CN109636936A - A kind of attendance checking system, method, medium and electronic equipment - Google Patents
A kind of attendance checking system, method, medium and electronic equipment Download PDFInfo
- Publication number
- CN109636936A CN109636936A CN201811517609.0A CN201811517609A CN109636936A CN 109636936 A CN109636936 A CN 109636936A CN 201811517609 A CN201811517609 A CN 201811517609A CN 109636936 A CN109636936 A CN 109636936A
- Authority
- CN
- China
- Prior art keywords
- terminal
- client
- user
- ibeancon
- attendance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000012795 verification Methods 0.000 claims description 28
- 206010000117 Abnormal behaviour Diseases 0.000 claims description 14
- 238000003860 storage Methods 0.000 claims description 11
- 230000006399 behavior Effects 0.000 claims description 8
- 230000002159 abnormal effect Effects 0.000 claims description 3
- 230000003213 activating effect Effects 0.000 claims description 3
- 238000001514 detection method Methods 0.000 claims description 3
- 230000008569 process Effects 0.000 abstract description 8
- 230000004913 activation Effects 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 10
- 230000007246 mechanism Effects 0.000 description 10
- 238000004590 computer program Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 5
- 238000004080 punching Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000001174 ascending effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000004397 blinking Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C1/00—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
- G07C1/10—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention provides a kind of attendance checking system, method, medium and electronic equipments, the system is made of at least one iBeancon beacon equipment in the specified attendance region of range of signal covering, terminal and server, and operation has client in a dormant state in terminal.Terminal can selectively activate client based on the iBeancon zone issue for being directed to user in beacon announcement transmitted by iBeancon beacon equipment, server judges whether user is to go to work to register or come off duty to register based on request of registering transmitted by the client after activation, to execute operation of registering automatically.It based on the embodiment of the present invention, may be implemented to be automatically signing in, to solve the problems, such as that employee forgets to check card, while simplifying attendance process to a certain extent, checking card without being lined up, improve attendance efficiency.
Description
Technical Field
The present invention relates to the field of information technologies, and in particular, to an attendance system, method, medium, and electronic device.
Background
In order to strengthen the attendance management of company personnel, the enterprise needs to check the attendance of the personnel in the work attendance time.
In the traditional mode, hardware card punching equipment is often used for checking attendance in a card swiping or fingerprint identification mode, but the traditional mode has the problems of high cost, difficulty in maintenance, requirement for queuing and the like. In order to solve the problems, along with the popularization of smart phones, an attendance technology that a mobile phone is connected with simple hardware equipment is gradually formed.
However, the above attendance checking means are all that the employee initiates the attendance checking operation actively, which can not avoid the embarrassment problem that the employee forgets to check the card.
Disclosure of Invention
In view of the above, the invention provides an attendance system, an attendance method, an attendance medium and electronic equipment, so as to solve the problem that the existing attendance means cannot avoid the embarrassment that an employee forgets to punch a card. The technical scheme is as follows:
based on an aspect of the embodiments of the present invention, an embodiment of the present invention provides an attendance system, including: the signal range covers at least one iBeancon beacon device, terminal and server of the designated attendance checking area; the terminal runs a client in a dormant state;
the iBeancon beacon device is used for sending a beacon notification to the terminal in the iBeancon area; wherein the beacon notification includes a beacon identifier of the iBeancon beacon device and an iBeancon zone event for a user of the terminal;
the terminal is used for activating the client under the condition that the iBeancon area event is an event entering or leaving the iBeancon area;
the client is used for sending a check-in request to the server; wherein the check-in request at least comprises the beacon identifier, the iBeancon area event, a local timestamp of the terminal and a login token of the client;
the server is used for judging whether the check-in request is a request for entering the attendance checking area for the first time within a preset working period or leaving the attendance checking area for the first time within a preset working period based on the beacon identifier, the iBeancon area event and the local timestamp; and if the check-in request is a request of entering the attendance checking area for the first time within a preset working period or leaving the attendance checking area for the first time within a preset working period, determining the user information of the user of the terminal according to the login token and executing check-in operation.
Optionally, the server is further configured to:
judging whether a user of the terminal is in a preset untrusted list or not according to the user information; if the user of the terminal is not in a preset untrusted list, executing sign-in operation; if the user of the terminal is in a preset untrusted list, a first identity verification instruction is sent to the client, first identity information of the user of the terminal fed back by the client according to the first identity verification instruction is received, the first identity information is verified according to the user information, and a check-in operation is executed under the condition that the first identity information is verified.
Optionally, the server is further configured to:
sending a second identity verification instruction to the client; receiving second identity information of the user of the terminal fed back by the client according to the second identity verification instruction; and verifying the second identity information according to the user information, and executing a check-in operation under the condition that the second identity information passes verification.
Optionally, the server is further configured to:
sending a second identity verification instruction to the client; receiving second identity information of the user of the terminal fed back by the client according to the second identity verification instruction; and verifying the second identity information according to the user information, and executing a check-in operation under the condition that the second identity information passes verification.
Optionally, the second identity information of the user of the terminal is head portrait information of the user of the terminal obtained by using a living body detection technology.
Optionally, the server is further configured to:
sending a predetermined authentication deadline to the client while sending a second authentication instruction to the client; and receiving second identity information of the user of the terminal, which is fed back by the client within the authentication deadline.
Optionally, the server is further configured to:
calling a historical sign-in request sent by the client; analyzing the historical check-in request to determine the abnormal attendance checking behavior of the user of the terminal; and determining the authentication deadline according to the attendance abnormal behavior.
Optionally, the server is further configured to:
and if the feedback of the client is not received at present and the time length from the authentication deadline is less than the preset time length, an authentication prompt is sent to the client.
Based on a further aspect of the embodiments of the present invention, an embodiment of the present invention provides an attendance checking method, which is applied to the server in the attendance checking system, and the method includes:
receiving a check-in request sent by the client; wherein,
the client is activated by the terminal when an iBeancon zone event of a user of the terminal in a beacon notification is an event of entering or exiting an iBeancon zone, the beacon notification is sent by the iBeancon beacon device to the terminal in the iBeancon zone and further comprises a beacon identifier of the iBeancon beacon device, and the check-in request at least comprises the beacon identifier, the iBeancon zone event, a local timestamp of the terminal and a login token of the client;
judging whether the check-in request is a request for entering the attendance checking area for the first time within a preset working period or for leaving the attendance checking area for the first time within a preset working period based on the beacon identification, the iBeancon area event and the local timestamp;
and if the check-in request is a request of entering the attendance checking area for the first time within a preset working period or leaving the attendance checking area for the first time within a preset working period, determining the user information of the user of the terminal according to the login token and executing check-in operation.
Based on a further aspect of the embodiments of the present invention, an embodiment of the present invention provides a storage medium, on which a program is stored, where the program, when executed by a processor, implements the attendance checking method described above.
Based on still another aspect of the embodiments of the present invention, an embodiment of the present invention provides an electronic device, including:
a processor; and a memory for storing executable instructions of the processor; wherein the processor is configured to perform the attendance method described above via execution of the executable instructions.
The attendance system, the method, the medium and the electronic equipment provided by the embodiment of the invention are composed of at least one iBeacon beacon device, a terminal and a server, wherein the signal range covers a designated attendance area, and the terminal is operated with a client in a dormant state. The terminal can selectively activate the client based on the iBeacon regional event aiming at the user in the beacon notification sent by the iBeacon beacon equipment, and the server judges whether the user is signed in on duty or signed in off duty based on the signed-in request sent by the activated client, so that the signed-in operation is automatically executed. Based on the embodiment of the invention, automatic sign-in can be realized, so that the problem that employees forget to punch the card is solved, the attendance process is simplified to a certain extent, queuing for punching the card is not needed, and the attendance efficiency is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an attendance system provided in an embodiment of the present invention;
fig. 2 is an example of an ideal attendance area;
fig. 3 is a flowchart of a method of attendance checking provided in an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention provides an attendance system, the structural schematic diagram of which is shown in fig. 1, and the attendance system comprises at least one iBeancon beacon device 10, a terminal 20 and a server 30, wherein the signal range of the iBeancon beacon device covers a specified attendance area; the terminal 20 runs a client 201 in a dormant state.
In this embodiment, the attendance area may be set at the entrance of a company, and the ibeacon beacon devices are used to form the attendance area, specifically, the signal range of each ibeacon beacon device, that is, the ibeacon area, may be adjusted to a radius of several meters around the ibeacon area, for example, about 3 to 5 meters, and the overlapping area of the ibeacon area is reduced as much as possible, and at the same time, it is ensured that at least two ibeacon areas need to pass through the attendance area from any direction. As shown in fig. 2, for an ideal attendance field, the circles represent iBeancon fields, and the ibeacon fields are misaligned as much as possible.
An ibeacon beacon device 10 for transmitting a beacon notification to a terminal 20 located within an ibeacon area; the beacon notification includes the beacon identifier of the ibeacon beacon device 10 and the ibeacon area event for the user of the terminal 20.
In the present embodiment, the ibeacon beacon device transmits a beacon notification to the surroundings by bluetooth low energy technology. The beacon identifier used for representing the iBeacon beacon equipment in the beacon notification has uniqueness and consists of a UUID, a Major and a Minor; ibeacon zone events include three types of events that enter the ibeacon zone, exit the ibeacon zone, and are located in the ibeacon zone.
And the terminal 20 is used for activating the client 201 when the iBeacon area event is an event of entering or exiting the iBeacon area.
In this embodiment, the initial state of the client is a dormant state, and when the terminal determines that the user enters or exits a single ibeacon area, the client is activated, and at this time, the client is switched from the dormant state to an operating state. Obviously, when a user walks through an attendance checking area, the client is continuously activated to trigger the client to send a plurality of continuous check-in requests to the server, so that the condition that the attendance checking fails due to the fact that a single request fails to be sent due to network or other reasons is avoided. In addition, the check-in behavior of the client is automatic check-in, and a user does not need to actively initiate the check-in.
Further, when the client is used to perform the first sign-on, the following preparation work is required:
1) the mobile phone starts the Bluetooth function and authorizes the client to use the function.
2) The user logs in with the pre-assigned username and password when using the client for the first time. And if the login is successful, the server generates a login Token (Token) for the user and binds the login Token with the user information. Certainly, since the login token is generally unique and disposable, the client can log in quickly by transferring the login token to the server without the user manually inputting a user name and a password during the valid period of the login token. Once the login token expires, the user needs to enter the username and password again to obtain a new login token.
A client 201 for sending a check-in request to the server 30; the check-in request at least includes a beacon identifier, an ibeacon area event, a local timestamp of the terminal 20, and a login token of the client 201.
In this embodiment, since the client generates a series of check-in requests while the user passes through the attendance checking area, and since the sending timing of many check-in requests is not necessarily the same as the receiving timing of the server, a local timestamp is set in the check-in requests for the server to sort the check-in requests, and the check-in requests are processed in parallel by independent threads.
In addition, the check-in request may further include a device identifier of the terminal and location information of the terminal, which is not limited in this embodiment and may be set according to actual needs.
The server 30 is used for judging whether the attendance request is a request for entering the attendance area for the first time within a preset working period or leaving the attendance area for the first time within a preset working period based on the beacon identifier, the iBeancon area event and the local timestamp; if the check-in request is a request for entering the attendance checking area for the first time within a preset working period or leaving the attendance checking area for the first time within a preset working period, the user information of the user of the terminal 20 is determined according to the login token, and the check-in operation is executed.
In this embodiment, the ibeacon beacon devices located at the edge of the attendance area are pre-labeled. When the server receives a check-in request, whether an iBeancon area entered or exited by a user is located at the edge of an attendance area can be determined based on the beacon identification; if not, the user walks in the attendance checking area, the check-in request is saved, and the next check-in request is waited; otherwise, if yes, the following operations are executed:
assuming that the check-in request is the nth request, reading the previous N-1 check-in requests for analysis, specifically, sorting the N check-in requests in ascending order according to the included local timestamps, where the N check-in requests are: records entering the edge iBeancon area and exiting the edge iBeancon area are divided into m groups, i.e. users pass through the attendance area m times. The first entry edge ibeacon area is marked as EN1, the exit edge ibeacon area is marked as EX1, the mth entry edge ibeacon area is marked as ENm, the exit edge ibeacon area is marked as EXm, and the record of the user's m-times passing through the attendance area is — { EN1, EX1} { EN2, EX2}.
If m is 1 and the local timestamp contained in the check-in request when the edge ibeacon area is entered for the first time is within the preset on-duty period, it indicates that the user is checking in on-duty. If m is not 1, the local timestamp contained in the check-in request when the m enters the edge iBeancon area is in the preset working period, and the local timestamp contained in the check-in request when the m walks out of the edge iBeancon area is in the preset working period, the user is checking in when the m walks out of the edge iBeancon area. If both conditions are met, the server 30 may determine the user information bound by the login token, and thus determine the check-in object. Of course, at this time, the login token should be within the validity period, and once the login token is within the non-validity period, it may be determined that the attendance behavior of the user is abnormal.
It should be noted that, if the check-in request is not a request for entering the attendance area for the first time in the preset working period or is not a request for leaving the attendance area for the first time in the preset working period, the server 30 does not perform any operation.
In some other embodiments, to establish the attendance trust mechanism, the server 30 in the attendance system shown in fig. 1 is further configured to:
judging whether the user of the terminal 20 is in a preset non-trust list or not according to the user information; if the user of the terminal is not in the preset untrusted list, executing sign-in operation; if the user of the terminal is in a preset untrusted list, a first identity verification instruction is sent to the client 201; and receiving first identity information of the user of the terminal fed back by the client according to the first identity verification instruction, verifying the first identity information according to the user information, and executing the check-in operation under the condition that the first identity information is verified.
In this embodiment, a random spot check mechanism or a manual supervision mechanism may be adopted to determine an untrusted list, and employees in the list cannot sign in automatically, and must actively initiate verification before the list can sign in. The random spot check mechanism and the manual supervision mechanism are introduced as follows:
and the random spot check mechanism randomly checks partial staff and requires the staff to immediately perform identity verification after signing in. Employees that fail to verify successfully or are overdue for non-verification will be added to the untrusted list.
And the manual supervision mechanism is used for pushing a message to the directly subordinate higher level of the staff with more attendance abnormal behaviors, and the higher level of the staff supervises the attendance behaviors and determines whether to enter an untrusted list. The attendance checking abnormal behavior of the employee can be determined based on the historical attendance checking request of the employee, for example, the card punching equipment is frequently replaced by a certain account, and for example, the account is overdue and not verified.
In addition, the type of the first identity information in this embodiment may be a fingerprint, a voice, a face, or the like. Correspondingly, when the server verifies the first identity information, the server calls reference identity information with the same type as the first identity information from the user information for matching, if the reference identity information and the user information are the same or the similarity of the reference identity information and the first identity information is higher than a preset threshold value, the first identity verification information is passed, otherwise, the first identity verification information is not passed. And the server does not execute the check-in operation once the first identity authentication information is not passed.
In some other embodiments, to avoid the problem of cheating work attendance, the server 30 in the work attendance system shown in fig. 1 is further configured to:
sending a second authentication instruction to the client 201; receiving second identity information of the user of the terminal, which is fed back by the client 201 according to the second identity verification instruction; and verifying the second identity information according to the user information, and executing the check-in operation under the condition that the second identity information is verified to be passed.
The type of the second identity information in this embodiment may be a fingerprint, a voice, a face, or the like. Correspondingly, when the server verifies the second identity information, the server calls the reference identity information with the same type as the second identity information from the user information for matching, if the reference identity information and the second identity information are the same or the similarity is higher than a preset threshold value, the second identity verification information is passed, otherwise, the second identity verification information is not passed. And the server does not execute the check-in operation once the first identity authentication information is not passed.
In particular, to enhance the reliability of the authentication, the client may use the biometric technology to obtain the head portrait information of the user of the terminal. Specifically, the client triggers the terminal to start the camera, and when the staff takes a picture, the staff needs to coordinate with the instruction to make the actions of blinking, turning around and the like.
Furthermore, in order to improve the attendance experience of the employee, the server 30 sends a predetermined authentication deadline to the client 201 while sending the second authentication instruction to the client 201; and receiving second identity information of the user of the terminal, which is fed back by the client 201 within the authentication period.
In this embodiment, the authentication period predetermined by the server may be a specified time period, such as 30 minutes.
In addition, the authentication period can be determined based on historical check-in requests of employees, specifically, historical check-in requests sent by clients are called; analyzing the historical check-in request to determine the attendance checking abnormal behavior of the user of the terminal; and determining the authentication deadline according to the attendance checking abnormal behavior. The rule is that the more the employees have attendance abnormal behaviors, the lower the trust degree is, the shorter the authentication deadline is, and the corresponding relationship between the attendance abnormal behaviors and the authentication deadline can be determined in advance. And for the staff who does not have attendance abnormal behavior for a long time, even the identity can not be verified, and the setting can be specifically carried out according to the actual requirement. Under the rule, the staff with excellent attendance record can automatically sign in and complete the authentication within a longer period, so that better user experience is obtained, otherwise, the authentication needs to be completed within a longer period after the staff signs in, and under the limit condition, the staff must immediately verify after the staff signs in, so that the cheating cost is sequentially increased.
Obviously, the premise of normal operation of the attendance checking mechanism is that the attendance checking abnormal behavior of the employee can be strictly and accurately identified by analyzing the historical check-in request.
The device identifier of the terminal and the location information of the terminal may be included in combination with the beacon identifier, the ibeacon area event, the local timestamp of the terminal and the login token of the client included in the check-in request. Several attendance exception behaviors are listed below, and the attendance exception behavior in this embodiment includes, but is not limited to:
1) frequently replacing a terminal for a certain account;
2) when a certain account number is overdue and not verified;
3) two terminals always check in at the same time and check in rules are accurate and consistent;
4) the terminal does not coincide with the bound user information.
In addition, in this embodiment, the server may further add, to the attention list, more attendance abnormal behaviors, for example, terminals are continuously changed for multiple times within a specified duration, and then, for example, employees having at least two attendance abnormal behaviors are added, so that the authentication period is short, and the probability of being randomly spot checked is also high.
In combination with the random check mechanism, once the employee in the attention list cannot be successfully verified or the employee who is not verified after the verification is overdue, the employee is added into the untrusted list. Of course, the employees in the non-attention list may also be spot checked, which is not limited in this embodiment.
By combining the manual supervision mechanism, the staff in the attention list pushes messages to the directly subordinate superior levels, and the superior levels of the staff supervise the attendance behavior and determine whether to enter the untrusted list.
In addition, the server 30 is further configured to send an authentication prompt to the client 201 if the feedback of the client 201 is not received currently and the time length from the authentication deadline is less than a preset time length. That is, if the employee is authenticated in time during the authentication period, the server 30 may remind the employee before the authentication period is reached, for example, in the form of a mail or a short message or a telephone, so as to avoid the problem that the employee is forgotten.
According to the attendance system provided by the embodiment of the invention, the terminal can selectively activate the client based on the iBeacon regional event of the user in the beacon notification sent by the iBeacon beacon equipment, and the server judges whether the user is on duty check-in or off duty check-in based on the check-in request sent by the activated client, so that the check-in operation is automatically executed. Based on the embodiment of the invention, automatic sign-in can be realized, so that the problem that employees forget to punch the card is solved, the attendance process is simplified to a certain extent, queuing for punching the card is not needed, and the attendance efficiency is improved.
Based on the attendance system provided by the embodiment of the invention, the embodiment of the invention also provides an attendance method, the method is applied to a server in the attendance system, the flow chart of the method is shown in figure 3, and the method comprises the following steps:
s10, receiving a check-in request sent by the client; wherein,
the client is activated by the terminal under the condition that an iBeacon area event of a user aiming at the terminal in a beacon notification is an event of entering or exiting the iBeacon area, the beacon notification is sent to the terminal in the iBeacon area by an iBeacon beacon device and also comprises a beacon identifier of the iBeacon beacon device, and the sign-in request at least comprises the beacon identifier, the iBeacon area event, a local timestamp of the terminal and a sign-in token of the client;
s20, judging whether the attendance request is a first attendance request in a preset working time period or a first attendance request in a preset working time period based on the beacon identifier, the iBeancon regional event and the local timestamp;
and S30, if the check-in request is a request for entering the attendance checking area for the first time in a preset working period or leaving the attendance checking area for the first time in a preset working period, determining the user information of the terminal user according to the login token, and executing the check-in operation.
Optionally, the attendance checking method shown in fig. 3 further includes the following steps:
judging whether a user of the terminal is in a preset untrusted list or not according to the user information;
if the user of the terminal is not in the preset untrusted list, executing sign-in operation;
if the user of the terminal is in a preset untrusted list, a first identity verification instruction is sent to the client, first identity information of the user of the terminal fed back by the client according to the first identity verification instruction is received, the first identity information is verified according to the user information, and the sign-in operation is executed under the condition that the first identity information is verified.
Optionally, the attendance checking method shown in fig. 3 further includes the following steps:
sending a second identity verification instruction to the client;
receiving second identity information of the user of the terminal fed back by the client according to the second identity verification instruction;
and verifying the second identity information according to the user information, and executing the check-in operation under the condition that the second identity information is verified to be passed.
Optionally, the second identity information of the user of the terminal is head portrait information of the user of the terminal obtained by using a living body detection technology.
Optionally, the attendance checking method further includes the following steps:
sending a predetermined authentication deadline to the client while sending a second authentication instruction to the client; and receiving second identity information of the user of the terminal, which is fed back by the client within the authentication deadline.
Optionally, the attendance checking method further includes the following steps:
calling a historical sign-in request sent by a client; analyzing the historical check-in request to determine the attendance checking abnormal behavior of the user of the terminal; and determining the authentication deadline according to the attendance checking abnormal behavior.
Optionally, the attendance checking method further includes the following steps:
and if the feedback of the client is not received at present and the time length from the authentication deadline is less than the preset time length, an authentication prompt is sent to the client.
According to the attendance checking method provided by the embodiment of the invention, whether the user is in attendance or off duty check-in is judged based on the check-in request sent by the activated client, so that the check-in operation is automatically executed. Based on the embodiment of the invention, automatic sign-in can be realized, so that the problem that employees forget to punch the card is solved, the attendance process is simplified to a certain extent, queuing for punching the card is not needed, and the attendance efficiency is improved.
An embodiment of the present invention provides a storage medium, on which a program is stored, where the program, when executed by a processor, implements the attendance checking method described above.
The embodiment of the invention provides a processor, wherein the processor is used for running a program, and the attendance checking method is executed when the program runs.
The embodiment of the invention provides electronic equipment, which comprises a processor, a memory and a program which is stored on the memory and can run on the processor, wherein the processor executes the attendance checking method.
The device herein may be a server, a PC, a PAD, a mobile phone, etc.
The present application further provides a computer program product adapted to perform initialization to implement the attendance method as described above when executed on a data processing device.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
The above are merely examples of the present invention, and are not intended to limit the present invention. Various modifications and alterations to this invention will become apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the scope of the claims of the present invention.
Claims (10)
1. An attendance system, comprising: the signal range covers at least one iBeancon beacon device, terminal and server of the designated attendance checking area; the terminal runs a client in a dormant state;
the iBeancon beacon device is used for sending a beacon notification to the terminal in the iBeancon area; wherein the beacon notification includes a beacon identifier of the iBeancon beacon device and an iBeancon zone event for a user of the terminal;
the terminal is used for activating the client under the condition that the iBeancon area event is an event entering or leaving the iBeancon area;
the client is used for sending a check-in request to the server; wherein the check-in request at least comprises the beacon identifier, the iBeancon area event, a local timestamp of the terminal and a login token of the client;
the server is used for judging whether the check-in request is a request for entering the attendance checking area for the first time within a preset working period or leaving the attendance checking area for the first time within a preset working period based on the beacon identifier, the iBeancon area event and the local timestamp; and if the check-in request is a request of entering the attendance checking area for the first time within a preset working period or leaving the attendance checking area for the first time within a preset working period, determining the user information of the user of the terminal according to the login token and executing check-in operation.
2. The system of claim 1, wherein the server is further configured to:
judging whether a user of the terminal is in a preset untrusted list or not according to the user information; if the user of the terminal is not in a preset untrusted list, executing sign-in operation; if the user of the terminal is in a preset untrusted list, a first identity verification instruction is sent to the client, first identity information of the user of the terminal fed back by the client according to the first identity verification instruction is received, the first identity information is verified according to the user information, and a check-in operation is executed under the condition that the first identity information is verified.
3. The system of claim 1, wherein the server is further configured to:
sending a second identity verification instruction to the client; receiving second identity information of the user of the terminal fed back by the client according to the second identity verification instruction; and verifying the second identity information according to the user information, and executing a check-in operation under the condition that the second identity information passes verification.
4. The system of claim 3, wherein the second identity information of the user of the terminal is head portrait information of the user of the terminal acquired by a liveness detection technique.
5. The system of claim 3, wherein the server is further configured to:
sending a predetermined authentication deadline to the client while sending a second authentication instruction to the client; and receiving second identity information of the user of the terminal, which is fed back by the client within the authentication deadline.
6. The system of claim 5, wherein the server is further configured to:
calling a historical sign-in request sent by the client; analyzing the historical check-in request to determine the abnormal attendance checking behavior of the user of the terminal; and determining the authentication deadline according to the attendance abnormal behavior.
7. The system of claim 5, wherein the server is further configured to:
and if the feedback of the client is not received at present and the time length from the authentication deadline is less than the preset time length, an authentication prompt is sent to the client.
8. An attendance checking method applied to the server in the attendance checking system according to any one of claims 1 to 7, the method comprising:
receiving a check-in request sent by the client; wherein,
the client is activated by the terminal when an iBeancon zone event of a user of the terminal in a beacon notification is an event of entering or exiting an iBeancon zone, the beacon notification is sent by the iBeancon beacon device to the terminal in the iBeancon zone and further comprises a beacon identifier of the iBeancon beacon device, and the check-in request at least comprises the beacon identifier, the iBeancon zone event, a local timestamp of the terminal and a login token of the client;
judging whether the check-in request is a request for entering the attendance checking area for the first time within a preset working period or for leaving the attendance checking area for the first time within a preset working period based on the beacon identification, the iBeancon area event and the local timestamp;
and if the check-in request is a request of entering the attendance checking area for the first time within a preset working period or leaving the attendance checking area for the first time within a preset working period, determining the user information of the user of the terminal according to the login token and executing check-in operation.
9. A storage medium having a program stored thereon, the program, when executed by a processor, implementing the attendance method of claim 8.
10. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the attendance method of claim 8 via execution of the executable instructions.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811517609.0A CN109636936B (en) | 2018-12-12 | 2018-12-12 | Attendance checking system, method, medium and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811517609.0A CN109636936B (en) | 2018-12-12 | 2018-12-12 | Attendance checking system, method, medium and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109636936A true CN109636936A (en) | 2019-04-16 |
CN109636936B CN109636936B (en) | 2021-05-28 |
Family
ID=66073134
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811517609.0A Active CN109636936B (en) | 2018-12-12 | 2018-12-12 | Attendance checking system, method, medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109636936B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110298557A (en) * | 2019-06-11 | 2019-10-01 | 苏州达家迎信息技术有限公司 | A kind of data processing method, device, equipment and storage medium |
CN110533787A (en) * | 2019-07-03 | 2019-12-03 | 广州西博电子科技有限公司 | Work attendance management system and method based on electronic tag |
CN111402443A (en) * | 2020-04-30 | 2020-07-10 | 宁波市交建工程监理咨询有限公司 | Supervision attendance method, client and storage medium thereof |
CN111885510A (en) * | 2020-07-10 | 2020-11-03 | 泰康保险集团股份有限公司 | Attendance checking method, attendance checking client and attendance checking system |
CN112148737A (en) * | 2020-09-23 | 2020-12-29 | 支付宝(杭州)信息技术有限公司 | Attendance processing method and device |
CN112311824A (en) * | 2019-07-29 | 2021-02-02 | 腾讯科技(深圳)有限公司 | Attendance information processing method and related device |
CN113192223A (en) * | 2021-04-28 | 2021-07-30 | 云知声智能科技股份有限公司 | Detection method, device and system based on iBeacon and intelligent equipment |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104144497A (en) * | 2014-07-28 | 2014-11-12 | 北京升哲科技有限公司 | Detection method and system for user entry and exit region on basis of Bluetooth beacon devices |
CN104504767A (en) * | 2014-11-26 | 2015-04-08 | 广东安居宝数码科技股份有限公司 | Check-in information verification method and system |
CN105007257A (en) * | 2015-05-08 | 2015-10-28 | 牛力伟 | On-site identity verification method based on bluetooth technology and on-site identity verification system based on bluetooth technology |
CN105139467A (en) * | 2014-05-30 | 2015-12-09 | 李虹 | Designing method of Internet of Things Bluetooth registration apparatus |
CN105139470A (en) * | 2015-09-30 | 2015-12-09 | 杭州海康威视数字技术股份有限公司 | Checking-in method, device and system based on face recognition |
CN205540989U (en) * | 2016-04-19 | 2016-08-31 | 唐山新质点科技有限公司 | Device for checking on work attendance |
KR20160105133A (en) * | 2015-02-27 | 2016-09-06 | 김경모 | Course Management System Using BLE Beacon |
CN105957169A (en) * | 2016-04-19 | 2016-09-21 | 唐山新质点科技有限公司 | Detection method, apparatus and system based on iBeacon technology |
CN106023021A (en) * | 2016-06-16 | 2016-10-12 | 蔡亮明 | BLE Bluetooth beacon-based attendance check method and system |
CN106682589A (en) * | 2016-12-06 | 2017-05-17 | 深圳市纽贝尔电子有限公司 | Face recognition and prison roll call system |
CN106912025A (en) * | 2017-05-02 | 2017-06-30 | 山东浪潮通软信息科技有限公司 | One kind is registered based on wechat peripheral equipment, punch card system and method |
US9710980B1 (en) * | 2016-05-20 | 2017-07-18 | Nasser Alzahrani | Biometric attendance tracking system and method using mobile devices |
CN107018478A (en) * | 2017-04-11 | 2017-08-04 | 深圳市口袋网络科技有限公司 | One kind is registered method and device |
CN107067486A (en) * | 2017-03-13 | 2017-08-18 | 山东科技大学 | A kind of user based on multifactor cross validation registers personal identification method |
CN107967723A (en) * | 2016-10-19 | 2018-04-27 | 中国电信股份有限公司 | Realize method, mobile terminal and the system of attendance |
CN108241953A (en) * | 2016-12-23 | 2018-07-03 | 电信科学技术研究院 | The method and apparatus of target object monitoring |
CN108882207A (en) * | 2017-05-08 | 2018-11-23 | 阿里巴巴集团控股有限公司 | The implementation method and device of near field Trigger Function |
-
2018
- 2018-12-12 CN CN201811517609.0A patent/CN109636936B/en active Active
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105139467A (en) * | 2014-05-30 | 2015-12-09 | 李虹 | Designing method of Internet of Things Bluetooth registration apparatus |
CN104144497A (en) * | 2014-07-28 | 2014-11-12 | 北京升哲科技有限公司 | Detection method and system for user entry and exit region on basis of Bluetooth beacon devices |
CN104504767A (en) * | 2014-11-26 | 2015-04-08 | 广东安居宝数码科技股份有限公司 | Check-in information verification method and system |
KR20160105133A (en) * | 2015-02-27 | 2016-09-06 | 김경모 | Course Management System Using BLE Beacon |
CN105007257A (en) * | 2015-05-08 | 2015-10-28 | 牛力伟 | On-site identity verification method based on bluetooth technology and on-site identity verification system based on bluetooth technology |
CN105139470A (en) * | 2015-09-30 | 2015-12-09 | 杭州海康威视数字技术股份有限公司 | Checking-in method, device and system based on face recognition |
CN205540989U (en) * | 2016-04-19 | 2016-08-31 | 唐山新质点科技有限公司 | Device for checking on work attendance |
CN105957169A (en) * | 2016-04-19 | 2016-09-21 | 唐山新质点科技有限公司 | Detection method, apparatus and system based on iBeacon technology |
US9710980B1 (en) * | 2016-05-20 | 2017-07-18 | Nasser Alzahrani | Biometric attendance tracking system and method using mobile devices |
CN106023021A (en) * | 2016-06-16 | 2016-10-12 | 蔡亮明 | BLE Bluetooth beacon-based attendance check method and system |
CN107967723A (en) * | 2016-10-19 | 2018-04-27 | 中国电信股份有限公司 | Realize method, mobile terminal and the system of attendance |
CN106682589A (en) * | 2016-12-06 | 2017-05-17 | 深圳市纽贝尔电子有限公司 | Face recognition and prison roll call system |
CN108241953A (en) * | 2016-12-23 | 2018-07-03 | 电信科学技术研究院 | The method and apparatus of target object monitoring |
CN107067486A (en) * | 2017-03-13 | 2017-08-18 | 山东科技大学 | A kind of user based on multifactor cross validation registers personal identification method |
CN107018478A (en) * | 2017-04-11 | 2017-08-04 | 深圳市口袋网络科技有限公司 | One kind is registered method and device |
CN106912025A (en) * | 2017-05-02 | 2017-06-30 | 山东浪潮通软信息科技有限公司 | One kind is registered based on wechat peripheral equipment, punch card system and method |
CN108882207A (en) * | 2017-05-08 | 2018-11-23 | 阿里巴巴集团控股有限公司 | The implementation method and device of near field Trigger Function |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110298557A (en) * | 2019-06-11 | 2019-10-01 | 苏州达家迎信息技术有限公司 | A kind of data processing method, device, equipment and storage medium |
CN110533787A (en) * | 2019-07-03 | 2019-12-03 | 广州西博电子科技有限公司 | Work attendance management system and method based on electronic tag |
CN112311824A (en) * | 2019-07-29 | 2021-02-02 | 腾讯科技(深圳)有限公司 | Attendance information processing method and related device |
CN111402443A (en) * | 2020-04-30 | 2020-07-10 | 宁波市交建工程监理咨询有限公司 | Supervision attendance method, client and storage medium thereof |
CN111402443B (en) * | 2020-04-30 | 2022-05-17 | 宁波市交建工程监理咨询有限公司 | Supervision attendance method, client and storage medium thereof |
CN111885510A (en) * | 2020-07-10 | 2020-11-03 | 泰康保险集团股份有限公司 | Attendance checking method, attendance checking client and attendance checking system |
CN111885510B (en) * | 2020-07-10 | 2022-01-28 | 泰康保险集团股份有限公司 | Attendance checking method, attendance checking client and attendance checking system |
CN112148737A (en) * | 2020-09-23 | 2020-12-29 | 支付宝(杭州)信息技术有限公司 | Attendance processing method and device |
CN112148737B (en) * | 2020-09-23 | 2023-08-08 | 支付宝(中国)网络技术有限公司 | Attendance checking processing method and device |
CN113192223A (en) * | 2021-04-28 | 2021-07-30 | 云知声智能科技股份有限公司 | Detection method, device and system based on iBeacon and intelligent equipment |
Also Published As
Publication number | Publication date |
---|---|
CN109636936B (en) | 2021-05-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109636936B (en) | Attendance checking system, method, medium and electronic equipment | |
US10129247B2 (en) | System and method for utilizing behavioral characteristics in authentication and fraud prevention | |
CN110447023B (en) | Method and apparatus for acquiring and recording tracking information on a blockchain | |
US11765177B1 (en) | System and method for providing a web service using a mobile device capturing dual images | |
CN110768968B (en) | Authorization method, device, equipment and system based on verifiable statement | |
US10389730B2 (en) | Visitor access management | |
US20160300242A1 (en) | Driver verification system for transport services | |
US10511592B1 (en) | System and method for authenticating a user via a mobile device to provide a web service on a different computer system | |
US11539526B2 (en) | Method and apparatus for managing user authentication in a blockchain network | |
WO2019153461A1 (en) | Identity information changing method and apparatus, terminal device, and storage medium | |
CN108597066B (en) | Visitor management method and device and computer readable storage medium | |
CN107241329B (en) | Account login processing method and device | |
CN109784031A (en) | A kind of account authentication process method and device | |
WO2013173238A1 (en) | Electronic transaction notification system and method | |
CN109377612A (en) | Reserve access method, system, computer equipment and storage medium | |
KR101762615B1 (en) | Identification system and user terminal using usage pattern analysis | |
CN111242248A (en) | Personnel information monitoring method and device and computer storage medium | |
CN111756721B (en) | Associated authentication method and device, IAM server and readable storage medium | |
JP2014129655A (en) | Key management system, method and program | |
WO2016176919A1 (en) | Attendance checking method and attendance checking server | |
CN116405270A (en) | Triggering method, device, equipment and medium of login flow | |
KR102450328B1 (en) | Method and apparatus for providing user profile | |
US12067638B2 (en) | Identity management | |
CN114298714A (en) | Account identity authentication method and device, electronic equipment and storage medium | |
US20230075741A1 (en) | Communications server apparatus, method and communications system for managing authentication of a user |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |