedEvent execution identification, V i1 = V1 or V2, V i1 = V1 for indicating that the i1 st user does not execute the second associated event of the target event to be executed, V i1 = v2 is configured to indicate that the i1 st user has executed the second associated event of the target event to be executed; the event execution time of the first associated event corresponding to any user is positioned behind the event execution time of the second associated event corresponding to the user;
at this time, the target user identifier in step S120 is a user identifier that satisfies the corresponding first associated event execution identifier S1 and the corresponding second associated event execution identifier v2 in U; m1 is the number of user identifiers in U that satisfy the corresponding first associated event execution identifier s1 and the corresponding second associated event execution identifier v 2.
3. The system according to claim 1 or 2, wherein the system further comprises a first server and a second server, the authentication terminal is connected with the second server through a public network, and the authentication terminal is connected with the first server through a local area network;
after the step S130, the authentication terminal is further configured to perform the following steps:
s160, obtain the relative complement of G in H, K2= (K2) 1 ,k2 2 ,...,k2 i2 ,...,k2 y ) I2=1,2, ·, y; wherein, k2 i2 Identifying the ith 2 target users which do not belong to G in H; y is the number of target user identifications which do not belong to G in H;
s170, if the K2 is not an empty set, sending the K2 to the second server;
the second server is configured to perform the following steps:
s210, responding to the reception of K2, acquiring an information DATA set DATA = (DATA) corresponding to K2 1 ,data 2 ,...,data i2 ,...,data y ),data i2 =(k2 i2 ,bio1 i2 ,seat i2 ) (ii) a Wherein, the data i2 Is k2 i2 Information data of the corresponding user, bio1 i2 Is k2 i2 Face image of corresponding userInformation, seat i2 Is k2 i2 Mobile end location data of a corresponding user;
s220, sending the DATA to the first server;
the first server is used for executing the following steps on the DATA:
s310, responding to the received DATA, determining seat in the DATA i2 Area identification area of corresponding target area i2 ;seat i2 Located within a corresponding target region;
s320, mixing bio1 i2 And area i2 Sent to area i2 A corresponding AR device; the AR device is for use according to bio1 i2 Determining bio1 in the corresponding target region i2 And (4) the corresponding user.
4. The system of claim 3, wherein an area is provided i2 Corresponding to a plurality of AR devices;
the step S320 includes:
s321, taking area i2 Determining the AR equipment in the non-working state in each corresponding AR equipment as area i2 A corresponding candidate AR device; the default state of each AR device is a non-working state;
s322, taking area i2 Location and seat in corresponding candidate AR devices i2 The candidate AR device with the minimum position distance is taken as the area i2 A corresponding target AR device;
s323, area is processed i2 The corresponding target AR equipment is switched to a working state;
s324, mixing bio1 i2 And area i2 Sent to area i2 A corresponding target AR device; area i2 The corresponding target AR equipment is used for determining bio1 i2 The corresponding user is switched to a non-working state.
5. The system of claim 3, wherein an area is provided i2 Corresponding to a plurality of AR devices; the first server is used for storing processing values corresponding to each AR device, and each processing valueThe initial values are all 0;
the step S320 includes:
s325, area i2 Each corresponding AR device is determined to be area i2 A corresponding candidate AR device;
s326, taking the area i2 Taking the candidate AR device with the minimum current corresponding processing value as area from the plurality of corresponding candidate AR devices i2 A corresponding target AR device;
s327, area i2 Adding 1 to the processing value of the corresponding target AR equipment;
s328, mixing bio1 i2 And area i2 Sent to area i2 A corresponding target AR device; area i2 The corresponding target AR equipment determines bio1 i2 And after the corresponding user, subtracting 1 from the processing value corresponding to the target AR equipment.
6. The system according to claim 3, wherein the step S140 comprises:
s141, acquiring the intersection K1= (K1) of H and G 1 ,k1 2 ,...,k1 a ,...,k1 b ) A =1,2, ·, b; wherein, k1 a Identifying the a-th candidate user belonging to H in G; b is the number of candidate user identifications belonging to H in G;
the verification terminal is also used for K1 in the K1 a The following steps are carried out:
s180, responding to the reaching of the second target time t2 tar Determining k1 a Whether a corresponding target user executes a first associated event of the target event to be executed; if not, then k1 is added a Sending to the first server; t2 tar =t bro +T2,t bro The execution starting time of the step S150 is T2, which is a second preset duration;
the second server is further configured to perform the steps of:
s230, responding to the reception of the k1 sent by the first server a Obtaining k1 a Corresponding face image information bio2 a
S240, mixing bio2 a Is sent to the firstA server;
the first server is further configured to perform the steps of:
s330, in response to receiving bio2 a To react bio2 a Sending the verification result to AR equipment corresponding to the verification terminal; the AR equipment corresponding to the verification terminal is used for verifying the bio2 a Determining bio2 within a reference region a A corresponding user; the distance between any position in the reference area and the verification terminal is smaller than d set
7. The system according to claim 6, wherein after the step S141, the authentication terminal is further configured to perform the steps of:
and S190, if the K1 is not the empty set, sending a second notification message to the target device corresponding to each candidate user identifier corresponding to the K1 through wireless communication connection.
8. The system of claim 6, wherein T2= γ x T1; wherein gamma is a preset coefficient, and gamma is more than 0 and less than 0.5.
9. The system according to claim 1, wherein after the step S150, the authentication terminal is further configured to perform the following steps:
s200, in response to t being reached fly And U, H, G and K1 are deleted.
10. The system according to claim 1, wherein the mobile terminal is configured to determine if the distance between the mobile terminal and the authentication terminal is less than a preset distance d set And then, establishing Bluetooth connection with the verification terminal.
CN202211318921.3A 2022-10-26 2022-10-26 Paperless data processing system for message notification Active CN115379389B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211318921.3A CN115379389B (en) 2022-10-26 2022-10-26 Paperless data processing system for message notification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211318921.3A CN115379389B (en) 2022-10-26 2022-10-26 Paperless data processing system for message notification

Publications (2)

Publication Number Publication Date
CN115379389A true CN115379389A (en) 2022-11-22
CN115379389B CN115379389B (en) 2022-12-23

Family

ID=84073217

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211318921.3A Active CN115379389B (en) 2022-10-26 2022-10-26 Paperless data processing system for message notification

Country Status (1)

Country Link
CN (1) CN115379389B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030111530A1 (en) * 2001-12-13 2003-06-19 Amehiko Iki Boarding pass processing unit, boarding gate reader, person collation unit, boarding system, boarding pass, boarding pass processing method, service kiosk for boarding pass
CN103489093A (en) * 2012-06-14 2014-01-01 鸿富锦精密工业(深圳)有限公司 Boarding information prompting system and method
CN104778640A (en) * 2014-01-11 2015-07-15 方文淋 Automatic departure date reminding system and method
US20170187817A1 (en) * 2015-12-29 2017-06-29 The Boeing Company Passenger Communications System

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030111530A1 (en) * 2001-12-13 2003-06-19 Amehiko Iki Boarding pass processing unit, boarding gate reader, person collation unit, boarding system, boarding pass, boarding pass processing method, service kiosk for boarding pass
CN103489093A (en) * 2012-06-14 2014-01-01 鸿富锦精密工业(深圳)有限公司 Boarding information prompting system and method
CN104778640A (en) * 2014-01-11 2015-07-15 方文淋 Automatic departure date reminding system and method
US20170187817A1 (en) * 2015-12-29 2017-06-29 The Boeing Company Passenger Communications System

Also Published As

Publication number Publication date
CN115379389B (en) 2022-12-23

Similar Documents

Publication Publication Date Title
CN100525177C (en) Access authentication system, equipment and method for world wide web
JP3818127B2 (en) Taxi reservation system, reservation terminal, in-vehicle device
JP3619958B2 (en) Crisis management system and computer
CN110753078B (en) Prompting method and device, electronic equipment and storage medium
CN106815917A (en) Passenger&#39;s management system and method
CN106067196A (en) A kind of method and system realizing Intelligent Checking on Work Attendance
JP2023090802A (en) Information provision device, terminal, identity verification system, information provision method, and recording medium
CN115379389B (en) Paperless data processing system for message notification
CN115374419B (en) Data processing system for paperless identity verification
CN115378983B (en) Paperless data processing system for data change
JP2003284113A (en) Position certifying method, position certifying service system, and network system
CN112232778A (en) Tourism management method
CN116168455A (en) Information automatic supplementing method, background server and gate terminal
JP2010257326A (en) Biometrics system, biometrics method, and information processing apparatus
JP2016086314A (en) On-vehicle communication apparatus
KR101689853B1 (en) System and method for checking attendance in gathering training
CN113570171A (en) City multi-scene-point hot-point data dynamic guiding method, system and storage medium
CN112562157B (en) Building traffic control method and building traffic control system based on Internet of things
JP5023913B2 (en) Delay information distribution device
CN102595347B (en) iPhone mobile phone platform-based mobile passenger name record (PNR) message transmission system and method thereof
CN113450493B (en) High-flow scenic spot queuing method and system
CN102572740A (en) Android mobile platform-based mobile passenger name record (PNR) message transmission system and method
CN110071856B (en) Method of village information interaction system
US20230274381A1 (en) Information processing apparatus, information processing method, and storage medium
CN107404534B (en) Multi-screen information pushing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant