Disclosure of Invention
In order to overcome the technical defects, the invention aims to provide a method and a system for managing a network contract house, which can comprehensively collect identity information of landlords and tenants to ensure the safety of the field of the network contract house.
The invention discloses a management method of a network contract house, which comprises the following steps: the user side uploads user identity information to the management side, the management side audits the user information, and the user information which passes the audit is marked as an authentication user; the east-house end uploads the identity information of the east-house to the management end, the management end audits the east-house information, and the east-house information passing the audit is marked as an authenticated east-house; the east end of the house controls the opening or closing of each room door lock, and the authenticated user and the east end of the house perform information interaction to realize the opening or closing of the room door lock; each east end of the house is associated with at least one room door lock, the room door lock associated with the authenticated east is connected with the management end, and the opening or closing information of the room door lock is obtained; the safety guarantee system is connected with the management end and used for acquiring the landlord information, the house source information corresponding to the room door lock associated with the landlord end and the information of the authenticated user and the opening and booking records of the authenticated user.
Preferably, the user uploading the user identity information to the management terminal, the management terminal auditing the user information, and marking the user information that is approved as the authenticated user includes: the user side uploads the identity card information of the user to the management side and carries out face recognition, the management side verifies the authenticity of the identity card information of the user and verifies whether a face recognition result is matched with the identity card information, and if the identity card information passes the verification, the user information is marked as an authenticated user; the east end uploads the identity information of the landlord to the management end, the management end audits the landlord information, and the landlord information which passes the audit is marked as the certified landlord, wherein the landlord identity information comprises the following steps: the east-house end uploads the identity card information of the east-house and the registration information of the house source to the management end, carries out face recognition, and the management end examines the authenticity of the identity card information of the east-house and the registration information of the house source and examines whether the face recognition result is matched with the identity card information, and if the identity card information and the registration information of the house source pass through, the east-house end marks the east-house information as an authenticated east-house.
Preferably, the user side and the landlord side comprise door lock lists integrated with all room door locks related to the certified landlord, the door lock lists comprise an online chamber booking door lock and an offline chamber booking door lock, and the display priority of the online chamber booking door lock is higher than that of the offline chamber booking door lock.
Preferably, each room door lock in the door lock list is provided with a tag, and the tags include a plurality of types of default tags and a plurality of types of other tags; the door lock name of each room door lock in the door lock list is an editable name, and the label is an editable label; the landlord end edits the room door lock and the label, and the edited door lock name and the label are displayed at the landlord end and the user end; the room door locks of the same type of tags in the door lock list have the same display priority, and the display priority of the room door locks without the type of tags is the sequence of the first letters of the tags; the system further comprises a top room door lock, and the top room door lock is highest in display priority.
Preferably, the associating of each east end of the house with at least one room door lock comprises: and the east end of the house adds the related room door lock through the online request and the offline request, and if the request is the online request, the east end of the house needs to perform operating qualification authentication and face identification.
Preferably, the authenticating the user and the landlord terminal to perform information interaction to open or close the door lock of the room includes: the authentication user sends a lodging request to the east end, the east end receives the lodging request and issues an unlocking authority to the authentication user through the management end, and the authentication user unlocks a room door lock through the unlocking authority within a preset time period after receiving the unlocking authority; the unlocking authority comprises a randomly generated password and a two-dimensional code; and the room door lock after successful unlocking sends unlocking information to the management terminal.
Preferably, the authenticated user sends a lodging request to the east end, the east end receives the lodging request and issues an unlocking authority to the authenticated user through the management end, and the authenticated user unlocks the room door lock through the unlocking authority within a preset time period after receiving the unlocking authority further comprises: the method comprises the steps that an authenticated user sends a lodging reservation request to a homeowner end, the lodging reservation request comprises a lodging time period, the homeowner end receives the lodging request and issues unlocking authority to the authenticated user through a management end, and the authenticated user unlocks a room door lock through the unlocking authority in the lodging time period.
Preferably, the authenticating the room door lock associated with the landlord is connected to the management end, and the landlord end controlling the opening or closing of each room door lock includes: the authentication landlord sets the associated room door locks as available door locks and standby door locks, the available door locks are connected with the management end, and the landlord end controls the opening or closing of each available door lock.
Preferably, the authenticating user sends a lodging request to the east end, and the east end receives the lodging request and issues an unlocking right to the authenticating user through the management end, and then the method further includes: when the door lock of the room is in an unlocked state, the room is automatically electrified; the method comprises the steps that a user side sends refuge information to a landlord side, wherein the refuge information comprises refuge time; and after the room retreating time, the power supply of the room with the locked door lock of the room is automatically closed.
The invention also discloses a management system of the cyber-contracting room, which is characterized by comprising a user side, an east side, a management side and a room door lock; the user side uploads user identity information to the management side, the management side audits the user information, and the user information which passes the audit is marked as an authentication user; the east-house end uploads the identity information of the east-house to the management end, the management end audits the information of the east-house and marks the information of the east-house passing the audit as a certified east-house; the east end of the house controls the opening or closing of the door lock of each room, and the authenticated user performs information interaction with the east end of the house to open or close the door lock of the room; each east end of the house is associated with at least one room door lock, and the room door lock associated with the authenticated east end of the house is connected with the management end to obtain the opening or closing information of the room door lock; the safety guarantee system is connected with the management end and used for acquiring the landlord information, the house source information corresponding to the room door lock associated with the landlord end, and the information of the authenticated user and the records of room opening and room booking of the authenticated user.
After the technical scheme is adopted, compared with the prior art, the method has the following beneficial effects:
1. the method has the advantages that the information of the landlord, the tenant and the house source is effectively and comprehensively collected, the house information and the house renting record are recorded in detail, and a flow type identity verification link is arranged in two important links of the house source online and house unlocking, so that the safety of the landlord identity, the house information and the tenant identity is ensured; the system is also in butt joint with a safety guarantee system, and the safety guarantee system can call the information in real time to carry out public safety management; the intelligent house renting management system has the advantages that flexible application and management mechanisms of renting at any time and withdrawing at any time are realized, functions of tracking the whole renting state, opening a door by a tenant without a key, entering the house and the like are further realized, the convenience in use of house renting service is greatly improved, the popularization rate and the utilization rate are improved, and the safety risk of renting in a cyber-contractor house is reduced.
Detailed Description
The advantages of the invention are further illustrated in the following description of specific embodiments in conjunction with the accompanying drawings.
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. The following description refers to the accompanying drawings in which the same numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The terminology used in the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present disclosure. The word "if," as used herein, may be interpreted as "at … …" or "at … …" or "in response to a determination," depending on the context.
In the description of the present invention, it is to be understood that the terms "longitudinal", "lateral", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like, indicate orientations or positional relationships based on those shown in the drawings, and are used merely for convenience of description and for simplicity of description, and do not indicate or imply that the referenced devices or elements must have a particular orientation, be constructed in a particular orientation, and be operated, and thus, are not to be construed as limiting the present invention.
In the description of the present invention, unless otherwise specified and limited, it is to be noted that the terms "mounted," "connected," and "connected" are to be interpreted broadly, and may be, for example, a mechanical connection or an electrical connection, a communication between two elements, a direct connection, or an indirect connection via an intermediate medium, and specific meanings of the terms may be understood by those skilled in the art according to specific situations.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in themselves. Thus, "module" and "component" may be used in a mixture.
Referring to fig. 1, the present invention discloses a management method of a network contract house, including:
auditing user identity information: the user side uploads user identity information to the management side, the management side verifies the user information, and the user information passing the verification is marked as an authentication user, namely, a user qualified for online house reservation.
And (4) auditing the identity information of the landlord: the east-house end uploads the identity information of the east-house to the management end, the management end audits the east-house information, and the east-house information which passes the audit is marked as a certified east-house, namely the east-house which is qualified to rent and manage the online house;
the on-line interaction between the landlord and the user comprises the steps of booking a house, issuing unlocking authority and the like: the east end of the house controls the opening or closing of each door lock of the house, and the authentication user performs information interaction with the east end of the house to realize the opening or closing of the door lock of the house;
the information of the contracted housing is uploaded to the management end, and the information interaction content between the landlord and the user is uploaded to the management end or the management end participates in a plurality of links, for example, the unlocking authority of the management end is issued to the user: each east end of the house is associated with at least one room door lock, the room door lock associated with the authenticated east is connected with the management end, and the opening or closing information of the room door lock is obtained;
all the network contracting room information comprises user information, landlord information, house information and housing information which are all in butt joint with the safety guarantee system, and the safety guarantee system is convenient to acquire in real time according to needs: the safety guarantee system is connected with the management end and used for acquiring the landlord information, the house source information corresponding to the room door lock associated with the landlord end, and information of the authenticated user and the record of opening and booking the house of the authenticated user.
Generally, the method is realized based on the mobile terminal APP and the background management platform. Referring to fig. 2, the landlord controls the switching authority of the intelligent door lock. The information interaction between the background management platform and the tenants comprises house booking information uploaded by the tenants to the background management platform, identity card information uploaded by the tenants, tenant information uploaded by the background management platform, unlocking authority issued by the background management platform to the tenants, a successful check-in notification short message and the like. After the tenant obtains the unlocking authority, the intelligent door lock is successfully unlocked, and the unlocking information is uploaded to the background management platform to be stored. And the information interaction between the background management platform and the landlord comprises house source registration information, door lock installation/maintenance information and the like. The information interaction between the safety guarantee system and the background management platform comprises the steps that the background management platform uploads house source information, unlocking information, house returning information and the like to the safety guarantee system, and the safety guarantee system sends a tenant information comparison result, a remote unlocking request and the like to the background management platform. The information interaction between the security guarantee system and the landlord comprises that the landlord uploads identity registration and house source information to the security guarantee system, and the security guarantee system issues registration identification and the like to the landlord.
The method for managing the network contract room has strong safety and high information transmission rate, meets the actual requirements of different identity users such as a safety guarantee system, a network contract room owner, a network contract room tenant and the like, and is suitable for the whole life cycle of a mobile terminal APP and a door lock management background.
Preferably, the auditing the user identity information specifically includes:
the user side uploads the identity card information of the user to the management side to verify the legal identity of the user and stores the identity card information, silent type living body detection is carried out, and face recognition is generally adopted;
the management terminal verifies the authenticity of the identity card information of the user and verifies whether the face recognition result is matched with the identity card information, if the face recognition result is passed through the identity card information, the user information is marked as an authenticated user, and the network contract can be normally carried out; if one item does not pass, rejecting the contracting application and indicating which information is uploaded again to pass the examination;
and uploading the house source registration identification on the landlord, carrying out authenticity identification on the house source registration identification by the management terminal, and storing and recording if the house source registration identification passes the management terminal.
The landlord identity information auditing method specifically comprises the following steps:
the east-house end uploads the identity card information of the east-house and the registration information of the house source to the management end to verify the legal identity and store the legal identity, silent living body detection is carried out, and face recognition is generally adopted;
the management end examines the authenticity of the identity card information of the landlord and the registration information of the house source, examines whether the face recognition result is matched with the identity card information or not, if the identity card information and the face recognition result are passed, the landlord information is marked as an authenticated landlord, and the landlord can be normally contracted; if one item does not pass, the house source on the shelf is refused to apply or the house source management qualification is refused, and the information of which is uploaded again is indicated to pass the examination.
Preferably, the mobile terminals APP of the user side and the east side of the house comprise a door lock list integrated with all room door locks related to the authenticated owner of the house, and the door lock list comprises an online booking door lock and an offline booking door lock. The offline room-booking door lock is the owner's individual door lock and is not managed by the background management platform. On the mobile terminal APP, the display priority of the on-line booking door lock is higher than that of the off-line booking door lock, namely, the front of the off-line door lock of the on-line door lock is preferentially displayed.
Specifically, the display of the door lock on the mobile terminal APP is classified and displayed according to the systems of 'all', 'network contract door lock' and 'non-network contract door lock'.
Preferably, each room door lock in the door lock list is provided with a tag, the tag is an editable tag, the editing authority is only provided for the landlord, the tag comprises a plurality of types of default tags and a plurality of types of other tags, the default tags can be tags with strong universality such as 'home', 'company', 'school', and the like, and the other tags are personalized and customized for the landlord. The display of the subsequent door lock on the mobile terminal APP is carried out according to the label: the display priorities of the door locks on the same label are the same, and the display priorities of the door locks on different labels can be sorted according to the first letter.
The door lock name of each room door lock in the door lock list is an editable name, and the display of the door locks in the same tag may be sorted by the first letter of the door lock name or the door lock number.
The edited door lock name and label are displayed at the east end of the house and the user side at the same time, so that the management of the east end of the house and the use of the user are facilitated.
The system is characterized by further comprising a top room door lock, the display priority of the top room door lock is highest, top display is carried out on the APP at the mobile terminal, and the APP can be used as a main management house of a landlord and can also be used as a most frequently used house of a user to display.
Preferably, the landlord end requests to add the related room door lock through online and offline, and when the added house source is a non-network-constrained room door lock, the adding can be directly performed without face recognition; when the door lock is a door lock for the cyber-contract, the operation qualification certification and the face recognition of the owner are required.
Specifically, the method comprises the steps of firstly selecting network contract door lock addition or non-network contract door lock addition on a mobile terminal APP, uploading a registration mark on a qualification certification page when the network contract door lock addition is selected, firstly uploading the front and back of an identity card in an identity certification link, automatically reading certificate information, and manually modifying if the certificate information is wrongly read.
Preferably, the authenticated user sends a lodging request to the landlord end, the landlord end receives the lodging request and issues the unlocking authority to the authenticated user through the management end, and the authenticated user unlocks the room door lock through the unlocking authority within a preset time period after receiving the unlocking authority. The unlocking authority comprises a randomly generated password and a two-dimensional code. And the room door lock after successful unlocking sends unlocking information to the management terminal.
Furthermore, the authenticated user can also send a lodging reservation request to the homeowner end, the lodging reservation request comprises a lodging time period, the homeowner end receives the lodging reservation request and issues the unlocking authority to the authenticated user through the management end, and the authenticated user unlocks the room door lock through the unlocking authority in the lodging time period.
It can be understood that the opening time of each unlocking authority is limited, the unlocking time of the first unlocking mode is automatically calculated from the time of issuing the unlocking authority until the opening time is full, and the authority is closed; and the second reserved unlocking mode can automatically select the opening time starting point of the unlocking authority, so that the method is more flexible.
It should be noted that, in order to ensure security, the user needs to perform identity authentication when the user uses the unlocking right for the first time, and if the first authentication is successful, the user is regarded as a reassuring user, and the identity authentication is not performed any more in the subsequent unlocking.
Preferably, the authenticating of the room door lock associated with the landlord is connected to the management end, and the landlord end controlling the opening or closing of each room door lock includes: the authentication landlord sets the associated room door locks as available door locks and standby door locks, the available door locks are connected with the management end, and the landlord end controls the opening or closing of each available door lock.
Preferably, in order to guarantee the electricity utilization safety of the network-constrained room, when the door lock of the room is in an unlocked state, the room is automatically powered on, namely when the door lock of the room is unlocked, the room is automatically powered on. And when the user side sends the room returning information to the landlord side, the room returning information comprises room returning time, and after the room returning time, the power supply system of the room with the lock of the room in the locked state considers that the tenant leaves, and then the power supply system is automatically closed.
The interface starting of the mobile terminal APP has various shortcuts, including long-time pressing of the back hand, namely display, and long-time pressing of the back hand, namely popping up of the interface after 2s without hand release.
The invention also discloses a management system of the network contract house, which comprises the following steps:
-a user end, i.e. a tenant;
the east end of the house is associated with at least one intelligent room door lock, the intelligent room door lock associated with the east end of the house is authenticated and connected with the management end, and opening or closing information of the intelligent room door lock is obtained;
the management end uploads user identity information to the management end, and the management end verifies the user information and marks the user information passing the verification as an authenticated user; the east-house end uploads the identity information of the east-house to the management end, the management end audits the information of the east-house and marks the information of the east-house passing the audit as a certified east-house;
the system comprises a room intelligent door lock, a landlord end and an authenticated user, wherein the landlord end controls the opening or closing of each room intelligent door lock, and the authenticated user performs information interaction with the landlord end to realize the opening or closing of the room intelligent door lock.
The safety guarantee system is connected with the management end and is used for acquiring the landlord information, the house source information corresponding to the intelligent room door lock associated with the landlord end, and the information of the authenticated user and the record of opening and booking the house of the authenticated user.
It should be noted that the embodiments of the present invention have been described in a preferred embodiment and not limited to the embodiments, and those skilled in the art may modify and modify the above-disclosed embodiments to equivalent embodiments without departing from the scope of the present invention.