CN108711205A - A kind of conference system visitor Verification System - Google Patents
A kind of conference system visitor Verification System Download PDFInfo
- Publication number
- CN108711205A CN108711205A CN201810437849.3A CN201810437849A CN108711205A CN 108711205 A CN108711205 A CN 108711205A CN 201810437849 A CN201810437849 A CN 201810437849A CN 108711205 A CN108711205 A CN 108711205A
- Authority
- CN
- China
- Prior art keywords
- meeting
- random code
- cell
- phone number
- personnel participating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012795 verification Methods 0.000 title claims abstract description 21
- 238000004891 communication Methods 0.000 claims abstract description 22
- 230000005764 inhibitory process Effects 0.000 claims abstract description 7
- 238000000034 method Methods 0.000 claims description 13
- 238000013475 authorization Methods 0.000 claims description 10
- 230000005540 biological transmission Effects 0.000 claims description 8
- 238000003032 molecular docking Methods 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 239000012141 concentrate Substances 0.000 description 1
- 239000012776 electronic material Substances 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/33—Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3215—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention relates to a kind of conference system visitor Verification Systems, including:Office system server generates a random code, wherein personnel participating in the meeting's information includes at least the cell-phone number of personnel participating in the meeting for storing personnel participating in the meeting's information, and for each personnel participating in the meeting;Cloud communication service end, connect with office system server, the cell-phone number for receiving personnel participating in the meeting and random code, and sends the message that content is the random code to the cell-phone number;Incoming end is connect with office system server and mobile terminal respectively, and the form data input by user containing cell-phone number and random code is sent by mobile terminal for receiving, and verifies cell-phone number and random code with the presence or absence of in personnel participating in the meeting's information;Gate inhibition's server, connect with incoming end, and after receiving the door open command that incoming end is sent after being verified, control actuator opens the door.Compared with prior art, the docking of conference system of the present invention and access control system realizes unmanned reception, reduces the manpower consumption of reception, improves efficiency.
Description
Technical field
The present invention relates to a kind of conferencing technologies, more particularly, to a kind of conference system visitor Verification System.
Background technology
Meeting is to concentrate the mode discussed and exchanged, conference system that can carry out pipe to conference content and process etc.
Reason, can improve the efficiency of meeting.
Meeting has many personnels participating in the meeting, for the safety in meeting-place, generally requires to verify personnel participating in the meeting, meeting
Personnel are present in conference system, but controllers enter certain access control system in meeting-place, and current conference system is simultaneously
It cannot carry out communicating with access control system and online, therefore be substantially and personnel participating in the meeting is tested by the way of manually receiving
Card, such mode one is being to need additional artificial, two the problem of coming there is also in terms of environmental protection, because have to be to reception people
Member provides paper material, if what is sent is electronic material, needs additional hardware costs (handheld terminal of reception personnel).
Invention content
It is an object of the present invention to overcome the above-mentioned drawbacks of the prior art and provide a kind of conference system visitors
Verification System.
The purpose of the present invention can be achieved through the following technical solutions:
A kind of conference system visitor Verification System, including:
Office system server generates a random code for storing personnel participating in the meeting's information, and for each personnel participating in the meeting,
In, personnel participating in the meeting's information includes at least the cell-phone number of personnel participating in the meeting;
Cloud communication service end, connect with office system server, the cell-phone number for receiving personnel participating in the meeting and random code, and
The message that content is the random code is sent to the cell-phone number;
Incoming end is connect with office system server and mobile terminal respectively, for receive by mobile terminal send by with
The form data containing cell-phone number and random code of family input, and verify cell-phone number and random code and believe with the presence or absence of in personnel participating in the meeting
In breath;
Gate inhibition's server, connect with incoming end, after receiving the door open command that incoming end is sent after being verified, control
Actuator processed opens the door.
The Office Service device updates a random code every setting time, and will be updated by cloud communication service end
Random code is sent to corresponding cell-phone number.
It includes following that the Office Service device sends the process that content is random code by cloud communication service end to cell-phone number
Step:
Step A101:A random code is generated for each personnel participating in the meeting;
Step A102:The cell-phone number of each personnel participating in the meeting and random code are sent to cloud communication service end in batches;
Step A103:Cloud communication service end receives the cell-phone number and random code of personnel participating in the meeting, and into the transmission of each cell-phone number
Hold for the message of corresponding random code.
The transmission form of the message is short message or instant communication message.
The incoming end certification user procedures realize following steps:
Step B101:After the access request for receiving mobile terminal, to mobile terminal transmission for input handset number and at random
The list formatted data of code;
Step B102:It receives and the list number input by user containing cell-phone number and random code is sent by mobile mobile terminal
According to, and parse and obtain the cell-phone number in list and random code;
Step B103:The cell-phone number and random code of all personnels participating in the meeting of office system server storage are read, and is verified
Whether cell-phone number input by user and random code are consistent with the cell-phone number of any personnel participating in the meeting and random code, if it has, then executing
Step B104, if it has not, then authentification failure;
Step B104:The authorization code for unlocking access control interface in mobile terminal corresponding to the user is generated, and
It is sent to mobile terminal.
The step B103 is specifically included:
Step B131:Read the cell-phone number and random code of all personnels participating in the meeting of office system server storage;
Step B132:Verify cell-phone number input by user and random code whether with the cell-phone number of any personnel participating in the meeting and random
Code is consistent, if it is, B133 is thened follow the steps, if it has not, then authentification failure;
Step B133:Present system time is judged whether within the access time of corresponding personnel participating in the meeting, if it has, then executing
Step B104, if it has not, then authentification failure.
The incoming end verification door opening process realizes following steps:
Step B201:After receiving the opening door operation information containing authorization code sent by mobile terminal, authorization code is verified
Whether effectively, if it is, B202 is thened follow the steps, if it has not, then authentication failed;
Step B202:Present system time is judged whether within the access time of corresponding personnel participating in the meeting, if it has, then executing
Step B203, if it has not, then authentication failed;
Step B203:Door open command is sent to gate inhibition's server.
The access time of the personnel participating in the meeting is the first period and meeting knot before meeting duration and meeting start
Second period after beam.
Compared with prior art, the invention has the advantages that:
1) docking for realizing conference system and access control system, may be implemented unmanned reception, reduces the manpower consumption of reception, carry
High efficiency.
2) random code irregularly updates, and avoids the safety issue caused by random code is revealed.
3) the transmission form of message be short message or instant communication message, it is versatile and flexible.
4) access control interface is unlocked by way of authorization code, and access control interface is pre-stored in mobile terminal, it can
To improve concurrent quantity.
5) multiple meetings more can have been supported while improving safety for the certification of time and verification when verifying
Control.
Description of the drawings
Fig. 1 is the structural diagram of the present invention;
Fig. 2 is the schematic diagram of verification process in embodiment;
Fig. 3 is the schematic diagram of verification process in embodiment;
Wherein:1, office system server, 2, cloud communication service end, 3, mobile terminal, 4, incoming end, 5, access control clothes
It is engaged in device, 6, door.
Specific implementation mode
The present invention is described in detail with specific embodiment below in conjunction with the accompanying drawings.The present embodiment is with technical solution of the present invention
Premised on implemented, give detailed embodiment and specific operating process, but protection scope of the present invention is not limited to
Following embodiments.
A kind of conference system visitor Verification System, it is possible to reduce the workload of receptionist personnel in existing working environment,
It even realizes the unmanned reception in wisdom office, office efficiency is promoted from side;It avoids simultaneously because using China second-generation identity card artificial
There are the risks of leakage of personal information during binding validatation hair fastener, as shown in Figure 1, including:
Office system server 1 generates a random code for storing personnel participating in the meeting's information, and for each personnel participating in the meeting,
Wherein, personnel participating in the meeting's information includes at least the cell-phone number of personnel participating in the meeting;
Cloud communication service end 2, connect with office system server 1, the cell-phone number for receiving personnel participating in the meeting and random code,
And send the message that content is the random code to the cell-phone number, wherein the transmission form of message is that short message or instant messaging disappear
Breath, it is versatile and flexible;
Incoming end 4 is connect with office system server 1 and mobile terminal 3 respectively, is sent by mobile terminal 3 for receiving
Form data input by user containing cell-phone number and random code, and cell-phone number and random code are verified with the presence or absence of in participant
In member's information;
Gate inhibition's server 5 is connect with incoming end 4, in the door open command for receiving incoming end 4 and being sent after being verified
Afterwards, control actuator opens the door.
Office system server 1 and incoming end 4 can propose the WebService Communications services realized based on C#.net technologies,
All application logics are all encapsulated in the inside.
Office Service device every setting time update a random code, and by cloud communication service end 2 by it is updated with
Machine code is sent to corresponding cell-phone number.
It includes following step that Office Service device sends the process that content is random code by cloud communication service end 2 to cell-phone number
Suddenly:
Step A101:A random code is generated for each personnel participating in the meeting;
Step A102:The cell-phone number of each personnel participating in the meeting and random code are sent to cloud communication service end 2 in batches;
Step A103:Cloud communication service end 2 receives the cell-phone number and random code of personnel participating in the meeting, and into the transmission of each cell-phone number
Hold for the message of corresponding random code.
As shown in Fig. 2, visitor (i.e. personnel participating in the meeting) receives invitation short message, office scene is reached, and send out by mobile terminal 3
Access request, 4 certification user procedures of incoming end is sent to realize following steps:
Step B101:Receive mobile terminal 3 access request after, to mobile terminal 3 send for input handset number and with
The list formatted data of machine code;
Step B102:It receives and the list input by user containing cell-phone number and random code is sent by mobile mobile terminal 3
Data, and parse and obtain the cell-phone number in list and random code;
Step B103:The cell-phone number and random code of all personnels participating in the meeting of 1 storage of office system server are read, and is verified
Whether cell-phone number input by user and random code are consistent with the cell-phone number of any personnel participating in the meeting and random code, specifically include:
Step B131:Read the cell-phone number and random code of all personnels participating in the meeting of 1 storage of office system server;
Step B132:Verify cell-phone number input by user and random code whether with the cell-phone number of any personnel participating in the meeting and random
Code is consistent, if it is, B133 is thened follow the steps, if it has not, then authentification failure;
Step B133:Present system time is judged whether within the access time of corresponding personnel participating in the meeting, if it has, then executing
Step B104, if it has not, then authentification failure.
Step B104:The authorization code for unlocking access control interface in mobile terminal 3 corresponding to the user is generated, and
It is sent to mobile terminal 3.
As shown in figure 3, incoming end 4, which verifies door opening process, realizes following steps:
Step B201:After receiving the opening door operation information containing authorization code sent by mobile terminal 3, authorization code is verified
Whether effectively, if it is, B202 is thened follow the steps, if it has not, then authentication failed;
Step B202:Present system time is judged whether within the access time of corresponding personnel participating in the meeting, if it has, then executing
Step B203, if it has not, then authentication failed;
Step B203:Door open command is sent to gate inhibition's server 5.
The access time of personnel participating in the meeting is the first period before meeting duration and meeting start and after the conference is over
Second period.
In addition, random code can again be applied by mobile terminal 3, it is not successfully transmitted to avoid cloud communication service end 2
Situation.The application can arrange more sets in application, for example there are the places that multiple meetings are held simultaneously, in addition at gate, often
It can also be configured at a meeting a set of.
Claims (8)
1. a kind of conference system visitor Verification System, which is characterized in that including:
Office system server generates a random code for storing personnel participating in the meeting's information, and for each personnel participating in the meeting, wherein
Personnel participating in the meeting's information includes at least the cell-phone number of personnel participating in the meeting;
Cloud communication service end, connect with office system server, the cell-phone number for receiving personnel participating in the meeting and random code, and to this
Cell-phone number sends the message that content is the random code;
Incoming end is connect with office system server and mobile terminal respectively, defeated by user by mobile terminal transmission for receiving
The form data containing cell-phone number and random code entered, and cell-phone number and random code are verified with the presence or absence of in personnel participating in the meeting's information
In,
Gate inhibition's server, connect with incoming end, and after receiving the door open command that incoming end is sent after being verified, control is held
Row device opens the door.
2. a kind of conference system visitor Verification System according to claim 1, which is characterized in that the Office Service device is every
A random code is updated every setting time, and updated random code is sent to by corresponding mobile phone by cloud communication service end
Number.
3. a kind of conference system visitor Verification System according to claim 1 or 2, which is characterized in that the Office Service
Device sends the process that content is random code to cell-phone number by cloud communication service end and includes the following steps:
Step A101:A random code is generated for each personnel participating in the meeting;
Step A102:The cell-phone number of each personnel participating in the meeting and random code are sent to cloud communication service end in batches;
Step A103:Cloud communication service end receives the cell-phone number and random code of personnel participating in the meeting, and sends content to each cell-phone number and be
The message of corresponding random code.
4. a kind of conference system visitor Verification System according to claim 1, which is characterized in that the transmission shape of the message
Formula is short message or instant communication message.
5. a kind of conference system visitor Verification System according to claim 1, which is characterized in that the incoming end certification is used
Family process realizes following steps:
Step B101:After the access request for receiving mobile terminal, sent to mobile terminal for input handset number and random code
List formatted data;
Step B102:It receives and the form data input by user containing cell-phone number and random code is sent by mobile mobile terminal,
And it parses and obtains the cell-phone number in list and random code;
Step B103:The cell-phone number and random code of all personnels participating in the meeting of office system server storage are read, and verifies user
Whether the cell-phone number and random code of input are consistent with the cell-phone number of any personnel participating in the meeting and random code, if it is, thening follow the steps
B104, if it has not, then authentification failure;
Step B104:Generate the authorization code for unlocking access control interface in mobile terminal corresponding to the user, and to shifting
Dynamic terminal is sent.
6. a kind of conference system visitor Verification System according to claim 5, which is characterized in that the step B103 is specific
Including:
Step B131:Read the cell-phone number and random code of all personnels participating in the meeting of office system server storage;
Step B132:Verify cell-phone number input by user and random code whether the cell-phone number and random code one with any personnel participating in the meeting
It causes, if it is, B133 is thened follow the steps, if it has not, then authentification failure;
Step B133:Present system time is judged whether within the access time of corresponding personnel participating in the meeting, if it is, thening follow the steps
B104, if it has not, then authentification failure.
7. a kind of conference system visitor Verification System according to claim 5, which is characterized in that the incoming end verification is opened
Door process realizes following steps:
Step B201:After receiving the opening door operation information containing authorization code sent by mobile terminal, whether verification authorization code
Effectively, if it is, thening follow the steps B202, if it has not, then authentication failed;
Step B202:Present system time is judged whether within the access time of corresponding personnel participating in the meeting, if it is, thening follow the steps
B203, if it has not, then authentication failed;
Step B203:Door open command is sent to gate inhibition's server.
8. a kind of conference system visitor Verification System described according to claim 6 or 7, which is characterized in that the personnel participating in the meeting
Access time be the first period before meeting duration and meeting start and the second period after the conference is over.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810437849.3A CN108711205B (en) | 2018-05-09 | 2018-05-09 | Visitor authentication system of conference system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810437849.3A CN108711205B (en) | 2018-05-09 | 2018-05-09 | Visitor authentication system of conference system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108711205A true CN108711205A (en) | 2018-10-26 |
CN108711205B CN108711205B (en) | 2021-07-06 |
Family
ID=63867875
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810437849.3A Expired - Fee Related CN108711205B (en) | 2018-05-09 | 2018-05-09 | Visitor authentication system of conference system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108711205B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111047756A (en) * | 2019-11-27 | 2020-04-21 | 温州大学智能锁具研究院 | Intelligent cell system |
CN112562147A (en) * | 2020-12-01 | 2021-03-26 | 安徽三人信息科技有限公司 | Access control user identity recognition method, device and system |
CN117320007A (en) * | 2023-11-27 | 2023-12-29 | 北京时代亿信科技股份有限公司 | Office system control method and system |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102831682A (en) * | 2012-08-28 | 2012-12-19 | 深圳市金立通信设备有限公司 | System and method for remotely opening door based on mobile phone short message |
CN103049953A (en) * | 2012-09-20 | 2013-04-17 | 青岛滨海学院 | Electronic lock |
CN103353997A (en) * | 2013-07-24 | 2013-10-16 | 江苏晓山信息产业股份有限公司 | Intelligent mobile terminal control electronic lock system |
CN103530924A (en) * | 2013-10-25 | 2014-01-22 | 北京金储自动化技术有限公司 | Dynamic password lock system and method for self-help network management |
CN104574615A (en) * | 2015-01-30 | 2015-04-29 | 程炽坤 | Electronic door lock control method and control device |
CN105976466A (en) * | 2016-05-03 | 2016-09-28 | 科世达(上海)管理有限公司 | Car access control opening method |
CN106780867A (en) * | 2016-11-28 | 2017-05-31 | 广州极酷物联智能科技有限公司 | Gate control system, identity recognition device and personal identification method |
CN107403506A (en) * | 2017-07-07 | 2017-11-28 | 广州创立起科技有限公司 | A kind of dynamic password management equipment used in Vending Machine, system and method |
CN107545625A (en) * | 2016-10-31 | 2018-01-05 | 郑州蓝视科技有限公司 | A kind of anti-theft system of electromotor car |
-
2018
- 2018-05-09 CN CN201810437849.3A patent/CN108711205B/en not_active Expired - Fee Related
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102831682A (en) * | 2012-08-28 | 2012-12-19 | 深圳市金立通信设备有限公司 | System and method for remotely opening door based on mobile phone short message |
CN103049953A (en) * | 2012-09-20 | 2013-04-17 | 青岛滨海学院 | Electronic lock |
CN103353997A (en) * | 2013-07-24 | 2013-10-16 | 江苏晓山信息产业股份有限公司 | Intelligent mobile terminal control electronic lock system |
CN103530924A (en) * | 2013-10-25 | 2014-01-22 | 北京金储自动化技术有限公司 | Dynamic password lock system and method for self-help network management |
CN104574615A (en) * | 2015-01-30 | 2015-04-29 | 程炽坤 | Electronic door lock control method and control device |
CN105976466A (en) * | 2016-05-03 | 2016-09-28 | 科世达(上海)管理有限公司 | Car access control opening method |
CN107545625A (en) * | 2016-10-31 | 2018-01-05 | 郑州蓝视科技有限公司 | A kind of anti-theft system of electromotor car |
CN106780867A (en) * | 2016-11-28 | 2017-05-31 | 广州极酷物联智能科技有限公司 | Gate control system, identity recognition device and personal identification method |
CN107403506A (en) * | 2017-07-07 | 2017-11-28 | 广州创立起科技有限公司 | A kind of dynamic password management equipment used in Vending Machine, system and method |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111047756A (en) * | 2019-11-27 | 2020-04-21 | 温州大学智能锁具研究院 | Intelligent cell system |
CN112562147A (en) * | 2020-12-01 | 2021-03-26 | 安徽三人信息科技有限公司 | Access control user identity recognition method, device and system |
CN117320007A (en) * | 2023-11-27 | 2023-12-29 | 北京时代亿信科技股份有限公司 | Office system control method and system |
CN117320007B (en) * | 2023-11-27 | 2024-02-09 | 北京时代亿信科技股份有限公司 | Office system control method and system |
Also Published As
Publication number | Publication date |
---|---|
CN108711205B (en) | 2021-07-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104639624B (en) | A kind of method and apparatus for realizing mobile terminal remote access control | |
CN110910523B (en) | Conference sign-in method, conference room operation terminal and computer storage medium | |
CN104883402B (en) | A kind of information processing method and cloud service platform | |
CN105224838A (en) | A kind of user authority control method based on recognition of face and system | |
CN106791584A (en) | The implementation method of video conference, cut-in method and related device | |
CN108711205A (en) | A kind of conference system visitor Verification System | |
CN105871789A (en) | Control method of intelligent package delivery box, server and system | |
CN105100094B (en) | A kind of solution lock control method and terminal | |
CN107666669A (en) | A kind of data sharing method and device | |
CN109150804A (en) | Entrust login method, relevant device and computer readable storage medium | |
CN106850703B (en) | Communication method based on social identity and server | |
US10164784B2 (en) | Communication terminal, communication system, and data transmission method | |
CN105320880A (en) | Terminal control method and apparatus | |
CN105553964A (en) | Method and apparatus for controlling Bluetooth device | |
CN105430169B (en) | The control method and system of mobile terminal | |
CN103813035A (en) | Meeting accessing method and device | |
EP3337128A1 (en) | Method, device and computer readable medium for communication using smart video cameras | |
CN109728996A (en) | Methods of exhibiting, user equipment, storage medium and the device of communication information | |
CN106020909A (en) | Application process control device and method | |
CN112887922B (en) | Message sending method and electronic equipment | |
CN114285680A (en) | Team cooperative communication method and system applied to network target range | |
US20240022414A1 (en) | Authentication of communication session participants using blockchain | |
CN104270336B (en) | The migration method, apparatus and system of remote applications running terminal | |
CN105025548B (en) | A kind of the connection control method and device of SIM card | |
CN110995706B (en) | Authentication system, method, device and storage medium for communication application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: 200436 5th floor, 1198 Wanrong Road, Jing'an District, Shanghai Patentee after: Shanghai Shangshi longchuang Intelligent Technology Co.,Ltd. Address before: 200436 5th floor, 1198 Wanrong Road, Jing'an District, Shanghai Patentee before: SHANGHAI SIIC-LONGCHUANG SMARTER ENERGY TECHNOLOGY Co.,Ltd. |
|
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20210706 |