CN116912041A - Entrance management method based on network house-making and civil-hosting - Google Patents

Entrance management method based on network house-making and civil-hosting Download PDF

Info

Publication number
CN116912041A
CN116912041A CN202310901939.4A CN202310901939A CN116912041A CN 116912041 A CN116912041 A CN 116912041A CN 202310901939 A CN202310901939 A CN 202310901939A CN 116912041 A CN116912041 A CN 116912041A
Authority
CN
China
Prior art keywords
check
resident
room
actual
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310901939.4A
Other languages
Chinese (zh)
Inventor
高柳
欧阳福全
陈志榕
陈雅霜
杜强生
蔡文强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Guangyi Bohui Information Technology Co ltd
Original Assignee
Xiamen Guangyi Bohui Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Guangyi Bohui Information Technology Co ltd filed Critical Xiamen Guangyi Bohui Information Technology Co ltd
Priority to CN202310901939.4A priority Critical patent/CN116912041A/en
Publication of CN116912041A publication Critical patent/CN116912041A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/12Hotels or restaurants
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00904Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00841Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed by a portable device
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention discloses a check-in management method based on network house and civil sink, wherein a user places a bill by using current equipment; the method comprises the steps that an actual check-in person sends an identity verification prompt after a mobile device of the actual check-in person obtains a check-in order; after the authentication is completed, the information is automatically uploaded to a security system for recording, and is sent to the information between houses and the door opening key; judging whether the room is opened or not, wherein the following conditions are at least satisfied: judging whether the positioning of the mobile equipment of the actual resident is within a first manually set distance range or not by taking the position of the resident room as a reference, and carrying out identity verification; judging whether the positioning of the mobile equipment of the actual resident is in a second range set by people or not by taking the position of the resident room as a reference, and judging whether the Bluetooth of the mobile equipment of the actual resident can be matched with the Bluetooth of a door lock of the resident room or not; the check-in management method solves the problems that the check-in management of the existing civilian hosts, network houses and the like is not compliant, and the existing nonstandard loopholes easily provide convenience for criminals to conduct crimes.

Description

Entrance management method based on network house-making and civil-hosting
Technical Field
The invention relates to the field of accommodation services, in particular to a living management method based on network house making and accommodation.
Background
Nowadays, no matter travel or business trip office, etc., the business trip office needs accommodation; the existing accommodation modes are mostly divided into hotels (including hotels, hotels and the like), civilian accommodation, network about houses and the like; in order to facilitate check-in, privacy or due to factors such as accommodation cost, most consumers can select a residential or network house, while the mode provides some convenience, a plurality of irregular phenomena (different from the hotel with regular procedures and safety report matters) exist at the same time, so that the residential or network house is easy to be leaked by lawless persons, and the residential or network house cannot provide data (data such as real check-in personnel information, real check-in personnel number and the like) to a public security system in real time, so that some illegal events occur, feedback cannot be acquired at the first time when police occurs, and the best case breaking opportunity is missed;
in summary, existing living management systems for civilian hosts, network about rooms, and the like are to be further improved and promoted.
Disclosure of Invention
The invention aims to overcome the defects or problems in the background art, and provides a check-in management method based on network house and civil house, which is simple and convenient to operate and easy to implement, and solves the problems that the check-in management of the existing civil house, network house, some hotels and the like is not compliant, and the existing non-standard loopholes are easy to provide convenience for criminals to implement crimes.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
a check-in management method based on network house and civil destination,
the user places an order by using the current equipment, and inputs the mobile phone number information, the identity information and the check-in time of the actual check-in person to generate a check-in order;
the method comprises the steps that an actual check-in person enters a man-machine interaction interface through mobile phone number information on mobile equipment to check in an order, and after the current mobile equipment acquires the check-in order, an identity verification prompt is sent and the prompt is required to be completed before check-in; after the authentication is completed, the information is automatically uploaded to a security system for recording, and is sent to the information between houses and the door opening key;
wherein, judge whether open and live the room and should meet at least the following condition:
first condition: judging whether the positioning of the mobile equipment of the actual resident is within a first manually set distance range or not by taking the position of the resident room as a reference, and carrying out identity verification;
second condition: and judging whether the positioning of the mobile equipment of the actual resident is in a second range set by people or not by taking the position of the resident room as a reference, and whether the Bluetooth of the mobile equipment of the actual resident can be matched with the Bluetooth of the door lock of the resident room or not.
Further, identity verification is performed within a manually set first distance range defined in the first condition, comprising: the actual check-in person performs face recognition verification within a first distance range set by a person centering on the position of the check-in room, and the first distance range set by the person is 100-1000 meters.
Further, in the second condition, the second distance range is a range covering no more than 10 meters outward with reference to a position of entering the room.
Further, the actual resident enters a man-machine interaction interface through mobile phone number information on the mobile equipment to consult a resident order or obtain a unique mac address in the mobile equipment when carrying out identity verification, and generates positioning information to be sent to a server; when the mobile device of the actual resident approaches the door lock, bluetooth is automatically connected, and the actual resident opens the door through the mobile device or the input door opening key.
Further, if the mobile device of the person who actually enters cannot be connected with Bluetooth and the door-opening key is input, a re-identity verification prompt is sent, and after verification is passed, a new door-opening key is changed and a new Bluetooth connection is established; if the identity verification is not matched with the identity information of the actual resident, the door of the resident room cannot be opened.
Further, the door of the living room is also provided with an induction component which is used for the server to judge the number of the living persons and judge the living persons to enter and exit the room after induction; the sensing assembly is used for acquiring the moving direction or track of the sensing body, and judging the entering room and the exiting room of the entering person; and sending a prompt to require the supplementary recording of the identity information of the actual check-in personnel when the check-in personnel number is judged to be not corresponding to the check-in personnel number in the first time period set by people, and reporting the identity information to a safety system.
Further, the sensing assembly is configured as an angle sensor, a radar sensor, or at least two infrared sensors.
Further, the time point when the resident enters the room is the starting point, and in a second period set by people, the sensing component does not sense the door opening and closing of the resident, and then an alarm is sent.
From the above description of the present invention, compared with the prior art, the present invention has the following advantages:
the invention provides a check-in management method based on network appointment rooms and civilian hosts, which is simple and convenient to operate and easy to implement, and solves the problems that check-in registration and management of the conventional civilian hosts, network appointment rooms, some hotels and the like are not compliant, and the existing irregular loopholes are easy to provide convenience for criminals to conduct crimes; the check-in management method provided by the invention can greatly reduce the phenomenon that the check-in registration personnel do not accord with the actual check-in personnel because the check-in management method can greatly reduce the check-in of the check-in transferred to other people no matter the user himself or the user generates the order for other people (the actual check-in personnel) on each platform; the invention generates the check-in order, sends the check-in order to the actual check-in person, and obtains the unique MAC address (generates the positioning information) of the current mobile equipment through the man-machine interaction interface for referring or during the identity verification, thereby facilitating the comparison of the positioning information and the like during the subsequent identity verification, namely the actual check-in person needs to carry out the identity verification within the first distance range set by people, the MAC address in the mobile equipment for identity verification is limited in a first distance range of the living room, so that the fact that the living person is in the living room can be ensured to be in the area of the living room, if illegal actions occur, the illegal actions are not caused to be in the vicinity of the issuing place, and the illegal actions are immediately uploaded to a security system (public security system) after the identity verification is finished; in addition, still need carry out bluetooth pairing before opening the room door, guarantee like this that the personnel of living in reality must be nearby this room, the unmatched door of then unable opening, and change mobile device and log in and open the door, also need carry out authentication again and carry out the record, and then can reduce the risk that other people lived at will by a wide margin.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the description of the embodiments below are briefly introduced, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic illustration of a user handling check-in according to the present invention.
FIG. 2 is a flow chart of a method for managing check-ins according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. It is to be understood that the described embodiments are preferred embodiments of the invention and should not be taken as excluding other embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without creative efforts, are within the protection scope of the present invention.
In the claims, specification and drawings hereof, unless explicitly defined otherwise, the terms "first," "second," or "third," etc., are used for distinguishing between different objects and not for describing a particular sequential order.
In the claims, specification and drawings hereof, unless explicitly defined otherwise, references to orientation terms such as "center", "transverse", "longitudinal", "horizontal", "vertical", "top", "bottom", "inner", "outer", "upper", "lower", "front", "rear", "left", "right", "clockwise", "counter-clockwise", etc., are based on the orientation and positional relationship shown in the drawings and are for convenience of description and simplicity of description only, and do not indicate or imply that the apparatus or element referred to must have or be constructed and operated in a particular orientation, nor should it be construed as limiting the particular scope of protection of the invention.
In the claims, specification and drawings of the present invention, unless explicitly defined otherwise, the term "fixedly connected" or "fixedly connected" should be construed broadly, i.e. any connection between them without a displacement relationship or a relative rotation relationship, that is to say includes non-detachably fixedly connected, integrally connected and fixedly connected by other means or elements.
In the claims, specification and drawings of the present invention, the terms "comprising," having, "and variations thereof as used herein, are intended to be" including but not limited to.
Referring to fig. 1-2, the invention relates to a living management method based on network house or civil sink,
the user 1 places an order by the current equipment A (the current equipment can be a computer, a mobile phone or an I PAD and other equipment), and inputs mobile phone number information, identity information and check-in time of the actual check-in person 2 to generate a check-in order;
it should be noted that, the user 1 may be the person who actually enters the person 2, or may be a person who places a bill for another person, and if the old person cannot operate by himself, the user needs to assist the other person for reservation;
the actual check-in person 2 enters a man-machine interaction interface through mobile phone number information on the mobile equipment B to check in an order, and the current mobile equipment B sends an identity verification prompt after acquiring the check-in order, and the prompt is completed before check-in; the actual resident 2 logs in through a WeChat applet, an AP P or other platform applet and the like of the mobile equipment B (mobile phone), and can consult order information after inputting a mobile phone number, and receive prompt information and operation flow such as identity verification, room door opening handling and the like;
after the authentication is completed, the information is uploaded to a security system for recording and is sent to the residence information and a door-opening secret key (the door-opening secret key comprises a door-opening module, bluetooth, a gateway, a password and the like through a mobile phone APP);
it should be noted that, the positioning information of the mobile device B of the actual person 2 to be checked is obtained by the following way that the actual person 2 to be checked enters a man-machine interaction interface through mobile phone number information on the mobile device B to check a check-in order or obtain a unique mac address in the mobile device B when performing identity verification, and positioning information is generated and sent to a server (the server is a cloud server), and the server obtains the positioning information of the mobile device B of the actual person 2 to be checked and the position information of the room to be checked, so that the first distance range and the second distance range can be set;
wherein, judge whether open and live the room and should meet at least the following condition:
first condition: taking the position C of the entering room as a reference, judging whether the positioning of the mobile equipment B of the actual entering person 2 is in a first distance range set manually, and performing identity verification;
identity verification within a manually set first distance range M1 defined in the first condition, comprising: the actual resident 2 performs face recognition verification in a first manually set distance range M1 with the location C of the resident room as the center, and the first manually set distance range M1 (100-1000 meters) (preferably within 150 meters); that is, the actual resident 2 must be authenticated within 1000 meters of the resident room to ensure that the actual resident 2 is in the vicinity of the resident room;
second condition: judging whether the positioning of the mobile equipment B of the actual resident 2 is in a second distance range M2 set by people or not by taking the position C of the resident room as a reference, and whether Bluetooth of the mobile equipment B of the actual resident 2 can be matched with Bluetooth of a door lock of the resident room or not;
in the second condition, the second distance range M2 is a range covering no more than 10 meters outward with reference to the position C of the living room. When the mobile device B of the actual resident 2 approaches the door lock, bluetooth is automatically connected, and the actual resident 2 opens the door of the resident room through the mobile device B or inputs a door opening key;
if the mobile equipment B of the actual resident 2 cannot be connected with Bluetooth and a door opening key is input, a re-identity verification prompt is sent, and after verification is passed, a new door opening key is changed and a new Bluetooth connection is established; if the authentication does not match the identity information of the actual resident 2, the door to the resident room cannot be opened.
Illustrating:
a user 1 presets a civil destination in a city B at a platform merchant through a mobile phone in the city A, an actual resident 2 is a user friend (user 2), and the user 1 inputs mobile phone information, identity information and selected civil destination information of the user 2 when the user presets the civil destination and generates order information;
the user 2 logs in the mobile phone and inputs the mobile phone number in the man-machine interaction interface (WeChat applet) to consult the order information; at this time, the applet prompts authentication and the like within the defined conditions; the server can acquire the unique MAC address of the current mobile phone and generate positioning information; of course, the identity verification and synchronous acquisition can be performed at the program prompt;
before entering a residence, the user 2 arrives near a preset residence, namely enters a first distance range M1 (within a range of 1000 meters) set manually, a server acquires the position information of a mobile phone of the user 2 and the position information of a residence room door lock in real time, the position information and the position information are compared, in the range of less than 1000 meters, an applet automatically prompts that identity verification can be performed, the user 2 can perform face recognition verification, and the identity information is automatically uploaded to the server and a security system after being determined; the door passwords of the residential room can be pushed;
the user 2 gets near the door lock of the civil room, namely enters a second distance range M2 (within 10 meters) set manually, the position information of the mobile phone of the user 2 and the position information of the door lock of the civil room are obtained in real time through a server, the position information and the position information are compared, bluetooth of the mobile phone of the user can be connected with Bluetooth of the door lock within a range smaller than 10 meters, and then the door can be opened through a small program or a password is input;
the problem that the user 3 is difficult to track after crime is implemented in the civilian destination can be avoided, and the users 1 and 2 are responsible together; the identity verification can be performed only in the first distance range M1 which is manually set, so that the user 2 is prevented from entering room information and passwords to the user 3 after the city C is verified, and the user 3 enters the room; because the authentication of the user 2 must be completed near the sink, it is assumed that the user 2 is also difficult to evade the tie after the crime is performed by the user 3, which is one of them; secondly, the door can be opened only after the Bluetooth of the door lock is paired with the mobile phone of the user 2, if login information is logged in for the user 3, and login with face recognition is required to be repeated, so that two conditions are limited, if illegal actions are sent, the illegal actions are implemented by the user 2 or by the user 2 and the user 3 in a correlated manner, and further illegal actions implemented by a network house or a civil sink are greatly reduced;
furthermore, in the present invention:
the door of the living room is also provided with an induction component which is used for the server to judge the number of the living persons and judge the living persons to enter and exit the room after induction; the sensing component is configured as an angle sensor, a radar sensor or at least two infrared sensors, and is arranged in a room and enters the area of a door; the sensing assembly is used for acquiring the moving direction or track of the sensing body, and judging the entering room and the exiting room of the entering person;
the angle sensing judges the number of the passengers entering and entering the room by judging the number of the sensing bodies (the actual passengers entering 2) and the angle conversion; the radar sensor judges the number and the entering and exiting rooms through the number of the sensing bodies and the moving track of the sensing bodies within a set range; the two infrared sensors sense human bodies in sequence and then calculate the number of people, and judge whether the people enter or leave the room according to the sensing sequence of the two infrared sensors;
the data are transmitted to a server, the server compares the number of scheduled check-in persons, the number of the check-in persons in the room is unchanged within a specified time range, namely, a prompt is sent when the number of the check-in persons is judged to be inconsistent with the number of the checked-in persons in a first time period set manually, so that the identity information of the actual check-in persons 2 is required to be recorded in a supplementary mode, and the identity information is reported to a safety system;
moreover, in order to prevent the illegal behavior of the resident in the room, the point of time when the resident enters the room is the starting point, and in the second period set by people, the sensing component does not sense the opening and closing of the door of the resident (for example, the door is not opened for more than 2 days, then the warning needs to be sent to the actual resident 2, the merchant or the police, and in reality, most of the resident generally needs to go out to play, purchase food, etc.), then the warning is sent.
The invention provides a check-in management method based on network house and civil house, which is simple and convenient to operate and easy to realize, and solves the problems that the check-in management of the existing civil house, network house, some hotels and the like is not compliant, and the existing nonstandard loopholes are easy to bring convenience to criminals; the check-in management method of the invention can greatly reduce the phenomenon that the check-in registration personnel do not accord with the actual check-in person 2 when the check-in management method is used for checking in by the user himself or the user generates the order for other people (the actual check-in person 2) on each platform; in the invention, the check-in order is generated and then sent to the actual check-in person 2, and the unique MAC address of the current mobile equipment B is obtained (the positioning information is generated) through the man-machine interaction interface for reference or during the identity verification, so that the positioning information and the like can be conveniently compared during the subsequent identity verification, namely the actual check-in person 2 is required to carry out the identity verification in a first distance range M1 set by people, the MAC address of the mobile equipment B for the identity verification is limited in the first distance range M1 of the check-in room, thus ensuring that the actual check-in person 2 can be in the area of the check-in room, and if illegal actions occur, the illegal actions are not caused to be caused nearby the issuing place, and the identification verification is immediately uploaded to a security system (public security system); in addition, still need carry out bluetooth pairing before opening the room door, guarantee like this that the person 2 personnel of living in reality must be nearby this room, the unmatched door of then unable opening, and change mobile device B and log in and open the door, also need carry out authentication again and carry out the record, and then can reduce the risk that other people lived at will by a wide margin.
The foregoing description of the embodiments and description is presented to illustrate the scope of the invention, but is not to be construed as limiting the scope of the invention.

Claims (8)

1. A check-in management method based on network house and civil sink is characterized in that:
the user places an order by using the current equipment, and inputs the mobile phone number information, the identity information and the check-in time of the actual check-in person to generate a check-in order;
the method comprises the steps that an actual check-in person enters a man-machine interaction interface through mobile phone number information on mobile equipment to check in an order, and after the current mobile equipment acquires the check-in order, an identity verification prompt is sent and the prompt is required to be completed before check-in; after the authentication is completed, the information is automatically uploaded to a security system for recording, and is sent to the information between houses and the door opening key;
wherein, judge whether open and live the room and should meet at least the following condition:
first condition: judging whether the positioning of the mobile equipment of the actual resident is within a first manually set distance range or not by taking the position of the resident room as a reference, and carrying out identity verification;
second condition: and judging whether the positioning of the mobile equipment of the actual resident is in a second range set by people or not by taking the position of the resident room as a reference, and whether the Bluetooth of the mobile equipment of the actual resident can be matched with the Bluetooth of the door lock of the resident room or not.
2. The method for managing living in based on network about rooms and citizens as claimed in claim 1, wherein: identity verification within a manually set first distance range defined in the first condition, comprising: the actual check-in person performs face recognition verification within a first distance range set by a person centering on the position of the check-in room, and the first distance range set by the person is 100-1000 meters.
3. The method for managing living in based on network about rooms and citizens as claimed in claim 2, wherein: in the second condition, the second distance range is a range covering no more than 10 meters outward based on the position of the living room.
4. A method for managing living in a network-based house or residence as set forth in claim 3, wherein: the method comprises the steps that an actual resident enters a man-machine interaction interface through mobile phone number information on mobile equipment to review a resident order or obtain a unique mac address in the mobile equipment when identity verification is carried out, and positioning information is generated and sent to a server; when the mobile device of the actual resident approaches the door lock, bluetooth is automatically connected, and the actual resident opens the door through the mobile device or the input door opening key.
5. The method for managing living in based on network about rooms and citizens as claimed in claim 4, wherein: if the mobile equipment of the actual resident cannot be connected with Bluetooth and the door opening key is input, a re-identity verification prompt is sent, and after verification is passed, a new door opening key is changed and a new Bluetooth connection is established; if the identity verification is not matched with the identity information of the actual resident, the door of the resident room cannot be opened.
6. A method for managing living in a network-based house or sink as set forth in any one of claims 1 to 5, wherein: the door of the living room is also provided with an induction component which is used for the server to judge the number of the living persons and judge the living persons to enter and exit the room after induction; the sensing assembly is used for acquiring the moving direction or track of the sensing body, and judging the entering room and the exiting room of the entering person; and sending a prompt to require the supplementary recording of the identity information of the actual check-in personnel when the check-in personnel number is judged to be not corresponding to the check-in personnel number in the first time period set by people, and reporting the identity information to a safety system.
7. The method for managing living in based on network about rooms and citizens as claimed in claim 6, wherein: the sensing assembly is configured as an angle sensor, a radar sensor, or at least two infrared sensors.
8. The method for managing living in based on network about rooms and citizens as claimed in claim 6, wherein: and taking the time point of entering the room by the resident as a starting point, and sending an alarm when the sensing assembly does not sense the door opening and closing of the resident in a second period set by people.
CN202310901939.4A 2023-07-21 2023-07-21 Entrance management method based on network house-making and civil-hosting Pending CN116912041A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310901939.4A CN116912041A (en) 2023-07-21 2023-07-21 Entrance management method based on network house-making and civil-hosting

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310901939.4A CN116912041A (en) 2023-07-21 2023-07-21 Entrance management method based on network house-making and civil-hosting

Publications (1)

Publication Number Publication Date
CN116912041A true CN116912041A (en) 2023-10-20

Family

ID=88359874

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310901939.4A Pending CN116912041A (en) 2023-07-21 2023-07-21 Entrance management method based on network house-making and civil-hosting

Country Status (1)

Country Link
CN (1) CN116912041A (en)

Similar Documents

Publication Publication Date Title
US10389729B2 (en) Access control using portable electronic devices
KR102585422B1 (en) Access control system with wireless and facial recognition
US20140002236A1 (en) Door Lock, System and Method for Remotely Controlled Access
AU2018312581A1 (en) Supervising property access with portable camera
JP2020521227A (en) Scalable system and method for surveillance and concierge services
US11049346B2 (en) Visitor access control system with radio identification and facial recognition
CN110164012A (en) A kind of community's access control system and working method thereof
CN110021086B (en) Openid-based temporary authorization access control method
EP3584769A1 (en) Improved access control system and a method thereof controlling access of persons into restricted areas
CN111373452B (en) Portal monitoring system with radio identity authentication mechanism and password detection mechanism
US11551501B2 (en) Access control system having radio and facial recognition
CN110211267A (en) Indoor openings control method, the configuration method of permission, device and storage medium
CN106897959A (en) A kind of intelligent Community safety-protection system based on Internet of Things
CN103871139A (en) School access control management method and embedded mainboard
US20190325677A1 (en) Home security system with automatic authorization functionality
CN105913513A (en) Control method and system for door lock system
CN108986281A (en) Kinsfolk's intelligent identification system based on recognition of face
KR101765080B1 (en) smart door lock system based on iot and the method thereof
CN112927408A (en) Visitor visiting processing method and device
KR101492799B1 (en) Entrance control integrated video recording system and method thereof
CN207037762U (en) mobile fingerprint access control system
CN116912041A (en) Entrance management method based on network house-making and civil-hosting
WO2020164104A1 (en) Processing chip, master control device, and access control system and unlocking method thereof
CN106157417A (en) A kind of iris identification method, device, smart lock and intelligent identifying system
CN115862196A (en) Identity verification method and device based on intelligent lock and intelligent lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Gao Liu

Inventor after: OuYang Fuquan

Inventor after: Chen Zhirong

Inventor after: Chen Yashuang

Inventor after: Du Qiangsheng

Inventor after: Cai Wenqiang

Inventor after: Wang Hao

Inventor after: Chen Shenghui

Inventor before: Gao Liu

Inventor before: OuYang Fuquan

Inventor before: Chen Zhirong

Inventor before: Chen Yashuang

Inventor before: Du Qiangsheng

Inventor before: Cai Wenqiang