CN111754671A - Verification method, device, equipment and computer storage medium - Google Patents

Verification method, device, equipment and computer storage medium Download PDF

Info

Publication number
CN111754671A
CN111754671A CN202010599736.0A CN202010599736A CN111754671A CN 111754671 A CN111754671 A CN 111754671A CN 202010599736 A CN202010599736 A CN 202010599736A CN 111754671 A CN111754671 A CN 111754671A
Authority
CN
China
Prior art keywords
information
equipment
applet
service control
sending
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010599736.0A
Other languages
Chinese (zh)
Other versions
CN111754671B (en
Inventor
史南胜
曹姣
谢马林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202010599736.0A priority Critical patent/CN111754671B/en
Publication of CN111754671A publication Critical patent/CN111754671A/en
Application granted granted Critical
Publication of CN111754671B publication Critical patent/CN111754671B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9537Spatial or temporal dependent retrieval, e.g. spatiotemporal queries

Abstract

The application discloses a verification method, a verification device, verification equipment and a computer storage medium, and relates to the technical field of computers, in particular to the fields of Internet and cloud computing. The specific implementation scheme is as follows: receiving authentication information sent by first equipment, wherein the authentication information comprises visitor information and access authentication information; and sending access verification information to the second equipment corresponding to the visitor information, so that the second equipment can display the access verification information. According to the embodiment of the application, the access verification information can be provided for the second equipment under the condition that the second equipment requests the access verification information according to the identity verification information sent by the first equipment, so that visitors can conveniently obtain the access verification information, and the access verification information can be displayed on the second equipment without meeting of the host and the visitors. The user can conveniently visit the travel activity in special periods, such as epidemic periods.

Description

Verification method, device, equipment and computer storage medium
Technical Field
The application relates to the technical field of computers, in particular to the field of internet and cloud computing.
Background
In real life, people may need to verify identities by means of a network when entering or leaving certain places in travel activities for various reasons. Such as a pass for a user to pass in and out of a particular occasion via a network. However, there are cases where people forget to take a ticket or have a visitor, and thus registration by form filling or the like is necessary to complete authentication. This causes a lot of trouble to people and may cause people to be congested.
For example, in the epidemic situation, pass documents such as entrance and exit certificates are almost carried in the process of entering and exiting each place. When a lot of people exist, people often forget the registration voucher or register and report on a card gate post, so that the time of the people is delayed, and when the people flow is high (such as on-duty time and off-duty time), the people are easy to block, the peak staggering during an epidemic situation is not facilitated, and the congestion is avoided. In addition, once a visitor needs to visit the owner, the owner needs to receive at the door of the place where the visitor is located, contact is not reduced, and inconvenience is brought to work or life of the owner.
Disclosure of Invention
The present disclosure provides a verification method, apparatus, device, and computer storage medium.
According to an aspect of the present disclosure, there is provided an authentication method applied to a service control device, including:
receiving identity authentication information sent by an applet of first equipment, wherein the identity authentication information comprises visitor information and access authentication information;
and sending access verification information to the second equipment corresponding to the visitor information, so that the applet of the second equipment can display the access verification information.
According to another aspect of the present disclosure, there is provided an authentication method applied to a first device, the method including:
sending identity verification information comprising visitor information and access verification information to the service control device so as to send the access verification information to the small program of the second device corresponding to the visitor information through the service control device;
and receiving feedback information of the access verification information sent by the service control equipment.
According to another aspect of the present disclosure, there is provided an authentication method applied to a second device, including:
sending a visitor request to a service control device;
and receiving access verification information returned by the service control device, wherein the access verification information is acquired by the service control device from the small program of the first device.
According to another aspect of the present disclosure, there is provided an authentication apparatus applied to a service control device, including:
the first receiving module is used for receiving identity authentication information sent by an applet of the first equipment, wherein the identity authentication information comprises visitor information and access authentication information;
and the first control module is used for sending access verification information to the applet of the second device corresponding to the visitor information, so that the applet of the second device can display the access verification information.
According to another aspect of the present disclosure, there is provided an authentication apparatus applied to a first device, the apparatus including:
the verification information sending module is used for sending identity verification information comprising visitor information and access verification information to the service control equipment so as to send the access verification information to the small program of the second equipment corresponding to the visitor information through the service control equipment;
and the feedback information receiving module is used for receiving the receiving feedback information of the access verification information sent by the service control equipment.
According to another aspect of the present disclosure, there is provided an authentication apparatus applied to a second device, including:
sending a visitor request to a service control device;
and receiving access verification information returned by the service control device, wherein the access verification information is acquired by the service control device from the small program of the first device.
According to another aspect of the present disclosure, there is provided an electronic device including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to cause the at least one processor to perform a method provided by any one of the embodiments of the present application.
According to another aspect of the present disclosure, there is provided a non-transitory computer readable storage medium having stored thereon computer instructions for causing a computer to perform a method provided by any one of the embodiments of the present application.
According to the embodiment of the application, the access verification information can be provided for the applet of the second device under the condition that the applet of the second device requests the access verification information according to the identity verification information sent by the applet of the first device, so that a visitor can obtain the access verification information conveniently, and the access verification information can be displayed on the applet of the second device without meeting of a host and the visitor. The method provides convenience for the user to visit other people during a special period (such as an epidemic situation).
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present disclosure, nor do they limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not intended to limit the present application. Wherein:
FIG. 1 is a flow chart of a verification method according to an embodiment of the present application;
FIG. 2 is a flow diagram of a verification method according to another embodiment of the present application;
FIG. 3 is a flow chart of a verification method according to an embodiment of the present application;
FIG. 4 is a flow diagram of a verification method according to another embodiment of the present application;
FIG. 5 is a flow chart of a verification method according to an embodiment of the present application;
FIG. 6 is a flow diagram of a verification method according to another embodiment of the present application;
FIG. 7 is a block diagram of an authentication device according to an embodiment of the present application;
FIG. 8 is a block diagram of an authentication device according to another embodiment of the present application;
fig. 9 is a block diagram of the structure of an authentication apparatus according to an embodiment of the present application;
FIG. 10 is a block diagram of an authentication device according to another embodiment of the present application;
fig. 11 is a block diagram of the structure of an authentication apparatus according to an embodiment of the present application;
fig. 12 is a block diagram of the structure of an authentication apparatus according to another embodiment of the present application;
FIG. 13 is a schematic illustration of an offer reminder in an application example;
FIG. 14 is a schematic diagram of heartbeat detection in an application example;
FIG. 15 is a schematic illustration of a guest mode in an application example;
fig. 16 is a block diagram of an electronic device for implementing the authentication method of the embodiment of the present application.
Detailed Description
The following description of the exemplary embodiments of the present application, taken in conjunction with the accompanying drawings, includes various details of the embodiments of the application for the understanding of the same, which are to be considered exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
Fig. 1 shows a schematic flowchart of an authentication method according to an embodiment of the present application, as shown in fig. 1, including the following steps:
step 101: receiving identity authentication information sent by an applet of first equipment, wherein the identity authentication information comprises visitor information and access authentication information;
step 102: and sending access authentication information to the applet of the second device corresponding to the visitor information, so that the applet of the second device can display the access authentication information.
In the embodiment of the present application, the applet may run depending on the host application, and is integrated in the host application by means of, for example, an SDK (Software Development Kit). The applet is generally ready for use without download and installation, and the user can open the applet by scanning or searching after opening the installed host application. For example, an application is installed in the first device or the second device, in which an applet for authentication can be opened.
For example, the first device may be a device that has selected a master mode for an applet used for authentication at the device, which may also be referred to as a master device. The second device may be a device that has selected a guest mode for an applet used for authentication at the device, and may also be referred to as a guest device. The specific operation mode can be as follows: an applet of a device sends a master mode report message to a service control device, which determines the device as a master device. The applet of the other device sends a report message of the guest mode to the service control device, which determines that the device is a guest device.
In this embodiment, the service control device may send the access verification information through the applet of the second device when receiving the visitor request sent by the applet of the second device corresponding to the visitor information, so that the applet of the second device can display the access verification information.
In this embodiment, the access verification information may specifically be access card, owner certificate, owner photo, two-dimensional code, and other verification information used for passing in a specific place. The access verification information may be used to access a location, such as an office building, a cell, etc. When the user a needs to go to the residence of the user B to visit the user B, if the cell of the user B needs to access the pass certificate, the user B may provide the service control device with authentication information indicating the identity of the owner before the user a visits the user B. The service control device is thus able to send access authentication information to the applet of the guest device upon receiving a guest request of the applet of the guest device.
The service control device may be a server that provides various services, for example, a background server that provides support for authentication information sent by the applet of the host device. The background server can analyze and process the received data such as the authentication information.
The service control device may also be hardware or software. When the service control device is hardware, it may be implemented as a plurality of software or software modules (e.g., modules for providing distributed services), or as a single software or software module. And is not particularly limited herein.
According to the authentication information sent by the applet of the first device, the access authentication information can be provided for the applet of the second device under the condition that the applet of the second device requests the access authentication information, so that a visitor can obtain the access authentication information conveniently without meeting the host and the visitor. In a special period which is not suitable for people to gather, the embodiment can provide convenience for people to go out and go in and out of a specific place.
In this embodiment, the user of the second device can obtain the authentication information of the user of the first device through the applet, so that in some special periods, such as an epidemic situation, the user of the second device can visit the user of the first device in a place where the user of the first device is located without contacting with the user of the first device in advance, and convenience is provided for traveling of the user.
Fig. 2 is a flow chart of a verification method according to another embodiment of the present application. The authentication method of this embodiment may include the steps of the above-described embodiment. In this embodiment, the verification and identification method further includes:
step 201: receiving reminding setting condition information sent by an applet of first equipment;
step 202: and sending the reminding information to the applet of the first equipment under the condition that the condition corresponding to the reminding setting condition information is met.
In this embodiment, the reminder setting condition information may be a reminder condition, and when the reminder setting condition is met, the reminder setting condition information is sent to the applet of the first device. The reminding condition can be set according to the reminding condition setting information sent by the first device. For example, the applet of the first device sends time setting information to set the reminder time to 7 am on wednesday. Or the applet of the first device sends time setting information, and the reminding time is set to be 7 am.
In this embodiment, the applet of the first device can set the reminding condition on one side of the control device, so that the control device sends the reminding information to the applet of the first device when the reminding condition is implemented. For example, when a user enters an office building during work, the user needs to carry the access certificate. In order to prevent the user from forgetting to carry the access certificate, the user can be reminded at a set time, so that the user can carry the access certificate which needs to be carried before going out at work. Therefore, in the period of access by the access authentication information in real life, the condition that the user cannot access due to forgetting to carry the access authentication information can be reduced, and convenience is brought to the user to access a specific occasion in a special period. During epidemic situations of epidemic diseases, a user can go in and out of places such as office buildings and communities only by carrying the access certificate, if the user forgets to carry the access certificate, the user can not normally go in and out of places for working and living, and inconvenience is brought to the user. Therefore, the verification method provided by the embodiment can remind the user to carry the access certificate according to the time or the set geographic position, assist the user in memorizing, and provide convenience for the working life of the user in a special period, such as an epidemic situation period.
In another implementation, the verification method may further include the steps of the above embodiments. In this embodiment, the reminder setting condition information includes a setting time; under the condition that the condition corresponding to the reminding setting condition information is met, sending the reminding information to the applet of the first device, wherein the reminding setting condition information comprises the following steps:
and sending reminding information to the small program of the first equipment when the set time is reached according to the time condition information in the time-round scheduling task.
In this embodiment, the time wheel scheduling task may be set according to the day. The slices in the time-round scheduling task are set to be set by minutes. 60 pieces per hour and 1440 pieces per day. If the 7:00 sending reminding information is set, a reminding task is set on the 361 th fragment. And when the time wheel scheduling task is performed on the 361 st sub-slice, sending reminding information to the small program of the first device.
In this embodiment, the reminding information can be used for reminding the user to carry certificates such as entrance and exit certificates and pass certificates. The certificate such as the access card, the pass and the like is used for displaying access verification information used by the user for access. The pass or entrance card may be electronic, for example, an electronic pass card obtained by scanning a two-dimensional code when leaving a gate of a cell. The pass, entrance, or exit may also be physical.
In general, the passing certificate is not required to be carried in most places. But access to any enclosed location may require carrying pass documents at a particular time. Thus, the user may forget to carry a pass certificate or other certificate for entrance or passage due to the habit of the user. In the embodiment, the reminding information can be sent to the applet of the first device at the set time, so that the user of the applet of the first device can be reminded regularly that the user does not forget to carry access verification information such as access certificates and pass cards at the set time, and convenience is provided for the user in a special period when the user needs to access a specific occasion through the pass cards.
In another embodiment of the present application, the verification method may include the steps of the above-described embodiments. In this embodiment, the reminding setting condition information includes setting a geographical position; under the condition that the condition corresponding to the reminding setting condition information is met, sending the reminding information to the applet of the first device, wherein the reminding setting condition information comprises the following steps:
receiving first geographical position reporting information sent by an applet of first equipment;
and sending reminding information to the small program of the first equipment under the condition that the geographic position corresponding to the first geographic position reporting information is within the set first geographic position range.
In this embodiment, the geographical location reporting information may be geographical location information uploaded by the applet of the first device along with the heartbeat packet. The first geographical location may be a reminder location set by the first device, e.g. a strike location, a home address, etc. The applet of the first device of the user may set a first geographical position to the service control device and set a first geographical position range. For example, when the service control device sets the first geographical location as a certain office building C, and then sets the geographical location range as 500 meters near C, the service control device sends the reminder to the applet of the first device when the applet of the first device of the user is within 500 meters near the office building C.
As another example, the user may set a home address or an office address. Meanwhile, the first geographical location range is set to be out of a small range with the home address or the office address as the center, and specifically, the first geographical location range can be set to be out of 200 meters near the home address to send the reminding information. Therefore, when the user leaves from home, the reminding information can be sent to remind the user to carry the passing certificate, and the certificate can be returned and taken in time from the vicinity of the home address under the condition that the user forgets to carry the passing certificate.
In the embodiment, the reminding information can be sent according to the geographical position reported by the small program of the first device in real time, so that the user is effectively prevented from forgetting to carry the passing certificate in a special period when the passing certificate is needed to go in and out of various closed occasions, and the user is provided with travel convenience in the special period, such as an epidemic situation period.
Fig. 3 is a schematic flow chart of a verification method according to another embodiment of the present application. The verification method of this embodiment may include the above steps, and in this embodiment, the verification method further includes:
step 301: receiving a second geographical position reporting message of the applet of the second device;
step 302: and sending refreshing information under the condition that the geographic position corresponding to the second geographic position reporting information is within the set second geographic position range, wherein the refreshing information is used for indicating the small program of the second equipment to stop displaying the access verification information.
In this embodiment, in order to ensure the security of the access verification information, the applet of the second device, e.g. the guest device, may report the geographic location of the guest device in real time after receiving the access verification information sent by the applet of the first device, e.g. the host device, through the service control device. The applet of the visitor equipment can send a heartbeat package to the service control equipment, the geographic position of the visitor equipment is carried in the heartbeat package, and the access verification information on the visitor equipment is refreshed by sending information under the condition that the geographic position sent by the visitor equipment and received by the service control equipment exceeds a set second geographic position range, so that the access verification information on the applet of the visitor equipment can not be displayed any more.
For example, the method is implemented by applets in applications (applications, APPs) on user a and user B. User B goes to user A's office building C and visits user A, and user A sends the authentication information of cominging in and going out to service control equipment in advance, and user B obtains the authentication information of cominging in and going out from service control equipment to when cominging in and going out office building C, can demonstrate the authentication information of cominging in and going out in the APP in the place is verified in cominging in and going out of office building C, in order to realize current. Leave office building C at user B, when surpassing office building C certain limit, refresh user B's discrepancy verification information show interface for the discrepancy verification information of discrepancy office building C will not show on the display interface of the applet in visitor's equipment.
The access verification information is used to facilitate access by a user of the guest device to a user of the host device visiting the particular location. In case of exceeding the scope of a specific location, the access verification information will no longer be needed by the guest device. If the access verification information is always displayed, owner information in the access verification information may be leaked, so that information insecurity is generated. In this embodiment, the access verification information on the applet of the visitor device can be refreshed under the condition that the geographic location of the visitor device exceeds the set second geographic location range, so that the access verification information is not displayed on the visitor device. Thereby ensuring the safety of the access authentication information. During an epidemic situation, a user does not need to meet visitors at the door of a closed place, so that the convenience of visiting is provided for the user.
Fig. 4 is a schematic flowchart of a verification method according to another embodiment of the present application. In this embodiment, there are a plurality of first devices, and the verification method further includes:
step 401: under the condition of receiving a heartbeat detection request of an applet of at least one first device, sending heartbeat detection instructions to all the first devices according to heartbeat detection signals;
step 402: determining fault equipment information according to heartbeat signals sent by the applets of all the first equipment;
step 403: and sending a heartbeat abnormity reminding signal comprising information of the fault equipment to the small program of the first equipment without the fault.
As an example, the first device of a certain user may include a mobile phone, a tablet computer, a car-mounted computer, and a smart speaker, and if the mobile phone of the user fails, the mobile phone may be determined as a failed device through a heartbeat signal, and failure device information may be sent to the tablet computer, the car-mounted computer, and the smart speaker. If the user of the first device can receive the fault device information through any one of the tablet computer, the vehicle-mounted computer and the intelligent loudspeaker box, the user of the first device can know the fault state of the mobile phone, so that necessary measures can be taken for the fault state of the mobile phone, and the situation that the mobile phone cannot receive the reminding information is avoided.
As an implementation manner of the present embodiment, in a case where there are a plurality of first devices, a master device in the first devices may be set. If the main device is connected with other first devices through Bluetooth. If the bluetooth connection between the other first device and the main device is disconnected, it indicates that the other first device is far away from the main device, for example, the user may not be in the vehicle and cannot view information on the vehicle-mounted computer.
In this embodiment, there may be a plurality of first devices. If the first device of the user fails, such as power failure, network outage, etc., the user may not receive the alert message. Thus, in the present embodiment, it is determined whether all the first devices are in a state of normally receiving information, based on the heartbeat signal transmitted by the applet of the first devices. If the first equipment is judged to be in fault, sending reminding information to other first equipment which is not in fault, determining that the first equipment can know the fault equipment, and avoiding the situation that the reminding information cannot be received. The travel of the user can be facilitated in a special period, such as an epidemic situation period.
In one embodiment, the authentication method further comprises: sending receipt feedback information of the access verification information to the applet of the first device.
In this embodiment, after the applet of the first device sends the access verification information to the service control device, the service control device sends the reception feedback information of the access verification information to the applet of the first device, so that the applet of the first device can know that the access verification information is received by the service control device.
An embodiment of the present application further provides a verification method, which is applied to a first device, and as shown in fig. 5, the method includes:
step 501: sending identity verification information comprising visitor information and access verification information to the service control device so as to send the access verification information to the small program of the second device corresponding to the visitor information through the service control device;
step 502: and receiving feedback information of the access verification information sent by the service control equipment.
In the embodiment of the application, the applet of the first device can send access verification information and visitor information to the service control device, so that the service control device can send access verification information to the applet of the second device corresponding to the visitor information, a user of the first device can send the access verification information to the second device under the condition that the user does not need to meet with the visitor, and convenience is provided for a host and the visitor who are inconvenient to meet in a special period (such as an epidemic situation).
In one embodiment, the first device is multiple, and the method further comprises:
an applet of at least one first device sends a heartbeat detection request to a service control device;
all the applets of the first equipment receive heartbeat detection instructions sent by the service control equipment;
all the applets of the first equipment send heartbeat signals to the service control equipment so as to determine fault equipment information in the service control equipment;
the method comprises the steps that an applet of a first device without a fault receives a heartbeat abnormity reminding signal sent by a service control device, wherein the heartbeat abnormity reminding signal comprises fault device information;
and the applet of the first device without the fault executes fault reminding operation according to the fault device information.
In this embodiment, whether the device is online or not can be determined through the heartbeat detection signal, so as to avoid the situation that the reminding information cannot be received due to the abnormal device. The method and the device prevent the user from being unable to receive important reminding information in the process of going out in a special period, such as an epidemic situation period.
In another embodiment of the present application, the verification method further includes:
sending receipt feedback information of the access verification information to an applet of the first device.
By means of the feedback information, it can be informed that the applet of the first device has received the access verification information.
An embodiment of the present application further provides a verification method, applied to a second device, as shown in fig. 6, including:
step 601: sending a visitor request to a service control device;
step 602: and receiving access verification information returned by the service control device, wherein the access verification information is acquired by the service control device from the small program of the first device.
In this embodiment, after the applet of the second device sends the visitor request to the service control device, the access authentication information required by the user accessing the first device can be obtained from the service control device, so that the user of the first device and the user of the second device do not need to meet at a place with more people, and convenience is provided for the user to go out in a special period (such as an epidemic situation period).
In one embodiment, the verification method further comprises:
sending second geographical position reporting information to the service control equipment;
receiving access verification information refreshing information sent by the service control equipment under the condition that the geographic position corresponding to the second geographic position reporting information exceeds a set second geographic position range;
and refreshing the information according to the access verification information, and stopping displaying the access verification information.
The embodiment of the application is suitable for but not limited to multi-terminal equipment verification based on an applet mode, and any form (such as forms of APP, embedded APP, light application, fast application and the like) of application mode is suitable.
Further, the visitor mode controls screen capture and does not support screen capture on the second device. Fig. 7 is a block diagram illustrating a structure of an authentication apparatus according to an embodiment of the present application, where the authentication apparatus may be applied to a service control device, and as shown in fig. 7, the authentication apparatus may include:
a first receiving module 701, configured to receive authentication information sent by an applet of a first device, where the authentication information includes visitor information and access authentication information;
the first control module 702 is configured to send access authentication information to an applet of the second device corresponding to the visitor information, so that the applet of the second device can display the access authentication information.
In one embodiment, as shown in fig. 8, the authentication apparatus further comprises:
a second receiving module 703, configured to receive the setting condition reminding information sent by the applet of the first device;
the second control module 704 is configured to send the reminder information to the applet of the first device when a condition corresponding to the reminder setting condition information is satisfied.
In one embodiment, the reminder setting condition information includes a set time; the second control module 704 is configured to:
and sending reminding information to the small program of the first equipment when the set time is reached according to the time condition information in the time-round scheduling task.
In one embodiment, the reminder setting condition information includes setting a geographical location; the second control module 704 is configured to:
receiving first geographical position reporting information sent by an applet of first equipment;
and sending reminding information to the small program of the first equipment under the condition that the geographic position corresponding to the first geographic position reporting information is within the set first geographic position range.
In one embodiment, the method further comprises:
a third receiving module 705, configured to receive a second geographic location reporting message of an applet of a second device;
and the third control module 706 is configured to send refresh information when the geographic location corresponding to the second geographic location reporting information is within the set second geographic location range, where the refresh information is used to instruct the applet of the second device to stop displaying the access verification information.
In one embodiment, the first device is multiple, and the apparatus further comprises:
a heartbeat detection request module 707, configured to send a heartbeat detection instruction to all the applets of the first device according to a heartbeat detection signal when receiving a heartbeat detection request of at least one applet of the first device;
a faulty device information module 708, configured to determine faulty device information according to the heartbeat signals sent by the applets of all the first devices;
an exception reminding module 709, configured to send a heartbeat exception reminding signal including information of the failed device to the applet of the first device without the failure.
In one embodiment, the method further comprises:
a receiving feedback module 710, configured to send receiving feedback information of the access verification information to the applet of the first device.
Fig. 9 shows a block diagram of an authentication apparatus 800 according to an embodiment of the present application, where the authentication apparatus may be applied to a first device, and as shown in fig. 9, the authentication apparatus 800 may include:
an authentication information sending module 801, configured to send identity authentication information including visitor information and access authentication information to the service control device, so as to send the access authentication information to an applet of the second device corresponding to the visitor information through the service control device;
a feedback information receiving module 802, configured to receive feedback information of receiving the access verification information sent by the service control device.
As shown in fig. 10, in one embodiment, there are a plurality of first devices, and the verification apparatus 800 further includes:
a detection request sending module 803, configured to send, by the applet of the at least one first device, a heartbeat detection request to the service control device;
a detection instruction receiving module 804, configured to receive, by the applets of all the first devices, the heartbeat detection instruction sent by the service control device;
a heartbeat signal sending module 805, configured to send heartbeat signals to the service control device by the applets of all the first devices, so as to determine, at the service control device, faulty device information;
an exception alert receiving module 806, configured to receive, by the applet of the non-faulty first device, a heartbeat exception alert signal sent by the service control device, where the heartbeat exception alert signal includes faulty device information;
and the applet of the first device without the fault executes fault reminding operation according to the fault device information.
Fig. 11 shows a block diagram of a verification apparatus 900 according to an embodiment of the present application, where the verification apparatus may be applied to a second device, and the verification apparatus 900 may include:
a visitor request sending module 901, configured to send a visitor request to a service control device;
an authentication information receiving module 902, configured to receive access authentication information returned by the service control device, where the access authentication information is obtained by the service control device from the applet of the first device.
As shown in fig. 12, in one embodiment, the verification apparatus 900 further includes:
a reporting module 903, configured to send second geographic location reporting information to the service control device;
a refresh information receiving module 904, configured to receive access verification information refresh information sent by the service control device when the geographic location corresponding to the second geographic location reporting information exceeds a set second geographic location range;
and a stop display module 905, configured to stop displaying the access verification information according to the access verification information refresh information.
In an application example, a way of an anti-epidemic provision reminder based on an applet is provided, which mainly includes the following modules:
a configuration module:
the main function of this module is to receive the configuration information reported by the terminal and store it in the database of the service control device.
The configuration module may be used to store authentication information. The authentication information may include access authentication information generated by dynamically setting N graphic records according to a specific scenario (where: N >0, the graphic information is not necessary in this case). In this example, the device set as the master is the master device, and the device set as the guest mode is the guest device. The purpose of uploading the text is to prepare for the visitor mode, and if the text is the host mode, the certificate map does not need to be provided.
The configuration module can determine whether to remind according to time and geographic position according to the submitted configuration information (time reminding is selected by default), and further, the following combination mode is adopted:
(a) only time is set: reminding M minutes in advance (M is set by a user);
(b) only the geographical position is set: reminding in a specified longitude and latitude range or reminding at a set distance from a target;
(c) time reminders and geographic location reminders are set simultaneously.
FIG. 13 is a schematic diagram of a reminder. And configuring a reminding task record at the equipment end (such as the first equipment or the second equipment). And the server side (such as the service control equipment) receives the reminding task record configured by the equipment side. And recording reminding task records in a task recording library, carrying out time-round task detection scheduling and scheduling of a GEO (geosynchronous orbit) service detection module according to the task recording library, and sending reminding information to the small program of the equipment end by notifying a service group when a detection center of the service end detects that the time-round task detection scheduling and/or the reminding condition in the GEO service detection module are realized. For example, the types of the applets on the device side may include APP applets, car applets, speaker applets, and the like. The configuration module may also perform mode selection. The device mode of the application supports two modes, a master mode and a visitor mode. In the case where one device is set to the master mode, the device is a master device; in case a device is set to guest mode, the device is set to guest device. In a specific application, APPs installed on a device that implement a verification method are all in a master mode by default.
In the master mode, the master device can check set information including content needing reminding, usable electronic certificate information for access verification and the like at any time and any place.
In the visitor mode, valid certificates such as certificate information sent by a host to the terminal can be opened and accessed only within a set radius range and valid time.
The sending of the reminders by the configuration module may also set the frequency. In the scheme, the frequency can be set to three frequency schemes of one time, multiple intervals, periodic setting and the like.
(II) a detection module:
the main function of the detection module is to detect according to the configuration information and determine whether to send the message notification according to whether to trigger an event. The detection module may include a time-round task detection scheduling submodule and a GEO service probing submodule.
The main function of the time wheel task monitoring and scheduling submodule is to execute the timing task on the current time slice through a circular queue for storing the timing task. The time slices of the present example are sliced in minutes, i.e. an hour is divided into 60 slices, and other slices are also possible. And a time wheel task monitoring and scheduling submodule (which can be called a scheduler for short) moves according to the time to judge whether the task needs to be executed. Illustratively, the set information structure of the task may include a task ID, a loop mode (e.g., loop several times, not loop), a task granularity (e.g., hour, day, week), a task execution time, a task ending manner (e.g., fixed time, combined with loop times), a task execution mode (e.g., host, visitor), a task execution combination configuration (e.g., time, geography), task information, a task name, a reminder template, a radius distance, a record, and the like. The detection service performs and detects various tasks according to a time round algorithm.
The GEO detection service submodule has the main function of being used for receiving longitude and latitude information of the end equipment and judging whether the current longitude and latitude are matched with the geographic position and the radius set in the task record or not. If the data is matched with the data, the data is considered to be in a set interval, prompting needs to be initiated, and prompting information is sent to the equipment end.
In the time and geographic position combination mode, the GEO detection service submodule exists as a combination of the time wheel task scheduling submodule, and the time wheel task scheduling submodule has limited functions. In the case of a combination of time alert and geographic location alert modes, the alert operation may not be performed even if the range of distances within GEO detection has been met.
(III) Notification Module
The main task of the notification module is to receive the message sent by the time wheel scheduling submodule and prompt the equipment message.
Further, the notification module detects how many intercommunicated heartbeat devices receive the message when sending the message, and adopts a broadcast mode to send the notification.
(IV) heartbeat service detection module
The heartbeat service detection module is mainly used for detecting whether end equipment, such as the first equipment, can normally survive.
The heartbeat detection is a mode of interaction between a plurality of end devices (such as a mobile phone APP, a vehicle-mounted terminal, wearable devices and the like) and a server. And the equipment side actively reports the information of the survival heartbeat at regular time.
When the service control device issues heartbeat detection, the information of other end devices mounted with the current user ID is issued at the same time. Therefore, once a certain device fails, the user can discover the device through the information notification of other devices, and the single point failure is avoided.
For example, as shown in fig. 14, a schematic diagram of an application example of center hop detection is shown. The end device sends the CLUSTER PING information carrying the < B _ ID > and < B _ IPreport > messages to the service registration center of the service end (service control device) as a heartbeat detection request. The service registration center sends a heartbeat detection instruction, e.g., INFO information, to a plurality of devices, e.g., node 1, node 2 … … node N, etc. The nodes may return heartbeat information, such as ACK information. The service registry then returns heartbeat signal reception feedback, e.g., PING information, to the nodes. Wherein the service registry may be a function in the service control device.
(V) mode control module
The mode control module is specially set for visitor visit during epidemic situations, and aims to reduce reception registration time of a host and multiple contact of personnel, and meanwhile, a specific area opening invalidation strategy is set for guaranteeing privacy of the host. Mode of master device master mode: new configuration information (authentication information) can be opened and set at any time, and the operation can be modified at any time and any place.
A guest mode: the visitor can only open at a specific time and a specific geographic position, and the access verification information sent by the host device cannot be opened when the visitor exceeds a set time range or a set area radius.
For example, as shown in FIG. 15, a diagram of guest mode in an application example is shown. The visitor sets up the visitor mode through the end device, and the end device becomes visitor's equipment. The master sets a master mode through the end device, which becomes the master device. The host device may submit the visitor and necessary access information to the service center. The guest device sends an access request to the service center. And the service center control center sends the information set by the host through the host equipment according to the information of the visitor equipment. The guest device may then present the access information. After the verification is passed, the service center may send (ACK) feedback information to the master device. In addition, the host mode of the host device and the guest mode of the guest device can be set independently without absolute association. The end devices may be in different roles in different scenarios, one end device may be a master device in one scenario, and the end device may change to a guest device in another scenario.
Through the embodiment of the application, the problems that information materials such as entrance certificates are easy to forget when a user goes out, information is filled in at sentry post points and the like can be solved, the time of the user going out can be greatly saved, the congestion risk of key setting screens such as units, high-speed intersections, cells and the like at the peak of stream of people is reduced, and therefore the safety of the user is favorably guaranteed.
By introducing the host-guest mode, the convenience of personnel mutual visit and reception efficiency are ensured while the repeated work and production are ensured. Ensure high quality and high efficiency in catching up the flow of people during certain periods, such as epidemic prevention and control. The primary purpose of avoiding peak shifting and congestion in the epidemic situation is achieved.
According to an embodiment of the present application, an electronic device and a readable storage medium are also provided.
Fig. 16 is a block diagram of an electronic device according to an authentication method according to an embodiment of the present application. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the present application that are described and/or claimed herein.
As shown in fig. 16, the electronic apparatus includes: one or more processors 1301, memory 1302, and interfaces for connecting the various components, including high speed interfaces and low speed interfaces. The various components are interconnected using different buses and may be mounted on a common motherboard or in other manners as desired. The processor may process instructions for execution within the electronic device, including instructions stored in or on the memory to display graphical information of a GUI on an external input/output apparatus (such as a display device coupled to the interface). In other embodiments, multiple processors and/or multiple buses may be used, along with multiple memories and multiple memories, as desired. Also, multiple electronic devices may be connected, with each device providing portions of the necessary operations (e.g., as a server array, a group of blade servers, or a multi-processor system). Fig. 16 illustrates an example of a processor 1301.
Memory 1302 is a non-transitory computer readable storage medium as provided herein. The memory stores instructions executable by the at least one processor to cause the at least one processor to perform the authentication method provided herein. The non-transitory computer-readable storage medium of the present application stores computer instructions for causing a computer to perform the authentication method provided herein.
The memory 1302, as a non-transitory computer readable storage medium, may be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the authentication method in the embodiments of the present application (for example, the first receiving module 501 and the second controlling module 504 shown in fig. 7). The processor 1301 executes various functional applications of the server and data processing, i.e., implements the authentication method in the above-described method embodiments, by running non-transitory software programs, instructions, and modules stored in the memory 1302.
The memory 1302 may include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of the video encoding electronic device, and the like. Further, the memory 1302 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, memory 1302 may optionally include memory located remotely from processor 1301, which may be connected to video encoding electronics over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The electronic device of the authentication method may further include: an input device 1303 and an output device 1304. The processor 1301, the memory 1302, the input device 1303 and the output device 1304 may be connected by a bus or other means, and fig. 16 illustrates the bus connection.
The input device 1303 may receive input numeric or character information and generate key signal inputs related to user settings and function control of the video encoded electronic device, such as a touch screen, a keypad, a mouse, a track pad, a touch pad, a pointing stick, one or more mouse buttons, a track ball, a joystick, or other input devices. The output devices 1304 may include a display device, auxiliary lighting devices (e.g., LEDs), tactile feedback devices (e.g., vibrating motors), and the like. The display device may include, but is not limited to, a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display, and a plasma display. In some implementations, the display device can be a touch screen.
Various implementations of the systems and techniques described here can be realized in digital electronic circuitry, integrated circuitry, application specific ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
These computer programs (also known as programs, software applications, or code) include machine instructions for a programmable processor, and may be implemented using high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or device (e.g., magnetic discs, optical disks, memory, Programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
According to the embodiment of the application, the access verification information can be provided for the second equipment under the condition that the second equipment requests the access verification information according to the identity verification information sent by the first equipment, so that visitors can conveniently obtain the access verification information, and the access verification information can be displayed on the second equipment without meeting of the host and the visitors. In a special period which is not suitable for people to gather, the embodiment can provide convenience for people to go out and go in and out of a specific place.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present application may be executed in parallel, sequentially, or in different orders, and the present invention is not limited thereto as long as the desired results of the technical solutions disclosed in the present application can be achieved.
The above-described embodiments should not be construed as limiting the scope of the present application. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (24)

1. An authentication method applied to a service control device comprises the following steps:
receiving identity authentication information sent by an applet of a first device, wherein the identity authentication information comprises visitor information and access authentication information;
and sending the access verification information to an applet of a second device corresponding to the visitor information, so that the second device can display the access verification information.
2. The method of claim 1, further comprising:
receiving reminding setting condition information sent by an applet of first equipment;
and sending the reminding information to the small program of the first equipment under the condition that the condition corresponding to the reminding setting condition information is met.
3. The method of claim 2, wherein the reminder setup condition information includes a setup time; under the condition that the condition corresponding to the reminding setting condition information is met, sending reminding information to the small program of the first equipment, wherein the reminding information comprises the following steps:
and sending reminding information to the small program of the first equipment when the set time is reached according to the time condition information in the time-round scheduling task.
4. The method of claim 2, wherein the reminder setup condition information includes setting a geographic location; under the condition that the condition corresponding to the reminding setting condition information is met, sending reminding information to the small program of the first equipment, wherein the reminding information comprises the following steps:
receiving first geographical position reporting information sent by an applet of the first equipment;
and sending reminding information to the small program of the first equipment under the condition that the geographic position corresponding to the first geographic position reporting information is within a set first geographic position range.
5. The method of claim 1, further comprising:
receiving second geographical position reporting information of the applet of the second device;
and sending refreshing information under the condition that the geographic position corresponding to the second geographic position reporting information is within a set second geographic position range, wherein the refreshing information is used for indicating the small program of the second equipment to stop displaying the access verification information.
6. The method of claim 1, wherein the first device is plural, the method further comprising:
under the condition of receiving a heartbeat detection request of at least one applet of the first equipment, sending heartbeat detection instructions to all applets of the first equipment according to the heartbeat detection signals;
determining fault equipment information according to heartbeat signals sent by all the applets of the first equipment;
and sending a heartbeat abnormity reminding signal comprising the information of the fault equipment to the small program of the first equipment without the fault.
7. The method of any of claims 1 to 6, further comprising:
sending receipt feedback information of the access verification information to an applet of the first device.
8. An authentication method applied to a first device, the method comprising:
sending identity verification information comprising visitor information and access verification information to service control equipment so as to send the access verification information to an applet of second equipment corresponding to the visitor information through the service control equipment;
and receiving feedback information of the access verification information sent by the service control equipment.
9. The method of claim 8, wherein the first device is plural, the method further comprising:
an applet of at least one of the first devices sends a heartbeat detection request to the service control device;
all the applets of the first equipment receive the heartbeat detection instruction sent by the service control equipment;
all the applets of the first equipment send heartbeat signals to service control equipment so as to determine fault equipment information at the service control equipment;
the small program of the first device without the fault receives a heartbeat abnormity reminding signal sent by the service control device, wherein the heartbeat abnormity reminding signal comprises the information of the fault device;
and the applet of the first equipment without the fault executes fault reminding operation according to the fault equipment information.
10. An authentication method applied to a second device comprises the following steps:
sending a visitor request to a service control device;
and receiving access verification information returned by the service control device, wherein the access verification information is acquired by the service control device from the small program of the first device.
11. The method of claim 10, further comprising:
sending second geographical position reporting information to the service control equipment;
receiving access verification information refreshing information sent by the service control equipment under the condition that the geographic position corresponding to the second geographic position reporting information exceeds a set second geographic position range;
and refreshing information according to the access verification information, and stopping displaying the access verification information.
12. An authentication device applied to a service control device comprises:
the system comprises a first receiving module, a second receiving module and a third receiving module, wherein the first receiving module is used for receiving identity authentication information sent by an applet of first equipment, and the identity authentication information comprises visitor information and access authentication information;
the first control module is used for sending the access verification information to an applet of the second device corresponding to the visitor information, so that the applet of the second device can display the access verification information.
13. The apparatus of claim 12, further comprising:
the second receiving module is used for receiving the reminding setting condition information sent by the small program of the first equipment;
and the second control module is used for sending the reminding information to the applet of the first equipment under the condition that the condition corresponding to the reminding setting condition information is met.
14. The apparatus of claim 13, wherein the reminder setup condition information includes a set time; the second control module is configured to:
and sending reminding information to the small program of the first equipment when the set time is reached according to the time condition information in the time-round scheduling task.
15. The apparatus of claim 13, wherein the reminder setup condition information includes setting a geographic location; the second control module is configured to:
receiving first geographical position reporting information sent by an applet of the first equipment;
and sending reminding information to the small program of the first equipment under the condition that the geographic position corresponding to the first geographic position reporting information is within a set first geographic position range.
16. The apparatus of claim 12, further comprising:
a third receiving module, configured to receive a second geographic location reporting message of the applet of the second device;
and the third control module is used for sending refreshing information under the condition that the geographic position corresponding to the second geographic position reporting information is within a set second geographic position range, wherein the refreshing information is used for indicating the small program of the second equipment to stop displaying the access verification information.
17. The apparatus of claim 12, wherein the first device is plural, the apparatus further comprising:
the heartbeat detection request module is used for sending heartbeat detection instructions to the applets of all the first equipment according to the heartbeat detection signals under the condition of receiving a heartbeat detection request of at least one applet of the first equipment;
the fault equipment information module is used for determining fault equipment information according to heartbeat signals sent by the small programs of all the first equipment;
and the abnormity reminding module is used for sending a heartbeat abnormity reminding signal comprising the information of the fault equipment to the applet of the first equipment without fault.
18. The apparatus of any of claims 12 to 17, further comprising:
and the receiving feedback module is used for sending the receiving feedback information of the access verification information to the small program of the first equipment.
19. An authentication apparatus applied to a first device, the apparatus comprising:
the verification information sending module is used for sending identity verification information comprising visitor information and access verification information to the service control equipment so as to send the access verification information to an applet of the second equipment corresponding to the visitor information through the service control equipment;
and the feedback information receiving module is used for receiving the receiving feedback information of the access verification information sent by the service control equipment.
20. The apparatus of claim 19, wherein the first device is a plurality of devices, the apparatus further comprising:
a detection request sending module, configured to send, by at least one applet of the first device, a heartbeat detection request to the service control device;
a detection instruction receiving module, configured to receive, by all applets of the first device, a heartbeat detection instruction sent by the service control device;
the heartbeat signal sending module is used for sending heartbeat signals to the service control equipment by all the applets of the first equipment so as to determine fault equipment information in the service control equipment;
an abnormal reminding receiving module, configured to receive, by an applet of a non-faulty first device, a heartbeat abnormal reminding signal sent by the service control device, where the heartbeat abnormal reminding signal includes information about the faulty device;
and the applet of the first equipment without the fault executes fault reminding operation according to the fault equipment information.
21. An authentication apparatus applied to a second device, comprising:
the visitor request sending module is used for sending a visitor request to the service control equipment;
and the verification information receiving module is used for receiving access verification information returned by the service control equipment, wherein the access verification information is acquired by the service control equipment from the small program of the first equipment.
22. The apparatus of claim 21, further comprising:
a reporting module, configured to send second geographic location reporting information to the service control device;
the refresh information receiving module is used for receiving access verification information refresh information sent by the service control equipment under the condition that the geographic position corresponding to the second geographic position reporting information exceeds a set second geographic position range;
and the display stopping module is used for refreshing information according to the access verification information and stopping displaying the access verification information.
23. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-11.
24. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any one of claims 1-11.
CN202010599736.0A 2020-06-28 2020-06-28 Verification method, device, equipment and computer storage medium Active CN111754671B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010599736.0A CN111754671B (en) 2020-06-28 2020-06-28 Verification method, device, equipment and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010599736.0A CN111754671B (en) 2020-06-28 2020-06-28 Verification method, device, equipment and computer storage medium

Publications (2)

Publication Number Publication Date
CN111754671A true CN111754671A (en) 2020-10-09
CN111754671B CN111754671B (en) 2022-11-18

Family

ID=72677719

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010599736.0A Active CN111754671B (en) 2020-06-28 2020-06-28 Verification method, device, equipment and computer storage medium

Country Status (1)

Country Link
CN (1) CN111754671B (en)

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102625231A (en) * 2011-06-14 2012-08-01 北京小米科技有限责任公司 Mobile terminal prompting method
CN103345789A (en) * 2013-06-25 2013-10-09 宇龙计算机通信科技(深圳)有限公司 Method and system for prompting correlation of terminal equipment and access control, and terminal equipment
CN104410954A (en) * 2014-12-24 2015-03-11 网易(杭州)网络有限公司 Information reminding method and device
WO2016180075A1 (en) * 2015-05-14 2016-11-17 深圳市家信信息科技开发有限公司 Remote detection method and system for smart electric vehicle and code table of system
CN106469081A (en) * 2016-09-29 2017-03-01 北京小米移动软件有限公司 Based reminding method and device
CN107564140A (en) * 2017-07-28 2018-01-09 孙志逸 A kind of gate inhibition invites authorization identifying system
CN108010164A (en) * 2017-11-30 2018-05-08 汤建男 The visitor's active invitation method and system of a kind of visitor's Control management system
JP2018092338A (en) * 2016-12-01 2018-06-14 Necネッツエスアイ株式会社 Visitor entry management system
CN108682062A (en) * 2018-05-11 2018-10-19 星络科技有限公司 A kind of authentication system and method
CN109657823A (en) * 2018-12-07 2019-04-19 广东美的物业管理股份有限公司 A kind of intelligent Community caller management method, system, terminal device and storage medium
CN109830010A (en) * 2019-01-18 2019-05-31 广东省安心加科技有限公司 Wireless entrance guard equipment unlocking information distribution method, device and computer equipment
CN110009786A (en) * 2019-04-10 2019-07-12 深圳市万睿智能科技有限公司 Invite the method and device and system and storage medium of visitor and visitor's arriving reminding
CN110009774A (en) * 2019-03-07 2019-07-12 绿漫科技有限公司 Intelligent caller management method and system
CN110084936A (en) * 2019-04-28 2019-08-02 广州佳都数据服务有限公司 Caller management method and device
CN110417915A (en) * 2019-08-22 2019-11-05 北京大米科技有限公司 A kind of PUSH message transmission method, device, storage medium and electronic equipment
CN210061148U (en) * 2019-04-30 2020-02-14 云南正晓安全监测科技有限公司 Robot and management system
CN111243145A (en) * 2020-03-15 2020-06-05 腾讯科技(深圳)有限公司 Method, device, medium and electronic equipment for processing visitor information

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102625231A (en) * 2011-06-14 2012-08-01 北京小米科技有限责任公司 Mobile terminal prompting method
CN103345789A (en) * 2013-06-25 2013-10-09 宇龙计算机通信科技(深圳)有限公司 Method and system for prompting correlation of terminal equipment and access control, and terminal equipment
CN104410954A (en) * 2014-12-24 2015-03-11 网易(杭州)网络有限公司 Information reminding method and device
WO2016180075A1 (en) * 2015-05-14 2016-11-17 深圳市家信信息科技开发有限公司 Remote detection method and system for smart electric vehicle and code table of system
CN106469081A (en) * 2016-09-29 2017-03-01 北京小米移动软件有限公司 Based reminding method and device
JP2018092338A (en) * 2016-12-01 2018-06-14 Necネッツエスアイ株式会社 Visitor entry management system
CN107564140A (en) * 2017-07-28 2018-01-09 孙志逸 A kind of gate inhibition invites authorization identifying system
CN108010164A (en) * 2017-11-30 2018-05-08 汤建男 The visitor's active invitation method and system of a kind of visitor's Control management system
CN108682062A (en) * 2018-05-11 2018-10-19 星络科技有限公司 A kind of authentication system and method
CN109657823A (en) * 2018-12-07 2019-04-19 广东美的物业管理股份有限公司 A kind of intelligent Community caller management method, system, terminal device and storage medium
CN109830010A (en) * 2019-01-18 2019-05-31 广东省安心加科技有限公司 Wireless entrance guard equipment unlocking information distribution method, device and computer equipment
CN110009774A (en) * 2019-03-07 2019-07-12 绿漫科技有限公司 Intelligent caller management method and system
CN110009786A (en) * 2019-04-10 2019-07-12 深圳市万睿智能科技有限公司 Invite the method and device and system and storage medium of visitor and visitor's arriving reminding
CN110084936A (en) * 2019-04-28 2019-08-02 广州佳都数据服务有限公司 Caller management method and device
CN210061148U (en) * 2019-04-30 2020-02-14 云南正晓安全监测科技有限公司 Robot and management system
CN110417915A (en) * 2019-08-22 2019-11-05 北京大米科技有限公司 A kind of PUSH message transmission method, device, storage medium and electronic equipment
CN111243145A (en) * 2020-03-15 2020-06-05 腾讯科技(深圳)有限公司 Method, device, medium and electronic equipment for processing visitor information

Also Published As

Publication number Publication date
CN111754671B (en) 2022-11-18

Similar Documents

Publication Publication Date Title
ES2950595T3 (en) Vehicle information system
US10397396B2 (en) Device function disablement during vehicle motion
CN110493080B (en) Block link point monitoring method and device, electronic equipment and storage medium
US9142114B2 (en) Tracking group members&#39; proximity
US20170024995A1 (en) Event notification
CN105190721A (en) Personnel crisis communications management system
EP3610297B1 (en) Rule deviation configuration for offender monitoring devices
US11405264B2 (en) Predictive analytics and device tracking to facilitate minimization of alert events
US20150341241A1 (en) Method and apparatus for specifying machine identifiers for machine-to-machine platform support
US20160071403A1 (en) Method, apparatus and system for broadcasting an alarm for an alarm group
CN112311824A (en) Attendance information processing method and related device
CN112567709A (en) Enhancing security using anomaly detection
CN110689693A (en) Path monitoring method, device, equipment and storage medium
US9942116B2 (en) Interconnecting electronic devices for reporting device status
Jovanovic et al. Soserbia: Android-based software platform for sending emergency messages
CN111754671B (en) Verification method, device, equipment and computer storage medium
CA3164077A1 (en) System for emergency response alerts and notification
CN113830209B (en) Abnormal movement detection method and device, vehicle and server
US11425238B2 (en) System and method for limiting mobile device functionality in a geographic area
CN113808376A (en) Safety monitoring method and device for self-service teller machine equipment
Fuller et al. IoT applications in an adaptive intelligent system with responsive anomaly detection
CA2814000C (en) System and method of device maintenance reporting via a wireless protocol
Nasui et al. Cloud-based mobile asset management solution

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant