CN113285913A - Data acquisition method and system based on intelligent lock, electronic equipment and storage medium - Google Patents

Data acquisition method and system based on intelligent lock, electronic equipment and storage medium Download PDF

Info

Publication number
CN113285913A
CN113285913A CN202110177078.0A CN202110177078A CN113285913A CN 113285913 A CN113285913 A CN 113285913A CN 202110177078 A CN202110177078 A CN 202110177078A CN 113285913 A CN113285913 A CN 113285913A
Authority
CN
China
Prior art keywords
user
information
check
identity information
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110177078.0A
Other languages
Chinese (zh)
Inventor
黄志锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian China's E Commerce Network Technology Co ltd
Original Assignee
Fujian China's E Commerce Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian China's E Commerce Network Technology Co ltd filed Critical Fujian China's E Commerce Network Technology Co ltd
Priority to CN202110177078.0A priority Critical patent/CN113285913A/en
Publication of CN113285913A publication Critical patent/CN113285913A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/16Real estate
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0225Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Primary Health Care (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Biomedical Technology (AREA)
  • Medical Informatics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention relates to the field of data processing, and provides a data acquisition method, a system, electronic equipment and a storage medium based on an intelligent lock, wherein the method comprises the steps of feeding back a house selection interface of a user according to authentication information for the user to submit a check-in order; signing a check-in contract for the user according to the check-in order, and uploading the check-in contract to a house administrative department for filing; monitoring whether an object to be identified exists in an induction range of the intelligent lock in real time, and starting an information acquisition function of an identity information acquisition unit and a data transmission function of a wireless communication unit when monitoring exists; respectively uploading the identity information to a related department system, a database and a block chain platform in real time through a wireless communication unit; and comparing whether the identity information is consistent with preset information stored in a database in advance, and controlling the lock cylinder driving unit to execute unlocking action when the identity information is consistent with the preset information. The method and the system can facilitate relevant departments to realize analysis of the trajectories of key attention crowds and personnel for floating population in places such as rental houses, resident accommodations, apartments and the like.

Description

Data acquisition method and system based on intelligent lock, electronic equipment and storage medium
Technical Field
The invention relates to the field of data processing, in particular to a data acquisition method and system based on an intelligent lock, electronic equipment and a storage medium.
Background
At present, the number of the national floating population is as high as 2.47 hundred million, which accounts for 18 percent of the total population, while the number of the population adopting the house renting to solve the living problem is about 1.6 hundred million, the floating population management and service are brought into the overall plan of the development of the economic society, and the current requirements of tedious check-in registration and frequent floating access management are very urgent; in suburbs, a large number of mobile personnel without fixed occupation are gathered, and the source and the destination of the mobile personnel cannot be comprehensively known.
With the increase of floating population, how to facilitate relevant departments to realize important attention groups (for example, people who have bad records in relevant department systems) and personnel trajectory analysis on floating population in places such as rental houses, lodging residences and apartments becomes a technical problem which needs to be solved urgently.
Disclosure of Invention
The invention mainly aims to provide a data acquisition method, a data acquisition system, electronic equipment and a storage medium based on an intelligent lock, and aims to solve the problem of how to facilitate related departments to realize analysis of tracks of key attention people and personnel for floating population in places such as rental houses, lodging residents, apartments and the like.
In order to achieve the above object, the present invention provides a data acquisition method based on an intelligent lock, which includes:
an authentication step: receiving a user check-in request sent by a user, analyzing the user check-in request to obtain authentication information authenticated by a real name, and feeding back a user house selected interface according to the authentication information for the user to submit a check-in order;
a recording step: signing a check-in contract for the user according to the check-in order, and uploading the check-in contract to a house administrative department for record;
a monitoring step: monitoring whether an object to be identified exists in an induction range of the intelligent lock in real time, and starting an information acquisition function of an identity information acquisition unit of the intelligent lock and a data transmission function of a wireless communication unit when the object to be identified exists in the induction range;
an acquisition step: acquiring identity information input by a current user by using the information acquisition unit, and uploading the identity information to a related department system, a database and a block chain platform respectively in real time through the wireless communication unit;
an unlocking step: and comparing whether the identity information is consistent with preset information stored in a database in advance, and controlling a lock cylinder driving unit of the intelligent lock to execute an unlocking action when the identity information is consistent with the preset information.
Preferably, the authentication information includes a user name, an identification card image, a user face image feature and a fingerprint feature.
Preferably, the real-name authentication step of the authentication information includes:
uploading the authentication information of the user to a third party authority trusted identity authentication platform, judging whether the user name, the identity card image, the user face image feature and the fingerprint feature in the authentication information are the same person information or not through the third party authority trusted identity authentication platform, if so, determining that the user real-name authentication is successful and storing the authentication information into the database.
Preferably, the method further comprises the step of authorizing:
after the check-in contract is signed, giving a door lock authority to the identity information corresponding to the user signing the check-in contract, generating an authorization record of the door lock authority, and uploading the authorization record to the block chain platform; and
and canceling the door lock authority corresponding to the landlord signing the check-in contract.
Preferably, the method further comprises the step of defining:
and limiting the information acquisition function of the identity information acquisition unit to be started when the retention time of the object to be identified in the sensing area is monitored to be longer than or equal to the preset time.
Preferably, the information acquisition unit comprises one or more of a fingerprint identification unit, an induction card reading unit and a touch keyboard;
the fingerprint identification unit is used for collecting fingerprint characteristic values of users, the induction card reading unit is used for collecting entrance guard card information of the users, and the touch keyboard is used for collecting pattern information or digital information input by the users.
Preferably, the method further comprises the statistical step of:
and carrying out timing statistics on unlocking records of the user acquired based on the intelligent lock, and creating a record table according to the unlocking records and uploading the record table to the relevant department system, wherein the unlocking records comprise identity information, unlocking time and unlocking frequency.
In order to achieve the above object, the present invention further provides a data acquisition system based on an intelligent lock, including:
the authentication module is used for receiving a user check-in request sent by a user, analyzing the user check-in request to obtain authentication information authenticated by a real name, and feeding back a user house selected interface according to the authentication information for the user to submit a check-in order;
the record module is used for signing a check-in contract for the user according to the check-in order and uploading the check-in contract to a house governing department for record;
the monitoring module is used for monitoring whether an object to be identified exists in an induction range of the intelligent lock in real time, and starting an information acquisition function of an identity information acquisition unit of the intelligent lock and a data transmission function of a wireless communication unit when the object to be identified exists in the induction range;
the acquisition module is used for acquiring the identity information input by the current user by using the information acquisition unit and respectively uploading the identity information to a related department system, a database and a block chain platform in real time through the wireless communication unit;
and the unlocking module is used for comparing whether the identity information is consistent with preset information stored in a database in advance or not, and controlling the lock cylinder driving unit of the intelligent lock to execute unlocking action when the identity information is consistent with the preset information.
In order to achieve the above object, the present invention further provides an electronic device, which includes a memory and a processor, wherein the memory stores a data acquisition program based on the smart lock, and the data acquisition program based on the smart lock, when executed by the processor, implements the steps of the data acquisition method based on the smart lock.
To achieve the above object, the present invention further provides a computer-readable storage medium, which stores thereon a smart lock-based data acquisition program, which is executable by one or more processors to implement the steps of the smart lock-based data acquisition method as described above.
According to the data acquisition method, the data acquisition system, the electronic equipment and the storage medium based on the intelligent lock, the user check-in request sent by the user is received, the user check-in request is analyzed to obtain the authentication information authenticated by the real name, and the selected house interface of the user is fed back according to the authentication information to allow the user to submit a check-in order; signing a check-in contract for the user according to the check-in order, and uploading the check-in contract to a house administrative department for record; monitoring whether an object to be identified exists in an induction range of the intelligent lock in real time, and starting an information acquisition function of an identity information acquisition unit of the intelligent lock and a data transmission function of a wireless communication unit when the object to be identified exists in the induction range; acquiring identity information input by a current user by using the information acquisition unit, and uploading the identity information to a related department system, a database and a block chain platform respectively in real time through the wireless communication unit; and comparing whether the identity information is consistent with preset information stored in a database in advance, and controlling a lock cylinder driving unit of the intelligent lock to execute an unlocking action when the identity information is consistent with the preset information. According to the intelligent lock, the identity information acquisition unit and the wireless communication unit are in the dormant state when the situation that an object to be identified approaches is not sensed in the sensing range of the intelligent lock, so that the purpose of saving electricity is achieved, meanwhile, lawless persons can be prevented from invading a processor of the intelligent lock through the wireless communication unit in the connected state to tamper data or maliciously control the door lock to open, lawless acts are implemented, and meanwhile, the analysis of tracks of people and personnel which are concerned mainly by floating population in places such as rental houses, resident rooms and apartments can be achieved conveniently by relevant departments.
Drawings
Fig. 1 is a schematic flowchart of a data acquisition method based on an intelligent lock according to an embodiment of the present invention;
FIG. 2 is a block diagram of a data acquisition system based on an intelligent lock according to an embodiment of the present invention;
fig. 3 is a schematic diagram of an internal structure of an electronic device implementing the data acquisition method based on the smart lock according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical embodiments and advantages of the present invention more apparent, the present invention will be described in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the description relating to "first", "second", etc. in the present invention is for descriptive purposes only and is not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, the technical embodiments of the present invention may be combined with each other, but it must be based on the realization of those skilled in the art, and when the combination of the technical embodiments contradicts each other or cannot be realized, such combination of the technical embodiments should be considered to be absent and not within the protection scope of the present invention.
The invention provides a data acquisition method based on an intelligent lock. Fig. 1 is a schematic flow chart of a data acquisition method based on an intelligent lock according to an embodiment of the present invention. The method may be performed by a system, which may be implemented by software and/or hardware.
In this embodiment, the data acquisition method based on the smart lock includes:
s110, receiving a user check-in request sent by a user, analyzing the user check-in request to obtain authentication information authenticated by a real name, and feeding back a user house selection interface according to the authentication information for the user to submit a check-in order.
In this embodiment, a user may initiate a user check-in request to a server through a client (e.g., a mobile phone) with a built-in third-party APP, and the server analyzes the user check-in request to obtain authentication information authenticated by a real name, where the type of the authentication information includes a user name, an identification card image, a user face image feature, and a fingerprint feature. The authentication information after real-name authentication represents that the information source is legal, and at this time, a user check-in procedure can be further provided for the user, and the user house selection interface is sent to a client of the user, such as a mobile phone, so that the user submits a check-in order.
The types of the authentication information comprise user names, identity card images, user face image characteristics and fingerprint characteristics.
The real-name authentication step of the authentication information comprises the following steps: uploading the authentication information of the user to a trusted identity authentication platform (such as CTID) of a third party authority, judging whether the user name, the identity card image, the user face image characteristic and the fingerprint characteristic in the authentication information are the same person information or not through the trusted identity authentication platform of the third party authority, if so, determining that the real-name authentication of the user is successful and storing the authentication information into a database.
Whether the identity information of the user is real or not is judged by judging whether the user name, the identity card image, the face image feature and the fingerprint feature are the same person or not, and compared with the existing authentication mode, the authentication result reliability of the authentication mode adopted by the method is higher. For example, most of the existing authentication methods identify whether an identity card number and a name in an identity card uploaded by a user are matched through an OCR technology, and then determine whether identity information of the user is real, and the authentication methods are difficult to determine whether the identity information is true or false, and identity card information is easy to be faked.
And S120, signing a check-in contract for the user according to the check-in order, and uploading the check-in contract to a house governing department for record.
In the embodiment, the user can more conveniently handle the check-in service by signing the contract online and reporting the contract to the local building office for network signing, namely, the record registration service, without needing to go to the window of the building office in person for handling.
After all the check-in services are transacted, the method also comprises the following authorization steps:
after the check-in contract is signed, giving a door lock authority to the identity information corresponding to the user signing the check-in contract, generating an authorization record of the door lock authority, uploading the authorization record to a block chain platform, and storing the block chain platform for recording the house contract, so that the house contract is prevented from being tampered by other useful house owners, and the house owners can be prevented from refusing to not acknowledge the real existence of the contract; and
the door lock authority corresponding to the landlord signing in the contract is cancelled, the unlocking authority is automatically transferred to the user from the landlord, and the housing right of the user is guaranteed.
S130, whether an object to be identified exists in the sensing range of the intelligent lock is monitored in real time, and when the object to be identified exists in the sensing range, the information acquisition function of the identity information acquisition unit of the intelligent lock and the data transmission function of the wireless communication unit are started.
In this embodiment, whether the intelligence lock accessible ultrasonic sensor real-time supervision its induction range has the thing of waiting to discern, the person who waits to discern the motivation unblank that the thing indicates. When the object to be identified exists in the sensing range of the ultrasonic sensor, the intelligent lock automatically starts the information acquisition function of the identity information acquisition unit.
The information acquisition unit comprises one or more of a fingerprint identification unit, an induction card reading unit and a touch keyboard. The fingerprint identification unit is used for collecting a fingerprint characteristic value of a user, the induction card reading unit is used for collecting entrance guard card information of the user, and the touch keyboard is used for collecting pattern information or digital information input by the user.
The wireless communication unit is one or more of a 4G module, a 5G module, a WiFi module and a Bluetooth module.
The information acquisition unit and the wireless communication unit are in a dormant state when the ultrasonic sensor does not sense that the object to be identified is close to the intelligent lock, so that the purpose of saving electricity is achieved, meanwhile, lawless persons can be prevented from invading a processor of the intelligent lock through the wireless communication unit in a connected state to tamper data or maliciously control the door lock to be opened, and lawless acts are implemented.
In another embodiment, the method further comprises the defining step of:
the information acquisition function of the identity information acquisition unit is limited to be started when the ultrasonic sensor monitors that the stay time of the object to be identified in the sensing area is greater than or equal to a preset time (for example, 5 seconds), so that the condition that the ultrasonic sensor is triggered by mistake due to overhigh sensitivity is avoided.
And S140, acquiring the identity information input by the current user by using the information acquisition unit, and uploading the identity information to a related department system, a database and a block chain platform respectively in real time through the wireless communication unit.
In this embodiment, the identity information acquired by the information acquisition unit is uploaded to a relevant department system in real time, so that the relevant department can conveniently perform analysis on key attention crowds (for example, people with bad records in the relevant department system) and personnel trajectories, and perform social security and precaution and other work. The identity information acquired by the information acquisition unit is uploaded to a database in real time, so that identity information comparison can be conveniently carried out subsequently. The identity information acquired by the information acquisition unit is uploaded to the block chain platform in real time, so that data is prevented from being tampered, and data security is improved.
In another embodiment, the method further comprises the statistical step of:
and carrying out timing statistics on the unlocking records of the user acquired based on the intelligent lock, and creating a record table according to the unlocking records and uploading the record table to a relevant department system, wherein the unlocking records comprise identity information, unlocking time and unlocking frequency. By automatically counting the unlocking frequency of the recorded data in each time period, the method is convenient for the personnel in the relevant department to judge whether a resident abnormally unlocked exists, for example, the total number of times of unlocking frequency is more than 4 times when 1 point in the morning appears in the continuous time of a week, and the resident has bad records, such as crowd gambling, at the moment, the suspected user is possible to play the crowd gambling, and the personnel in the relevant department can make judgment in advance.
S150, comparing whether the identity information is consistent with preset information stored in a database in advance, and controlling a lock cylinder driving unit of the intelligent lock to execute an unlocking action when the identity information is consistent with the preset information.
In this embodiment, by comparing whether the identity information acquired by the information acquisition unit is consistent with preset information pre-stored in a database, when the judgment result shows that the identity information is consistent with the preset information, the lock cylinder driving unit of the intelligent lock is controlled to execute an unlocking action, otherwise, the lock is kept in a locked state.
For the detailed description of the above steps, please refer to the following description of fig. 2 regarding a schematic diagram of program modules of an embodiment of the smart-lock-based data acquisition program 10 and fig. 3 regarding a schematic diagram of a method flow of an embodiment of a smart-lock-based data acquisition method.
Referring now to FIG. 2, a functional block diagram of the smart lock based data acquisition system 100 of the present invention is shown.
The smart lock-based data acquisition system 100 of the present invention may be installed in the electronic device 1. Depending on the implemented functionality, the smart lock-based data acquisition system 100 may include an authentication module 110, a docketing module 120, a detection module 130, an acquisition module 140, and an unlocking module 150. The module of the invention, which may also be referred to as a unit, is a series of computer program segments that can be executed by a processor of the electronic device 1 and that can perform a fixed function, and is stored in a memory of the electronic device 1.
In the present embodiment, the functions regarding the respective modules/units are as follows:
the authentication module 110 is configured to receive a user check-in request sent by a user, analyze the user check-in request to obtain authentication information authenticated by a real name, and feed back a user house selection interface according to the authentication information to allow the user to submit a check-in order.
In this embodiment, a user may initiate a user check-in request to a server through a client (e.g., a mobile phone) with a built-in third-party APP, and the server analyzes the user check-in request to obtain authentication information authenticated by a real name, where the type of the authentication information includes a user name, an identification card image, a user face image feature, and a fingerprint feature. The authentication information after real-name authentication represents that the information source is legal, and at this time, a user check-in procedure can be further provided for the user, and the user house selection interface is sent to a client of the user, such as a mobile phone, so that the user submits a check-in order.
The types of the authentication information comprise user names, identity card images, user face image characteristics and fingerprint characteristics.
The real-name authentication step of the authentication information comprises the following steps: uploading the authentication information of the user to a trusted identity authentication platform (such as CTID) of a third party authority, judging whether the user name, the identity card image, the user face image characteristic and the fingerprint characteristic in the authentication information are the same person information or not through the trusted identity authentication platform of the third party authority, if so, determining that the real-name authentication of the user is successful and storing the authentication information into a database.
Whether the identity information of the user is real or not is judged by judging whether the user name, the identity card image, the face image feature and the fingerprint feature are the same person or not, and compared with the existing authentication mode, the authentication result reliability of the authentication mode adopted by the method is higher. For example, most of the existing authentication methods identify whether an identity card number and a name in an identity card uploaded by a user are matched through an OCR technology, and then determine whether identity information of the user is real, and the authentication methods are difficult to determine whether the identity information is true or false, and identity card information is easy to be faked.
And the recording module 120 is configured to sign a check-in contract for the user according to the check-in order, and upload the check-in contract to a department in charge of the house for recording.
In the embodiment, the user can more conveniently handle the check-in service by signing the contract online and reporting the contract to the local building office for network signing, namely, the record registration service, without needing to go to the window of the building office in person for handling.
After all the check-in services are transacted, the method also comprises the following authorization steps:
after the check-in contract is signed, giving a door lock authority to the identity information corresponding to the user signing the check-in contract, generating an authorization record of the door lock authority, uploading the authorization record to a block chain platform, and storing the block chain platform for recording the house contract, so that the house contract is prevented from being tampered by other useful house owners, and the house owners can be prevented from refusing to not acknowledge the real existence of the contract; and
the door lock authority corresponding to the landlord signing in the contract is cancelled, the unlocking authority is automatically transferred to the user from the landlord, and the housing right of the user is guaranteed.
The detection module 130 is configured to monitor whether an object to be identified exists in an induction range of the intelligent lock in real time, and when the object to be identified exists in the induction range, start an information acquisition function of an identity information acquisition unit of the intelligent lock and a data transmission function of a wireless communication unit.
In this embodiment, whether the intelligence lock accessible ultrasonic sensor real-time supervision its induction range has the thing of waiting to discern, the person who waits to discern the motivation unblank that the thing indicates. When the object to be identified exists in the sensing range of the ultrasonic sensor, the intelligent lock automatically starts the information acquisition function of the identity information acquisition unit.
The information acquisition unit comprises one or more of a fingerprint identification unit, an induction card reading unit and a touch keyboard. The fingerprint identification unit is used for collecting a fingerprint characteristic value of a user, the induction card reading unit is used for collecting entrance guard card information of the user, and the touch keyboard is used for collecting pattern information or digital information input by the user.
The wireless communication unit is one or more of a 4G module, a 5G module, a WiFi module and a Bluetooth module.
The information acquisition unit and the wireless communication unit are in a dormant state when the ultrasonic sensor does not sense that the object to be identified is close to the intelligent lock, so that the purpose of saving electricity is achieved, meanwhile, lawless persons can be prevented from invading a processor of the intelligent lock through the wireless communication unit in a connected state to tamper data or maliciously control the door lock to be opened, and lawless acts are implemented.
In another embodiment, the system further comprises a definition module for:
the information acquisition function of the identity information acquisition unit is limited to be started when the ultrasonic sensor monitors that the stay time of the object to be identified in the sensing area is greater than or equal to a preset time (for example, 5 seconds), so that the condition that the ultrasonic sensor is triggered by mistake due to overhigh sensitivity is avoided.
The obtaining module 140 is configured to collect identity information entered by the current user by using the information obtaining unit, and upload the identity information to the relevant department system, the database, and the block chain platform respectively in real time through the wireless communication unit.
In this embodiment, the identity information acquired by the information acquisition unit is uploaded to a relevant department system in real time, so that the relevant department can conveniently perform analysis on key attention crowds (for example, people with bad records in the relevant department system) and personnel trajectories, and perform social security and precaution and other work. The identity information acquired by the information acquisition unit is uploaded to a database in real time, so that identity information comparison can be conveniently carried out subsequently. The identity information acquired by the information acquisition unit is uploaded to the block chain platform in real time, so that data is prevented from being tampered, and data security is improved.
In another embodiment, the system further comprises a statistics module for:
and carrying out timing statistics on the unlocking records of the user acquired based on the intelligent lock, and creating a record table according to the unlocking records and uploading the record table to a relevant department system, wherein the unlocking records comprise identity information, unlocking time and unlocking frequency. By automatically counting the unlocking frequency of the recorded data in each time period, the method is convenient for the personnel in the relevant department to judge whether a resident abnormally unlocked exists, for example, the total number of times of the unlocking frequency is more than 4 times when 1 point in the morning appears in the continuous time of a week, and the resident is a case, such as crowd gambling, at the moment, the suspected user is possibly gambling in the crowd, so that the personnel in the relevant department can make judgment in advance.
And the unlocking module 150 is used for comparing whether the identity information is consistent with preset information stored in a database in advance, and controlling the lock cylinder driving unit of the intelligent lock to execute unlocking action when the identity information is consistent with the preset information.
In this embodiment, by comparing whether the identity information acquired by the information acquisition unit is consistent with preset information pre-stored in a database, when the judgment result shows that the identity information is consistent with the preset information, the lock cylinder driving unit of the intelligent lock is controlled to execute an unlocking action, otherwise, the lock is kept in a locked state.
Fig. 3 is a schematic structural diagram of an electronic device implementing the data acquisition method based on the smart lock according to the present invention.
The electronic device 1 may comprise a processor 12, a memory 11 and a bus, and may further comprise a computer program, such as a smart lock-based data acquisition program 10, stored in the memory 11 and executable on the processor 12.
Wherein the memory 11 comprises at least one type of readable storage medium having stored thereon a smart lock-based data acquisition program executable by one or more processors. The readable storage medium includes flash memory, removable hard disks, multimedia cards, card type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disks, optical disks, etc. The memory 11 may in some embodiments be an internal storage unit of the electronic device 1, such as a removable hard disk of the electronic device 1. The memory 11 may also be an external storage device of the electronic device 1 in other embodiments, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the electronic device 1. Further, the memory 11 may also include both an internal storage unit and an external storage device of the electronic device 1. The memory 11 may be used not only to store application software installed in the electronic device 1 and various types of data, such as codes of the smart lock-based data acquisition program 10, but also to temporarily store data that has been output or is to be output.
The processor 12 may be formed of an integrated circuit in some embodiments, for example, a single packaged integrated circuit, or may be formed of a plurality of integrated circuits packaged with the same or different functions, including one or more Central Processing Units (CPUs), microprocessors, digital Processing chips, graphics processors, and combinations of various control chips. The processor 12 is a Control Unit (Control Unit) of the electronic device 1, connects various components of the electronic device 1 by using various interfaces and lines, and executes various functions and processes data of the electronic device 1 by running or executing programs or modules (e.g., data acquisition programs based on smart locks, etc.) stored in the memory 11 and calling data stored in the memory 11.
The bus may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. The bus is arranged to enable connection communication between the memory 11 and at least one processor 12 or the like.
Fig. 3 shows only the electronic device 1 with components, and it will be understood by those skilled in the art that the structure shown in fig. 3 does not constitute a limitation of the electronic device 1, and may comprise fewer or more components than those shown, or some components may be combined, or a different arrangement of components.
For example, although not shown, the electronic device 1 may further include a power supply (such as a battery) for supplying power to each component, and preferably, the power supply may be logically connected to the at least one processor 12 through a power management system, so as to implement functions of charge management, discharge management, power consumption management, and the like through the power management system. The power supply may also include any component of one or more dc or ac power sources, recharging systems, power failure detection circuitry, power converters or inverters, power status indicators, and the like. The electronic device 1 may further include various sensors, a bluetooth module, a Wi-Fi module, and the like, which are not described herein again.
Further, the electronic device 1 may further include a network interface 13, and optionally, the network interface 13 may include a wired interface and/or a wireless interface (such as a WI-FI interface, a bluetooth interface, etc.), which are generally used for establishing a communication connection between the electronic device 1 and other electronic devices 1.
Optionally, the electronic device 1 may further comprise a user interface, which may be a Display (Display), an input unit (such as a Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable for displaying information processed in the electronic device 1 and for displaying a visualized user interface, among other things.
It is to be understood that the described embodiments are for purposes of illustration only and that the scope of the appended claims is not limited to such structures.
The smart lock-based data acquisition program 10 stored in the memory 11 of the electronic device 1 is a combination of instructions that, when executed in the processor 12, enable:
an authentication step: receiving a user check-in request sent by a user, analyzing the user check-in request to obtain authentication information authenticated by a real name, and feeding back a user house selected interface according to the authentication information for the user to submit a check-in order;
a recording step: signing a check-in contract for the user according to the check-in order, and uploading the check-in contract to a house administrative department for record;
a monitoring step: monitoring whether an object to be identified exists in an induction range of the intelligent lock in real time, and starting an information acquisition function of an identity information acquisition unit of the intelligent lock and a data transmission function of a wireless communication unit when the object to be identified exists in the induction range;
an acquisition step: acquiring identity information input by a current user by using the information acquisition unit, and uploading the identity information to a related department system, a database and a block chain platform respectively in real time through the wireless communication unit;
an unlocking step: and comparing whether the identity information is consistent with preset information stored in a database in advance, and controlling a lock cylinder driving unit of the intelligent lock to execute an unlocking action when the identity information is consistent with the preset information.
In another embodiment, the program further performs the steps of:
and when the audio data does not exist in the data segment, judging whether a figure image type or a preset image type for identifying a key object exists in the image data, and if not, deleting the data segment.
In another embodiment, the program further performs the authorizing step:
after the check-in contract is signed, giving a door lock authority to the identity information corresponding to the user signing the check-in contract, generating an authorization record of the door lock authority, and uploading the authorization record to the block chain platform; and
and canceling the door lock authority corresponding to the landlord signing the check-in contract.
In another embodiment, the program further performs the defining step of:
and limiting the information acquisition function of the identity information acquisition unit to be started when the retention time of the object to be identified in the sensing area is monitored to be longer than or equal to the preset time.
In another embodiment, the program further performs the statistical step of:
and carrying out timing statistics on unlocking records of the user acquired based on the intelligent lock, and creating a record table according to the unlocking records and uploading the record table to the relevant department system, wherein the unlocking records comprise identity information, unlocking time and unlocking frequency.
Specifically, the specific implementation method of the instruction by the processor 12 may refer to the description of the relevant steps in the embodiment corresponding to fig. 1, which is not described herein again.
Further, the integrated modules/units of the electronic device 1, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. The computer-readable medium may include: any entity or system capable of carrying said computer program code, a recording medium, a usb-disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM).
In the embodiments provided by the present invention, it should be understood that the disclosed apparatus, system, and method may be implemented in other ways. For example, the system embodiments described above are merely illustrative, and for example, the division of the modules is only one logical functional division, and other divisions may be realized in practice.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof.
The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or systems recited in the system claims may also be implemented by one unit or system in software or hardware. The terms second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (10)

1. A data acquisition method based on an intelligent lock is characterized by comprising the following steps:
an authentication step: receiving a user check-in request sent by a user, analyzing the user check-in request to obtain authentication information authenticated by a real name, and feeding back a user house selected interface according to the authentication information for the user to submit a check-in order;
a recording step: signing a check-in contract for the user according to the check-in order, and uploading the check-in contract to a house administrative department for record;
a monitoring step: monitoring whether an object to be identified exists in an induction range of the intelligent lock in real time, and starting an information acquisition function of an identity information acquisition unit of the intelligent lock and a data transmission function of a wireless communication unit when the object to be identified exists in the induction range;
an acquisition step: acquiring identity information input by a current user by using the information acquisition unit, and uploading the identity information to a related department system, a database and a block chain platform respectively in real time through the wireless communication unit;
an unlocking step: and comparing whether the identity information is consistent with preset information stored in a database in advance, and controlling a lock cylinder driving unit of the intelligent lock to execute an unlocking action when the identity information is consistent with the preset information.
2. The intelligent-lock-based data acquisition method as claimed in claim 1, wherein the authentication information includes a user name, an identification card image, a user face image feature and a fingerprint feature.
3. The intelligent lock-based data acquisition method according to claim 2, wherein the real-name authentication step of the authentication information comprises:
uploading the authentication information of the user to a third party authority trusted identity authentication platform, judging whether the user name, the identity card image, the user face image feature and the fingerprint feature in the authentication information are the same person information or not through the third party authority trusted identity authentication platform, if so, determining that the user real-name authentication is successful and storing the authentication information into the database.
4. The smart lock-based data acquisition method as recited in claim 1, further comprising the step of authorizing:
after the check-in contract is signed, giving a door lock authority to the identity information corresponding to the user signing the check-in contract, generating an authorization record of the door lock authority, and uploading the authorization record to the block chain platform; and
and canceling the door lock authority corresponding to the landlord signing the check-in contract.
5. A smart lock based data acquisition method as claimed in claim 1, characterized in that it further comprises the defining step of:
and limiting the information acquisition function of the identity information acquisition unit to be started when the retention time of the object to be identified in the sensing area is monitored to be longer than or equal to the preset time.
6. The data acquisition method based on the intelligent lock as claimed in claim 1, wherein the information acquisition unit comprises one or more of a fingerprint identification unit, an induction card reading unit and a touch keyboard;
the fingerprint identification unit is used for collecting fingerprint characteristic values of users, the induction card reading unit is used for collecting entrance guard card information of the users, and the touch keyboard is used for collecting pattern information or digital information input by the users.
7. The smart lock-based data acquisition method as recited in claim 1, further comprising the statistical step of:
and carrying out timing statistics on unlocking records of the user acquired based on the intelligent lock, and creating a record table according to the unlocking records and uploading the record table to the relevant department system, wherein the unlocking records comprise identity information, unlocking time and unlocking frequency.
8. A data acquisition system based on a smart lock, comprising:
the authentication module is used for receiving a user check-in request sent by a user, analyzing the user check-in request to obtain authentication information authenticated by a real name, and feeding back a user house selected interface according to the authentication information for the user to submit a check-in order;
the record module is used for signing a check-in contract for the user according to the check-in order and uploading the check-in contract to a house governing department for record;
the monitoring module is used for monitoring whether an object to be identified exists in an induction range of the intelligent lock in real time, and starting an information acquisition function of an identity information acquisition unit of the intelligent lock and a data transmission function of a wireless communication unit when the object to be identified exists in the induction range;
the acquisition module is used for acquiring the identity information input by the current user by using the information acquisition unit and respectively uploading the identity information to a related department system, a database and a block chain platform in real time through the wireless communication unit;
and the unlocking module is used for comparing whether the identity information is consistent with preset information stored in a database in advance or not, and controlling the lock cylinder driving unit of the intelligent lock to execute unlocking action when the identity information is consistent with the preset information.
9. An electronic device, characterized in that the electronic device comprises a memory and a processor, the memory having stored thereon a data acquisition program which, when executed by the processor, implements the steps of the data acquisition method according to any one of claims 1-7.
10. A computer-readable storage medium having stored thereon a data acquisition program executable by one or more processors to perform the steps of the data acquisition method as claimed in any one of claims 1-7.
CN202110177078.0A 2021-02-07 2021-02-07 Data acquisition method and system based on intelligent lock, electronic equipment and storage medium Pending CN113285913A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110177078.0A CN113285913A (en) 2021-02-07 2021-02-07 Data acquisition method and system based on intelligent lock, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110177078.0A CN113285913A (en) 2021-02-07 2021-02-07 Data acquisition method and system based on intelligent lock, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113285913A true CN113285913A (en) 2021-08-20

Family

ID=77275833

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110177078.0A Pending CN113285913A (en) 2021-02-07 2021-02-07 Data acquisition method and system based on intelligent lock, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113285913A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116980478A (en) * 2023-09-22 2023-10-31 首都信息科技发展有限公司 Space management method, apparatus, electronic device, and computer-readable storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182798A (en) * 2014-09-02 2014-12-03 广州商景网络科技有限公司 Self-service room reservation method and system based on mobile device
CN106453605A (en) * 2016-10-28 2017-02-22 深圳市欧瑞博电子有限公司 Hotel room reservation information transfer method and system
CN107682339A (en) * 2017-10-13 2018-02-09 唐利伟 lodging data processing method, device, storage medium and computer equipment
CN107832863A (en) * 2017-12-05 2018-03-23 安徽尚易信息技术有限公司 A kind of self-service hotel's booking system based on cell phone application
CN108932773A (en) * 2018-06-15 2018-12-04 王若清 A kind of intelligent unlocking system and method
CN109215196A (en) * 2018-09-10 2019-01-15 上海若禅信息科技有限公司 Rental house management method and system based on intelligent door lock
CN109427120A (en) * 2017-08-30 2019-03-05 郭连花 A kind of hotel's intelligence door opening method and system
CN110334824A (en) * 2019-06-28 2019-10-15 阿里巴巴集团控股有限公司 Safety moves in method and device
CN110930544A (en) * 2018-08-29 2020-03-27 东莞中集智能科技有限公司 Hotel self-service check-in method and system and intelligent terminal
CN111179487A (en) * 2019-12-26 2020-05-19 北京中安百傲科技有限公司 Intelligent door lock and intelligent door lock system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182798A (en) * 2014-09-02 2014-12-03 广州商景网络科技有限公司 Self-service room reservation method and system based on mobile device
CN106453605A (en) * 2016-10-28 2017-02-22 深圳市欧瑞博电子有限公司 Hotel room reservation information transfer method and system
CN109427120A (en) * 2017-08-30 2019-03-05 郭连花 A kind of hotel's intelligence door opening method and system
CN107682339A (en) * 2017-10-13 2018-02-09 唐利伟 lodging data processing method, device, storage medium and computer equipment
CN107832863A (en) * 2017-12-05 2018-03-23 安徽尚易信息技术有限公司 A kind of self-service hotel's booking system based on cell phone application
CN108932773A (en) * 2018-06-15 2018-12-04 王若清 A kind of intelligent unlocking system and method
CN110930544A (en) * 2018-08-29 2020-03-27 东莞中集智能科技有限公司 Hotel self-service check-in method and system and intelligent terminal
CN109215196A (en) * 2018-09-10 2019-01-15 上海若禅信息科技有限公司 Rental house management method and system based on intelligent door lock
CN110334824A (en) * 2019-06-28 2019-10-15 阿里巴巴集团控股有限公司 Safety moves in method and device
CN111179487A (en) * 2019-12-26 2020-05-19 北京中安百傲科技有限公司 Intelligent door lock and intelligent door lock system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116980478A (en) * 2023-09-22 2023-10-31 首都信息科技发展有限公司 Space management method, apparatus, electronic device, and computer-readable storage medium

Similar Documents

Publication Publication Date Title
TWI414669B (en) Out of the room management system and out of the room management methods
US11450186B2 (en) Person monitoring system and person monitoring method
CN111563671A (en) Regional personnel management method, system, machine readable medium and equipment
CN110096606B (en) Foreign roll personnel management method and device and electronic equipment
CN112016520A (en) AI-based traffic violation voucher generation method, device, terminal and storage medium
CN111582693A (en) Population management method, system, machine readable medium and device
CN111814646A (en) Monitoring method, device, equipment and medium based on AI vision
CN113837030A (en) Intelligent personnel management and control method and system for epidemic situation prevention and control and computer equipment
CN110930566A (en) Safe rechecking method, system and device for vehicles to and from prisons and storable medium
CN113221589A (en) Electric vehicle management method, device, system and computer readable storage medium
CN109712291A (en) Open method, device and the server of electronic gate
CN111476685A (en) Behavior analysis method, device and equipment
CN113285913A (en) Data acquisition method and system based on intelligent lock, electronic equipment and storage medium
CN110728778A (en) Intelligent visitor reservation management system and method based on face recognition
CN112735015B (en) Community management method, device, machine-readable medium and equipment
CN114049658A (en) Floating population management method and device based on face recognition, computer equipment and storage medium
CN113326730A (en) Indoor elderly safety monitoring method and system, electronic equipment and medium
CN113378624A (en) Data transmission method, system, electronic device and medium based on gateway device
CN112837460A (en) Unattended intelligent access control system and personnel access management method
CN112509277A (en) Rental house monitoring method, device, equipment and storage medium
EP3109837A1 (en) System and method of smart incident analysis in control system using floor maps
CN116188223A (en) Personnel residence management system, method and electronic equipment
CN111126167A (en) Method and system for quickly identifying series activities of multiple specific persons
CN112669105B (en) Rental detection method, rental detection equipment and rental detection medium
US7784091B2 (en) Data processing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination