CN113379952A - Sharing management method and sharing management device for house key - Google Patents

Sharing management method and sharing management device for house key Download PDF

Info

Publication number
CN113379952A
CN113379952A CN202110662636.2A CN202110662636A CN113379952A CN 113379952 A CN113379952 A CN 113379952A CN 202110662636 A CN202110662636 A CN 202110662636A CN 113379952 A CN113379952 A CN 113379952A
Authority
CN
China
Prior art keywords
key
information
house
requester
management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110662636.2A
Other languages
Chinese (zh)
Other versions
CN113379952B (en
Inventor
管年丰
周钦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Fangjianghu Technology Co Ltd
Original Assignee
Beijing Fangjianghu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Fangjianghu Technology Co Ltd filed Critical Beijing Fangjianghu Technology Co Ltd
Priority to CN202110662636.2A priority Critical patent/CN113379952B/en
Publication of CN113379952A publication Critical patent/CN113379952A/en
Application granted granted Critical
Publication of CN113379952B publication Critical patent/CN113379952B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a house key sharing management method and a house key sharing management device, wherein the method comprises the following steps: receiving a key acquisition request sent by a requester, wherein the key acquisition request comprises personal identity information of the requester and house information to be checked; verifying the personal identity information; and if the verification is passed, executing corresponding key distribution operation based on the acquired key management information and the key acquisition request. The traditional manual management method is improved, authority management is carried out on the use of the key, when a requester needs to use the key, the requester acquires authority according to the key corresponding to personal identity verification, and corresponding key distribution operation is executed on the requester, so that accurate management of the house-watching key is realized, the condition that the client is long-time due to the fact that the requester who really needs the key cannot acquire the house-watching key is avoided, the working efficiency of a house agency is improved, and the user experience is improved.

Description

Sharing management method and sharing management device for house key
Technical Field
The invention relates to the technical field of house management, in particular to a house key sharing management method and a house key sharing management device.
Background
With the continuous advance of urbanization, the size of cities is continuously increased, and the house resources of the cities are increasingly lacked. Due to high demand, housing selling prices in cities are higher and higher, heavy life burden is caused to young people of the new generation, and more people select renting houses.
In cities, most people choose to rent rooms assisted by a property broker because the property broker holds a lot of renting resources in hand. After the client finds the house intermediary, the house intermediary brings the client to the corresponding house type to see the house. In the current general practice, a property broker often needs to bring a large number of door keys, and in order to be portable, the property broker often puts a large number of door keys on a key ring to be carried, so that the user can check the door keys back and forth between different house types.
However, in the practical application process, because the property resources are often mastered by a plurality of property agents at the same time, once one property agent takes the key away, another property agent needing to use the key cannot timely know the specific use state and the placement position of the key, so that the working efficiency is low, and the user experience is low.
Disclosure of Invention
In order to solve the technical problems of low working efficiency, low user experience and the like caused by the fact that a house key management method in the prior art is backward, the embodiment of the invention provides a house key sharing management method and a house key sharing management device.
In order to achieve the above object, an embodiment of the present invention provides a house key sharing management method, where the house key sharing management method includes: receiving a key acquisition request sent by a requester, wherein the key acquisition request comprises personal identity information of the requester and house information to be checked; verifying the personal identity information; and if the verification is passed, executing corresponding key distribution operation based on the acquired key management information and the key acquisition request.
Preferably, the verification of the personal identity information comprises the following steps: judging whether the requester has a key acquisition right or not based on the key management information and the personal identity information, and if the requester has the key acquisition right, passing the verification; or the sharing management method further comprises: if the personal identity information is illegal identity information or the personal identity information is in a limited state or the requester does not have the key acquisition right, the verification is not passed and prompt information for failing to pass the verification is generated.
Preferably, the executing the corresponding key assignment operation based on the acquired key management information and the key acquisition request includes: acquiring house information to be checked based on the key acquisition request; acquiring corresponding key information based on the key management information; a corresponding key assignment operation is performed based on the key information.
Preferably, the performing a key distribution operation on the key based on the key information includes: judging whether the house to be checked is being checked or not based on key state information corresponding to the key information; and if the house to be checked is being checked, generating and feeding back corresponding prompt information.
Preferably, the sharing management method further includes: and if the house to be checked is not checked, executing corresponding key distribution operation.
Preferably, the sharing management method further includes: if the requester executes the key returning operation within the preset time, recording corresponding viewing information; or the sharing management method further comprises: and if the requester does not execute the key returning operation within the preset time, sending prompt information to the requester.
Correspondingly, the invention also provides a house key sharing management device, which comprises: the receiving module is used for receiving a key storage and management request or a key acquisition request sent by a requester; the control module is used for verifying the identity information of the requester and generating a control instruction based on a verification result; and the key management module is used for executing corresponding key storage and management operation or key distribution operation based on the control command.
Preferably, the sharing management device further comprises an information display module, configured to display corresponding information when/after the key management module performs a key management operation; or the sharing management device further comprises: the identity information acquisition module is used for acquiring the personal identity information of the user within a preset range based on a control instruction sent by the control module; the control module is also used for verifying the personal identity information and obtaining a verification result.
Preferably, the key management module includes: a housing assembly for housing the house key and/or an assembly connected to the house key, the housing assembly including an openable/closable opening; and an opening/closing member disposed at the opening/closing port for performing an opening/closing operation or a pop-up/pop-up operation.
Preferably, the opening and closing assembly includes: an opening/closing door matched with the opening/closing port; and the driving assembly is connected with the opening and closing door and used for controlling the opening and closing door to execute corresponding operation based on a control command sent by the control module.
In another aspect, the present invention also provides a computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements the method provided by the present invention.
The traditional manual management method is improved, authority management is carried out on the use of the key, when a requester needs to use the key, the requester acquires authority according to the key corresponding to personal identity verification, and corresponding key distribution operation is executed on the requester, so that accurate management of the house-watching key is realized, the condition that the client is long-time due to the fact that the requester who really needs the key cannot acquire the house-watching key is avoided, the working efficiency of a house agency is improved, and the user experience is improved.
Additional features and advantages of the invention will be set forth in the detailed description which follows.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a flowchart illustrating a specific implementation of a house key sharing management method according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a specific implementation of a key allocation operation in a house key sharing management method according to an embodiment of the present invention
Fig. 3 is a schematic structural diagram of a house key sharing management apparatus according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a house key sharing management apparatus according to another embodiment of the present invention;
fig. 5 is a schematic structural diagram of a key management module in the house key sharing management apparatus according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a key management module in the house key sharing management apparatus according to another embodiment of the present invention;
fig. 7 is a schematic structural diagram of a house key sharing management apparatus according to another embodiment of the present invention;
fig. 8 is a schematic structural diagram of a control device in a house key sharing management device according to an embodiment of the present invention.
Description of reference numerals:
100 receiving module 200 control module
201 wireless communication component 202 data storage component
203 operation response component 204 authentication component
300 Key management Module 301 housing Assembly
302 openable/closable opening 303 opening and closing assembly
304 fastener assembly 313 opening and closing door
323 driving assembly 400 information display module
500 identity information acquisition module 600 cloud server
Detailed Description
In order to solve the technical problems of poor management accuracy, low working efficiency and low user experience caused by the fact that a house key management method in the prior art is backward, the embodiment of the invention provides a house key sharing management method and a house key sharing management device.
The following detailed description of embodiments of the invention refers to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present invention, are given by way of illustration and explanation only, not limitation.
It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict.
"signal connection" as used in embodiments of the present invention is intended to mean a signal connection between two components, such as a control signal and a feedback signal; the term "electrical connection" is used to describe an electrical power connection between two components; "connected" may be a direct connection between two elements or an indirect connection through a third element.
The terms "system" and "network" in embodiments of the present invention may be used interchangeably. The "plurality" means two or more, and in view of this, the "plurality" may also be understood as "at least two" in the embodiments of the present invention. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" generally indicates that the preceding and following related objects are in an "or" relationship, unless otherwise specified. In addition, it should be understood that the terms first, second, etc. in the description of the embodiments of the invention are used for distinguishing between the descriptions and are not intended to indicate or imply relative importance or order to be construed.
Referring to fig. 1, the present invention provides a house key sharing management method, applied to a house key sharing management apparatus, the house key sharing management method including:
s10) receiving a key acquisition request sent by a requester, wherein the key acquisition request comprises the personal identity information of the requester and the house information to be checked;
s20) verifying the personal identity information;
s30) if the verification result passes, executing a corresponding key assignment operation based on the acquired key management information and the key acquisition request.
In the embodiment of the present invention, the verifying the personal identity information includes the following steps: judging whether the requester has a key acquisition right or not based on the key management information and the personal identity information, and if the requester has the key acquisition right, passing the verification; or the sharing management method further comprises: if the personal identity information is illegal identity information or the personal identity information is in a limited state or the requester does not have the key acquisition right, the verification is not passed and prompt information for failing to pass the verification is generated.
In the embodiment of the present invention, the key management information includes, but is not limited to, key information, house information of a house corresponding to the key, and broker information with a right to borrow the key (for example, broker information to maintain the house, or broker information with a right set according to a requirement).
In order to uniformly and accurately manage house keys, in one possible implementation mode, a technician firstly creates corresponding key management information according to house number information, house position information, key information, house source maintenance broker information and other information in a current area, wherein the key management information at least comprises the house number information, the house position information, the key information, the house source maintenance broker information and other information, and then each key management information forms a key database. In the embodiment of the present invention, a technician may also add or delete corresponding information content in the key management information according to actual needs, and the present invention also belongs to the protection scope of the present invention, and therefore, redundant description is not repeated herein.
After the key management information is established, the technician uploads the key management information to the key sharing management device, and at the moment, the key sharing management device starts to monitor whether a key acquisition request sent by a requester is acquired in real time. For example, when a broker needs to go to a house with a customer, a key acquisition request is first issued to the sharing management apparatus by clicking a corresponding option on an input device (e.g., a touch screen, a key pad) of the sharing management apparatus. The key acquisition request may include the broker's personally identifiable information and the house information to be viewed. After a key acquisition request of a requester is acquired, identity information verification is performed on the user, for example, face information of the requester is acquired through a camera, feature extraction is performed on the face information to acquire corresponding feature information, and the feature information is used as personal identity information of the requester, or identity information input by the user is used as personal identity information to be verified. At this time, the shared management apparatus immediately verifies the individual identification information, for example, the acquired individual identification information may be queried or checked in the key management information to determine whether the broker is a legitimate broker. For example, in an embodiment, the broker is a broker described in the key database, and therefore if it is determined that the broker is a legitimate broker, it is determined that the verification is passed, and at this time, the shared management apparatus acquires a key corresponding to the key acquisition request based on the key management information and performs a key assignment operation.
In another possible implementation, in order to further improve the management accuracy of the key, after the key acquisition request is acquired, the validity of the personal identification information of the requester is first verified in advance, for example, by verifying whether the personal identification information belongs to a preset maintainer or a preset person with key management authority, for example, in this embodiment, the requester is a preset maintainer, and therefore it is determined that the requester has the key acquisition authority, and the verification is passed, and then the key assignment operation corresponding to the requester is performed. Therefore, the house key can be strictly monitored through the control of the user identity information, and more accurate key management is realized.
It should be noted that, in the embodiment of the present invention, it may also be determined whether to acquire the key acquisition request of the user by configuring an operation button on the shared management device and monitoring whether the operation button is operated in real time; or by setting the barcode tag on the site, the user scans the barcode tag through the smart mobile terminal, and wirelessly communicates with the sharing management device in a wireless communication manner to send a key acquisition request to the sharing management device, which all belong to the protection scope of the present invention and are not described in detail herein.
In the embodiment of the invention, the key management information is generated by the information of each key, the corresponding house number information, the house position information, the corresponding broker information and the like with the association relation, and the key management information is shared in a cloud, so that all brokers in different areas can acquire the related use and storage information of the key of each house in real time in the cloud, the key can be acquired in time when the key is needed to be used, and meanwhile, the taking operation of the broker taking the key is recorded and updated in real time, so that the management accuracy of the key is greatly improved, the working efficiency of the broker is improved, the long-time waiting of a client is avoided, and the user experience is improved.
Furthermore, by monitoring the key acquisition authority, only requesters with the key acquisition authority can be allowed to distribute keys, and the key acquisition is not allowed to any legal broker, so that the management accuracy of the keys is further improved, and the working efficiency of the broker is improved.
In another possible embodiment, the shared management apparatus includes an identification card recognition apparatus, and when a certain broker needs to take a certain key, the shared management apparatus first sends a key acquisition request to the shared management apparatus, and then places its own identification card on the identification card recognition apparatus, at this time, the identification card recognition apparatus reads the personal identification information stored on the identification card, and then verifies the personal identification information.
In still another embodiment, the sharing management device further verifies that the requester does not have the key acquisition right after acquiring the personal identification information of the requester, and therefore determines that the verification is not passed and generates a prompt message indicating that the verification is not passed.
In the embodiment of the invention, the requester who wants to acquire the key is subjected to identity verification, and the authority for acquiring the key is opened only for the requester with legal identity, so that random acquisition and random placement of the key are effectively avoided, the problems that key management is disordered, the key is lost and the like in the prior art are solved, and the management accuracy of the key is improved.
Referring to fig. 2, in an embodiment of the present invention, the executing a corresponding key distribution operation based on the acquired key management information and the key acquisition request includes:
s31) acquiring the house information to be checked based on the key acquisition request;
s32) acquiring corresponding key information based on the key management information;
s33) performs a corresponding key assignment operation based on the key information.
In an actual application process, the shared management device determines that the personal identity information of the requester is a legal identity, so the to-be-checked house information is further extracted from the key acquisition request, and then key information corresponding to the to-be-checked house information is acquired from the key management information, for example, the key information may include a current use state of the key, and if the key is in an unused state, the key information includes a current placement position of the key. The sharing management device executes corresponding prompting operation or key distribution operation according to the use state or the placement position.
Further, in an embodiment of the present invention, the performing a key assignment operation on the key based on the key information includes: judging whether the house to be checked is being checked or not based on key state information corresponding to the key information; and if the house to be checked is being checked, generating and feeding back corresponding prompt information.
In a possible embodiment, the a broker needs to obtain a certain key, and therefore issues a key obtaining request to the shared management device and determines the key obtaining authority of the a broker through the shared management device, at this time, the shared management device executes a corresponding key allocation operation, during the execution, the shared management device obtains that the key is currently in a use state, and therefore determines that the house to be viewed is being viewed, and immediately issues a corresponding prompt message to the a broker, for example, the basic information of the broker who takes the house key (for example, the basic information of the broker that takes the house key includes, but is not limited to, a broker name, a contact way, and the like), the time when the key is taken, and the basic information of the house (for example, the basic information of the house includes, but is not limited to, a house name, address information, and the like), Floor number, etc.).
In this embodiment of the present invention, the sharing management method further includes: and if the house to be checked is not checked, executing corresponding key distribution operation.
In this embodiment of the present invention, the sharing management method further includes: operation information for performing the key assignment operation is recorded.
In a possible embodiment, when the shared management device obtains the key acquisition request and determines that the house to be checked is not checked, the shared management device immediately performs a corresponding key allocation operation, for example, opens a cabinet door storing a key corresponding to the house to be checked, further, in order to enhance management of the key and improve traceability of key access, after opening the cabinet door, the shared management device further records operation information for performing the key allocation operation, for example, in this embodiment, the operation information includes, but is not limited to, operation time, operator information and the like related to the operation.
In the embodiment of the invention, the accuracy of key allocation can be further improved by further judging whether to execute key allocation operation according to the use state of the key, and meanwhile, the use state of the key is tracked, recorded and fed back in time, so that the acquisition efficiency of a broker for acquiring house-watching keys can be effectively improved, and the working efficiency of the broker is improved.
In this embodiment of the present invention, the sharing management method further includes: if the requester executes the key returning operation within the preset time, recording corresponding viewing information; or the sharing management method further comprises: and if the requester does not execute the key returning operation within the preset time, sending prompt information to the requester.
In one possible embodiment, after the requester takes the key and records the taken information, the shared management device also monitors the key return operation of the requester. If the requester does not perform the corresponding key returning operation after the key is taken, the unreturned time of the requester is monitored in real time based on the operation time.
In another embodiment, after a certain broker acquires a key, if no key returning operation is performed within a predetermined time, a corresponding prompt message is sent to the broker, for example, a fetching timeout prompt message corresponding to the acquired key is sent to a mobile terminal of the broker.
Further, in order to improve the accuracy and effectiveness of management of keys and avoid the situation that a broker occupies keys for a long time and causes trouble and trouble to other brokers, unreturned actions of the broker are continuously monitored. For example, in an embodiment, the shared management apparatus monitors, in real time, the number of times of timeout that unreturned time of a key unreturned by a broker exceeds a preset time threshold, and if the unreturned time exceeds the preset time threshold, for example, the preset time threshold is 24h, immediately generates corresponding warning information, for example, sends corresponding short message warning information to a mobile terminal of the broker, so as to warn the broker. Further, at another moment, the sharing management apparatus monitors that the number of times out that the unreturned time of the broker exceeds the preset time threshold reaches the preset number threshold, for example, the preset number threshold is 3 times, and then sets the personal information of the requester to a restricted state, for example, the requester is included in a blacklist system to further restrict the authority of the requester.
In the embodiment of the invention, the key use state, the use time and the like of the broker are monitored in real time, and the broker is required to return the key in time, so that the accuracy of key management is further improved, long-time occupation of key resources is avoided, and each broker can reasonably share each key with other brokers on the basis of reasonably using the key, so that the utilization rate of the key resources is improved, the working efficiency of the broker is improved, and the user experience is improved.
A house key sharing management apparatus according to an embodiment of the present invention will be described below with reference to the drawings.
Referring to fig. 3, based on the same inventive concept, an embodiment of the present invention provides a house key sharing management apparatus, including: a receiving module 100, configured to receive a key storage request or a key acquisition request sent by a requester; the control module 200 is configured to verify the identity information of the requester and generate a control instruction based on a verification result; and the key management module 300 is configured to execute a corresponding key storage operation or key distribution operation based on the control command.
Referring to fig. 4 and 5, in the embodiment of the present invention, the sharing management apparatus may further include an information display module 400, configured to display corresponding information when/after the key management module 300 performs the key management operation; or the sharing management device further comprises: the identity information acquisition module 500 is used for acquiring the personal identity information of the user within a preset range based on a control instruction sent by the control module 200; the control module 200 is further configured to verify the personal identity information and obtain a verification result.
Preferably, the identity information collecting module 500 is any one of a face recognition device, a fingerprint recognition device, an identification code recognition device, a wireless tag recognition device and an identity card recognition device.
In the embodiment of the present invention, the information display module 400 and the receiving module 100 may be an integrated device, for example, a touch screen.
Referring to fig. 6, in the embodiment of the present invention, the key management module 300 includes: a housing assembly 301 for housing the house key and/or a component connected to the house key, the housing assembly 301 comprising a housing compartment provided with an openable/closable opening 302; an opening/closing member 303 is disposed at the openable/closable opening 302, and performs an opening/closing operation or a pop-up/pop-up operation.
In the embodiment of the present invention, the opening and closing member 303 includes: an opening/closing door 313, the opening/closing door 313 matching the openable/closable opening 302; and the driving component 323 is connected with the opening and closing door 313 and is used for controlling the opening and closing door 313 to execute corresponding operation based on a control command sent by the control module 200.
In a possible embodiment, the shared management device is a cabinet (not shown), the cabinet is provided with a plurality of key storage modules 300, each key storage module 300 comprises an accommodating component 301, the accommodating component 301 is an accommodating cavity, an opening/closing door 313 is arranged on the accommodating cavity, the opening/closing door 313 is connected with an opening/closing opening on the accommodating cavity through a driving component 323, and the opening/closing door is controlled by the driving component 323 to perform an opening/closing operation, for example, in the embodiment of the present invention, the driving component 323 is a rotating motor.
Referring to fig. 7, in another possible embodiment, the shared management apparatus includes a plurality of key storage modules 300, each of the key storage modules 300 has a receiving component 301 for receiving a component connected to a house key, for example, the component connected to the house key is a buckle component 304, during the key storage process, a broker inserts the buckle component 304 into the receiving component 301 through an openable/closable opening 302 (not shown), and when the openable/closable door 313 is in an opened state, the driving component 323 (not shown) automatically performs a spring-in operation on the inserted buckle component 304; in the process of taking the key, the driving component 323 executes an ejecting operation on the buckle component 304 according to the control command, so that the buckle component is pushed out of the accommodating component 301, and the house key storing/taking operation is realized.
In an embodiment of the present invention, the drive assembly 323 is further configured to: when the opening/closing operation or the pop-in/pop-out operation is performed, the opening/closing operation or the pop-in/pop-out operation is fed back to the control module 200. For example, in an embodiment, after receiving the opening/closing operation or the pop-in/pop-out operation, the control module determines that the execution of the opening/closing operation or the pop-in/pop-out operation is completed, and records the operation time of the opening/closing operation or the pop-in/pop-out operation, for example, the recorded time may be uploaded to the cloud server 600 or locally stored.
In a possible embodiment, the sharing management device further includes an identity information collecting module 500 disposed on the opening/closing door 313, and the receiving module 100, for example, in an embodiment of the present invention, the identity information collecting module 500 is a wireless tag identification device RFID, and the receiving module 100 is an operation button.
Referring to fig. 8, in the embodiment of the present invention, the control module 200 includes: the wireless communication component 201 is in signal connection with the cloud server 600, and is used for acquiring and forwarding wireless communication information sent from the cloud server 600; the data storage component 202 is electrically connected with the wireless communication component 201 and is used for analyzing the wireless communication information and storing the analyzed key management information; the operation response component 203 is electrically connected with the receiving module 100, the wireless communication component 201 and the identity information acquisition module 500, and is used for acquiring the operation information sent by the receiving module 100 or analyzing the wireless communication information to generate the operation information, generating a corresponding information acquisition control instruction based on the operation information and sending the information acquisition control instruction to the identity information acquisition module 500; the identity verification component 204 is electrically connected with the data storage component 202, the identity information acquisition module 500 and the opening and closing component 303, and is used for verifying the personal identity information based on the key management information to generate a corresponding verification result, generating a corresponding control instruction under the condition that the verification result is a legal identity, and sending the control instruction to the opening and closing component 303.
In a possible embodiment, a certain broker needs to access a certain key, and therefore scans a barcode identifier disposed on the opening/closing door 313 by opening a corresponding Application software (APP) so as to obtain information such as a key number corresponding to the barcode identifier, at this time, the broker sends a request instruction for accessing the key to the data storage component 201 in the control module 200 via the cloud server 600 through the APP. After the request instruction is acquired, the request instruction is forwarded to the operation response component 202, the operation response component analyzes corresponding operation information from the request instruction, then generates a corresponding information acquisition control instruction according to the operation information and sends the corresponding information acquisition control instruction to the identity information acquisition module 500, after the personal identity information fed back by the identity information acquisition module 500 is acquired, the control module 200 verifies the personal identity information of the broker through the identity verification component 203, generates a corresponding key-taking control instruction after the verification is passed and sends the corresponding key-taking control instruction to the opening and closing component 303.
In this embodiment of the present invention, the data storage module 201 is further configured to: after the opening/closing operation or the pop-in/pop-out operation fed back by the driving component 323 is acquired, the key management information is updated to obtain updated management information, and the updated management information is sent to the cloud server 600.
In an embodiment of the present invention, the control module 200 further comprises a monitoring component, configured to: judging whether the user executes key returning operation within a preset time threshold value; and if the user does not execute the key returning operation within the preset time threshold, generating and sending corresponding warning information.
In an embodiment of the present invention, the monitoring component is further configured to: judging whether the sending times of the warning information is greater than a preset time threshold value or not; and if the sending times are greater than the preset times threshold, setting the personal identity information of the user to be in a limited state.
Further, an embodiment of the present invention also provides a computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements the method of the present invention.
The preferred embodiments of the present invention have been described in detail with reference to the accompanying drawings, however, the present invention is not limited to the specific details of the above embodiments, and various simple modifications can be made to the technical solution of the present invention within the technical idea of the present invention, and these simple modifications are within the protective scope of the present invention.
It should be noted that the various technical features described in the above embodiments can be combined in any suitable manner without contradiction, and the invention is not described in any way for the possible combinations in order to avoid unnecessary repetition.
Those skilled in the art will understand that all or part of the steps in the method according to the above embodiments may be implemented by a program, which is stored in a storage medium and includes several instructions to enable a single chip, a chip, or a processor (processor) to execute all or part of the steps in the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In addition, any combination of the various embodiments of the present invention is also possible, and the same should be considered as the disclosure of the present invention as long as it does not depart from the spirit of the present invention.

Claims (10)

1. A house key sharing management method is characterized by comprising the following steps:
receiving a key acquisition request sent by a requester, wherein the key acquisition request comprises personal identity information of the requester and house information to be checked;
verifying the personal identity information;
and if the verification is passed, executing corresponding key distribution operation based on the acquired key management information and the key acquisition request.
2. The sharing management method according to claim 1,
the method for verifying the personal identity information comprises the following steps:
judging whether the requester has a key acquisition right or not based on the key management information and the personal identity information, and if the requester has the key acquisition right, passing the verification; or
The sharing management method further comprises the following steps:
if the personal identity information is illegal identity information or the personal identity information is in a limited state or the requester does not have the key acquisition right, the verification is not passed and prompt information for failing to pass the verification is generated.
3. The sharing management method according to claim 1, wherein the executing of the corresponding key assignment operation based on the acquired key management information and the key acquisition request includes:
acquiring house information to be checked based on the key acquisition request;
acquiring corresponding key information based on the key management information;
a corresponding key assignment operation is performed based on the key information.
4. The share management method according to claim 3, wherein the performing a key assignment operation on the key based on the key information includes:
judging whether the house to be checked is being checked or not based on key state information corresponding to the key information;
and if the house to be checked is being checked, generating and feeding back corresponding prompt information.
5. The sharing management method according to claim 3 or 4, characterized in that the sharing management method further comprises:
and if the house to be checked is not checked, executing corresponding key distribution operation.
6. The sharing management method according to claim 1, wherein the sharing management method further comprises:
if the requester executes the key returning operation within the preset time, recording corresponding viewing information; or
The sharing management method further comprises the following steps:
and if the requester does not execute the key returning operation within the preset time, sending prompt information to the requester.
7. A house key sharing management apparatus, characterized by comprising:
the receiving module is used for receiving a key storage and management request or a key acquisition request sent by a requester;
the control module is used for verifying the identity information of the requester and generating a control instruction based on a verification result;
and the key management module is used for executing corresponding key storage and management operation or key distribution operation based on the control command.
8. The sharing management apparatus according to claim 7,
the sharing management device also comprises an information display module used for displaying corresponding information when/after the key management module executes key management operation; or
The sharing management apparatus further includes:
the identity information acquisition module is used for acquiring the personal identity information of the user within a preset range based on a control instruction sent by the control module;
the control module is also used for verifying the personal identity information and obtaining a verification result.
9. The sharing management device according to claim 7, wherein the key management module includes:
a housing assembly for housing the house key and/or an assembly connected to the house key, the housing assembly including an openable/closable opening; and
and the opening and closing assembly is configured at the opening/closing port and used for executing opening/closing operation or popup/ejection operation.
10. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, is adapted to carry out the method of any one of claims 1 to 6.
CN202110662636.2A 2021-06-15 2021-06-15 Sharing management method and sharing management device for house key Active CN113379952B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110662636.2A CN113379952B (en) 2021-06-15 2021-06-15 Sharing management method and sharing management device for house key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110662636.2A CN113379952B (en) 2021-06-15 2021-06-15 Sharing management method and sharing management device for house key

Publications (2)

Publication Number Publication Date
CN113379952A true CN113379952A (en) 2021-09-10
CN113379952B CN113379952B (en) 2023-02-28

Family

ID=77574494

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110662636.2A Active CN113379952B (en) 2021-06-15 2021-06-15 Sharing management method and sharing management device for house key

Country Status (1)

Country Link
CN (1) CN113379952B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114120541A (en) * 2021-09-23 2022-03-01 贵州电网有限责任公司 Intelligent safety tool cabinet based on facial recognition technology and memory function and control method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017071249A1 (en) * 2015-10-28 2017-05-04 广州畅联信息科技有限公司 Access management method and system
CN107644493A (en) * 2017-09-22 2018-01-30 深圳市我能成才企业管理有限公司 A kind of intelligence sees room device and its system
CN110675287A (en) * 2019-10-12 2020-01-10 南京我爱我家信息科技有限公司 Real estate industry house key management system and method
CN111667331A (en) * 2019-03-08 2020-09-15 上海助邦信息技术有限公司 House watching system applied to house leasing or selling

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017071249A1 (en) * 2015-10-28 2017-05-04 广州畅联信息科技有限公司 Access management method and system
CN107644493A (en) * 2017-09-22 2018-01-30 深圳市我能成才企业管理有限公司 A kind of intelligence sees room device and its system
CN111667331A (en) * 2019-03-08 2020-09-15 上海助邦信息技术有限公司 House watching system applied to house leasing or selling
CN110675287A (en) * 2019-10-12 2020-01-10 南京我爱我家信息科技有限公司 Real estate industry house key management system and method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114120541A (en) * 2021-09-23 2022-03-01 贵州电网有限责任公司 Intelligent safety tool cabinet based on facial recognition technology and memory function and control method

Also Published As

Publication number Publication date
CN113379952B (en) 2023-02-28

Similar Documents

Publication Publication Date Title
WO2018090839A1 (en) Identity verification system, method, device, and account verification method
CN111402578A (en) Shared vehicle monitoring method and device based on track monitoring and computer equipment
CN109359601A (en) Authentication recognition methods, electronic device and computer readable storage medium
CN100583114C (en) System and method for remote security enablement
CN103679831B (en) A kind of handheld terminal, Time Attendance Device, electronic attendance system and Work attendance method
EP3211825B1 (en) Trusted terminal verification method and apparatus
CN104850771A (en) Identity verification method and related equipment
CN110414258A (en) Document handling method and system, data processing method
CN104969180A (en) User authorization and presence detection in isolation from interference from and control by host central processing unit and operating system
CN110619529A (en) Anti-channel conflict method based on positioning and tracking
CN105721468A (en) Communication method and device
CN110162942B (en) Identity verification method, device, equipment and storage medium based on time stamp
CN113379952B (en) Sharing management method and sharing management device for house key
CN107733835A (en) A kind of self-service borrowing-returning books system in library based on O2O and method
CN110362446A (en) Mobile application abnormal operation monitoring method, device, storage medium and electronic equipment
US20210327285A1 (en) Flight processing method and control device, unmanned aerial vehicle, server, and smart terminal
CN113379969A (en) Shared laboratory control method, system, equipment and medium
US10410443B2 (en) System and method to control access to hazardous machines
CN107786349B (en) Security management method and device for user account
CN115174266B (en) Air conditioner control method, device, electronic equipment and computer readable storage medium
CN110502885A (en) Identity identifying method, system, computer equipment and computer readable storage medium
CN115906028A (en) User identity verification method and device and self-service terminal
CN113012361A (en) Intelligent cabinet, system and method for storing digital certificate
CN111861491A (en) Information verification method, device and equipment
CN111256757A (en) Medical equipment monitoring system and method based on cloud computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant