CN112487395B - Method and device for setting offer codes - Google Patents

Method and device for setting offer codes Download PDF

Info

Publication number
CN112487395B
CN112487395B CN202011425215.XA CN202011425215A CN112487395B CN 112487395 B CN112487395 B CN 112487395B CN 202011425215 A CN202011425215 A CN 202011425215A CN 112487395 B CN112487395 B CN 112487395B
Authority
CN
China
Prior art keywords
offer
invitees
invitee
code
level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011425215.XA
Other languages
Chinese (zh)
Other versions
CN112487395A (en
Inventor
周勤
万涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Bayantu Information Technology Co ltd
Original Assignee
Shanghai Bayantu Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Bayantu Information Technology Co ltd filed Critical Shanghai Bayantu Information Technology Co ltd
Priority to CN202011425215.XA priority Critical patent/CN112487395B/en
Publication of CN112487395A publication Critical patent/CN112487395A/en
Application granted granted Critical
Publication of CN112487395B publication Critical patent/CN112487395B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9554Retrieval from the web using information identifiers, e.g. uniform resource locators [URL] by using bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Tourism & Hospitality (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • Data Mining & Analysis (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Economics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application discloses a method and a device for setting an offer code. The method includes entering a list of offers; generating an offer code according to a set rule; transmitting an offer sending request to clients corresponding to contact information of all invitees on the offer list; the invitee registers; after the registration is successful, the sponsor uses its identification device to identify the offer codes provided by the invitees. The present application addresses the problem of lack of efficient offer code identification services.

Description

Method and device for setting offer codes
Technical Field
The application relates to the technical field of offer codes, in particular to a method and a device for setting an offer code.
Background
At present, in a meeting or an exhibition, an offer code sent to an invitee generally needs to pass through a back-end service verification, and then the identity of a user and the authenticity of the offer code can be identified.
The inventor finds that in the process of verifying and identifying the identity of the user and the authenticity of the offer code in the back-end service, the identity and the authenticity of the offer code are identified, because in certain scenes, such as: if the network condition of the client is not good and the client cannot communicate with the back-end service, the offer codes cannot be identified in places with large flow of people such as airports, railway stations, conference sites and the like; based on security consideration, for some places such as important conferences and exhibitions, if the offer codes cannot be verified to be true or false, the pass cannot be realized, that is, the authenticity of the offer codes can be ensured only after verification of the server serving as a back end, and once the server cannot provide service, the spot access control system is paralyzed, personnel backlog is caused, and the smooth proceeding of the conferences or exhibitions is affected. The satisfaction degree of meeting participants to meetings and exhibitions is reduced.
Aiming at the problem of lack of effective offer code identification service in the related art, no effective solution is proposed at present.
Disclosure of Invention
The main objective of the present application is to provide a method and apparatus for setting an offer code, so as to solve the problem of lack of an effective offer code identification service.
To achieve the above object, according to one aspect of the present application, there is provided a method of setting an offer code.
The method for setting the offer codes comprises the following steps: entering an offer list; generating an offer code according to a set rule; transmitting an offer sending request to clients corresponding to contact information of all invitees on the offer list; the invitee registers; after the registration is successful, the sponsor uses its identification device to identify the offer codes provided by the invitees.
Further, the invitee list contains the contact information of the invitees, the contact information is used for sending the invitees serving as the invitees to the invitees, in the invitees list, the level of the meeting or the participating of the invitees can be specified, the level of the meeting or the participating exists in the visited system, and the level of the meeting or the participating is used for providing corresponding services in a targeted manner.
Further, the generated offer code contains the following information: the invited person as a participant has a meeting or showcase level, an encrypted mobile phone number and an encrypted mailbox number, and a check code generated together with the meeting or showcase level of the invited person, the encrypted mobile phone number and the encrypted mailbox number.
Further, the generated offer code can be a character string or a two-dimensional code.
Further, the offer transmission request contains visited system information including URLs or applets for participating or enrolling in, and generated offer code information.
Further, the interview system can automatically identify the level of the meeting or the exhibition of the invitee, the mobile phone number and the mailbox information of the invitee according to the invitee code information, and then automatically fill the automatically identified information into the form.
Further, the sponsor identifying, with its identification device, the offer code provided by the invitee, comprising: the identification equipment of the sponsor identifies the offer codes provided by the invitees and verifies the identity of the invitees and the authenticity of the offer codes.
To achieve the above object, according to another aspect of the present application, there is provided an apparatus for setting an offer code, the apparatus comprising:
the input module is used for inputting an offer list;
the generation module is used for generating an offer code according to a set rule;
the sending module is used for sending the offer sending request to the clients corresponding to the contact information of all the invitees on the offer list;
the registration module is used for registering the invitee;
and the identification module is used for identifying the offer codes provided by the invitees by the sponsor.
Further, the logging module is applied to a visited system; the generation module is applied to a visited system; the sending module is applied to a visited system; the registration module is used on the client of the invitee; the identification module is applied to identification equipment of the sponsor.
In the embodiment of the application, the identity of the participant can be normally verified through the offer code when the client cannot communicate with the server under certain specific conditions, the smooth and safe progress and safety of the conference and the exhibition site are ensured, the satisfaction degree of the participant to the conference or the exhibition is improved, the problem that the existing participant offers cannot identify the offer code offline under specific conditions to verify the authenticity of the participant is solved, and the technical problem that the effective offer code identification service is lacking is solved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, are included to provide a further understanding of the application and to provide a further understanding of the application with regard to the other features, objects and advantages of the application. The drawings of the illustrative embodiments of the present application and their descriptions are for the purpose of illustrating the present application and are not to be construed as unduly limiting the present application. In the drawings:
FIG. 1 is a flow chart of a method of setting an offer code according to the present application;
fig. 2 is a block diagram of an apparatus for setting an offer code according to the present application.
Detailed Description
In order to make the present application solution better understood by those skilled in the art, the following description will be made in detail and with reference to the accompanying drawings in the embodiments of the present application, it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate in order to describe the embodiments of the present application described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In the present application, the terms "upper", "lower", "left", "right", "front", "rear", "top", "bottom", "inner", "outer", "middle", "vertical", "horizontal", "lateral", "longitudinal" and the like indicate an azimuth or a positional relationship based on that shown in the drawings. These terms are used primarily to better describe the present application and its embodiments and are not intended to limit the indicated device, element or component to a particular orientation or to be constructed and operated in a particular orientation.
Also, some of the terms described above may be used to indicate other meanings in addition to orientation or positional relationships, for example, the term "upper" may also be used to indicate some sort of attachment or connection in some cases. The specific meaning of these terms in this application will be understood by those of ordinary skill in the art as appropriate.
Furthermore, the terms "mounted," "configured," "provided," "connected," "coupled," and "sleeved" are to be construed broadly. For example, it may be a fixed connection, a removable connection, or a unitary construction; may be a mechanical connection, or an electrical connection; may be directly connected, or indirectly connected through intervening media, or may be in internal communication between two devices, elements, or components. The specific meaning of the terms in this application will be understood by those of ordinary skill in the art as the case may be.
According to the method for setting the offer codes, the set offer codes are used, different codes in each section can be used for representing different identities and roles of the invitees, and the codes are used for identifying the identities of the invitees through the offer codes when the invitees are registered in a participant or a participant, so that the information which the invitees need to fill in can be determined. The offer code can also be used as the identity code of the participant, and identity and information can be identified offline through the offer code when signing in and exchanging business cards.
It should be noted that, in the case of no conflict, the embodiments and features in the embodiments may be combined with each other. The present application will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
As shown in fig. 1, the method includes steps S101 to S105 as follows:
s101, inputting an offer list;
in particular, the list of entered offers is a list of offers entered in a visited system, preferably comprising contact information of the invitees for sending the invitees as an object of the offers to the invitees, in which list the level of the invitees' involvement or participation, which is already present in the visited system, for targeted provision of the corresponding services, can be specified. The visited system is generally in the background of offer management, and can be recorded by adopting a PC or a mobile phone. The contact information of the invitee is: the basic information such as name, mobile phone number, mailbox or ID card number can also contain other personal information such as company, job or title. For meetings or exhibitions, the level of the meeting or exhibition generally determines the service treatment that the meeting can enjoy, and the service treatment can be generally classified into SVIP, VIP, common guests, media or accompanying personnel. The level of the participant or exhibition is used for targeted provision of corresponding services, for example, one-to-one pick-up service, free hotel accommodation service, can be provided for high-level participants or exhibitors.
Step S102, generating an offer code according to a set rule;
preferably, the generated offer code contains the following information: the invited person as a participant has a meeting or showcase level, an encrypted mobile phone number and an encrypted mailbox number, and a check code generated together with the meeting or showcase level of the invited person, the encrypted mobile phone number and the encrypted mailbox number. The generated offer codes are in one-to-one correspondence with the offer records in the offer list. Preferably, the generated offer code can be a character string or a two-dimensional code. Under the condition that the generated offer code is a character string, for example, the meeting or exhibition level of the invitee can be a character string "tnctup", the encrypted mobile phone number can be a character string "7Du5R", the encrypted mailbox number can be a character string "9Tyr3", and the check code can be a character string "H73dR". The encryption method as the set rule may be: the json character string is used, the character string format is that the participant level (integer of 0-99) +the mobile phone number+the mailbox, the encryption is carried out by using an AES128 algorithm, the key is used for creating a character string generated by using an MD5 digest algorithm for the ID (GUID) +the conference or the exhibition of each conference or exhibition, and the cipher text is generated.
Json string example: { l: '01', m: '1990000001', e: 'alfre@gmail.com' }
Step S103, sending an offer sending request to clients corresponding to the contact information of all invitees on the offer list;
specifically, the request for sending the offer is sent to the clients corresponding to the contact information of all the invitees on the offer list, wherein preferably, the request for sending the offer contains visited system information and generated offer code information, and the visited system information comprises a URL or an applet for participating in or participating in registration. In addition, the request for sending the offer may be an offer to the participant or the exhibitor by means of a short message, a mail, a micro message, or the like, and the request includes the visited system information and the generated offer code information, where the visited system information includes URL, applet, or registration time for participant or exhibitor registration.
Step S104, the invitee registers;
specifically, the invitee registers by accessing the visited system through the client thereof, preferably, the visited system can automatically identify the level of the meeting or the exhibition of the invitee, the mobile phone number and the mailbox information of the invitee according to the information of the invitee code, and then automatically fill the automatically identified information into a form. In addition, the access mode can be to access the URL used for participating or participating registration as a webpage through a PC (personal computer) or a mobile phone serving as a client.
Step S105, after the registration is successful, the sponsor uses the identification equipment to identify the offer codes provided by the invitees.
Specifically, after the invitee registers for a participant or performs a participant, the sponsor preferably uses its identification device to identify the offer code provided by the invitee, which includes: the sponsor can use the identifying equipment such as the mobile phone, the tablet computer or the gate access control machine to identify the offer codes provided by the invitees in places such as airports, stations, conference exhibition sites and the like, and verify the identity of the invitees and the authenticity of the offer codes without being verified by a server. In addition, the identifying mode can be as follows: the identification equipment is used for storing the decrypted key in advance, and identifying the character string of the offer code by scanning the two-dimensional code and decrypting to obtain a plaintext.
From the above description, it can be seen that the following technical effects are achieved:
in the embodiment of the application, the interview system sends the solicited message to the interviewee, wherein the solicited message can contain the access link of the interview system, and the interview code can be directly identified by directly using the access link without inputting; after successful registration, the offer codes can be directly used as the check-in certificates of the invitees for check-in places such as reception, entrance and the like; under the condition of no network, the client can directly identify the meeting or exhibition level of the invited person, the mobile phone and the mailbox according to the offer codes, so that the reception personnel of the host can rapidly provide services for the invited person, the satisfaction degree is improved, and the technical problem of lack of a method for effectively setting the offer codes by virtual characters is solved.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
There is also provided, according to an embodiment of the present application, an apparatus for implementing the method for setting an offer code, as shown in fig. 2, where the apparatus includes:
an entry module 10 for entering a list of offers;
a generation module 20, configured to generate an offer code according to a set rule;
a sending module 30, configured to send an offer sending request to clients corresponding to contact information of all invitees on the offer list;
a registration module 40 for registering the invitee;
and an identification module 50 for the sponsor to identify the offer codes provided by the invitees.
Preferably, the logging module 10 is employed on a visited system; the generation module 20 is used on the visited system; the transmission module 30 is used on the visited system; the registration module 40 is applied on the client of the invitee; the identification module 50 is employed on the identification device of the host. The identification device is typically a mobile phone, a tablet computer, a handheld android machine or a gate machine (android device) and the like,
the sending module 30 in this embodiment sends an offer sending request to clients corresponding to contact information of all invitees on the offer list, where the offer sending request includes visited system information and generated offer code information, where the visited system information includes URL, applet or registration time for participating in or participating in registration, and the offer code can be directly identified without inputting by directly using URL or applet for participating in or participating in registration. In addition, under the condition of no network, the client can directly identify the meeting or exhibition level of the invited person, the mobile phone and the mailbox according to the offer code, so that the receptionist can rapidly provide services for the meeting person, and the satisfaction degree is improved; after registration by the registration module 40, the offer code can be directly used as a sign-in certificate of the invitee for sign-in places such as reception, entrance and the like.
It will be apparent to those skilled in the art that the modules or steps of the application described above may be implemented in a general purpose computing device, they may be centralized on a single computing device, or distributed across a network of computing devices, or they may alternatively be implemented in program code executable by computing devices, such that they may be stored in a memory device and executed by computing devices, or individually fabricated as individual integrated circuit modules, or multiple modules or steps within them may be fabricated as a single integrated circuit module. Thus, the present application is not limited to any specific combination of hardware and software.
The foregoing description is only of the preferred embodiments of the present application and is not intended to limit the same, but rather, various modifications and variations may be made by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principles of the present application should be included in the protection scope of the present application.

Claims (6)

1. A method of setting an offer code, comprising: entering an offer list; generating an offer code according to a set rule;
the encryption mode of the set rule is as follows: the json character string is used, the format of the character string is that the participant level, the mobile phone number and the mailbox are encrypted by using an AES128 algorithm, a key is used for creating a timestamp for the ID of each conference or exhibition, and the character string generated by using an MD5 abstract algorithm is used for generating ciphertext;
transmitting an offer sending request to clients corresponding to contact information of all invitees on the offer list; the invitee registers; after the registration is successful, the sponsor uses the identification equipment to identify the offer codes provided by the invitees;
the sponsor identifying, with its identification device, an offer code provided by the invitee, comprising: the identity of the invitee and the authenticity of the invitee are verified by using the identification equipment to identify the invitee code provided by the invitee, and the identity of the invitee are not required to be verified by a server; in addition, the identification mode is as follows: the identification equipment is used for storing the decrypted key in advance, identifying the character string of the offer code by scanning the two-dimensional code and decrypting to obtain a plaintext;
the invitee list comprises the contact information of the invitees, the contact information is used for sending the invitees serving as the invitees to the invitees, in the invitees list, the level of the participation or the participation of the invitees can be designated, the level of the participation or the participation exists in the visited system, and the level of the participation or the participation is used for providing corresponding services in a targeted manner;
the generated offer code contains the following information: the invited person as a participant has a meeting or showcase level, an encrypted mobile phone number and an encrypted mailbox number, and a check code generated together with the meeting or showcase level of the invited person, the encrypted mobile phone number and the encrypted mailbox number.
2. The method of setting an offer code according to claim 1, wherein the offer transmission request contains visited system information including URL or applet for participating or enrolling in, and generated offer code information.
3. The method of setting an offer code according to claim 1, wherein the interview system automatically identifies the level of the invitee's participation or exhibition, the mobile phone number of the invitee, and the mailbox information based on the offer code information, and then automatically populates the form with the automatically identified information.
4. An apparatus for setting an offer code, the apparatus comprising:
the input module is used for inputting an offer list;
the invitee list comprises the contact information of the invitees, the contact information is used for sending the invitees serving as the invitees to the invitees, in the invitees list, the level of the participation or the participation of the invitees can be designated, the level of the participation or the participation exists in the visited system, and the level of the participation or the participation is used for providing corresponding services in a targeted manner;
the generation module is used for generating an offer code according to a set rule;
the encryption mode of the set rule is as follows: the json character string is used, the format of the character string is that the participant level, the mobile phone number and the mailbox are encrypted by using an AES128 algorithm, a key is used for creating a timestamp for the ID of each conference or exhibition, and the character string generated by using an MD5 abstract algorithm is used for generating ciphertext;
the generated offer code contains the following information: the invited person as the participant has a meeting or showcase level, an encrypted mobile phone number and an encrypted mailbox number, and a check code which is generated together with the meeting or showcase level of the invited person, the encrypted mobile phone number and the encrypted mailbox number;
the sending module is used for sending the offer sending request to the clients corresponding to the contact information of all the invitees on the offer list;
the registration module is used for registering the invitee;
and an identification module for a host to identify the offer codes provided by the invitees, the host identifying the offer codes provided by the invitees with its identification device, comprising: the identity of the invitee and the authenticity of the invitee are verified by using the identification equipment to identify the invitee code provided by the invitee, and the identity of the invitee are not required to be verified by a server; in addition, the identification mode is as follows: the identification equipment is used for storing the decrypted key in advance, and identifying the character string of the offer code by scanning the two-dimensional code and decrypting to obtain a plaintext.
5. The apparatus for setting an offer code of claim 4, wherein the logging module is employed on a visited system; the generation module is applied to a visited system; the sending module is applied to a visited system; the registration module is used on the client of the invitee; the identification module is applied to identification equipment of the sponsor.
6. A computer storage medium having stored thereon computer executable instructions for performing the method of setting an offer code of any one of claims 1 to 3.
CN202011425215.XA 2020-12-08 2020-12-08 Method and device for setting offer codes Active CN112487395B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011425215.XA CN112487395B (en) 2020-12-08 2020-12-08 Method and device for setting offer codes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011425215.XA CN112487395B (en) 2020-12-08 2020-12-08 Method and device for setting offer codes

Publications (2)

Publication Number Publication Date
CN112487395A CN112487395A (en) 2021-03-12
CN112487395B true CN112487395B (en) 2024-04-12

Family

ID=74940468

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011425215.XA Active CN112487395B (en) 2020-12-08 2020-12-08 Method and device for setting offer codes

Country Status (1)

Country Link
CN (1) CN112487395B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CL2010001504A1 (en) * 2009-12-22 2011-03-11 Autopista Concesionaria Espanola S A Method to validate transactions through a payment card on a toll road.
CN104506562A (en) * 2015-01-13 2015-04-08 东北大学 Two-dimension code and face recognition fused conference identity authentication device and method
CN105187486A (en) * 2015-08-02 2015-12-23 北京云动数字媒体技术有限公司 Semi-offline conference activity signing-in method and system
CN106056717A (en) * 2016-06-16 2016-10-26 广州地理研究所 System and method for scanning and verifying codes in offline manner
CN106850520A (en) * 2016-04-18 2017-06-13 中国科学院信息工程研究所 A kind of implementation method for encrypting voice conferencing
CN108428271A (en) * 2018-05-15 2018-08-21 上海高屋信息科技有限公司 Double offline identity authorization systems based on Quick Response Code
CN108573343A (en) * 2018-03-30 2018-09-25 平安科技(深圳)有限公司 A kind of method, apparatus of conference management, terminal device and storage medium
CN109003362A (en) * 2018-07-03 2018-12-14 广州启盟信息科技有限公司 A kind of visitor invites passing method, device, system and storage medium
CN111131433A (en) * 2019-12-20 2020-05-08 厦门瑞为信息技术有限公司 Visitor management system and method based on cloud edge cooperation

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CL2010001504A1 (en) * 2009-12-22 2011-03-11 Autopista Concesionaria Espanola S A Method to validate transactions through a payment card on a toll road.
CN104506562A (en) * 2015-01-13 2015-04-08 东北大学 Two-dimension code and face recognition fused conference identity authentication device and method
CN105187486A (en) * 2015-08-02 2015-12-23 北京云动数字媒体技术有限公司 Semi-offline conference activity signing-in method and system
CN106850520A (en) * 2016-04-18 2017-06-13 中国科学院信息工程研究所 A kind of implementation method for encrypting voice conferencing
CN106056717A (en) * 2016-06-16 2016-10-26 广州地理研究所 System and method for scanning and verifying codes in offline manner
CN108573343A (en) * 2018-03-30 2018-09-25 平安科技(深圳)有限公司 A kind of method, apparatus of conference management, terminal device and storage medium
CN108428271A (en) * 2018-05-15 2018-08-21 上海高屋信息科技有限公司 Double offline identity authorization systems based on Quick Response Code
CN109003362A (en) * 2018-07-03 2018-12-14 广州启盟信息科技有限公司 A kind of visitor invites passing method, device, system and storage medium
CN111131433A (en) * 2019-12-20 2020-05-08 厦门瑞为信息技术有限公司 Visitor management system and method based on cloud edge cooperation

Also Published As

Publication number Publication date
CN112487395A (en) 2021-03-12

Similar Documents

Publication Publication Date Title
CN109120597B (en) Identity verification and login method and device and computer equipment
CN102317903B (en) Use social information that user conversation is authenticated
CN1685371B (en) Image recognition
US20090300122A1 (en) Augmented reality collaborative messaging system
US20130276140A1 (en) Transaction system for business and social networking
CN111352740B (en) Application interaction processing method and device
CN109565640A (en) The service based on privately owned position of safety
CN106780782B (en) Method, system and equipment based on the ticket checking scheme progress ticket checking that server is recommended
CN106060073B (en) Channel key machinery of consultation
US20200137004A1 (en) Systems, methods and computer program products for providing enhanced chat services
CN107277812A (en) A kind of wireless network authentication method and system based on Quick Response Code
CN107248084A (en) Ticketing service method for managing security and device
CN107196896A (en) Method for managing user right and device
CN108898728A (en) Intelligent interaction device and its voting method, device and system
CN110321730A (en) A kind of method, block chain node and the storage medium of operation data processing
CN105894640A (en) Guest room door lock management method and device
JP2006048390A (en) Method and system for authenticating two-dimensional code user
CN106060097A (en) Management system and management method for information security competition
CN108650223A (en) A kind of point-to-point authentic authentication method of the network equipment and system
US10867326B2 (en) Reputation system and method
CN107135076A (en) A kind of participatory of without TTP perceives incentive mechanism implementation method
CN103714454A (en) Queuing and payment system
Jan An improved lightweight privacy preserving authentication scheme for SIP-Based-VoIP using smart card
Carbunar et al. A survey of privacy vulnerabilities and defenses in geosocial networks
CN106790305B (en) The system and method for differential service authentication charging

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Zhou Qin

Inventor after: Wan Tao

Inventor before: Zhou Qin

CB03 Change of inventor or designer information
GR01 Patent grant
GR01 Patent grant