CN109147077B - Mobile attendance checking method and device and server - Google Patents

Mobile attendance checking method and device and server Download PDF

Info

Publication number
CN109147077B
CN109147077B CN201811030244.9A CN201811030244A CN109147077B CN 109147077 B CN109147077 B CN 109147077B CN 201811030244 A CN201811030244 A CN 201811030244A CN 109147077 B CN109147077 B CN 109147077B
Authority
CN
China
Prior art keywords
check
request
mobile terminal
information
sign
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811030244.9A
Other languages
Chinese (zh)
Other versions
CN109147077A (en
Inventor
何泾沙
张胜凡
朱娜斐
韩松
李文欣
蔡方博
侯自强
李想
杨玥
张琨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yongbo Technology Co ltd
Guangdong Hanpu Legal Services Co.,Ltd.
Original Assignee
Beijing University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Technology filed Critical Beijing University of Technology
Priority to CN201811030244.9A priority Critical patent/CN109147077B/en
Publication of CN109147077A publication Critical patent/CN109147077A/en
Application granted granted Critical
Publication of CN109147077B publication Critical patent/CN109147077B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/10Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services

Abstract

The invention provides a mobile attendance checking method, a mobile attendance checking device and a server, and relates to the technical field of attendance checking, wherein the method comprises the following steps: receiving a check-in request sent by a mobile terminal; judging whether the check-in request is legal or not according to the information carried by the check-in request; if yes, issuing a sign-in success identifier to the mobile terminal. The invention can effectively improve the attendance efficiency and the attendance accuracy.

Description

Mobile attendance checking method and device and server
Technical Field
The invention relates to the technical field of attendance checking, in particular to a mobile attendance checking method, a mobile attendance checking device and a server.
Background
At present, employees of a company and students of a school need to examine attendance and check in on time, and especially for the company and the enterprise, attendance is an important embodiment for maintaining normal work order and improving work efficiency. At present, attendance is mostly performed through electronic attendance equipment, and conventional electronic attendance equipment such as a fingerprint attendance system or a human face attendance system has a lot of inconvenience in the actual use process, especially in application scenes involving many people, large personnel mobility, frequent personnel change and complex organization structure. Except that special equipment needs to be deployed, the system also has the problems of low attendance checking efficiency due to queuing, management and control and maintenance need, one person instead of multiple persons to check in and the like. In the attendance system based on GPS positioning, because GPS signals at different moments in the same place are different, the positioning is deviated due to the difference of the signals, and the attendance position is wrong or even fails.
Aiming at the problems of low attendance efficiency and low attendance accuracy of the existing attendance mode, an effective solution is not provided at present.
Disclosure of Invention
In view of the above, the present invention provides a mobile attendance method, an apparatus and a server, which can effectively improve attendance efficiency and attendance accuracy.
In order to achieve the above purpose, the embodiment of the present invention adopts the following technical solutions:
in a first aspect, an embodiment of the present invention provides a mobile attendance checking method, where the method is executed by a server, and includes: receiving a check-in request sent by a mobile terminal; wherein, the information carried by the check-in request comprises: mobile terminal identification, user information, sign-in position and sign-in time; judging whether the check-in request is legal or not according to the information carried by the check-in request; if yes, issuing a sign-in success identifier to the mobile terminal.
With reference to the first aspect, an embodiment of the present invention provides a first possible implementation manner of the first aspect, where the method further includes: if receiving a query request sent by the mobile terminal before receiving the check-in request, determining response information according to the query request; the query request carries AP information connected with the mobile terminal and the current time; the response information includes at least one check-in option for the AP information and the current time; and sending the response information to the mobile terminal so that the mobile terminal determines a target sign-in option and sends a sign-in request based on the target sign-in option.
With reference to the first possible implementation manner of the first aspect, an embodiment of the present invention provides a second possible implementation manner of the first aspect, where the step of determining the response information according to the query request includes: searching check-in options corresponding to the AP information and the current time through a pre-recorded check-in option table; the corresponding relation among the AP information, the time and the check-in options is recorded in the check-in option list; and determining the found check-in option as response information.
With reference to the first aspect, an embodiment of the present invention provides a third possible implementation manner of the first aspect, where the check-in request further includes a first encryption key; the first encryption key is generated by the mobile terminal according to a first preset algorithm; the step of judging whether the check-in request is legal or not comprises the following steps: generating a second encryption key according to a second preset algorithm according to the information carried by the sign-in request; wherein the first preset algorithm is related to the second preset algorithm; judging whether the first encryption key and the second encryption key are the same; if so, judging whether the information carried by the check-in request conflicts with the information carried by the check-in request stored in a database of the server; the stored check-in request is a check-in request corresponding to the check-in successful identifier, and the information carried by the stored check-in request comprises: mobile terminal identification, user information, sign-in position and sign-in time; if no conflict exists, the check-in request is determined to be legal.
With reference to the third possible implementation manner of the first aspect, an embodiment of the present invention provides a fourth possible implementation manner of the first aspect, where the method further includes: if the first encryption key is different from the second encryption key, determining that the sign-in request is illegal, recording user information carried in the sign-in request, and marking the user information; and issuing an illegal identifier and an identifier which represents that the user information is marked to the mobile terminal.
With reference to the third possible implementation manner of the first aspect, an embodiment of the present invention provides a fifth possible implementation manner of the first aspect, where the step of determining whether information carried in the check-in request conflicts with information carried in the check-in request stored in a database of the server includes: searching for a mobile terminal identifier which is the same as the mobile terminal identifier carried by the check-in request in a plurality of mobile terminal identifiers stored in a database of the server, and determining the check-in request stored in the database corresponding to the same mobile terminal identifier; and judging whether the check-in time carried by the check-in request conflicts with the stored check-in time carried by the check-in request.
With reference to the fifth possible implementation manner of the first aspect, an embodiment of the present invention provides a sixth possible implementation manner of the first aspect, where the method further includes: and if the check-in time carried by the check-in request conflicts with the stored check-in time carried by the check-in request, issuing a check-in conflict identifier to the mobile terminal.
In a second aspect, an embodiment of the present invention further provides a mobile attendance checking device, where the device is disposed at a server side, and the device includes: the receiving module is used for receiving a sign-in request sent by the mobile terminal; wherein, the information carried by the check-in request comprises: mobile terminal identification, user information, sign-in position and sign-in time; the judging module is used for judging whether the check-in request is legal or not according to the information carried by the check-in request; and the sending module is used for issuing a successful sign-in identifier to the mobile terminal if the sign-in request is legal.
In a third aspect, an embodiment of the present invention provides a server, including a processor and a memory; the memory has stored thereon a computer program which, when executed by the processor, performs the method according to any one of the first to sixth possible implementation manners of the first aspect.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, performs the steps of the method in any one of the first to sixth possible implementation manners of the first aspect.
The embodiment of the invention provides a mobile attendance checking method, a device and a server, wherein a check-in request sent by a mobile terminal is received, the check-in request carries mobile terminal identification information, user information, check-in position information and check-in time information, whether the check-in request is legal or not is judged according to the information carried by the check-in request, and if the check-in request is legal, a check-in success identification is issued to the mobile terminal. In the attendance mode that this embodiment provided, the user only needs can sign in through mobile terminal, and convenient and fast directly interacts by server and mobile terminal, can effectively promote attendance efficiency. In addition, the check-in request sent by the mobile terminal carries the mobile terminal identification, the user information, the check-in position and the check-in time, the check-in action can be effectively prevented from being replaced due to the uniqueness of the mobile terminal identification, the check-in position and the check-in time can limit the check-in range in terms of time dimension and space dimension, the validity of the check-in request can be comprehensively verified by combining the user information, and the check-in is considered to be successful only when the check-in request is legal. This kind of mode can make attendance result more accurate. To sum up, this embodiment can effectively improve attendance efficiency and attendance rate of accuracy.
Additional features and advantages of the disclosure will be set forth in the description which follows, or in part may be learned by the practice of the above-described techniques of the disclosure, or may be learned by practice of the disclosure.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 shows a flowchart of a mobile attendance checking method according to an embodiment of the present invention;
fig. 2 shows a flowchart of another mobile attendance checking method provided by the embodiment of the invention;
fig. 3 shows a flowchart of another mobile attendance checking method provided by the embodiment of the invention;
fig. 4 shows a flowchart of a mobile attendance checking method according to an embodiment of the present invention;
fig. 5 is a flowchart illustrating an administrator entering MAC address information of a corresponding classroom according to an embodiment of the present invention;
FIG. 6 is a flow chart illustrating course information entry provided by an embodiment of the present invention;
fig. 7 shows a block diagram of a mobile attendance checking device according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a server according to an embodiment of the present invention.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In view of the problems of low attendance efficiency and low attendance accuracy in the existing attendance mode, the mobile attendance method, the mobile attendance device and the server provided by the embodiment of the invention can effectively improve the attendance efficiency and the attendance accuracy, and the embodiment of the invention is described in detail below.
The first embodiment is as follows:
first, a mobile attendance method for implementing an embodiment of the present invention is described with reference to fig. 1.
Fig. 1 shows a flowchart of a mobile attendance checking method, which is executed by a server, and includes the following steps:
step S102, receiving a sign-in request sent by a mobile terminal; wherein, the information carried by the check-in request comprises: mobile terminal identification, user information, check-in location and check-in time.
The mobile terminals can be mobile phones, iPads and other devices, the mobile terminal identification of each mobile terminal is unique, namely the identification of different mobile terminals is different, and the user information can be the name of the user and the sign-in position such as a conference room, an office or a classroom.
And step S104, judging whether the check-in request is legal or not according to the information carried by the check-in request.
Since the user may check in illegally through the browser or the simulator, or may check in once or more times through the mobile terminal instead of others, it is necessary to determine whether the check-in request is legal. The information carried in the check-in request is a mobile terminal identifier, whether the user successfully checks in through the mobile terminal in a certain time period can be judged by judging the mobile terminal identifier, if the user successfully checks in, and the re-received check-in request and the previously received check-in request have time conflicts and are overlapped, the check-in request is judged to be the check-in conflict request, the user is not allowed to check in again, namely, the check-in condition of replacing other people is prevented, namely, each mobile device can only check in once in a specific time period and area (the area limit of time + space). The check-in request can also include an encrypted key obtained by the mobile terminal through calculation, and when the server receives the check-in request, if the encrypted key is judged to be null, the server indicates that the user is an illegal check-in request performed through a browser or a simulator.
And step S106, if yes, issuing a sign-in success identifier to the mobile terminal.
The sign-in success identification can be a text prompt with sign-in success or a voice prompt for showing sign-in success. If the check-in request is judged to be illegal, when the request is illegal and belongs to the condition that the check-in request at this time and the previous successful check-in time conflict, a check-in conflict identifier is issued to the mobile terminal; when the request illegally belongs to a sign-in request of a user through a browser or a simulator, recording user information carried in the sign-in request, marking the user information, sending a sign-in invalid identifier and an identifier representing that the user information is marked to the mobile terminal, and enabling the user to enter a blacklist when the user illegally signs in for a certain number of times.
In the attendance checking method provided by the embodiment, the user can check in only through the mobile terminal, the method is convenient and fast, the server directly interacts with the mobile terminal, and the attendance checking efficiency can be effectively improved. In addition, the check-in request sent by the mobile terminal carries the mobile terminal identification, the user information, the check-in position and the check-in time, the check-in action can be effectively prevented from being replaced due to the uniqueness of the mobile terminal identification, the check-in position and the check-in time can limit the check-in range in terms of time dimension and space dimension, the validity of the check-in request can be comprehensively verified by combining the user information, and the check-in is considered to be successful only when the check-in request is legal. This kind of mode can make attendance result more accurate. To sum up, this embodiment can effectively improve attendance efficiency and attendance rate of accuracy.
The embodiment further provides a specific process of the mobile attendance method on the basis of the mobile attendance method, and as shown in a flow chart of another mobile attendance method shown in fig. 2, the following steps can be seen:
step S202, receiving a sign-in request sent by a mobile terminal; wherein, the information carried by the check-in request comprises: the mobile terminal comprises a mobile terminal identifier, user information, a sign-in position and sign-in time, and further comprises a first encryption key; the first encryption key is generated by the mobile terminal according to a first preset algorithm.
The first encryption key is generated according to a first preset algorithm according to the check-in request and is attached to the check-in request when the mobile terminal sends the check-in request.
Step S204, generating a second encryption key according to a second preset algorithm according to the information carried by the sign-in request; wherein the first preset algorithm is related to the second preset algorithm.
The correlation may indicate that the first preset algorithm is the same as the second preset algorithm, or that the first preset algorithm is different from the second preset algorithm. The first encryption key is generated by the mobile terminal according to a first preset algorithm, and the second encryption key is generated by the server according to the first preset algorithm.
In step S206, it is determined whether the first encryption key and the second encryption key are the same. If yes, go to step S208; if not, step S216 is performed.
Step S208, searching for a mobile terminal identifier which is the same as the mobile terminal identifier carried by the received check-in request in a plurality of mobile terminal identifiers stored in a database of the server, and determining the check-in request stored in the database corresponding to the same mobile terminal identifier; the stored check-in request is a check-in request corresponding to the check-in successful identifier, and the information carried by the stored check-in request comprises: mobile terminal identification, user information, check-in location and check-in time.
According to the mobile terminal identification carried by the check-in request sent by the mobile terminal, the same mobile terminal identification is searched in the mobile terminal identifications stored in the server, the check-in request which is stored in the server and corresponds to the same mobile terminal identification is determined, namely, the check-in request which corresponds to the check-in success identification is determined, if a student sends the check-in request to the server through a mobile phone of the student, before the check-in request, the student sends the check-in request to the server through the mobile phone of the student and completes the check-in, the server stores the check-in request which corresponds to the completion of the check-in, and the check-in request comprises information carried by the check-in request.
Step S210, judging whether the check-in time carried by the received check-in request conflicts with the stored check-in time carried by the check-in request; if not, executing step S212; if so, go to step S214.
The check-in time carried by the check-in request stored in the server can be check-in time recorded in the form of hours, months and days, if the check-in time carried by the check-in request is different from the check-in time in the corresponding check-in request stored in the server after the check-in is successful for the last time by less than the time of a lesson, the check-in request is considered to be a conflict check-in, and the conflict check-in also comprises repeated check-in, if the student completes the check-in a lesson, and sends the check-in request again in the course on course period, the check-in request sent again is considered to be repeated check-in.
Step S212, the check-in request is determined to be legal, and a check-in success identifier is issued to the mobile terminal.
If the first encryption key is the same as the second encryption key, the time conflict does not exist between the check-in request and the check-in completed by the mobile terminal before, and the check-in request is determined to be legal.
Step S214, issuing a sign-in conflict identifier to the mobile terminal.
If the time conflict exists between the check-in request and the check-in completed by the mobile terminal before, and the user can check-in again by the mobile terminal after finishing the check-in by himself or herself, and sends a check-in conflict identifier to the mobile terminal to prevent the check-in behavior by replacing other people.
Step S216, determining that the sign-in request is illegal, recording the user information carried in the sign-in request, and issuing a sign-in invalid identifier and an identifier representing that the user information is marked to the mobile terminal.
If the first encryption key is different from the second encryption key, the fact that the user possibly sends a check-in request to the server through the simulator is indicated, the server can determine that the check-in request is an illegal request, record user information carried in the check-in request, such as the name of the user, and mark the user information. The sign-in invalid identification can be words or voice with sign-in invalid identification, and the identification for representing that the user information is marked can be words or voice with information such as user name and the like which is marked.
The mobile attendance method provided by the embodiment of the invention comprises the steps of receiving a check-in request sent by a mobile terminal, wherein the check-in request also carries a first encryption secret key generated by the mobile terminal according to the check-in request according to a first preset algorithm, generating a second encryption secret key by a server according to a second preset algorithm according to information carried by the check-in request, judging whether the first encryption secret key and the second encryption secret key are the same, if not, indicating that a user does not pass the check-in request sent by the mobile terminal but can pass the check-in request sent by an illegal way such as a browser or a simulator, and determining that the check-in request is an illegal request, thereby effectively preventing the illegal check-in behavior of the user, ensuring that the attendance result is more accurate, and if the first encryption secret key and the second encryption secret key are the same, judging whether the check-in time carried by the received check-in request conflicts with the stored check-in time carried by the check-in request, if the check-in conflict does not occur, the sign-in success identifier is sent to the mobile terminal, if the check-in conflict occurs, the sign-in success identifier represents that the user may replace other people to sign in or the user's own repeated sign-in, the sign-in conflict identifier is sent to the mobile terminal, the action of replacing other people to sign in is prevented, and the check-in accuracy rate can be effectively improved.
In specific implementation, a flowchart of another mobile attendance checking method shown in fig. 3 is given on the basis of fig. 1, and the following steps can be seen:
step S302, receiving a query request sent by a mobile terminal; the query request carries the AP information and the current time of the mobile terminal connection.
Taking the example that the user signs in a meeting room, the user can send a query request to the server through a mobile phone of the user, and can uniquely determine the location division of the area corresponding to the AP (Access Point) information (such as an MAC address) by using the unique characteristics of the AP information (such as the MAC address) connected to the mobile terminal.
Step S304, checking the sign-in options corresponding to the AP information and the current time through a pre-recorded sign-in option table; the corresponding relation of the AP information, the time and the check-in option is recorded in the check-in option table.
And searching the meeting subjects of the areas corresponding to the AP (MAC address), such as the meeting room where the user is located and the next meeting room at the current time, through a pre-recorded check-in type selection table.
Step S306, determining the found check-in option as response information; wherein the response information includes at least one check-in option for the AP information and the current time.
The conference subjects of the conference room where the user is located and the next conference room at the current time are found, the found corresponding conference subjects of the conference rooms different in the current time are used as response information, the sign-in options are included, such as the conference subject of the first conference room at the current time, the conference subject of the second conference room at the current time, at the moment, the two sign-in options are provided, and the sign-in options of the response information are not less than one.
And step S308, sending the response information to the mobile terminal so that the mobile terminal determines a target sign-in option and sends a sign-in request based on the target sign-in option.
The user selects the sign-in option according to the response information sent to the mobile terminal, if the conference subject of the first conference room at the current time is selected as the target sign-in option, the sign-in request is sent based on the target sign-in option, and the information carried by the sign-in request comprises: mobile terminal identification, user information, check-in location and check-in time.
Step S310, judging whether the check-in request is legal or not according to the information carried by the check-in request.
Step S312, if yes, the successful sign-in identifier is sent to the mobile terminal.
The sign-in success mark can be a text prompt with sign-in success or a voice prompt for showing sign-in success, and prompts the user that the sign-in is successful. If the check-in request is judged to be illegal, the specific process is described in step S106, and will not be described herein again.
According to the mobile attendance checking method provided by the embodiment of the invention, the inquiry request carries the AP information connected with the mobile terminal and the current time, the position division of the area corresponding to the AP information can be uniquely determined by utilizing the unique characteristic of the AP information connected with the mobile terminal, the more accurate response information can be issued according to the current time, and the check-in request is sent by the mobile terminal according to the response information, so that the check-in accuracy is further improved.
Example two:
on the basis of the mobile attendance method provided in the first embodiment, the present embodiment takes the example of the student signing in class, the attendance object is the student, and the attendance field is the course signing in, and is applied to the mobile attendance method, for example, as shown in the flowchart of the mobile attendance method shown in fig. 4, the specific steps are as follows:
(1) if the client of the student (namely, the mobile terminal) is connected with Wi-Fi in a certain classroom covered by Wi-Fi, the student sends an inquiry request to the server through the client, wherein the inquiry request comprises the MAC address (namely, the AP information) contained in the current Wi-Fi and the current time.
(2) And when receiving an inquiry request of the client, the server screens and matches the courses in the MySQL database according to the received MAC address information and the time information, and if the screening result meets the course information at the current time and the current place, the server issues the corresponding course information at the current time and the current space to the client.
(3) The client side obtains the course information issued by the server side, if the course information is null, the client side is prompted to change the position or refresh the client side to resend the query request, the client side can also send the information that the MAC address information of the current position is not recorded into the background database to the server, and if the current course information is not null, the course needing to be checked in can be selected and the check-in request can be sent.
(4) When a student at a client sends a check-in request, the client sends current student information (school number, name and the like), selected course information (course place, course time, course teacher, course name and the like), current check-in time and encrypted key information obtained by calculation of a first preset algorithm as the check-in request to a server, and the server checks the encrypted key information.
(5) After receiving a sign-in request sent by a client, the server analyzes an encryption key, and if the encryption key is empty, the server issues a sign-in invalid identifier to the client; if the client side is not empty, an encryption key is obtained through calculation of a second preset algorithm, whether the encryption key calculated by the client side is the same as the encryption key calculated by the server or not is judged, if not, the encryption algorithms of the client side and the server are different, the student sends a check-in request through the simulator, the check-in identification is illegal check-in, if yes, the student judges whether the client side completes check-in of other courses within the course time range corresponding to the course requested to be checked-in according to the check-in request, and if yes, the check-in conflict identification is issued to the client side; if not, judging whether the client finishes the check-in of the course within the time range of the course corresponding to the course requested to check-in, if so, issuing a check-in repeated identifier to the client, if not, indicating that the check-in is successful, storing the check-in request information into a database, and issuing a check-in successful identifier to the client.
(6) The client receives the information sent by the server, if the sent information is that the information prompting whether the student needs to cancel the previous sign-in of the mobile terminal exists in the sign-in conflict identification, the course sign-in can not be carried out if the information is not cancelled; if the issued information is an invalid sign-in, indicating that the interface simulation is currently carried out to forge the sign-in, wherein the invalid sign-in contains information for prompting that the current student information is marked, and the sign-in is invalid; if the issued information is the sign of successful check-in, the check-in is successful.
Fig. 5 illustrates a flow chart of the administrator entering MAC address information of the corresponding classroom, as seen in the following steps:
(1) the mobile terminal administrator inputs MAC address information of a classroom, firstly, the Wi-Fi information is connected to the classroom, a physical address corresponding to the current classroom is input, and the Wi-Fi information is clicked and uploaded to a server background to wait.
(2) The server receives MAC address information and corresponding physical location information (classroom information) sent by the mobile terminal, judges whether the received information is stored in a MySQL database, if the received information is stored in the database, the uploading conflict is described, and the feedback identifier is failed to upload; if the received information is not summarized with the database, the uploading is not conflicted, the uploading is successful, the information is written into the database, and the feedback identifier is uploaded successfully.
(3) The mobile terminal receives a feedback identifier sent by the server, if the feedback identifier is an uploading conflict, the MAC address information of the current position is already uploaded, and the administrator needs to move the position to perform the steps (1) and (2) again; if the feedback identification is successful uploading, the MAC address information of the current position is successfully uploaded.
Fig. 6 illustrates a flow chart of course information entry, which can be seen in the following steps:
(1) and at the Web end, a teacher or an administrator can select a time and a place to construct course information, submit the constructed course information to the server background, and wait for the feedback information of the server.
(2) After receiving the course construction information sent by the Web end, the server firstly judges the classroom and time contained in the constructed course, judges whether the received information conflicts with the database summary information according to a specific rule, if so, feeds back the identification of the Web end as the course construction conflict, and if not, indicates that the course construction is successful, and writes the course construction conflict into the database.
(3) If the user teacher or administrator at the Web end receives the identification returned by the server background, and if the identification is used for creating course conflicts, the user needs to edit and select the time period or the place selected by the user teacher or the administrator, and then the steps (1) and (2) are carried out again.
The scheme of signing in at class for students is applicable to a mobile attendance method based on AP information (such as MAC addresses). In the whole check-in process, in order to ensure the usability of the mobile attendance checking method, the technologies of RESTFUL, MD5 encryption, information mutual exclusion, asynchronous loading, real-time refreshing and the like are analyzed, the automatic addition of the MAC address information of Wi-Fi into a database is realized through the design of the MAC address information of Wi-Fi, and a user can automatically send a request to a background to acquire corresponding attendance checking classroom information after the mobile phone is linked with the Wi-Fi information.
From the viewpoint of obtaining the MAC address information of the Wi-Fi, the mobile terminal can allow the mobile terminal to obtain the MAC address of the information of the linked Wi-Fi, the MAC address information is unique and can be used as a unique identification mark, and the attendance information is also subjected to corresponding encryption technology, so that the safety of the transmission process can be ensured, and the attendance information cannot be simulated or tampered.
Meanwhile, the identification of the request when the mobile terminal signs in is also the only identification of the mobile terminal, so that each mobile terminal can be ensured to represent a user, when the mobile terminal signs in, the check-in request is carried out, the check-in of other courses can not be carried out when the course which is successfully signed in is not finished through the overall mutual exclusion processing, and the check-in of the next course can be carried out unless the user cancels the information that the course which is successfully signed in this time.
After the user successfully signs in, the sign-in request information is stored in the MYSQL database, so that the sign-in information is stored and the accuracy and reliability of the sign-in are ensured.
The check-in process may end up with an overview of: the user is marked through the unique identification mark of the mobile terminal, and the check-in course information and the check-in classroom information at the current time are bound through the MAC address of Wi-Fi or the information of the unique identification mark in the base station and are stored in the database. Whether the current check-in time is finished or not can be judged through the time of the course information when the course is checked in, whether check-in of a plurality of users is carried out through one mobile terminal or not is judged, it is guaranteed that one mobile terminal can only carry out effective check-in on the course once, other check-in information is invalid, and finally the check-in information is bound with each user mobile phone.
The final overview of the check-in process is mainly to explain that the mobile attendance checking method is not limited to a specific scene, and as long as a check-in mode capable of marking a mobile terminal is available, the check-in mode of a specific occasion is carried out through two dimensions of time and space, so that an accurate and reliable check-in mode can be achieved.
Through the mode, the user only needs to sign in through the client, namely the mobile terminal, the system is convenient and fast, interaction is directly carried out through the server and the mobile terminal, and the attendance checking efficiency can be effectively improved. In addition, the inquiry request sent by the mobile terminal is provided with the MAC address contained in the current Wi-Fi, the sign-in request carries user information, a sign-in position, sign-in time and an encryption key, the uniqueness of the MAC address information can be used as a uniquely identified identifier, so that the sign-in behavior can be effectively prevented from being replaced, the server calculates the encryption key according to the sign-in request, judges whether the sign-in request is legal according to the encryption key calculated by the mobile terminal and the encryption key calculated by the server, the sign-in position and the sign-in time can limit the attendance range by using both time dimension and space dimension, and the validity of the sign-in request can be comprehensively verified by combining with the user information, and the sign-in request is considered to be successful only when the sign-in request is legal. This kind of mode can make attendance result more accurate. To sum up, this embodiment can effectively improve attendance efficiency and attendance rate of accuracy.
Example three:
corresponding to the foregoing method embodiment, this embodiment provides a mobile attendance device, referring to a block diagram of a structure of the mobile attendance device shown in fig. 7, where the device is disposed on a server side and includes the following modules:
a receiving module 702, configured to receive a check-in request sent by a mobile terminal; wherein, the information carried by the check-in request comprises: mobile terminal identification, user information, sign-in position and sign-in time;
the judging module 704 is used for judging whether the check-in request is legal or not according to the information carried by the check-in request;
a sending module 706, configured to send a successful sign-in identifier to the mobile terminal if the sign-in request is legal.
According to the mobile attendance checking device provided by the embodiment of the invention, the check-in request sent by the mobile terminal is received, the check-in request carries mobile terminal identification information, user information, check-in position information and check-in time information, whether the check-in request is legal or not is further judged according to the information carried by the check-in request, and if the check-in request is legal, a check-in success identification is issued to the mobile terminal. In the attendance mode that this embodiment provided, the user only needs can sign in through mobile terminal, and convenient and fast directly interacts by server and mobile terminal, can effectively promote attendance efficiency. In addition, the check-in request sent by the mobile terminal carries the mobile terminal identification, the user information, the check-in position and the check-in time, the check-in action can be effectively prevented from being replaced due to the uniqueness of the mobile terminal identification, the check-in position and the check-in time can limit the check-in range in terms of time dimension and space dimension, the validity of the check-in request can be comprehensively verified by combining the user information, and the check-in is considered to be successful only when the check-in request is legal. This kind of mode can make attendance result more accurate. To sum up, this embodiment can effectively improve attendance efficiency and attendance rate of accuracy.
In particular implementation, the check-in request further comprises a first encryption key; the first encryption key is generated by the mobile terminal according to a first preset algorithm; the judgment module 704 is configured to generate a second encryption key according to a second preset algorithm according to the information carried by the check-in request; wherein the first preset algorithm is related to the second preset algorithm; judging whether the first encryption key and the second encryption key are the same; if so, judging whether the information carried by the check-in request conflicts with the information carried by the check-in request stored in a database of the server, and if not, determining that the check-in request is legal. The sending module 706 is configured to issue a sign-in invalid identifier to the mobile terminal if the first encryption key is different from the second encryption key; and if the information carried by the check-in request conflicts with the information carried by the check-in request stored in the database of the server, issuing a check-in conflict identifier to the mobile terminal.
In another embodiment, the receiving module 702 includes: the check-in unit is used for searching check-in options corresponding to the AP information and the current time through a pre-recorded check-in option table if a query request sent by the mobile terminal is received before the check-in request is received; the query request carries AP information connected with the mobile terminal and the current time; the corresponding relation among the AP information, the time and the check-in options is recorded in the check-in option list; the determining unit is used for determining the found check-in option as response information; wherein the response information includes at least one check-in option for the AP information and the current time; and the sending unit is used for sending the response information to the mobile terminal so that the mobile terminal determines the target sign-in option and sends a sign-in request based on the target sign-in option.
The device provided by the embodiment has the same implementation principle and technical effect as the foregoing embodiment, and for the sake of brief description, reference may be made to the corresponding contents in the foregoing method embodiment for the portion of the embodiment of the device that is not mentioned.
An embodiment of the present invention provides a server, referring to a schematic structural diagram of a server shown in fig. 8, where the server includes: the device comprises a processor 80, a memory 81, a bus 82 and a communication interface 83, wherein the processor 80, the communication interface 83 and the memory 81 are connected through the bus 82; the processor 80 is arranged to execute executable modules, such as computer programs, stored in the memory 81.
The memory 81 may include a high-speed Random Access Memory (RAM) and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection between the network element of the system and at least one other network element is realized through at least one communication interface 83 (which may be wired or wireless), and the internet, a wide area network, a local network, a metropolitan area network, etc. may be used.
Bus 82 may be an ISA bus, PCI bus, EISA bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 8, but that does not indicate only one bus or one type of bus.
The memory 81 is used for storing a program, the processor 80 executes the program after receiving an execution instruction, and the method executed by the apparatus defined by the flow process disclosed in any of the foregoing embodiments of the present invention may be applied to the processor 80, or implemented by the processor 80.
The processor 80 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 80. The Processor 80 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the device can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA), or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory 81, and the processor 80 reads the information in the memory 81 and performs the steps of the above method in combination with its hardware.
Embodiments of the present invention further provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, performs the steps of the method of any one of the foregoing embodiments.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the system described above may refer to the corresponding process in the foregoing embodiments, and is not described herein again.
The mobile attendance method, the mobile attendance device and the computer program product of the server provided by the embodiment of the invention comprise a computer readable storage medium storing program codes, instructions included in the program codes can be used for executing the method described in the previous method embodiment, and specific implementation can refer to the method embodiment, and is not described herein again.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present invention, which are used for illustrating the technical solutions of the present invention and not for limiting the same, and the protection scope of the present invention is not limited thereto, although the present invention is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (8)

1. A mobile attendance method, performed by a server, comprising:
receiving a check-in request sent by a mobile terminal; wherein, the information carried by the check-in request comprises: mobile terminal identification, user information, sign-in position and sign-in time;
judging whether the check-in request is legal or not according to the information carried by the check-in request;
if yes, issuing a sign-in success identifier to the mobile terminal;
if an inquiry request sent by the mobile terminal is received before the check-in request is received, response information is determined according to the inquiry request; the query request carries AP information connected with the mobile terminal and the current time; the response information includes at least one check-in option for the AP information and the current time;
sending the response information to the mobile terminal so that the mobile terminal determines a target sign-in option and sends a sign-in request based on the target sign-in option;
the step of determining response information according to the query request includes:
searching check-in options corresponding to the AP information and the current time through a pre-recorded check-in option table; the check-in option list records the corresponding relation among the AP information, the time and the check-in options;
and determining the found check-in option as response information.
2. The method of claim 1, wherein the check-in request further comprises a first encryption key; the first encryption key is generated by the mobile terminal according to a first preset algorithm;
the step of judging whether the check-in request is legal comprises the following steps:
generating a second encryption key according to a second preset algorithm according to the information carried by the sign-in request; wherein the first preset algorithm is related to the second preset algorithm;
judging whether the first encryption key and the second encryption key are the same;
if yes, judging whether the information carried by the check-in request conflicts with the information carried by the check-in request stored in a database of the server; the stored check-in request is a check-in request corresponding to the successful check-in identifier, and the information carried by the stored check-in request includes: mobile terminal identification, user information, sign-in position and sign-in time;
and if no conflict exists, determining that the check-in request is legal.
3. The method of claim 2, further comprising:
if the first encryption key is different from the second encryption key, determining that the sign-in request is illegal, recording the user information carried in the sign-in request, and marking the user information;
and issuing an illegal identifier and an identifier representing that the user information is marked to the mobile terminal.
4. The method according to claim 2, wherein the step of determining whether the information carried by the check-in request conflicts with the information carried by the check-in request stored in the database of the server comprises:
searching for a mobile terminal identifier which is the same as the mobile terminal identifier carried by the check-in request in a plurality of mobile terminal identifiers stored in a database of the server, and determining the check-in request stored in the database corresponding to the same mobile terminal identifier;
and judging whether the check-in time carried by the check-in request conflicts with the stored check-in time carried by the check-in request.
5. The method of claim 4, further comprising:
and if the check-in time carried by the check-in request conflicts with the stored check-in time carried by the check-in request, issuing a check-in conflict identifier to the mobile terminal.
6. The utility model provides a remove attendance device which characterized in that, the device sets up in the server side, the device includes:
the receiving module is used for receiving a sign-in request sent by the mobile terminal; wherein, the information carried by the check-in request comprises: mobile terminal identification, user information, sign-in position and sign-in time;
the judging module is used for judging whether the check-in request is legal or not according to the information carried by the check-in request;
the first sending module is used for issuing a sign-in success identifier to the mobile terminal if the sign-in request is legal;
the determining module is used for determining response information according to the query request if the query request sent by the mobile terminal is received before the check-in request is received; the query request carries AP information connected with the mobile terminal and the current time; the response information includes at least one check-in option for the AP information and the current time;
the second sending module is used for sending the response information to the mobile terminal so that the mobile terminal determines a target sign-in option and sends a sign-in request based on the target sign-in option;
the determining module is further configured to search check-in options corresponding to the AP information and the current time through a pre-recorded check-in option table; the check-in option list records the corresponding relation among the AP information, the time and the check-in options;
and determining the found check-in option as response information.
7. A server, comprising a processor and a memory;
the memory has stored thereon a computer program which, when executed by the processor, performs the method of any of claims 1 to 5.
8. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to any one of the claims 1 to 5.
CN201811030244.9A 2018-09-04 2018-09-04 Mobile attendance checking method and device and server Active CN109147077B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811030244.9A CN109147077B (en) 2018-09-04 2018-09-04 Mobile attendance checking method and device and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811030244.9A CN109147077B (en) 2018-09-04 2018-09-04 Mobile attendance checking method and device and server

Publications (2)

Publication Number Publication Date
CN109147077A CN109147077A (en) 2019-01-04
CN109147077B true CN109147077B (en) 2021-08-27

Family

ID=64826937

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811030244.9A Active CN109147077B (en) 2018-09-04 2018-09-04 Mobile attendance checking method and device and server

Country Status (1)

Country Link
CN (1) CN109147077B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110599128A (en) * 2019-09-12 2019-12-20 凡普数字技术有限公司 Method, device and storage medium for checking attendance of staff
CN112200926A (en) * 2020-09-30 2021-01-08 中国银行股份有限公司 Anti-cheating attendance check sign-in method and system based on WIFI technology
CN112365640A (en) * 2020-11-27 2021-02-12 深圳市欧瑞博科技股份有限公司 Method, system and device for replacing user information of intelligent door lock
CN112907775A (en) * 2021-01-27 2021-06-04 江西中科瓦力科技有限公司 Attendance system based on face recognition

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202535538U (en) * 2011-06-22 2012-11-14 许晓飞 System for positioning person's geographic location with local information push function
CN104378366A (en) * 2014-11-05 2015-02-25 康佳集团股份有限公司 Mobile terminal based remote sign-in system and method

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5873236B2 (en) * 2010-08-11 2016-03-01 Kddi株式会社 Attendance management method and system
JP5578629B2 (en) * 2011-12-27 2014-08-27 Necソリューションイノベータ株式会社 Time management device, time management method and program
CN103021038A (en) * 2012-12-03 2013-04-03 福州开普软件信息技术有限公司 Campus classroom attendance checking-in system and method for realizing attendance checking-in by using system
CN104282050B (en) * 2013-07-13 2017-12-19 海南大学 The attendance checking system verified based on smart phone digital certificate and time location
CN103369635A (en) * 2013-07-29 2013-10-23 广州市沃希信息科技有限公司 Sign-in method, mobile terminal and sign-in server
CN104143219B (en) * 2014-07-18 2016-06-22 浙江工业大学 Work attendance method and system based on Wi-Fi fingerprint
CN105869224B (en) * 2015-01-19 2018-09-25 北京艾博纳信息技术有限公司 A kind of classroom based on intelligent terminal WLAN is registered method and system
CN106156915A (en) * 2015-04-02 2016-11-23 华为技术有限公司 A kind of wireless Work attendance method, Apparatus and system
WO2016168667A1 (en) * 2015-04-16 2016-10-20 Offender Smartphone Monitoring, LLC Monitoring process
KR101713484B1 (en) * 2015-05-21 2017-03-22 강원대학교산학협력단 Server and system for managing smart attendance, and method for generating seat map of classroom
CN105741208A (en) * 2016-01-25 2016-07-06 东华大学 NFC based intelligent teaching management system and method
CN105654568A (en) * 2016-01-29 2016-06-08 重庆邮电大学 Automatic attendance checking method and system based on WI-FI
CN106130732A (en) * 2016-06-23 2016-11-16 深圳市海月通信技术有限公司 The method and apparatus that a kind of user registers
CN106650372B (en) * 2016-12-06 2019-05-03 厦门中控智慧信息技术有限公司 The activating method and device of administrator right
CN106686524B (en) * 2016-12-06 2019-11-26 福建天泉教育科技有限公司 Classroom roll-call method based on Wi-Fi Direct
CN106657301A (en) * 2016-12-09 2017-05-10 北京竞业达数码科技有限公司 Automatic sign-in method and device, attendance computing method and server
CN106710021A (en) * 2017-01-03 2017-05-24 北京华云网际科技有限公司 Automobile punch-in method based on mobile terminal
CN107343261A (en) * 2017-07-13 2017-11-10 广州耘宇电子科技有限公司 Mobile Internet is intelligently registered system and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202535538U (en) * 2011-06-22 2012-11-14 许晓飞 System for positioning person's geographic location with local information push function
CN104378366A (en) * 2014-11-05 2015-02-25 康佳集团股份有限公司 Mobile terminal based remote sign-in system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于微信平台的并行签到考勤管理系统;徐宁;《电脑知识与技术》;20161031;77-79 *

Also Published As

Publication number Publication date
CN109147077A (en) 2019-01-04

Similar Documents

Publication Publication Date Title
CN109147077B (en) Mobile attendance checking method and device and server
WO2018119587A1 (en) Data processing method, device, and system, and information acquisition apparatus
CN110535660A (en) A kind of evidence obtaining service system based on block chain
CN105246073B (en) The access authentication method and server of wireless network
US20140215573A1 (en) System and method for application accounts
US10003975B2 (en) Authorized areas of authentication
CN106162804A (en) For providing the method and apparatus of the access information of wireless access focus
CN110298421A (en) A kind of online generation, offline generation and the verification method and device of two dimensional code
CN108256303A (en) Electronic device, auth method and storage medium
CN108769044B (en) Sign-in verification method and system based on reverse addresses
CN109474577A (en) A kind of Internet of Things network edge O&M equipment with safety permission function
CN105427203A (en) House renting information management method and system
CN108647501A (en) Multiple utility program shares password unlocking method, device, equipment and storage medium
CN107204049A (en) The methods, devices and systems of electronic signing
CN111242248A (en) Personnel information monitoring method and device and computer storage medium
CN106302355A (en) A kind of method of Real-name Registration authentication
CN103530343A (en) Structural data interactive system, data receiving terminal and structural data interactive method
CN113037505B (en) Method and system for realizing trusted Web application
KR20140078242A (en) System and method for attendance and absence management using biometrics and location sensing in terminal
CN105873046B (en) A kind of method and apparatus for managing WAP
CN110020514B (en) Account proxy registration method and device
US20230042561A1 (en) Systems and methods for authenticating of personal communications cross reference to related applications
JP6368062B1 (en) Authentication device, authentication device control method, and program thereof
CN113240824B (en) Attendance checking method and device, computer equipment and storage medium
KR20150107509A (en) Online board server, online board system and method for controlling harmful image display on online board

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230817

Address after: Card 301, Hengtai Building, No. 9 Changjiang North Road, East District, Zhongshan City, Guangdong Province, 528400

Patentee after: Guangdong Hanpu Legal Services Co.,Ltd.

Address before: 101200 room 205-211526, No. 40, Fuqian West Street, Pinggu town, Pinggu District, Beijing (cluster registration)

Patentee before: BEIJING YONGBO TECHNOLOGY CO.,LTD.

Effective date of registration: 20230817

Address after: 101200 room 205-211526, No. 40, Fuqian West Street, Pinggu town, Pinggu District, Beijing (cluster registration)

Patentee after: BEIJING YONGBO TECHNOLOGY CO.,LTD.

Address before: 100000 No. 100 Chaoyang District Ping Tian Park, Beijing

Patentee before: Beijing University of Technology