CN113285913A - Data acquisition method and system based on intelligent lock, electronic equipment and storage medium - Google Patents
Data acquisition method and system based on intelligent lock, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN113285913A CN113285913A CN202110177078.0A CN202110177078A CN113285913A CN 113285913 A CN113285913 A CN 113285913A CN 202110177078 A CN202110177078 A CN 202110177078A CN 113285913 A CN113285913 A CN 113285913A
- Authority
- CN
- China
- Prior art keywords
- user
- information
- check
- identity information
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 238000004891 communication Methods 0.000 claims abstract description 28
- 230000006698 induction Effects 0.000 claims abstract description 25
- 238000012544 monitoring process Methods 0.000 claims abstract description 13
- 230000009471 action Effects 0.000 claims abstract description 11
- 230000005540 biological transmission Effects 0.000 claims abstract description 9
- 230000006870 function Effects 0.000 claims description 28
- 238000013475 authorization Methods 0.000 claims description 12
- 230000014759 maintenance of location Effects 0.000 claims description 3
- 238000007667 floating Methods 0.000 abstract description 8
- 238000012545 processing Methods 0.000 abstract description 5
- 230000004308 accommodation Effects 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 6
- 208000001613 Gambling Diseases 0.000 description 4
- 238000004590 computer program Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 3
- 230000005611 electricity Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000008450 motivation Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000035945 sensitivity Effects 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/16—Real estate
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0225—Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Primary Health Care (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- General Engineering & Computer Science (AREA)
- Development Economics (AREA)
- Educational Administration (AREA)
- Biomedical Technology (AREA)
- Medical Informatics (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention relates to the field of data processing, and provides a data acquisition method, a system, electronic equipment and a storage medium based on an intelligent lock, wherein the method comprises the steps of feeding back a house selection interface of a user according to authentication information for the user to submit a check-in order; signing a check-in contract for the user according to the check-in order, and uploading the check-in contract to a house administrative department for filing; monitoring whether an object to be identified exists in an induction range of the intelligent lock in real time, and starting an information acquisition function of an identity information acquisition unit and a data transmission function of a wireless communication unit when monitoring exists; respectively uploading the identity information to a related department system, a database and a block chain platform in real time through a wireless communication unit; and comparing whether the identity information is consistent with preset information stored in a database in advance, and controlling the lock cylinder driving unit to execute unlocking action when the identity information is consistent with the preset information. The method and the system can facilitate relevant departments to realize analysis of the trajectories of key attention crowds and personnel for floating population in places such as rental houses, resident accommodations, apartments and the like.
Description
Technical Field
The invention relates to the field of data processing, in particular to a data acquisition method and system based on an intelligent lock, electronic equipment and a storage medium.
Background
At present, the number of the national floating population is as high as 2.47 hundred million, which accounts for 18 percent of the total population, while the number of the population adopting the house renting to solve the living problem is about 1.6 hundred million, the floating population management and service are brought into the overall plan of the development of the economic society, and the current requirements of tedious check-in registration and frequent floating access management are very urgent; in suburbs, a large number of mobile personnel without fixed occupation are gathered, and the source and the destination of the mobile personnel cannot be comprehensively known.
With the increase of floating population, how to facilitate relevant departments to realize important attention groups (for example, people who have bad records in relevant department systems) and personnel trajectory analysis on floating population in places such as rental houses, lodging residences and apartments becomes a technical problem which needs to be solved urgently.
Disclosure of Invention
The invention mainly aims to provide a data acquisition method, a data acquisition system, electronic equipment and a storage medium based on an intelligent lock, and aims to solve the problem of how to facilitate related departments to realize analysis of tracks of key attention people and personnel for floating population in places such as rental houses, lodging residents, apartments and the like.
In order to achieve the above object, the present invention provides a data acquisition method based on an intelligent lock, which includes:
an authentication step: receiving a user check-in request sent by a user, analyzing the user check-in request to obtain authentication information authenticated by a real name, and feeding back a user house selected interface according to the authentication information for the user to submit a check-in order;
a recording step: signing a check-in contract for the user according to the check-in order, and uploading the check-in contract to a house administrative department for record;
a monitoring step: monitoring whether an object to be identified exists in an induction range of the intelligent lock in real time, and starting an information acquisition function of an identity information acquisition unit of the intelligent lock and a data transmission function of a wireless communication unit when the object to be identified exists in the induction range;
an acquisition step: acquiring identity information input by a current user by using the information acquisition unit, and uploading the identity information to a related department system, a database and a block chain platform respectively in real time through the wireless communication unit;
an unlocking step: and comparing whether the identity information is consistent with preset information stored in a database in advance, and controlling a lock cylinder driving unit of the intelligent lock to execute an unlocking action when the identity information is consistent with the preset information.
Preferably, the authentication information includes a user name, an identification card image, a user face image feature and a fingerprint feature.
Preferably, the real-name authentication step of the authentication information includes:
uploading the authentication information of the user to a third party authority trusted identity authentication platform, judging whether the user name, the identity card image, the user face image feature and the fingerprint feature in the authentication information are the same person information or not through the third party authority trusted identity authentication platform, if so, determining that the user real-name authentication is successful and storing the authentication information into the database.
Preferably, the method further comprises the step of authorizing:
after the check-in contract is signed, giving a door lock authority to the identity information corresponding to the user signing the check-in contract, generating an authorization record of the door lock authority, and uploading the authorization record to the block chain platform; and
and canceling the door lock authority corresponding to the landlord signing the check-in contract.
Preferably, the method further comprises the step of defining:
and limiting the information acquisition function of the identity information acquisition unit to be started when the retention time of the object to be identified in the sensing area is monitored to be longer than or equal to the preset time.
Preferably, the information acquisition unit comprises one or more of a fingerprint identification unit, an induction card reading unit and a touch keyboard;
the fingerprint identification unit is used for collecting fingerprint characteristic values of users, the induction card reading unit is used for collecting entrance guard card information of the users, and the touch keyboard is used for collecting pattern information or digital information input by the users.
Preferably, the method further comprises the statistical step of:
and carrying out timing statistics on unlocking records of the user acquired based on the intelligent lock, and creating a record table according to the unlocking records and uploading the record table to the relevant department system, wherein the unlocking records comprise identity information, unlocking time and unlocking frequency.
In order to achieve the above object, the present invention further provides a data acquisition system based on an intelligent lock, including:
the authentication module is used for receiving a user check-in request sent by a user, analyzing the user check-in request to obtain authentication information authenticated by a real name, and feeding back a user house selected interface according to the authentication information for the user to submit a check-in order;
the record module is used for signing a check-in contract for the user according to the check-in order and uploading the check-in contract to a house governing department for record;
the monitoring module is used for monitoring whether an object to be identified exists in an induction range of the intelligent lock in real time, and starting an information acquisition function of an identity information acquisition unit of the intelligent lock and a data transmission function of a wireless communication unit when the object to be identified exists in the induction range;
the acquisition module is used for acquiring the identity information input by the current user by using the information acquisition unit and respectively uploading the identity information to a related department system, a database and a block chain platform in real time through the wireless communication unit;
and the unlocking module is used for comparing whether the identity information is consistent with preset information stored in a database in advance or not, and controlling the lock cylinder driving unit of the intelligent lock to execute unlocking action when the identity information is consistent with the preset information.
In order to achieve the above object, the present invention further provides an electronic device, which includes a memory and a processor, wherein the memory stores a data acquisition program based on the smart lock, and the data acquisition program based on the smart lock, when executed by the processor, implements the steps of the data acquisition method based on the smart lock.
To achieve the above object, the present invention further provides a computer-readable storage medium, which stores thereon a smart lock-based data acquisition program, which is executable by one or more processors to implement the steps of the smart lock-based data acquisition method as described above.
According to the data acquisition method, the data acquisition system, the electronic equipment and the storage medium based on the intelligent lock, the user check-in request sent by the user is received, the user check-in request is analyzed to obtain the authentication information authenticated by the real name, and the selected house interface of the user is fed back according to the authentication information to allow the user to submit a check-in order; signing a check-in contract for the user according to the check-in order, and uploading the check-in contract to a house administrative department for record; monitoring whether an object to be identified exists in an induction range of the intelligent lock in real time, and starting an information acquisition function of an identity information acquisition unit of the intelligent lock and a data transmission function of a wireless communication unit when the object to be identified exists in the induction range; acquiring identity information input by a current user by using the information acquisition unit, and uploading the identity information to a related department system, a database and a block chain platform respectively in real time through the wireless communication unit; and comparing whether the identity information is consistent with preset information stored in a database in advance, and controlling a lock cylinder driving unit of the intelligent lock to execute an unlocking action when the identity information is consistent with the preset information. According to the intelligent lock, the identity information acquisition unit and the wireless communication unit are in the dormant state when the situation that an object to be identified approaches is not sensed in the sensing range of the intelligent lock, so that the purpose of saving electricity is achieved, meanwhile, lawless persons can be prevented from invading a processor of the intelligent lock through the wireless communication unit in the connected state to tamper data or maliciously control the door lock to open, lawless acts are implemented, and meanwhile, the analysis of tracks of people and personnel which are concerned mainly by floating population in places such as rental houses, resident rooms and apartments can be achieved conveniently by relevant departments.
Drawings
Fig. 1 is a schematic flowchart of a data acquisition method based on an intelligent lock according to an embodiment of the present invention;
FIG. 2 is a block diagram of a data acquisition system based on an intelligent lock according to an embodiment of the present invention;
fig. 3 is a schematic diagram of an internal structure of an electronic device implementing the data acquisition method based on the smart lock according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical embodiments and advantages of the present invention more apparent, the present invention will be described in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the description relating to "first", "second", etc. in the present invention is for descriptive purposes only and is not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, the technical embodiments of the present invention may be combined with each other, but it must be based on the realization of those skilled in the art, and when the combination of the technical embodiments contradicts each other or cannot be realized, such combination of the technical embodiments should be considered to be absent and not within the protection scope of the present invention.
The invention provides a data acquisition method based on an intelligent lock. Fig. 1 is a schematic flow chart of a data acquisition method based on an intelligent lock according to an embodiment of the present invention. The method may be performed by a system, which may be implemented by software and/or hardware.
In this embodiment, the data acquisition method based on the smart lock includes:
s110, receiving a user check-in request sent by a user, analyzing the user check-in request to obtain authentication information authenticated by a real name, and feeding back a user house selection interface according to the authentication information for the user to submit a check-in order.
In this embodiment, a user may initiate a user check-in request to a server through a client (e.g., a mobile phone) with a built-in third-party APP, and the server analyzes the user check-in request to obtain authentication information authenticated by a real name, where the type of the authentication information includes a user name, an identification card image, a user face image feature, and a fingerprint feature. The authentication information after real-name authentication represents that the information source is legal, and at this time, a user check-in procedure can be further provided for the user, and the user house selection interface is sent to a client of the user, such as a mobile phone, so that the user submits a check-in order.
The types of the authentication information comprise user names, identity card images, user face image characteristics and fingerprint characteristics.
The real-name authentication step of the authentication information comprises the following steps: uploading the authentication information of the user to a trusted identity authentication platform (such as CTID) of a third party authority, judging whether the user name, the identity card image, the user face image characteristic and the fingerprint characteristic in the authentication information are the same person information or not through the trusted identity authentication platform of the third party authority, if so, determining that the real-name authentication of the user is successful and storing the authentication information into a database.
Whether the identity information of the user is real or not is judged by judging whether the user name, the identity card image, the face image feature and the fingerprint feature are the same person or not, and compared with the existing authentication mode, the authentication result reliability of the authentication mode adopted by the method is higher. For example, most of the existing authentication methods identify whether an identity card number and a name in an identity card uploaded by a user are matched through an OCR technology, and then determine whether identity information of the user is real, and the authentication methods are difficult to determine whether the identity information is true or false, and identity card information is easy to be faked.
And S120, signing a check-in contract for the user according to the check-in order, and uploading the check-in contract to a house governing department for record.
In the embodiment, the user can more conveniently handle the check-in service by signing the contract online and reporting the contract to the local building office for network signing, namely, the record registration service, without needing to go to the window of the building office in person for handling.
After all the check-in services are transacted, the method also comprises the following authorization steps:
after the check-in contract is signed, giving a door lock authority to the identity information corresponding to the user signing the check-in contract, generating an authorization record of the door lock authority, uploading the authorization record to a block chain platform, and storing the block chain platform for recording the house contract, so that the house contract is prevented from being tampered by other useful house owners, and the house owners can be prevented from refusing to not acknowledge the real existence of the contract; and
the door lock authority corresponding to the landlord signing in the contract is cancelled, the unlocking authority is automatically transferred to the user from the landlord, and the housing right of the user is guaranteed.
S130, whether an object to be identified exists in the sensing range of the intelligent lock is monitored in real time, and when the object to be identified exists in the sensing range, the information acquisition function of the identity information acquisition unit of the intelligent lock and the data transmission function of the wireless communication unit are started.
In this embodiment, whether the intelligence lock accessible ultrasonic sensor real-time supervision its induction range has the thing of waiting to discern, the person who waits to discern the motivation unblank that the thing indicates. When the object to be identified exists in the sensing range of the ultrasonic sensor, the intelligent lock automatically starts the information acquisition function of the identity information acquisition unit.
The information acquisition unit comprises one or more of a fingerprint identification unit, an induction card reading unit and a touch keyboard. The fingerprint identification unit is used for collecting a fingerprint characteristic value of a user, the induction card reading unit is used for collecting entrance guard card information of the user, and the touch keyboard is used for collecting pattern information or digital information input by the user.
The wireless communication unit is one or more of a 4G module, a 5G module, a WiFi module and a Bluetooth module.
The information acquisition unit and the wireless communication unit are in a dormant state when the ultrasonic sensor does not sense that the object to be identified is close to the intelligent lock, so that the purpose of saving electricity is achieved, meanwhile, lawless persons can be prevented from invading a processor of the intelligent lock through the wireless communication unit in a connected state to tamper data or maliciously control the door lock to be opened, and lawless acts are implemented.
In another embodiment, the method further comprises the defining step of:
the information acquisition function of the identity information acquisition unit is limited to be started when the ultrasonic sensor monitors that the stay time of the object to be identified in the sensing area is greater than or equal to a preset time (for example, 5 seconds), so that the condition that the ultrasonic sensor is triggered by mistake due to overhigh sensitivity is avoided.
And S140, acquiring the identity information input by the current user by using the information acquisition unit, and uploading the identity information to a related department system, a database and a block chain platform respectively in real time through the wireless communication unit.
In this embodiment, the identity information acquired by the information acquisition unit is uploaded to a relevant department system in real time, so that the relevant department can conveniently perform analysis on key attention crowds (for example, people with bad records in the relevant department system) and personnel trajectories, and perform social security and precaution and other work. The identity information acquired by the information acquisition unit is uploaded to a database in real time, so that identity information comparison can be conveniently carried out subsequently. The identity information acquired by the information acquisition unit is uploaded to the block chain platform in real time, so that data is prevented from being tampered, and data security is improved.
In another embodiment, the method further comprises the statistical step of:
and carrying out timing statistics on the unlocking records of the user acquired based on the intelligent lock, and creating a record table according to the unlocking records and uploading the record table to a relevant department system, wherein the unlocking records comprise identity information, unlocking time and unlocking frequency. By automatically counting the unlocking frequency of the recorded data in each time period, the method is convenient for the personnel in the relevant department to judge whether a resident abnormally unlocked exists, for example, the total number of times of unlocking frequency is more than 4 times when 1 point in the morning appears in the continuous time of a week, and the resident has bad records, such as crowd gambling, at the moment, the suspected user is possible to play the crowd gambling, and the personnel in the relevant department can make judgment in advance.
S150, comparing whether the identity information is consistent with preset information stored in a database in advance, and controlling a lock cylinder driving unit of the intelligent lock to execute an unlocking action when the identity information is consistent with the preset information.
In this embodiment, by comparing whether the identity information acquired by the information acquisition unit is consistent with preset information pre-stored in a database, when the judgment result shows that the identity information is consistent with the preset information, the lock cylinder driving unit of the intelligent lock is controlled to execute an unlocking action, otherwise, the lock is kept in a locked state.
For the detailed description of the above steps, please refer to the following description of fig. 2 regarding a schematic diagram of program modules of an embodiment of the smart-lock-based data acquisition program 10 and fig. 3 regarding a schematic diagram of a method flow of an embodiment of a smart-lock-based data acquisition method.
Referring now to FIG. 2, a functional block diagram of the smart lock based data acquisition system 100 of the present invention is shown.
The smart lock-based data acquisition system 100 of the present invention may be installed in the electronic device 1. Depending on the implemented functionality, the smart lock-based data acquisition system 100 may include an authentication module 110, a docketing module 120, a detection module 130, an acquisition module 140, and an unlocking module 150. The module of the invention, which may also be referred to as a unit, is a series of computer program segments that can be executed by a processor of the electronic device 1 and that can perform a fixed function, and is stored in a memory of the electronic device 1.
In the present embodiment, the functions regarding the respective modules/units are as follows:
the authentication module 110 is configured to receive a user check-in request sent by a user, analyze the user check-in request to obtain authentication information authenticated by a real name, and feed back a user house selection interface according to the authentication information to allow the user to submit a check-in order.
In this embodiment, a user may initiate a user check-in request to a server through a client (e.g., a mobile phone) with a built-in third-party APP, and the server analyzes the user check-in request to obtain authentication information authenticated by a real name, where the type of the authentication information includes a user name, an identification card image, a user face image feature, and a fingerprint feature. The authentication information after real-name authentication represents that the information source is legal, and at this time, a user check-in procedure can be further provided for the user, and the user house selection interface is sent to a client of the user, such as a mobile phone, so that the user submits a check-in order.
The types of the authentication information comprise user names, identity card images, user face image characteristics and fingerprint characteristics.
The real-name authentication step of the authentication information comprises the following steps: uploading the authentication information of the user to a trusted identity authentication platform (such as CTID) of a third party authority, judging whether the user name, the identity card image, the user face image characteristic and the fingerprint characteristic in the authentication information are the same person information or not through the trusted identity authentication platform of the third party authority, if so, determining that the real-name authentication of the user is successful and storing the authentication information into a database.
Whether the identity information of the user is real or not is judged by judging whether the user name, the identity card image, the face image feature and the fingerprint feature are the same person or not, and compared with the existing authentication mode, the authentication result reliability of the authentication mode adopted by the method is higher. For example, most of the existing authentication methods identify whether an identity card number and a name in an identity card uploaded by a user are matched through an OCR technology, and then determine whether identity information of the user is real, and the authentication methods are difficult to determine whether the identity information is true or false, and identity card information is easy to be faked.
And the recording module 120 is configured to sign a check-in contract for the user according to the check-in order, and upload the check-in contract to a department in charge of the house for recording.
In the embodiment, the user can more conveniently handle the check-in service by signing the contract online and reporting the contract to the local building office for network signing, namely, the record registration service, without needing to go to the window of the building office in person for handling.
After all the check-in services are transacted, the method also comprises the following authorization steps:
after the check-in contract is signed, giving a door lock authority to the identity information corresponding to the user signing the check-in contract, generating an authorization record of the door lock authority, uploading the authorization record to a block chain platform, and storing the block chain platform for recording the house contract, so that the house contract is prevented from being tampered by other useful house owners, and the house owners can be prevented from refusing to not acknowledge the real existence of the contract; and
the door lock authority corresponding to the landlord signing in the contract is cancelled, the unlocking authority is automatically transferred to the user from the landlord, and the housing right of the user is guaranteed.
The detection module 130 is configured to monitor whether an object to be identified exists in an induction range of the intelligent lock in real time, and when the object to be identified exists in the induction range, start an information acquisition function of an identity information acquisition unit of the intelligent lock and a data transmission function of a wireless communication unit.
In this embodiment, whether the intelligence lock accessible ultrasonic sensor real-time supervision its induction range has the thing of waiting to discern, the person who waits to discern the motivation unblank that the thing indicates. When the object to be identified exists in the sensing range of the ultrasonic sensor, the intelligent lock automatically starts the information acquisition function of the identity information acquisition unit.
The information acquisition unit comprises one or more of a fingerprint identification unit, an induction card reading unit and a touch keyboard. The fingerprint identification unit is used for collecting a fingerprint characteristic value of a user, the induction card reading unit is used for collecting entrance guard card information of the user, and the touch keyboard is used for collecting pattern information or digital information input by the user.
The wireless communication unit is one or more of a 4G module, a 5G module, a WiFi module and a Bluetooth module.
The information acquisition unit and the wireless communication unit are in a dormant state when the ultrasonic sensor does not sense that the object to be identified is close to the intelligent lock, so that the purpose of saving electricity is achieved, meanwhile, lawless persons can be prevented from invading a processor of the intelligent lock through the wireless communication unit in a connected state to tamper data or maliciously control the door lock to be opened, and lawless acts are implemented.
In another embodiment, the system further comprises a definition module for:
the information acquisition function of the identity information acquisition unit is limited to be started when the ultrasonic sensor monitors that the stay time of the object to be identified in the sensing area is greater than or equal to a preset time (for example, 5 seconds), so that the condition that the ultrasonic sensor is triggered by mistake due to overhigh sensitivity is avoided.
The obtaining module 140 is configured to collect identity information entered by the current user by using the information obtaining unit, and upload the identity information to the relevant department system, the database, and the block chain platform respectively in real time through the wireless communication unit.
In this embodiment, the identity information acquired by the information acquisition unit is uploaded to a relevant department system in real time, so that the relevant department can conveniently perform analysis on key attention crowds (for example, people with bad records in the relevant department system) and personnel trajectories, and perform social security and precaution and other work. The identity information acquired by the information acquisition unit is uploaded to a database in real time, so that identity information comparison can be conveniently carried out subsequently. The identity information acquired by the information acquisition unit is uploaded to the block chain platform in real time, so that data is prevented from being tampered, and data security is improved.
In another embodiment, the system further comprises a statistics module for:
and carrying out timing statistics on the unlocking records of the user acquired based on the intelligent lock, and creating a record table according to the unlocking records and uploading the record table to a relevant department system, wherein the unlocking records comprise identity information, unlocking time and unlocking frequency. By automatically counting the unlocking frequency of the recorded data in each time period, the method is convenient for the personnel in the relevant department to judge whether a resident abnormally unlocked exists, for example, the total number of times of the unlocking frequency is more than 4 times when 1 point in the morning appears in the continuous time of a week, and the resident is a case, such as crowd gambling, at the moment, the suspected user is possibly gambling in the crowd, so that the personnel in the relevant department can make judgment in advance.
And the unlocking module 150 is used for comparing whether the identity information is consistent with preset information stored in a database in advance, and controlling the lock cylinder driving unit of the intelligent lock to execute unlocking action when the identity information is consistent with the preset information.
In this embodiment, by comparing whether the identity information acquired by the information acquisition unit is consistent with preset information pre-stored in a database, when the judgment result shows that the identity information is consistent with the preset information, the lock cylinder driving unit of the intelligent lock is controlled to execute an unlocking action, otherwise, the lock is kept in a locked state.
Fig. 3 is a schematic structural diagram of an electronic device implementing the data acquisition method based on the smart lock according to the present invention.
The electronic device 1 may comprise a processor 12, a memory 11 and a bus, and may further comprise a computer program, such as a smart lock-based data acquisition program 10, stored in the memory 11 and executable on the processor 12.
Wherein the memory 11 comprises at least one type of readable storage medium having stored thereon a smart lock-based data acquisition program executable by one or more processors. The readable storage medium includes flash memory, removable hard disks, multimedia cards, card type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disks, optical disks, etc. The memory 11 may in some embodiments be an internal storage unit of the electronic device 1, such as a removable hard disk of the electronic device 1. The memory 11 may also be an external storage device of the electronic device 1 in other embodiments, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the electronic device 1. Further, the memory 11 may also include both an internal storage unit and an external storage device of the electronic device 1. The memory 11 may be used not only to store application software installed in the electronic device 1 and various types of data, such as codes of the smart lock-based data acquisition program 10, but also to temporarily store data that has been output or is to be output.
The processor 12 may be formed of an integrated circuit in some embodiments, for example, a single packaged integrated circuit, or may be formed of a plurality of integrated circuits packaged with the same or different functions, including one or more Central Processing Units (CPUs), microprocessors, digital Processing chips, graphics processors, and combinations of various control chips. The processor 12 is a Control Unit (Control Unit) of the electronic device 1, connects various components of the electronic device 1 by using various interfaces and lines, and executes various functions and processes data of the electronic device 1 by running or executing programs or modules (e.g., data acquisition programs based on smart locks, etc.) stored in the memory 11 and calling data stored in the memory 11.
The bus may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. The bus is arranged to enable connection communication between the memory 11 and at least one processor 12 or the like.
Fig. 3 shows only the electronic device 1 with components, and it will be understood by those skilled in the art that the structure shown in fig. 3 does not constitute a limitation of the electronic device 1, and may comprise fewer or more components than those shown, or some components may be combined, or a different arrangement of components.
For example, although not shown, the electronic device 1 may further include a power supply (such as a battery) for supplying power to each component, and preferably, the power supply may be logically connected to the at least one processor 12 through a power management system, so as to implement functions of charge management, discharge management, power consumption management, and the like through the power management system. The power supply may also include any component of one or more dc or ac power sources, recharging systems, power failure detection circuitry, power converters or inverters, power status indicators, and the like. The electronic device 1 may further include various sensors, a bluetooth module, a Wi-Fi module, and the like, which are not described herein again.
Further, the electronic device 1 may further include a network interface 13, and optionally, the network interface 13 may include a wired interface and/or a wireless interface (such as a WI-FI interface, a bluetooth interface, etc.), which are generally used for establishing a communication connection between the electronic device 1 and other electronic devices 1.
Optionally, the electronic device 1 may further comprise a user interface, which may be a Display (Display), an input unit (such as a Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable for displaying information processed in the electronic device 1 and for displaying a visualized user interface, among other things.
It is to be understood that the described embodiments are for purposes of illustration only and that the scope of the appended claims is not limited to such structures.
The smart lock-based data acquisition program 10 stored in the memory 11 of the electronic device 1 is a combination of instructions that, when executed in the processor 12, enable:
an authentication step: receiving a user check-in request sent by a user, analyzing the user check-in request to obtain authentication information authenticated by a real name, and feeding back a user house selected interface according to the authentication information for the user to submit a check-in order;
a recording step: signing a check-in contract for the user according to the check-in order, and uploading the check-in contract to a house administrative department for record;
a monitoring step: monitoring whether an object to be identified exists in an induction range of the intelligent lock in real time, and starting an information acquisition function of an identity information acquisition unit of the intelligent lock and a data transmission function of a wireless communication unit when the object to be identified exists in the induction range;
an acquisition step: acquiring identity information input by a current user by using the information acquisition unit, and uploading the identity information to a related department system, a database and a block chain platform respectively in real time through the wireless communication unit;
an unlocking step: and comparing whether the identity information is consistent with preset information stored in a database in advance, and controlling a lock cylinder driving unit of the intelligent lock to execute an unlocking action when the identity information is consistent with the preset information.
In another embodiment, the program further performs the steps of:
and when the audio data does not exist in the data segment, judging whether a figure image type or a preset image type for identifying a key object exists in the image data, and if not, deleting the data segment.
In another embodiment, the program further performs the authorizing step:
after the check-in contract is signed, giving a door lock authority to the identity information corresponding to the user signing the check-in contract, generating an authorization record of the door lock authority, and uploading the authorization record to the block chain platform; and
and canceling the door lock authority corresponding to the landlord signing the check-in contract.
In another embodiment, the program further performs the defining step of:
and limiting the information acquisition function of the identity information acquisition unit to be started when the retention time of the object to be identified in the sensing area is monitored to be longer than or equal to the preset time.
In another embodiment, the program further performs the statistical step of:
and carrying out timing statistics on unlocking records of the user acquired based on the intelligent lock, and creating a record table according to the unlocking records and uploading the record table to the relevant department system, wherein the unlocking records comprise identity information, unlocking time and unlocking frequency.
Specifically, the specific implementation method of the instruction by the processor 12 may refer to the description of the relevant steps in the embodiment corresponding to fig. 1, which is not described herein again.
Further, the integrated modules/units of the electronic device 1, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. The computer-readable medium may include: any entity or system capable of carrying said computer program code, a recording medium, a usb-disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM).
In the embodiments provided by the present invention, it should be understood that the disclosed apparatus, system, and method may be implemented in other ways. For example, the system embodiments described above are merely illustrative, and for example, the division of the modules is only one logical functional division, and other divisions may be realized in practice.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof.
The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or systems recited in the system claims may also be implemented by one unit or system in software or hardware. The terms second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.
Claims (10)
1. A data acquisition method based on an intelligent lock is characterized by comprising the following steps:
an authentication step: receiving a user check-in request sent by a user, analyzing the user check-in request to obtain authentication information authenticated by a real name, and feeding back a user house selected interface according to the authentication information for the user to submit a check-in order;
a recording step: signing a check-in contract for the user according to the check-in order, and uploading the check-in contract to a house administrative department for record;
a monitoring step: monitoring whether an object to be identified exists in an induction range of the intelligent lock in real time, and starting an information acquisition function of an identity information acquisition unit of the intelligent lock and a data transmission function of a wireless communication unit when the object to be identified exists in the induction range;
an acquisition step: acquiring identity information input by a current user by using the information acquisition unit, and uploading the identity information to a related department system, a database and a block chain platform respectively in real time through the wireless communication unit;
an unlocking step: and comparing whether the identity information is consistent with preset information stored in a database in advance, and controlling a lock cylinder driving unit of the intelligent lock to execute an unlocking action when the identity information is consistent with the preset information.
2. The intelligent-lock-based data acquisition method as claimed in claim 1, wherein the authentication information includes a user name, an identification card image, a user face image feature and a fingerprint feature.
3. The intelligent lock-based data acquisition method according to claim 2, wherein the real-name authentication step of the authentication information comprises:
uploading the authentication information of the user to a third party authority trusted identity authentication platform, judging whether the user name, the identity card image, the user face image feature and the fingerprint feature in the authentication information are the same person information or not through the third party authority trusted identity authentication platform, if so, determining that the user real-name authentication is successful and storing the authentication information into the database.
4. The smart lock-based data acquisition method as recited in claim 1, further comprising the step of authorizing:
after the check-in contract is signed, giving a door lock authority to the identity information corresponding to the user signing the check-in contract, generating an authorization record of the door lock authority, and uploading the authorization record to the block chain platform; and
and canceling the door lock authority corresponding to the landlord signing the check-in contract.
5. A smart lock based data acquisition method as claimed in claim 1, characterized in that it further comprises the defining step of:
and limiting the information acquisition function of the identity information acquisition unit to be started when the retention time of the object to be identified in the sensing area is monitored to be longer than or equal to the preset time.
6. The data acquisition method based on the intelligent lock as claimed in claim 1, wherein the information acquisition unit comprises one or more of a fingerprint identification unit, an induction card reading unit and a touch keyboard;
the fingerprint identification unit is used for collecting fingerprint characteristic values of users, the induction card reading unit is used for collecting entrance guard card information of the users, and the touch keyboard is used for collecting pattern information or digital information input by the users.
7. The smart lock-based data acquisition method as recited in claim 1, further comprising the statistical step of:
and carrying out timing statistics on unlocking records of the user acquired based on the intelligent lock, and creating a record table according to the unlocking records and uploading the record table to the relevant department system, wherein the unlocking records comprise identity information, unlocking time and unlocking frequency.
8. A data acquisition system based on a smart lock, comprising:
the authentication module is used for receiving a user check-in request sent by a user, analyzing the user check-in request to obtain authentication information authenticated by a real name, and feeding back a user house selected interface according to the authentication information for the user to submit a check-in order;
the record module is used for signing a check-in contract for the user according to the check-in order and uploading the check-in contract to a house governing department for record;
the monitoring module is used for monitoring whether an object to be identified exists in an induction range of the intelligent lock in real time, and starting an information acquisition function of an identity information acquisition unit of the intelligent lock and a data transmission function of a wireless communication unit when the object to be identified exists in the induction range;
the acquisition module is used for acquiring the identity information input by the current user by using the information acquisition unit and respectively uploading the identity information to a related department system, a database and a block chain platform in real time through the wireless communication unit;
and the unlocking module is used for comparing whether the identity information is consistent with preset information stored in a database in advance or not, and controlling the lock cylinder driving unit of the intelligent lock to execute unlocking action when the identity information is consistent with the preset information.
9. An electronic device, characterized in that the electronic device comprises a memory and a processor, the memory having stored thereon a data acquisition program which, when executed by the processor, implements the steps of the data acquisition method according to any one of claims 1-7.
10. A computer-readable storage medium having stored thereon a data acquisition program executable by one or more processors to perform the steps of the data acquisition method as claimed in any one of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110177078.0A CN113285913A (en) | 2021-02-07 | 2021-02-07 | Data acquisition method and system based on intelligent lock, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110177078.0A CN113285913A (en) | 2021-02-07 | 2021-02-07 | Data acquisition method and system based on intelligent lock, electronic equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113285913A true CN113285913A (en) | 2021-08-20 |
Family
ID=77275833
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110177078.0A Pending CN113285913A (en) | 2021-02-07 | 2021-02-07 | Data acquisition method and system based on intelligent lock, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113285913A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116980478A (en) * | 2023-09-22 | 2023-10-31 | 首都信息科技发展有限公司 | Space management method, apparatus, electronic device, and computer-readable storage medium |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104182798A (en) * | 2014-09-02 | 2014-12-03 | 广州商景网络科技有限公司 | Self-service room reservation method and system based on mobile device |
CN106453605A (en) * | 2016-10-28 | 2017-02-22 | 深圳市欧瑞博电子有限公司 | Hotel room reservation information transfer method and system |
CN107682339A (en) * | 2017-10-13 | 2018-02-09 | 唐利伟 | lodging data processing method, device, storage medium and computer equipment |
CN107832863A (en) * | 2017-12-05 | 2018-03-23 | 安徽尚易信息技术有限公司 | A kind of self-service hotel's booking system based on cell phone application |
CN108932773A (en) * | 2018-06-15 | 2018-12-04 | 王若清 | A kind of intelligent unlocking system and method |
CN109215196A (en) * | 2018-09-10 | 2019-01-15 | 上海若禅信息科技有限公司 | Rental house management method and system based on intelligent door lock |
CN109427120A (en) * | 2017-08-30 | 2019-03-05 | 郭连花 | A kind of hotel's intelligence door opening method and system |
CN110334824A (en) * | 2019-06-28 | 2019-10-15 | 阿里巴巴集团控股有限公司 | Safety moves in method and device |
CN110930544A (en) * | 2018-08-29 | 2020-03-27 | 东莞中集智能科技有限公司 | Hotel self-service check-in method and system and intelligent terminal |
CN111179487A (en) * | 2019-12-26 | 2020-05-19 | 北京中安百傲科技有限公司 | Intelligent door lock and intelligent door lock system |
-
2021
- 2021-02-07 CN CN202110177078.0A patent/CN113285913A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104182798A (en) * | 2014-09-02 | 2014-12-03 | 广州商景网络科技有限公司 | Self-service room reservation method and system based on mobile device |
CN106453605A (en) * | 2016-10-28 | 2017-02-22 | 深圳市欧瑞博电子有限公司 | Hotel room reservation information transfer method and system |
CN109427120A (en) * | 2017-08-30 | 2019-03-05 | 郭连花 | A kind of hotel's intelligence door opening method and system |
CN107682339A (en) * | 2017-10-13 | 2018-02-09 | 唐利伟 | lodging data processing method, device, storage medium and computer equipment |
CN107832863A (en) * | 2017-12-05 | 2018-03-23 | 安徽尚易信息技术有限公司 | A kind of self-service hotel's booking system based on cell phone application |
CN108932773A (en) * | 2018-06-15 | 2018-12-04 | 王若清 | A kind of intelligent unlocking system and method |
CN110930544A (en) * | 2018-08-29 | 2020-03-27 | 东莞中集智能科技有限公司 | Hotel self-service check-in method and system and intelligent terminal |
CN109215196A (en) * | 2018-09-10 | 2019-01-15 | 上海若禅信息科技有限公司 | Rental house management method and system based on intelligent door lock |
CN110334824A (en) * | 2019-06-28 | 2019-10-15 | 阿里巴巴集团控股有限公司 | Safety moves in method and device |
CN111179487A (en) * | 2019-12-26 | 2020-05-19 | 北京中安百傲科技有限公司 | Intelligent door lock and intelligent door lock system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116980478A (en) * | 2023-09-22 | 2023-10-31 | 首都信息科技发展有限公司 | Space management method, apparatus, electronic device, and computer-readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI414669B (en) | Out of the room management system and out of the room management methods | |
US11450186B2 (en) | Person monitoring system and person monitoring method | |
CN111563671A (en) | Regional personnel management method, system, machine readable medium and equipment | |
CN110096606B (en) | Foreign roll personnel management method and device and electronic equipment | |
CN112016520A (en) | AI-based traffic violation voucher generation method, device, terminal and storage medium | |
CN111582693A (en) | Population management method, system, machine readable medium and device | |
CN111814646A (en) | Monitoring method, device, equipment and medium based on AI vision | |
CN113837030A (en) | Intelligent personnel management and control method and system for epidemic situation prevention and control and computer equipment | |
CN110930566A (en) | Safe rechecking method, system and device for vehicles to and from prisons and storable medium | |
CN113221589A (en) | Electric vehicle management method, device, system and computer readable storage medium | |
CN109712291A (en) | Open method, device and the server of electronic gate | |
CN111476685A (en) | Behavior analysis method, device and equipment | |
CN113285913A (en) | Data acquisition method and system based on intelligent lock, electronic equipment and storage medium | |
CN110728778A (en) | Intelligent visitor reservation management system and method based on face recognition | |
CN112735015B (en) | Community management method, device, machine-readable medium and equipment | |
CN114049658A (en) | Floating population management method and device based on face recognition, computer equipment and storage medium | |
CN113326730A (en) | Indoor elderly safety monitoring method and system, electronic equipment and medium | |
CN113378624A (en) | Data transmission method, system, electronic device and medium based on gateway device | |
CN112837460A (en) | Unattended intelligent access control system and personnel access management method | |
CN112509277A (en) | Rental house monitoring method, device, equipment and storage medium | |
EP3109837A1 (en) | System and method of smart incident analysis in control system using floor maps | |
CN116188223A (en) | Personnel residence management system, method and electronic equipment | |
CN111126167A (en) | Method and system for quickly identifying series activities of multiple specific persons | |
CN112669105B (en) | Rental detection method, rental detection equipment and rental detection medium | |
US7784091B2 (en) | Data processing system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |