CN112200940A - System and method for identifying abnormal use state of contract house - Google Patents

System and method for identifying abnormal use state of contract house Download PDF

Info

Publication number
CN112200940A
CN112200940A CN202011056821.9A CN202011056821A CN112200940A CN 112200940 A CN112200940 A CN 112200940A CN 202011056821 A CN202011056821 A CN 202011056821A CN 112200940 A CN112200940 A CN 112200940A
Authority
CN
China
Prior art keywords
information
room
door
server
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011056821.9A
Other languages
Chinese (zh)
Other versions
CN112200940B (en
Inventor
李楠
曹兵
徐毅
张凤杰
李立超
孙泽浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beiniao Technology Chengdu Co ltd
Original Assignee
Chongqing Yichang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Yichang Technology Co ltd filed Critical Chongqing Yichang Technology Co ltd
Priority to CN202011056821.9A priority Critical patent/CN112200940B/en
Publication of CN112200940A publication Critical patent/CN112200940A/en
Application granted granted Critical
Publication of CN112200940B publication Critical patent/CN112200940B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention relates to the technical field of access control management, and particularly discloses a system and a method for identifying abnormal use states of a network contract room, wherein the system comprises an intelligent door lock, a door unlocking module and a door locking module, the intelligent door lock is used for acquiring authentication information and verifying when a user enters a door, and unlocking the door after the verification is passed, and the system further comprises: the electronic peephole is used for starting when the door is opened and acquiring video information; the server is used for acquiring video information from the electronic peep hole, carrying out face recognition based on the video information, judging whether a specific person exists in the user entering the room, if so, judging whether the user cannot determine the identity, if so, marking the user as a following person, and generating abnormal information of the person when the user entering the room comprises the specific person and the following person. By adopting the technical scheme of the invention, the use of the room can be supervised.

Description

System and method for identifying abnormal use state of contract house
Technical Field
The invention relates to the technical field of access control management, in particular to a system and a method for identifying abnormal use states of a network contract house.
Background
The existing lodging modes of the net-book house comprise short renting houses, long renting apartments, low renting houses, lodging in residents and the like. Due to the special properties of the cyber-contracting rooms, cleaning personnel, management personnel, passengers and the like may have the authority of opening doors. Because the number of people who can open the door is large, the situation that people enter a room without permission exists, and safety problems are easily caused.
In order to solve the above problems, the chinese patent with publication number CN106338928A discloses a method and a device for detecting the status of an access door, the method comprises the following steps: monitoring an unlocking verification process and a door opening action; when the unlocking verification process and the door opening action are monitored successively, judging that the current door entering state is achieved; and when only the door opening action is monitored, judging that the current door is in the door-out state.
According to the scheme, the door entering state and the door exiting state can be effectively distinguished and recorded through monitoring of door opening actions, the condition that personnel enter a room without permission can be effectively reduced, and the personnel can trace back to determine the occurrence time when safety problems occur. However, when no passenger is in the room, cleaning personnel and the like may bypass the platform by using normal cleaning opportunities to invite friends to live and the like, which is difficult to identify and supervise at present and has certain potential safety hazards.
Therefore, a system and a method for identifying abnormal use status of a cyber-contracting room, which can supervise the use of the room, are needed.
Disclosure of Invention
The invention provides a system and a method for identifying abnormal use states of a network contract room, which can supervise the use of the room.
In order to solve the technical problem, the present application provides the following technical solutions:
the utility model provides a net appointment room user state unusual identification system, includes intelligent lock for gather authentication information and verify when the user enters the door, unblock door after verifying to pass, still include:
the electronic peephole is used for starting when the door is opened and acquiring video information;
the server is used for acquiring video information from the electronic peep hole, carrying out face recognition based on the video information, judging whether a specific person exists in the user entering the room, if so, judging whether the user cannot determine the identity, if so, marking the user as a following person, and generating abnormal information of the person when the user entering the room comprises the specific person and the following person.
The basic scheme principle and the beneficial effects are as follows:
in this scheme, through the cooperation of intelligent lock and electron cat eye, can carry out video information's collection when the user gets into the room, the server can accurately judge whether have specific personnel and accompany personnel according to video information. For example, a specific person is a cleaning person, under normal conditions, one room only needs one cleaning person to work, and other irrelevant persons cannot be brought into the room during working. By generating the abnormal information of the personnel, subsequent management personnel can conveniently acquire and process the abnormal information. In conclusion, the scheme can effectively supervise the use of the room.
Further, the server is also used for calculating the residence time of the specific personnel and the accompanying personnel entering the room, and when the residence time is greater than a first time threshold value, residence time abnormal information is generated.
When a specific person is a cleaning person, the normal cleaning work time is relatively fixed, for example, 40 minutes, and when the residence time of the cleaning person and other irrelevant persons in a room is far more than 40 minutes, the cleaning person may enter the room after opening the door by using the self authority of the cleaning person. By generating the retention time abnormal information, the behavior can be found in time, and subsequent management personnel can process the behavior in time conveniently.
Furthermore, the intelligent door lock is also used for recording door opening state information, and the door opening state information comprises inward opening and outward opening.
It is convenient to know from which side the door is opened.
Further, the server is also used for acquiring door opening state information from the intelligent door lock; when the door opening state information is opened after a specific person enters a room independently, and the face recognition shows that the identity user cannot be determined to enter the room, the server marks the identity user as a company.
When a specific person is a cleaning person, the situation that the cleaning person enters a room in advance and other irrelevant persons arrive later and the cleaning person opens the door for the cleaning person to help the cleaning person to enter the room can also occur, and the optimal scheme can effectively identify the situation.
Further, the system also comprises a management terminal used for acquiring abnormal information of personnel and abnormal information of the residence time from the server.
The management personnel can conveniently know the personnel abnormal information and the stay time abnormal information in time through the management terminal.
Furthermore, the management terminal is also used for inputting the face recognition data of a specific person and storing the face recognition data in the server.
The server can accurately identify specific personnel when the face is identified.
Further, the authentication information includes one or more of bluetooth information, password information, and NFC information.
Further, the first time threshold is 2-5 hours.
Further, the server is also used for obtaining order information of the passenger, wherein the order information comprises check-in time, check-in duration and a call placing mobile phone model.
A method for recognizing the abnormal use state of a network contract house uses the abnormal use state recognition system of the network contract house.
In this scheme, through the cooperation of intelligent lock and electron cat eye, can carry out video information's collection when the user gets into the room, the server can accurately judge whether have specific personnel and accompany personnel according to video information. For example, a specific person is a cleaning person, under normal conditions, one room only needs one cleaning person to work, and other irrelevant persons cannot be brought into the room during working. The normal cleaning work time is relatively fixed, for example, 40 minutes, when the stay time of cleaning personnel and other irrelevant personnel in a room is far more than 40 minutes, the cleaning personnel can open the door by utilizing the authority of the cleaning personnel, and then the irrelevant personnel can live in the room. By generating the stay time abnormality information, such behavior can be found in time. In conclusion, the scheme can effectively supervise the use of the room.
Drawings
Fig. 1 is a logic block diagram of an abnormal identification system of a gateway usage state according to an embodiment.
Detailed Description
The following is further detailed by way of specific embodiments:
example one
As shown in fig. 1, the system for recognizing abnormal use status of a cyber-contracting room of the embodiment includes an intelligent door lock, an electronic peephole, a server and a management terminal.
The intelligent door lock is used for collecting authentication information and verifying when a user enters the door, and unlocking the door after the verification is passed. The authentication information includes one or more of bluetooth information, password information, and NFC information, and in this embodiment, the password information is used.
The intelligent door lock is also used for recording the door opening state information, and the door opening state information comprises inward opening and outward opening. When the verification is carried out firstly, the door opening action is detected and the current state is judged to be outward opening; when only the door opening action is detected, the door is judged to be opened inwards.
And the electronic peephole is used for starting when the door is opened and acquiring video information.
The management terminal is also used for inputting the face recognition data of a specific person and storing the face recognition data in the server. In this embodiment, the specific person is a cleaner.
The server is used for acquiring video information from the electronic peephole and door opening state information from the intelligent door lock, carrying out face recognition based on the video information and face recognition data of specific personnel, judging whether the specific personnel exist in the users entering the room, if so, judging whether the users can not determine identities, and if so, marking the users as accompanying personnel;
when the door opening state information is opened after a specific person enters a room independently, and the face recognition shows that the identity user cannot be determined to enter the room, the server marks the identity user as a company.
The server is also used for generating the person abnormality information when the user entering the room includes a specific person and accompanying persons.
The server is also used for calculating the residence time of the specific personnel and accompanying personnel entering the room, and generating residence time abnormity information when the residence time is greater than a first time threshold value. The first time threshold is 2-5 hours, in this example 5 hours.
The management terminal is also used for acquiring abnormal information of personnel and abnormal information of residence time from the server.
The method for identifying the abnormal use state of the cyber-contracting room in the embodiment uses the system for identifying the abnormal use state of the cyber-contracting room.
Example two
The difference between the present embodiment and the first embodiment is that the cyber-contracting room includes a kitchen, a dining room, a living room, a toilet, a bedroom, etc. In the system for identifying abnormal use state of the network contract house in the embodiment, the server is further used for acquiring order information of the passenger, wherein the order information comprises check-in time, check-in duration and a call placing mobile phone model. The server also matches the mobile phone weight MP in a preset database according to the mobile phone model. The preset database can be a related website for receiving and recording the information of the digital product in the internet, and can also be a related shopping website for selling the digital product.
The server also sends passenger-specific authentication information to the mobile phone of the passenger based on the order information, the intelligent door lock is used for sending the collected passenger-specific authentication information to the server, and the server judges that the passenger lives in based on the passenger-specific authentication information sent by the intelligent door lock.
Still include camera, first intelligence callus on the sole and second intelligence callus on the sole, first intelligence callus on the sole embeds has weight sensor and bluetooth chip, and weight sensor is used for gathering weight information, and the bluetooth chip is connected with intelligent lock bluetooth, and the bluetooth chip is used for sending weight information to intelligent lock, and intelligent lock still is used for sending weight information to the server. The second intelligent foot pad is the same as the first intelligent foot pad in structure. The first intelligent foot pad is placed outside a doorway of a net-shaped house, and the second intelligent foot pad is placed at a doorway of a toilet;
the camera is installed in the dining room, and the camera is used for gathering the image information of dining room desktop. In order to ensure privacy, a text prompt of 'camera is arranged at the table top of the dining room', and the area which can be shot is marked on the tablecloth by using images.
The server is used for collecting the total weight MG of the passenger and the baggage entering the room based on the first intelligent foot pad when the passenger first enters the room, and the server is also used for collecting the change weight MX0 of entering and exiting the room each time based on the first intelligent foot pad when the passenger enters the room. The change weight MX0 is obtained from the difference between the weight information when going out of the room and the weight information when going into the room. For example, when the user leaves the door, the user returns to twist the commodities, and the difference is positive, namely the weight of the newly added commodities; of course, the difference may be negative, since there are cases where the article is taken out and not brought back.
The server is used for collecting the changing weight MW0 of each entrance and exit of the toilet during the passenger check-in period based on the second intelligent foot pad. Can be used for correcting weight change caused by consumption of washing products.
The server is also used for acquiring image information of the camera, identifying food in the image based on the image information, and acquiring the corresponding weight MS of the food based on the food information base. The food information base can adopt data in shopping websites such as Taobao and Jingdong. Can be used for correcting weight variation caused by eaten food.
The server is also used for acquiring the total weight MZ of the passenger and the luggage which leave the room finally based on the first intelligent foot pad after the passenger leaves the room. The server is also used for calculating the total variable weight MX1 of the entering and exiting rooms according to the variable weight MX0 of the entering and exiting rooms at each time; the server is also used for calculating the total weight MW1 of the change in the toilet according to the weight MW0 of the change in the toilet.
The server is also used for calculating the weight difference value MA after the passenger exits, and the calculation formula is as follows:
MA=MG-(MZ+MW1+MX1+MS)
the server is also used for judging whether the difference between the weight difference value MA and the weight MP of the mobile phone is positive and smaller than a threshold value, and if so, judging that the mobile phone is suspected to be left.
When the special authentication information for the passengers is password information, the server is also used for timing from the departure of the passengers, and the door opening passwords are not changed within the first preset time. The first preset time is 10-60 minutes. In this embodiment, the criterion for the departure of the passenger is that the weight information of the first intelligent foot pad is zero.
When the special authentication information of the passenger is Bluetooth information or NFC information, the server is further used for starting timing when the passenger leaves, acquiring the emerging weight MD of the first intelligent foot pad within second preset time, judging whether the emerging weight MD is equal to the total weight MZ of the passenger and the luggage which leave the room at last, and if so, unlocking the door by the intelligent door lock. The second preset time is 5-15 minutes.
In this scheme, through the cooperation of camera, first intelligent callus on the sole and second intelligence callus on the sole, can be when the passenger leaves the room, whether the control forgets article, especially cell-phone. And timing is started when the passenger leaves, the door opening password is not changed within the preset time, and the passenger can conveniently return to take back the mobile phone after finding the mobile phone is left. For the passenger unlocked by the Bluetooth or NFC, the passenger cannot use the Bluetooth or NFC for unlocking due to the fact that the mobile phone is left in the room, but the total weight MZ of the passenger and the luggage which leave the room at last is equal to the emerging weight MD, and the passenger can be judged to return to take the mobile phone, unlock the door and be convenient for the passenger to enter the room to take the mobile phone. For passengers with short check-in days and few access times, the accuracy rate of detecting the mobile phone remaining is higher.
In this embodiment, the method for identifying the abnormal use state of the cyber-contracting room uses the system for identifying the abnormal use state of the cyber-contracting room.
The above are merely examples of the present invention, and the present invention is not limited to the field related to this embodiment, and the common general knowledge of the known specific structures and characteristics in the schemes is not described herein too much, and those skilled in the art can know all the common technical knowledge in the technical field before the application date or the priority date, can know all the prior art in this field, and have the ability to apply the conventional experimental means before this date, and those skilled in the art can combine their own ability to perfect and implement the scheme, and some typical known structures or known methods should not become barriers to the implementation of the present invention by those skilled in the art in light of the teaching provided in the present application. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.

Claims (10)

1. The utility model provides a net appointment room user state unusual identification system, includes intelligent lock for gather authentication information and verify when the user enters the door, unblock door after verifying the passing, its characterized in that still includes:
the electronic peephole is used for starting when the door is opened and acquiring video information;
the server is used for acquiring video information from the electronic peep hole, carrying out face recognition based on the video information, judging whether a specific person exists in the user entering the room, if so, judging whether the user cannot determine the identity, if so, marking the user as a following person, and generating abnormal information of the person when the user entering the room comprises the specific person and the following person.
2. The system for recognizing abnormality in usage state of a cyber-contracting room according to claim 1, wherein: the server is also used for calculating the residence time of the specific personnel and accompanying personnel entering the room, and generating residence time abnormal information when the residence time is greater than a first time threshold value.
3. The system for recognizing abnormality in use status of a network contract room according to claim 2, wherein: the intelligent door lock is further used for recording door opening state information, and the door opening state information comprises inward opening and outward opening.
4. The system for recognizing abnormality in usage state of a cyber-contracting room according to claim 3, wherein: the server is also used for acquiring door opening state information from the intelligent door lock; when the door opening state information is opened after a specific person enters a room independently, and the face recognition shows that the identity user cannot be determined to enter the room, the server marks the identity user as a company.
5. The system for recognizing abnormality in use status of a network contract room according to claim 4, wherein: the system also comprises a management terminal used for acquiring abnormal information of personnel and abnormal information of the residence time from the server.
6. The system for recognizing abnormality in usage state of a cyber-contracting room according to claim 5, wherein: the management terminal is also used for inputting the face recognition data of a specific person and storing the face recognition data in the server.
7. The system for recognizing abnormality in usage state of a cyber-contracting room according to claim 6, wherein: the authentication information includes one or more of bluetooth information, password information, and NFC information.
8. The system for recognizing abnormality in usage state of a cyber-contracting room according to claim 7, wherein: the first time threshold is 2-5 hours.
9. The system for recognizing abnormality in usage state of a cyber-contracting room according to claim 8, wherein: the server is also used for acquiring order information of the passenger, wherein the order information comprises check-in time, check-in duration and a call placing mobile phone model.
10. A method for recognizing an abnormality in a usage state of a cyber-concierge house, comprising using the system for recognizing an abnormality in a usage state of a cyber-concierge house according to any one of claims 1 to 9.
CN202011056821.9A 2020-09-30 2020-09-30 System and method for identifying abnormal use state of contract house Active CN112200940B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011056821.9A CN112200940B (en) 2020-09-30 2020-09-30 System and method for identifying abnormal use state of contract house

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011056821.9A CN112200940B (en) 2020-09-30 2020-09-30 System and method for identifying abnormal use state of contract house

Publications (2)

Publication Number Publication Date
CN112200940A true CN112200940A (en) 2021-01-08
CN112200940B CN112200940B (en) 2022-10-14

Family

ID=74007119

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011056821.9A Active CN112200940B (en) 2020-09-30 2020-09-30 System and method for identifying abnormal use state of contract house

Country Status (1)

Country Link
CN (1) CN112200940B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160180153A1 (en) * 2012-12-12 2016-06-23 Verint Systems Ltd. Time-in-store estimation using facial recognition
CN106846565A (en) * 2016-12-27 2017-06-13 中国计量大学 A kind of hotel occupancy safe-guard system
CN107195057A (en) * 2017-06-27 2017-09-22 天津市滨海新区军民融合创新研究院 A kind of intelligent access control system and its control method
CN109325885A (en) * 2018-12-04 2019-02-12 广东电网有限责任公司 A kind of self-service hotel register system
CN109741529A (en) * 2018-09-07 2019-05-10 盈奇科技(深圳)有限公司 A kind of unmanned gravity sensing sales counter settlement method
CN110211271A (en) * 2019-06-17 2019-09-06 浙江居利威物联科技有限公司 Net about room management method, management platform and system
CN111210546A (en) * 2018-11-22 2020-05-29 杭州海康威视数字技术股份有限公司 Access control management method and system realized by intelligent lock
CN111462369A (en) * 2020-03-06 2020-07-28 珠海格力电器股份有限公司 Hotel check-in management method and device, storage medium and computer equipment
CN111715546A (en) * 2020-06-23 2020-09-29 云南得禄供应链管理有限公司 Full-automatic quick sorting complete equipment of weighing of giving birth to bright

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160180153A1 (en) * 2012-12-12 2016-06-23 Verint Systems Ltd. Time-in-store estimation using facial recognition
CN106846565A (en) * 2016-12-27 2017-06-13 中国计量大学 A kind of hotel occupancy safe-guard system
CN107195057A (en) * 2017-06-27 2017-09-22 天津市滨海新区军民融合创新研究院 A kind of intelligent access control system and its control method
CN109741529A (en) * 2018-09-07 2019-05-10 盈奇科技(深圳)有限公司 A kind of unmanned gravity sensing sales counter settlement method
CN111210546A (en) * 2018-11-22 2020-05-29 杭州海康威视数字技术股份有限公司 Access control management method and system realized by intelligent lock
CN109325885A (en) * 2018-12-04 2019-02-12 广东电网有限责任公司 A kind of self-service hotel register system
CN110211271A (en) * 2019-06-17 2019-09-06 浙江居利威物联科技有限公司 Net about room management method, management platform and system
CN111462369A (en) * 2020-03-06 2020-07-28 珠海格力电器股份有限公司 Hotel check-in management method and device, storage medium and computer equipment
CN111715546A (en) * 2020-06-23 2020-09-29 云南得禄供应链管理有限公司 Full-automatic quick sorting complete equipment of weighing of giving birth to bright

Also Published As

Publication number Publication date
CN112200940B (en) 2022-10-14

Similar Documents

Publication Publication Date Title
CA2729193C (en) Access control system based upon behavioral patterns
CN108537922B (en) Visitor early warning method and system based on face recognition
US20110050876A1 (en) Method and apparatus for detecting behavior in a monitoring system
CN108399671A (en) A kind of Internet of Things vena metacarpea video gate inhibition integrated system
CN109167971A (en) Intelligent region monitoring alarm system and method
CN107809416A (en) Intelligent building safety control system and control method
CN106504374A (en) A kind of can automatic identification entrance guard security system
JP2019096179A (en) Behavior monitoring system
CN108537921B (en) Visitor identification method and system based on face identification
CN108537920B (en) Visitor monitoring method and system based on face recognition
CN110276320A (en) Guard method, device, equipment and storage medium based on recognition of face
CN109215191A (en) Nobody a kind of intelligent access control system and its working method on duty
WO2015099607A1 (en) An integrated access control and identity management system
CN109410386A (en) Unlocking processing method and device, storage medium and processor
KR101492799B1 (en) Entrance control integrated video recording system and method thereof
CN110580762A (en) Intelligent household access control system and method
JP2019080271A (en) Occupant monitoring system
CN112381676A (en) Check-in situation recognition system and method for network contract house
CN112200940B (en) System and method for identifying abnormal use state of contract house
CN112184964A (en) House management system and method based on intelligent door lock
EP3109837A1 (en) System and method of smart incident analysis in control system using floor maps
CN111612948A (en) Intelligent monitoring personnel access method, device, equipment and readable storage medium
CN206849125U (en) Intelligent access control system
CN106408690A (en) Nuclear power plant personnel entrance and exit control apparatus and nuclear power plant personnel entrance and exit control method
CN115913998A (en) PCTSE intelligent park state evaluation method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240125

Address after: No. 51 Qingci Road, Huayuan Street, Xinjin District, Chengdu City, Sichuan Province, 611735, Building 17, Building C, Floor 1, No. 40, D10 (self declared)

Patentee after: Beiniao Technology (Chengdu) Co.,Ltd.

Country or region after: China

Address before: 400042 No.4, 5th floor, building 3, No.79, Pipashan back street, Yuzhong District, Chongqing

Patentee before: Chongqing Yichang Technology Co.,Ltd.

Country or region before: China