CN110570550A - unmanned hotel management authentication method and device - Google Patents

unmanned hotel management authentication method and device Download PDF

Info

Publication number
CN110570550A
CN110570550A CN201910684096.0A CN201910684096A CN110570550A CN 110570550 A CN110570550 A CN 110570550A CN 201910684096 A CN201910684096 A CN 201910684096A CN 110570550 A CN110570550 A CN 110570550A
Authority
CN
China
Prior art keywords
hotel
check
authentication
personnel
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910684096.0A
Other languages
Chinese (zh)
Inventor
尤新革
彭勤牧
吴双
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong University of Science and Technology
Original Assignee
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong University of Science and Technology filed Critical Huazhong University of Science and Technology
Priority to CN201910684096.0A priority Critical patent/CN110570550A/en
Publication of CN110570550A publication Critical patent/CN110570550A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/12Hotels or restaurants
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification

Abstract

The invention relates to the technical field of hotel management, in particular to an unmanned hotel management authentication method and device, wherein the method comprises the following steps: acquiring a face image on the surface of a user certificate and a face image in a certificate chip, matching the two face images, and verifying the authenticity of the user certificate; acquiring a depth face image of a user on site, and matching the depth face image with two face images on a certificate to realize identity authentication of the user; after the authentication is successful, providing corresponding service for the user according to the authentication type; the authentication types are check-in authentication, room entrance authentication, public place entrance authentication or check-out authentication. The invention combines the face images collected on the surface of the certificate, in the certificate chip and on site, not only identifies the authenticity of the certificate, but also effectively realizes the user identity authentication in a cross verification mode, is not easy to cause information leakage, has higher safety factor, and obviously improves the safety and reliability of unmanned hotel management.

Description

Unmanned hotel management authentication method and device
[ technical field ] A method for producing a semiconductor device
the invention relates to the technical field of hotel management, in particular to an unmanned hotel management authentication method and device.
[ background of the invention ]
in recent years, with the rapid development of artificial intelligence related technologies, image-based technologies such as identification and verification are more and more widely applied, for example, self-service services such as an unmanned supermarket reduce labor cost and improve management efficiency. In the future, unmanned services will become an important development trend, and an authentication method of the unmanned hotel is urgently required to be proposed.
At present, identity authentication methods based on face recognition are widely applied, but 2D face images mostly adopted by these authentication methods, such as a patent with a patent number CN108090772A entitled "hotel check-in face-brushing payment system and method based on face recognition" and a patent with a patent number CN201711188765 entitled "hotel check-in identity verification method and verification system based on face recognition", both refer to identity authentication using a face recognition method. However, with the development of deep learning, authentication is performed by using a method for generating a 2D face by using a generation countermeasure network, so that certain loopholes exist in identity authentication by using 2D face recognition, and the method for performing identity authentication by using a 3D face can make up for the deficiency.
in addition, although the patent number CN201810030814 entitled "method and system for unmanned hotel check-in" proposes to use a deep face image and identity card information for identity authentication, the patent requires a government department to provide photo information, which relates to privacy and easily causes information leakage, and the process of acquiring identity information ignores the problem of certificate authenticity, so that the safety factor is low, and thus, the patent also has disadvantages.
In view of the above, it is an urgent problem in the art to overcome the above-mentioned drawbacks of the prior art.
[ summary of the invention ]
The technical problems to be solved by the invention are as follows:
in the traditional unmanned hotel management authentication process, a government department is required to provide photo information, privacy is involved, user information leakage is easily caused, the problem of certificate authenticity is ignored in the process of acquiring identity information, and the safety factor is low.
The invention achieves the above purpose by the following technical scheme:
in a first aspect, the present invention provides an unmanned hotel management authentication method, including:
the hotel terminal collects a face image on the surface of a certificate of a user and a face image in the certificate chip, matches the two face images and verifies the authenticity of the certificate of the user;
The hotel terminal collects a depth face image of a user on site, and matches the depth face image with two face images on a certificate to realize identity authentication of the user;
After the authentication is successful, the hotel terminal provides corresponding service for the user according to the authentication type;
the user is a check-in person or a hotel person, and the authentication types are check-in authentication, room entrance authentication, public place entrance authentication or check-out authentication.
Preferably, the hotel terminal provides corresponding service for the user according to the authentication type, specifically:
For check-in authentication, the hotel terminal transacts corresponding check-in procedures for check-in personnel;
For the room entrance authentication, the hotel terminal controls to open the corresponding room door so that the check-in personnel or the hotel personnel enter the room;
For public place entrance authentication, the hotel terminal controls the corresponding public place to pass the persons living in or the hotel persons;
For the check-out certification, the hotel terminal handles corresponding check-out procedures for the check-in personnel.
Preferably, the process of handling the corresponding check-in procedure for the check-in personnel by the hotel terminal specifically comprises the following steps:
The hotel terminal stores and records the certificate information of the personnel living in and the depth face image information acquired on site;
after the check-in personnel select check-in information at the hotel terminal and pay the cost, the hotel terminal generates an order corresponding to the check-in personnel information;
The hotel terminal generates an emergency password and sends the emergency password to corresponding check-in personnel;
the certificate information comprises basic information and biological information, the basic information comprises one or more of the name, the sex, the identification number, the nationality and the address of a user, and the biological information comprises one or more of a face image, an iris image and a fingerprint.
Preferably, the process of handling the corresponding check-out procedure for the check-in personnel by the hotel terminal specifically comprises the following steps:
The hotel terminal judges whether the room returning time is normal according to an order generated when the check-in personnel check in; if the check-out time is normal, the check-out is successful, and if the check-out time is abnormal, the expense is settled according to the rules of the hotel;
the abnormal refund time comprises early refund and delayed refund, and if the check-in personnel refund in advance, the cost is returned according to the hotel regulation; if the check-in person delays the return, a fee is charged according to the hotel regulations.
Preferably, when the check-in person performs room entering authentication or room returning authentication and the check-in person loses the certificate after handling the check-in, the method further comprises:
the check-in personnel input the emergency password received during check-in into the hotel terminal so that the hotel terminal can inquire the corresponding check-in personnel information during check-in;
The hotel terminal collects the depth face image of the person who enters the room on site, and matches with any one face image stored during the business of the person, so that the identity authentication of the user is realized.
preferably, when the check-in person performs the public place access authentication, the method further includes:
The hotel terminal collects face images or other biological information of the persons living in the field and inquires whether a corresponding order exists according to the collected information;
if the order exists, judging whether the resident has the authority of entering the corresponding public place according to the content of the order;
If the checked-in personnel have the access right, the checked-in personnel pass through the corresponding public place; if the checked-in personnel do not have the access right, the corresponding public place refuses to pass; wherein the public place is a restaurant, a gymnasium, an internet bar, a conference room or a gymnasium in a hotel.
preferably, when hotel personnel perform room entrance authentication or public place entrance authentication, before the hotel terminal collects the depth face image of the user on site, the method further comprises:
if the certificate of the hotel personnel is true, the hotel terminal inquires related certificate information and judges whether the certified hotel personnel is in normal working time;
If the hotel terminal is in normal working time, the hotel terminal continues to collect the depth face image of the hotel personnel on site to carry out identity authentication; if the working time is not in the normal working time, alarm information is sent out.
Preferably, the depth face image is a three-dimensional image with face three-dimensional information acquired by a 3D camera or a binocular camera, a thermal imaging face image or other face images with face information representing living bodies.
Preferably, the hotel terminal comprises a first electronic terminal arranged in a hall of the hotel, a second electronic terminal arranged at a doorway of a hotel room and a third electronic terminal arranged at an entrance of a hotel public place; the check-in authentication and the check-out authentication are completed through the first electronic terminal, the room entrance authentication is completed through the second electronic terminal, and the public place entrance authentication is completed through the third electronic terminal.
In a second aspect, the present invention provides an unmanned hotel management authentication apparatus, which includes at least one processor and a memory, where the at least one processor and the memory are connected through a data bus, and the memory stores instructions executable by the at least one processor, and the instructions are used to complete the unmanned hotel management authentication method according to the first aspect after being executed by the processor.
The invention has the beneficial effects that:
in the unmanned hotel management authentication method provided by the invention, the authenticity of the user certificate is verified by matching two face images on the certificate, and then the matching of a certificate holder and the certificate is ensured by acquiring the deep face image and comparing the deep face image with the face image on the certificate, so that the identity authentication of the user is completed. The method combines the face image information acquired on the surface of the certificate, in the certificate chip and on site, not only identifies the authenticity of the certificate, but also effectively realizes the identity authentication of the user in a cross verification mode, the information acquired on site is not easy to cause the leakage of the user information, and the method has higher safety factor and obviously improves the safety and reliability of the unmanned hotel management.
[ description of the drawings ]
in order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the embodiments of the present invention will be briefly described below. It is obvious that the drawings described below are only some embodiments of the invention, and that for a person skilled in the art, other drawings can be derived from them without inventive effort.
Fig. 1 is a flowchart of an unmanned hotel management authentication method according to an embodiment of the present invention;
Fig. 2 is a structural assembly diagram of a first electronic terminal device according to an embodiment of the present invention;
Fig. 3 is a flowchart of a check-in authentication method for an unmanned hotel according to an embodiment of the present invention;
fig. 4 is a structural composition diagram of a second electronic terminal device according to an embodiment of the present invention;
Fig. 5 is a flowchart of a room entrance authentication method (check-in personnel) for an unmanned hotel according to an embodiment of the present invention;
Fig. 6 is a flowchart of another room entrance authentication method for an unmanned hotel according to an embodiment of the present invention (hotel staff);
fig. 7 is a structural assembly diagram of a third electronic terminal device according to an embodiment of the present invention;
fig. 8 is a flowchart of a public place entrance authentication method (check-in personnel) for an unmanned hotel according to an embodiment of the present invention;
Fig. 9 is a flowchart of another public place entrance authentication method for an unmanned hotel according to an embodiment of the present invention (hotel staff);
Fig. 10 is a flowchart of a check-out authentication method for an unmanned hotel according to an embodiment of the present invention;
fig. 11 is an architecture diagram of an unmanned hotel management authentication apparatus according to an embodiment of the present invention.
[ detailed description ] embodiments
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the embodiments of the present invention, the symbol "/" indicates the meaning of having both functions, and the symbol "a and/or B" indicates that the combination between the preceding and following objects connected by the symbol includes three cases of "a", "B", "a and B".
in addition, the technical features involved in the embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other. The invention will be described in detail below with reference to the figures and examples.
Example 1:
the embodiment of the invention provides an unmanned hotel management authentication method, which comprises authentication for various activities of check-in personnel in a hotel and authentication for hotel personnel. Wherein, the activity authentication in the store of the check-in personnel comprises: the method comprises the following steps of (1) checking-in authentication, room returning authentication, room entering authentication, and entering authentication of hotel own public places such as restaurants, gymnasiums, internet cafes and conference rooms; the authentication of hotel personnel includes: the authentication of cleaning personnel entering rooms or public places for cleaning, the authentication of emergency treatment personnel, the authentication of hotel management personnel and the like. In summary, the user is a check-in person or a hotel person, and the authentication types are check-in authentication, room entrance authentication, public place entrance authentication or check-out authentication.
the unmanned hotel management authentication method provided by the invention is completed through a self-service hotel terminal, and the hotel terminal comprises three types of embedded electronic terminal equipment: the system comprises a first electronic terminal arranged in a hotel lobby, a second electronic terminal arranged at a hotel room entrance and a third electronic terminal arranged at a hotel public place entrance. The check-in authentication and the check-out authentication can be completed through the first electronic terminal, the room entrance authentication is completed through the second electronic terminal, and the public place entrance authentication is completed through the third electronic terminal.
as shown in fig. 1, the method for unmanned hotel management authentication provided by the present invention specifically includes:
Step 201, the hotel terminal collects the face image on the surface of the certificate of the user and the face image in the certificate chip, matches the two face images, and verifies the authenticity of the certificate of the user.
The face image on the surface of the certificate refers to a certificate registration photo shot by a certificate holder during certificate handling, and the certificate chip refers to a chip for storing certificate information of the certificate holder in the certificate; the certificate information comprises basic information and biological information related to a user, wherein the basic information comprises one or more of name, gender, identification number, nationality and address, and the biological information comprises one or more of a face image, an iris image and a fingerprint.
For the resident, the certificate comprises one or more effective identity certificates approved by countries such as an identity card, a passport, a cochlioid hometown-returning certificate of hong Kong and Macao, a passage of the resident of hong Kong and Macao, a passage of the common people of China to and from hong Kong and Macao, a passage of the resident of Taiwan to and from the mainland, a passage of the resident of continental land to and from Taiwan, a residence certificate of foreign people and the like. For hotel personnel, documents are classified into two categories, one is a valid identity document recognised by the above-mentioned countries, and the other is a document recognised by the hotel party as being employee-specific, and the document should have the same characteristics as the first category, i.e. the document has a face image on its surface and the electronic chip of the document also contains a face image.
after matching the two face images on the certificate, if the matching is successful, the certificate is true, and step 202 can be continuously executed downwards; if the matching fails, the certificate is false, and the corresponding hotel terminal can send out alarm information or report an error so as to remind corresponding hotel management personnel.
Step 202, the hotel terminal collects the depth face image of the user on site, and matches the depth face image with the face image on the certificate, so as to realize the identity authentication of the user.
the depth face image can be a three-dimensional image which is acquired by a 3D camera or a binocular camera and has face three-dimensional information, the image establishes a three-dimensional image of a face according to three-dimensional data points, the image is not influenced by illumination, and the face recognition precision can be greatly improved; compared with a 2D face, the 3D face is more difficult to imitate. Besides, the depth face image can be a thermal imaging face image or other face images with the information of representing the living body face.
Three face images, namely the depth face image collected by the camera, the face image on the surface of the certificate and the face image in the certificate chip, are matched, so that the user can be subjected to cross and multiple identity identities. If the matching is successful, the authentication is successful, and the step 203 can be executed continuously; if the information cannot be matched, the authentication fails, and the hotel terminal can send alarm information or report an error so as to remind corresponding hotel management personnel.
and 203, after the authentication is successful, the hotel terminal provides corresponding service for the user according to the authentication type. For different authentication types, the execution actions of the hotel terminal after the authentication is successful are also different:
for the check-in authentication, after the authentication is successful, the hotel terminal (namely, the first electronic terminal) can transact corresponding check-in procedures for check-in personnel;
For the room entrance authentication, after the authentication is successful, the hotel terminal (namely, the second electronic terminal) can control to open the corresponding room door so that the check-in personnel or the hotel personnel can enter the room;
For the public place entering authentication, after the authentication is successful, the hotel terminal (namely, the third electronic terminal) can control the corresponding public place to pass the check-in personnel or hotel personnel;
for the check-out authentication, after the authentication is successful, the hotel terminal (i.e. the first electronic terminal) will handle the corresponding check-out procedure for the check-in personnel.
In the unmanned hotel management authentication method provided by the invention, the authenticity of the user certificate is verified by matching two face images on the certificate, and then the matching of a certificate holder and the certificate is ensured by acquiring the deep face image and comparing the deep face image with the face image on the certificate, so that the identity authentication of the user is completed. The method combines the face image information acquired on the surface of the certificate, in the certificate chip and on site, not only identifies the authenticity of the certificate, but also effectively realizes the identity authentication of the user in a cross verification mode, the information acquired on site is not easy to cause the leakage of the user information, and the method has higher safety factor and obviously improves the safety and reliability of the unmanned hotel management.
In order to facilitate information management, for the check-in personnel, certificate information of the check-in personnel is collected and stored by the hotel terminal when the check-in personnel check in, and biological information can be input into the hotel terminal when the check-in personnel check in for subsequent use. For hotel personnel, certificate information of the hotel personnel is input and stored in a management cloud server of the hotel when the hotel personnel works or the certificate is transacted, and biological information is also input and stored for subsequent use. The biological information can be acquired by reading a chip in the certificate on one hand and by field acquisition on the other hand.
in addition, considering that the valid certificate may be lost after the check-in personnel checks in, and the check-in personnel cannot timely make up the check-in a short time, in order to ensure that the check-in personnel smoothly complete a series of authentication in the hotel, the hotel terminal can automatically generate an emergency password during the check-in procedure and send the emergency password to the check-in personnel as a spare key. Therefore, the process of handling the check-in procedure may specifically be: the hotel terminal stores and records the certificate information of the personnel living in and the depth face image information acquired on site; after the check-in personnel select check-in information at the hotel terminal and pay the cost, the hotel terminal generates an order corresponding to the check-in personnel information; the hotel terminal generates an emergency password and sends the emergency password to corresponding check-in personnel.
When the subsequent check-in personnel perform room entering authentication or room returning authentication, the identity authentication can be performed according to the following method because the certificate is lost and the certificate authenticity identification process in the step 201 cannot be performed: the check-in personnel input the emergency password received during check-in into the hotel terminal so that the hotel terminal can inquire the corresponding check-in personnel information during check-in; the hotel terminal collects the depth face image of the person who enters the room on site, and matches with any one face image stored during the business of the person, so that the identity authentication of the user is realized. Therefore, even if the certificate is lost, the check-in personnel can smoothly complete hotel authentication.
There is also a preferred implementation in conjunction with the embodiments of the present invention. Considering that after a user stays in a hotel, danger, emergency situations and the like may occur in the hotel, in order to find the danger in time and ensure the personal safety of the stay-in personnel, for each stay-in personnel, an emergency help-seeking device can be distributed by self after the stay-in personnel successfully transact, and the stay-in personnel need to carry the emergency help-seeking device when moving in the restaurant so as to be used at any time. When the personnel who live in the house are in danger, the portable emergency help-seeking device can be activated; when a server where the unmanned hotel is located detects that the emergency help-seeking device is activated, the emergency help-seeking device can be positioned through a wifi positioning system in a hotel floor, and then the position of the person who enters the hotel is positioned; after the position is determined, the server can call the camera at the corresponding position in the hotel and start the play-out permission, the camera is used for recording the field situation in real time, the warning content can be broadcasted, the behavior of the perpetrator is reminded to be found and recorded, a certain warning effect can be played, the perpetrator can possibly directly give up the continuous behavior and then escape from the field, and further harm to the survivors is reduced. Meanwhile, the server can intercept the corresponding video content recorded by the camera to form a related database of potential case incidents, and when a case occurs in a hotel, the related database can be called and confirmed by a police party at the first time.
further, in order to simplify the verification process, when the public place enters the authentication, even when the room enters the authentication and exits the authentication, the certificate identification process of step 201 can be omitted, and the face image or the fingerprint and other biological information are directly collected for verification. This is because, for the check-in personnel, the authenticity identification of the certificate passes through the first check-in authentication, and then the correct certificate information is recorded in the hotel terminal; for hotel personnel, correct certificate information is stored in the hotel terminal, so that information collection of the certificate is not required every time during subsequent authentication, the verification process can be simplified, and the verification time is saved.
under the above premise, when the resident performs the public place entrance authentication, the following process can be specifically performed: the hotel terminal collects face images or other biological information of the persons living in the field and inquires whether a corresponding order exists according to the collected information; and if the order exists, judging whether the resident has the authority of entering the corresponding public place according to the order content. If the checked-in personnel have the access right, the checked-in personnel pass through the corresponding public place; and if the checked-in personnel do not have the access right, refusing to pass corresponding to the public place.
Further, when hotel personnel perform room entrance authentication or public place entrance authentication, a step of judging whether the hotel personnel are in normal working time can be added, and before the hotel terminal collects the depth face image of the user on site, the method further comprises the following steps: if the certificate of the hotel personnel is true, the hotel terminal inquires related certificate information and judges whether the certified hotel personnel is in normal working time. If the hotel terminal is in normal working time, the hotel terminal continues to collect the depth face image of the hotel personnel on site to carry out identity authentication; if the working time is not in the normal working time, alarm information is sent out.
Further, the unmanned hotel can also divide different security levels according to actual needs to perform identity authentication on the user. For example, a level one and a level two may be provided, wherein the security level of the level one is higher than the level two: when a first-level security level is selected, the cross verification mode introduced above can be used (namely, three face images including the depth face image acquired by the camera, the face image on the surface of the certificate and the face image in the certificate chip are verified); when the secondary security level is selected, the depth face image collected by the camera can be used independently for authentication, or the authentication can be performed by using a mode of matching two face images on the certificate independently.
the specific authentication procedures for the four different authentication types (check-in authentication, room entry authentication, public place entry authentication, check-out authentication) are described in embodiments 2 to 5, respectively, and will be described in detail below.
example 2:
On the basis of the above embodiment 1, an embodiment of the present invention provides a check-in authentication method for an unmanned hotel, where a targeted user is a check-in person and is completed by means of a first electronic terminal installed in a hotel lobby.
referring to fig. 2, the first electronic terminal device includes a touch screen graphical interface, a face image acquisition module, a fingerprint input module, a certificate image acquisition module, a certificate chip information reading module, a password input module, a processing module, and the like. Briefly, the first electronic terminal is an embedded electronic device with a single-sided or double-sided touch screen interface, one side of the embedded electronic device is used for operation of check-in personnel, and the other side of the embedded electronic device is used for operation of hotel personnel, so that the touch screen graphical interface comprises a self-service operation system of the check-in personnel and a data management system for the entrance of hotel management personnel.
The face image acquisition module can be a 3D camera or a binocular camera and is used for acquiring a depth face image of a user; the certificate image acquisition module can specifically adopt a scanner, and is used for scanning a certificate of a user to acquire corresponding certificate information (including a face image on the surface of the certificate); the certificate chip information reading module is used for reading a certificate chip of a user to acquire corresponding certificate information (including a face image in the chip); the processing module is used for matching the information so as to complete the authenticity identification of the certificate and the identity authentication of the user. The fingerprint input module is an optional module and is used for inputting fingerprints by a user so as to acquire biological characteristics.
As shown in fig. 3, the check-in authentication method provided in the embodiment of the present invention specifically includes:
Step 301, a check-in person enters an authentication interface by using a first electronic terminal, and provides a certificate for authentication.
the check-in personnel can make advance online reservation, for example, through terminal equipment such as a mobile phone, a tablet, a computer and the like, select information such as check-in time, room types and the like, and authenticate by using certificates on the first electronic terminal equipment after arriving at a hotel lobby; or directly selecting the information such as the check-in time, the room type and the like on the first electronic terminal device, and then providing the certificate for authentication.
step 302, collecting the face image on the surface of the certificate of the person, the face image in the certificate chip and other certificate information.
The check-in personnel place the certificate in the assigned position department of first electronic terminal equipment, and the corresponding certificate image acquisition module and certificate chip information reading module can carry out the collection of information respectively. Besides collecting two face images, other certificate information can be collected, including basic information such as name, sex, identification number, nationality, address and the like, and biological information such as iris images, fingerprints and the like, which can be obtained by reading a chip, or collected by a corresponding biological characteristic collection module, such as a fingerprint input module.
and step 303, verifying whether the face image on the surface of the certificate is matched with the face image in the certificate chip. If so, the certificate is true, and the process continues to step 304; if not, the certificate is false, and the first electronic terminal can send out alarm information to remind hotel management personnel.
And step 304, acquiring the depth face image of the person living in the field. When the person who lives in is located at the first electronic terminal device, the depth face image is collected on site through a corresponding face image collecting module (such as a 3D camera or a binocular camera).
And 305, verifying whether the depth face image is matched with the face image on the certificate. The face image on the certificate refers to the face image on the surface of the certificate and/or in the certificate chip; if the matching is successful, the identity authentication is successful, and the step 306 is continuously executed downwards; if not, the identity authentication fails, the user cannot check in, and the first electronic terminal can send out alarm information to remind hotel management personnel.
and step 306, storing and recording the certificate information of the personnel living in and the depth face image information collected on site. Namely, if the identity authentication is successful, the first electronic terminal stores various information related to the check-in personnel collected in the authentication process, sequentially verifies the information according to the actual check-in personnel and records the information of all the check-in personnel.
And 307, selecting the check-in information and paying the fee by the check-in personnel, and generating an order corresponding to the check-in personnel information by the first electronic terminal.
after the certificate authenticity verification and the identity authentication are passed, the check-in personnel can select check-in time periods, room types, other services (such as entertainment activities in corresponding public places) and the like through the first electronic terminal device, and then pay at the first electronic terminal, wherein the payment mode comprises electronic payment (such as payment treasure, WeChat and the like), card swiping payment and cash payment. After the payment, the first electronic terminal can automatically generate an order, wherein the order contains various information related to the check-in personnel, namely various certificate information collected in the authentication process, namely the order corresponds to the check-in personnel information.
And 308, generating an emergency password by the first electronic terminal and sending the emergency password to the corresponding check-in personnel. The emergency password is a string of character verification codes sent by a cloud server of the hotel terminal, and the verification codes are standby keys when the certificate is lost during the check-in period of the check-in personnel and cannot be timely repaired, and the check-in personnel need to be properly stored. The sending method may be a mobile phone short message, a WeChat, an email, etc., and is not limited herein.
Further, after the check-in authentication of the check-in personnel at the first electronic terminal is successful, the first electronic terminal can also automatically issue a room card to the check-in personnel, and the room card corresponds to the room number selected by the check-in personnel so as to enter the room through the room card in the subsequent process.
example 3:
on the basis of the above embodiment 1 and embodiment 2, the embodiment of the present invention provides a room entrance authentication method for an unmanned hotel, and a targeted user has not only a check-in person but also hotel personnel (such as a cleaning person and other service personnel) by means of a second electronic terminal installed at a door of a hotel room.
Referring to fig. 4, the second electronic terminal device includes a touch screen graphical interface, a face image capture module, a certificate chip information reading module, a password input module, a processing module, and the like. The face image acquisition module can be a 3D camera or a binocular camera and is used for acquiring a depth face image of a user; the certificate image acquisition module can specifically adopt a scanner and is used for scanning a certificate of a user to acquire a face image on the surface of the certificate; the certificate chip information reading module is used for reading a certificate chip of a user so as to acquire a face image in the chip; the processing module is used for matching the information so as to complete the authenticity identification of the certificate and the identity authentication of the user; the password input module is used for inputting an emergency password. The second electronic terminal is also an embedded electronic device (which may be the same as the first electronic terminal device), and the device should be connected to or integrated with a door lock control of a hotel room so as to control opening and closing of a room door.
As shown in fig. 5, for the checked-in person, the room entry authentication method provided in the embodiment of the present invention specifically includes:
step 401, collecting the face image on the surface of the user certificate and the face image in the certificate chip. The check-in personnel place the certificate at the designated position of the second electronic terminal equipment, and the corresponding certificate image acquisition module and the corresponding certificate chip information reading module can respectively acquire information.
and step 402, verifying whether the face image on the surface of the certificate is matched with the face image in the certificate chip. If so, the certificate is true, and the step 403 is continued to be executed downwards; if not, the certificate is false, and the second electronic terminal can send out alarm information to remind hotel management personnel.
And step 403, the second electronic terminal inquires an order corresponding to the room and compares the image currently acquired from the certificate with the face image corresponding to the order.
step 404, determine whether the user is a check-in person. If the comparison between the image collected from the certificate and the face image corresponding to the order is successful, the order information can be matched with the certificate information, the user can be determined as a check-in person, and the step 405 is continuously executed downwards; if the image collected from the certificate at present cannot be compared with the face image corresponding to the order, the order information cannot be matched with the certificate information, it can be determined that the user is not a person living in, and at the moment, the second electronic terminal can send out alarm information to remind hotel management personnel.
step 405, collecting the depth face image of the person living in the field. When the person who lives in is located at the second electronic terminal device, the depth face image is collected on site through a corresponding face image collecting module (such as a 3D camera or a binocular camera).
step 406, verifying whether the depth face image is matched with the face image on the certificate. The face image on the certificate refers to the face image on the surface of the certificate and/or in the certificate chip; if the first electronic terminal is matched with the second electronic terminal, the identity authentication is successful, the room is allowed to enter, and the second electronic terminal controls the door of the corresponding hotel room to be opened so that the entrance of the resident can be facilitated; if not, the identity authentication fails, the user is prohibited from entering the room, and the second electronic terminal can send out alarm information to remind hotel management personnel.
Wherein, if the valid certificate is lost after the personnel of living in transacting the living in, and can't in time supply the office in the short time, then take another kind of room to enter the authentication:
steps 401-404 are replaced with: the check-in personnel inputs the emergency password received during check-in by using a password input module of the second electronic terminal; if the password is input correctly, the second electronic terminal inquires the check-in personnel information corresponding to the room when the user checks the check-in and can acquire the face image information on the certificate stored when the user checks the check-in personnel information.
Then, steps 405 and 406 are continued: the second electronic terminal collects the depth face image of the person who enters the residence on site and matches the collected depth face image with any one of the face images stored during the residence; if the first electronic terminal is matched with the second electronic terminal, the identity authentication is successful, the room is allowed to enter, and the second electronic terminal can control the door of the corresponding hotel room to be opened; if not, the identity authentication fails, the user is prohibited from entering the room, and the second electronic terminal can send out alarm information to remind hotel management personnel.
In addition, the traditional way of entering a room by using a room card can be reserved in the unmanned hotel, that is, the room card issued after successful check-in authentication by the first electronic terminal in embodiment 2 is used, and the room card is identified to enter the room by using the second electronic terminal.
as shown in fig. 6, for hotel staff, the room entry authentication method provided by the embodiment of the present invention specifically includes:
step 401', collecting the face image on the surface of the user certificate and the face image in the certificate chip. The hotel staff works in the hotel for a long time, so the certificate comprises a valid identity certificate which is approved by the state, and also comprises a special certificate which is approved by the restaurant, and the certificate image acquisition module and the certificate chip information reading module of the second electronic terminal device are used for acquiring information.
And step 402', verifying whether the face image on the surface of the certificate is matched with the face image in the certificate chip. If so, the certificate is true, and the step 403' is continued to be executed downwards; if not, the certificate is false, and the second electronic terminal can send out alarm information to remind hotel management personnel.
step 403', judge whether the user is a hotel person. The method comprises the following specific steps:
After hotel staff such as cleaning staff or other service staff transact certificates or enter jobs, corresponding certificate information is stored on the management cloud server to ensure subsequent inquiry and comparison. Here, the second electronic terminal may match the currently acquired credential information with the pre-stored credential information, and if the matching is successful, the user is proved to be a hotel person, and step 404' may be continuously executed downwards; if the matching is unsuccessful, the user is proved to be not a hotel person, the user is prohibited from entering a room, and at the moment, the second electronic terminal can send out alarm information to remind a hotel manager.
Step 404', determine if the bearer is in normal operating time. Specifically, certificate information of the licensee, the provisions of the hotel and the current time can be comprehensively judged, and if the hotel personnel are in normal working time, the step 405' is continuously executed downwards; if the second electronic terminal is not in the normal working time, the second electronic terminal can send out alarm information to remind hotel management personnel.
Step 405', the depth face image of the hotel personnel is collected on site.
Step 406', verifying whether the depth face image is matched with the face image on the certificate. If the first electronic terminal is matched with the second electronic terminal, the identity authentication is successful, the hotel room is allowed to enter, and the second electronic terminal controls a door of the corresponding hotel room to be opened so that hotel personnel can enter; if not, the identity authentication fails, the user is prohibited from entering the room, and the second electronic terminal can send out alarm information to remind hotel management personnel.
example 4:
On the basis of the above embodiments 1 to 3, the embodiments of the present invention provide a public place entrance authentication method for an unmanned hotel, and a targeted user has not only a person who enters the hotel, but also hotel staff (such as a cleaner and other service staff), and the authentication is completed by means of a third electronic terminal provided at an entrance of the public place.
Referring to fig. 7, the third electronic terminal device may only include a touch screen graphical interface, a facial image acquisition module (specifically, a camera may be used), a processing module, a fingerprint input module, and other biometric acquisition modules. The certificate image acquisition module and the certificate chip information reading module are not required to be arranged in view of simplifying the verification process and avoiding the certificate verification when entering a public place.
as shown in fig. 8, for the checked-in person, the method for authenticating the entrance to the public place provided by the embodiment of the present invention specifically includes:
Step 501, acquiring a face image or other biological characteristic information of a user on site. The acquired face image is not limited to a depth face image, and a two-dimensional face image can be acquired and acquired through a face image acquisition module of a third electronic terminal; besides, the fingerprint information can be collected by using the corresponding fingerprint input module, or the corresponding biological characteristics can be collected by using other biological characteristic collection modules.
step 502, query whether there is a corresponding order. Specifically, the corresponding query can be performed according to the face image or other biological feature information collected in step 501, and if an order exists, step 503 is continuously executed downwards; and if no order exists, the user is prohibited from entering the public place, and at the moment, the third electronic terminal can also send out alarm information to remind hotel management personnel.
step 503, inquiring whether the check-in personnel have the authority of entering the corresponding public place. Specifically, the query can be performed according to the content of the order (i.e., whether to select the corresponding service when entering the residence); if the checked-in personnel have the access authority, the checked-in personnel are released corresponding to the public place and allowed to enter; and if the checked-in personnel do not have the access right, refusing to pass corresponding to the public place and forbidding to enter.
As shown in fig. 9, for hotel staff, the public place entrance authentication method provided by the embodiment of the present invention specifically includes:
in step 501', facial images or other biometric information of the hotel personnel are collected on site.
Step 502', certificate information of hotel personnel is queried. Specifically, the inquiry is performed according to the face image or other biometric information acquired in step 501', and the hotel staff already enters and stores the certificate information (including the basic information and the biometric information) when entering into the office or transacting the certificate, so that the corresponding other certificate information can be correspondingly inquired according to any one biometric information acquired on site.
Step 503', judge the bearer is in the normal working time. The certificate information, the hotel regulations and the current time which can be obtained in detail are comprehensively judged, if the hotel personnel are in normal working time, the hotel personnel have access authority, and the corresponding public place is released at the moment to allow the hotel personnel to enter; if the hotel personnel are not in normal working time and do not have access authority, the corresponding public place refuses to pass at the moment, and the hotel personnel are forbidden to enter.
Example 5:
On the basis of the embodiments 1 to 4, the embodiments of the present invention provide a check-out authentication method for an unmanned hotel, in which a user who is a check-in person is completed by means of a first electronic terminal installed in a lobby of the hotel. The existing hotel returning process in the market is mainly based on a returning card of a check-in person, and whether a deposit is returned or not is determined according to an order and the condition of a check-in room. Therefore, the check-in personnel also need to be authenticated during self-service check-out so as to avoid malicious check-out by others.
as shown in fig. 10, the retirement authentication method provided in the embodiment of the present invention specifically includes:
Step 601, the check-in personnel enter a check-out interface by using the first electronic terminal and provide certificates for authentication. When the check-out is performed, if the certificate is not lost, the step 602 is continuously performed downwards according to the normal check-out process; if the credentials are missing, step 605 is performed.
Step 602, collecting a face image on the surface of a user certificate, a face image in a certificate chip and other certificate information. The check-in personnel place the certificate at the appointed position of the first electronic terminal equipment, and the corresponding certificate image acquisition module and the corresponding certificate chip information reading module can respectively acquire information.
Step 603, verifying whether the face image on the surface of the certificate is matched with the face image in the certificate chip. If so, the certificate is true, and the process continues to step 604; if not, the certificate is false, and the first electronic terminal can send out alarm information to remind hotel management personnel.
Step 604, query whether there is a corresponding order. Specifically, the corresponding query can be performed according to the certificate information acquired in step 602, and if a corresponding order is queried, step 607 is continuously performed downward by skipping steps 605 and 606; if the corresponding order is not inquired, the first electronic terminal can send out alarm information to remind hotel management personnel.
Step 605, the check-in personnel uses the emergency password to perform identity authentication. Specifically, the emergency password received during handling can be input by using a password input module of the first electronic terminal.
Step 606, inquiring corresponding order information according to the emergency password, and acquiring the face image on the certificate from the order information. When the check-in personnel transact the check-in, the generated order comprises certificate information of the check-in personnel (including a face image on the surface of the certificate and a face image in the certificate chip), so that the first electronic terminal can acquire the face image information on the certificate according to the order information after inquiring the order.
and step 607, acquiring the depth face image of the person living in the field.
Step 608, verifying whether the depth face image is matched with the face image on the certificate. If so, the identity authentication is successful, and the step 609 is continuously executed downwards; if not, then authentication fails, can't handle the room of returning, and first electronic terminal can send alarm information this moment, reminds hotel management personnel.
and step 609, judging whether the refuge time is normal or not according to the order generated when the check-in personnel check in. If the check-out time is normal, the check-out is successful; if the back-room time is abnormal, go to step 610.
And step 610, settling the fee according to the hotel regulation according to the current room-returning time and the order room-returning time, and the room-returning is successful. The abnormal refund time comprises early refund and delayed refund, and if the check-in personnel refund in advance, the refund cost is returned according to the number of days in advance and the hotel regulation; if the check-in person delays the return, a fee is charged based on the number of delayed days and hotel regulations.
In consideration of the difficulty problem of asking for the fees to be supplemented, the hotel party can automatically determine the amount of deposit when the hotel party transacts the check-in, and the behaviors of delaying the room returning and not paying the fees can be handed to the related legal departments for processing; if a credit system exists, remarking can also be performed in the credit system.
After the user successfully returns, the room can be vacated, the person who enters the room can not enter the room through the room entering authentication method in the embodiment 3, and the returning state is determined by the final cost clearing result.
Further, if the user forgets the emergency password, the check-in person can also obtain the password again by sending the password to the mobile phone of the check-in person through the first electronic terminal through the 'forget password' option on the first electronic terminal.
example 6:
On the basis of the unmanned hotel management authentication method provided in embodiments 1 to 5, the present invention further provides an unmanned hotel management authentication device for implementing the above method, and as shown in fig. 11, the present invention is a schematic view of a device architecture in an embodiment of the present invention. The unmanned hotel management authentication apparatus of the present embodiment includes one or more processors 21 and a memory 22. In fig. 11, one processor 21 is taken as an example. The processor 21 and the memory 22 may be connected by a bus or other means, and fig. 11 illustrates the connection by a bus as an example.
The memory 22, which is a non-volatile computer-readable storage medium for the unmanned hotel management authentication method, may be used to store non-volatile software programs, non-volatile computer-executable programs, and modules, such as the unmanned hotel management authentication method in embodiment 1. The processor 21 executes various functional applications and data processing of the unmanned hotel management authentication device by running the nonvolatile software programs, instructions and modules stored in the memory 22, that is, the unmanned hotel management authentication methods of embodiments 1 and 2 are implemented.
The memory 22 may include high speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, the memory 22 may optionally include memory located remotely from the processor 21, and these remote memories may be connected to the processor 21 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The program instructions/modules are stored in the memory 22 and, when executed by the one or more processors 21, perform the unmanned hotel management authentication method of embodiment 1, for example, perform the steps illustrated in fig. 1, fig. 3, fig. 5, fig. 6, fig. 8-fig. 10 described above.
Those of ordinary skill in the art will appreciate that all or part of the steps of the various methods of the embodiments may be implemented by associated hardware as instructed by a program, which may be stored on a computer-readable storage medium, which may include: a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic or optical disk, or the like.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (10)

1. An unmanned hotel management authentication method is characterized by comprising the following steps:
The hotel terminal collects a face image on the surface of a certificate of a user and a face image in the certificate chip, matches the two face images and verifies the authenticity of the certificate of the user;
the hotel terminal collects a depth face image of a user on site, and matches the depth face image with two face images on a certificate to realize identity authentication of the user;
After the authentication is successful, the hotel terminal provides corresponding service for the user according to the authentication type;
The user is a check-in person or a hotel person, and the authentication types are check-in authentication, room entrance authentication, public place entrance authentication or check-out authentication.
2. the unmanned hotel management authentication method of claim 1, wherein the hotel terminal provides corresponding services to the user according to the authentication type, and specifically comprises:
For check-in authentication, the hotel terminal transacts corresponding check-in procedures for check-in personnel;
For the room entrance authentication, the hotel terminal controls to open the corresponding room door so that the check-in personnel or the hotel personnel enter the room;
for public place entrance authentication, the hotel terminal controls the corresponding public place to pass the persons living in or the hotel persons;
for the check-out certification, the hotel terminal handles corresponding check-out procedures for the check-in personnel.
3. The unmanned hotel management authentication method of claim 2, wherein for the check-in authentication, the process of the hotel terminal for the check-in personnel to handle the corresponding check-in procedure specifically comprises the following steps:
The hotel terminal stores and records the certificate information of the personnel living in and the depth face image information acquired on site;
after the check-in personnel select check-in information at the hotel terminal and pay the cost, the hotel terminal generates an order corresponding to the check-in personnel information;
The hotel terminal generates an emergency password and sends the emergency password to corresponding check-in personnel;
The certificate information comprises basic information and biological information, the basic information comprises one or more of the name, the sex, the identification number, the nationality and the address of a user, and the biological information comprises one or more of a face image, an iris image and a fingerprint.
4. The unmanned hotel management authentication method of claim 2, wherein for the check-out authentication, the handling of the corresponding check-out procedure for the check-in personnel by the hotel terminal specifically comprises:
the hotel terminal judges whether the room returning time is normal according to an order generated when the check-in personnel check in; if the check-out time is normal, the check-out is successful, and if the check-out time is abnormal, the expense is settled according to the rules of the hotel;
The abnormal refund time comprises early refund and delayed refund, and if the check-in personnel refund in advance, the cost is returned according to the hotel regulation; if the check-in person delays the return, a fee is charged according to the hotel regulations.
5. The unmanned hotel management authentication method of claim 3, wherein when the check-in person performs room entry authentication or room exit authentication and the check-in person loses credentials after checking in, the method further comprises:
The check-in personnel input the emergency password received during check-in into the hotel terminal so that the hotel terminal can inquire the corresponding check-in personnel information during check-in;
the hotel terminal collects the depth face image of the person who enters the room on site, and matches with any one face image stored during the business of the person, so that the identity authentication of the user is realized.
6. The unmanned hotel management certification method of claim 1, wherein when the check-in personnel conduct the public place entry certification, the method further comprises:
the hotel terminal collects face images or other biological information of the persons living in the field and inquires whether a corresponding order exists according to the collected information;
If the order exists, judging whether the resident has the authority of entering the corresponding public place according to the content of the order;
If the checked-in personnel have the access right, the checked-in personnel pass through the corresponding public place; if the checked-in personnel do not have the access right, the corresponding public place refuses to pass; wherein the public place is a restaurant, a gymnasium, an internet bar, a conference room or a gymnasium in a hotel.
7. The unmanned hotel management authentication method of claim 1, wherein when hotel personnel perform room entrance authentication or public place entrance authentication, before the hotel terminal collects the deep face image of the user on site, the method further comprises:
If the certificate of the hotel personnel is true, the hotel terminal inquires related certificate information and judges whether the certified hotel personnel is in normal working time;
if the hotel terminal is in normal working time, the hotel terminal continues to collect the depth face image of the hotel personnel on site to carry out identity authentication; if the working time is not in the normal working time, alarm information is sent out.
8. The unmanned hotel management and authentication method as claimed in any one of claims 1 to 7, wherein the deep face image is a stereoscopic image with three-dimensional face information, a thermal imaging face image or other face image with face information representing living bodies, which is acquired by a 3D camera or a binocular camera.
9. the unmanned hotel management authentication method as recited in any one of claims 1 to 7, wherein the hotel terminals comprise a first electronic terminal disposed at a lobby of the hotel, a second electronic terminal disposed at a doorway of a hotel room, and a third electronic terminal disposed at an entrance of a hotel public place;
the check-in authentication and the check-out authentication are completed through the first electronic terminal, the room entrance authentication is completed through the second electronic terminal, and the public place entrance authentication is completed through the third electronic terminal.
10. an unmanned hotel management authentication device, comprising at least one processor and a memory, wherein the at least one processor and the memory are connected through a data bus, and the memory stores instructions executable by the at least one processor, and the instructions are used for completing the unmanned hotel management authentication method of any one of claims 1 to 9 after being executed by the processor.
CN201910684096.0A 2019-07-26 2019-07-26 unmanned hotel management authentication method and device Pending CN110570550A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910684096.0A CN110570550A (en) 2019-07-26 2019-07-26 unmanned hotel management authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910684096.0A CN110570550A (en) 2019-07-26 2019-07-26 unmanned hotel management authentication method and device

Publications (1)

Publication Number Publication Date
CN110570550A true CN110570550A (en) 2019-12-13

Family

ID=68773358

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910684096.0A Pending CN110570550A (en) 2019-07-26 2019-07-26 unmanned hotel management authentication method and device

Country Status (1)

Country Link
CN (1) CN110570550A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111402462A (en) * 2020-03-13 2020-07-10 巴江物联技术(东莞)有限公司 Real-name authentication method for face lock, display terminal, face lock and server
CN112766661A (en) * 2020-12-31 2021-05-07 上海梦创双杨数据科技股份有限公司 Training report accommodation one-card-pass integration system and method
CN115985000A (en) * 2023-03-17 2023-04-18 威海海洋职业学院 Hotel financial data verification method and system based on access control terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106650560A (en) * 2015-11-04 2017-05-10 上海市公安局刑事侦查总队 Identity authentication method based on identity card and identity authentication processor and system thereof
CN108961100A (en) * 2018-07-05 2018-12-07 邱云 A kind of unattended hotel service system and method
CN109215181A (en) * 2018-01-12 2019-01-15 上海弘视通信技术有限公司 Unmanned hotel occupancy method and system
KR101975962B1 (en) * 2018-08-06 2019-05-08 이재일 Management method for unmanned accommodation
CN110009787A (en) * 2019-04-11 2019-07-12 深圳市华腾物联科技有限公司 A kind of method and apparatus of hotel management

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106650560A (en) * 2015-11-04 2017-05-10 上海市公安局刑事侦查总队 Identity authentication method based on identity card and identity authentication processor and system thereof
CN109215181A (en) * 2018-01-12 2019-01-15 上海弘视通信技术有限公司 Unmanned hotel occupancy method and system
CN108961100A (en) * 2018-07-05 2018-12-07 邱云 A kind of unattended hotel service system and method
KR101975962B1 (en) * 2018-08-06 2019-05-08 이재일 Management method for unmanned accommodation
CN110009787A (en) * 2019-04-11 2019-07-12 深圳市华腾物联科技有限公司 A kind of method and apparatus of hotel management

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
汤其建等: "《煤矿安全》", 31 August 2012 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111402462A (en) * 2020-03-13 2020-07-10 巴江物联技术(东莞)有限公司 Real-name authentication method for face lock, display terminal, face lock and server
CN112766661A (en) * 2020-12-31 2021-05-07 上海梦创双杨数据科技股份有限公司 Training report accommodation one-card-pass integration system and method
CN112766661B (en) * 2020-12-31 2023-06-09 上海梦创双杨数据科技股份有限公司 Training report accommodation one-card-through integrated system and method
CN115985000A (en) * 2023-03-17 2023-04-18 威海海洋职业学院 Hotel financial data verification method and system based on access control terminal

Similar Documents

Publication Publication Date Title
CN205015915U (en) Management system by oneself stays
CN110473323A (en) A kind of wisdom cell management method and system
CN110543957A (en) Intelligent hotel check-in method and corresponding device
CN109711133A (en) Authentication method, device and the server of identity information
US20210089635A1 (en) Biometric identity verification and protection software solution
US11716330B2 (en) Mobile enrollment using a known biometric
CN109064603A (en) A kind of method and access control system for opening gate inhibition
CN110570550A (en) unmanned hotel management authentication method and device
MXPA05011481A (en) Systems and methods for verifying identities in transactions.
CN107038509A (en) Self-service registration-management system
US11934500B2 (en) Identification system enrollment and validation and/or authentication
JP2007241501A (en) Visitor specification system and method
CN107578502A (en) A kind of cell caller management method and device
US8749347B1 (en) Authorized custodian verification
JP2007206816A (en) Admittance system
CN110084947B (en) Access control information updating method and device
KR20120013881A (en) Loaning method using kiosk system
US20220270423A1 (en) Identity-based enablement of event access control
EP3767918B1 (en) Method and system for authenticating a purchase by a user
CN112150733B (en) Bank card misoperation processing method, device and equipment
JP7321858B2 (en) User pass permission system, automatic ticket gate system, automatic ticket gate device, and user pass permission method
JP7416308B2 (en) Admission control device, admission control system, admission control method and admission control program
KR102639356B1 (en) Identity Authentication System and Method Using Face Recognition
JP7458991B2 (en) Authentication device, authentication method and program
CN112837187A (en) Method for self-service hotel check-in

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191213