KR20170029292A - System and method for visitor identification using wireless communication - Google Patents

System and method for visitor identification using wireless communication Download PDF

Info

Publication number
KR20170029292A
KR20170029292A KR1020150126447A KR20150126447A KR20170029292A KR 20170029292 A KR20170029292 A KR 20170029292A KR 1020150126447 A KR1020150126447 A KR 1020150126447A KR 20150126447 A KR20150126447 A KR 20150126447A KR 20170029292 A KR20170029292 A KR 20170029292A
Authority
KR
South Korea
Prior art keywords
visitor
terminal device
identification information
user terminal
information
Prior art date
Application number
KR1020150126447A
Other languages
Korean (ko)
Other versions
KR101797726B1 (en
Inventor
권용장
조인호
이석
원종운
Original Assignee
한국철도기술연구원
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 한국철도기술연구원 filed Critical 한국철도기술연구원
Priority to KR1020150126447A priority Critical patent/KR101797726B1/en
Publication of KR20170029292A publication Critical patent/KR20170029292A/en
Application granted granted Critical
Publication of KR101797726B1 publication Critical patent/KR101797726B1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Abstract

According to an embodiment of the present invention, the user terminal device receives the visitor identification information from the visitor terminal device, and by comparing the visitor identification information received with the visitor judgment information stored in advance by the user terminal device, Determining whether the visitor is a visitor who is scheduled to visit, and notifying the user of the visit to the user based on the determination result. Also, according to an embodiment of the present invention, a visitor identification system including the visitor terminal device, the user terminal device, and the management server may be provided.

Description

[0001] SYSTEM AND METHOD FOR VISITOR IDENTIFICATION USING WIRELESS COMMUNICATION [0002]

The present invention relates to a system and method for identifying a visitor including a user terminal device held by a user, a visitor terminal device for informing a visitor terminal of a visit to a visitor terminal, and a management server for managing the visitor terminal device, To a system and method capable of improving convenience and security by performing visitor identification through 1: 1 short-range wireless communication between user terminal devices.

As industry develops and societies become more sophisticated, service providers become more and more likely to visit their beneficiaries' homes to provide services. Examples of such services include home delivery service, visit repair service, and meter reading service. Especially, in case of courier services, e-commerce by online shopping mall has increased dramatically in terms of size.

Courier service allows users to easily order items from a remote location without having to visit the store and purchase goods at home or at work. For example, a user can order a desired item through an Internet shopping mall or a home shopping, and conveniently receive an order item delivered through a courier service at home. This courier service has a positive effect of significantly reducing the cost and time spent on the part of the user. However, on the other hand, there are occasions in which fraudulent articles such as courier articles are used as a means to commit crime, and this is emerging as a new social problem.

In order to prevent crime in such a courier service, a service is provided to inform the user of information such as visitor's personal information and expected time of visiting by using SMS (Short Message Service) or e-mail. In addition, a service for informing the user of the accurate arrival time of the visitor using the location information measured by the GPS or the like is also designed. The government's unmanned courier system is also part of this effort.

However, the technology that provides the visitor's personal information, the expected time and location information of the visitor is likely to cause a sensitive legal problem such as invasion of the visitor's privacy, and the unmanned courier system also has a practical problem of securing space and maintenance It is difficult to actively introduce it unless it is resolved.

Accordingly, it is required to develop a new technique for confirming a visitor, which can be easily implemented and conveniently used while achieving high security.

Patent Document: Korean Patent Publication No. 10-2014-0148184

The present invention is intended to provide a visitor identification system and method that is easy to implement, maintain and repair, and can be easily and conveniently used by a user. It is also intended to provide a visitor identification system and method that can protect a visitor from damage caused by privacy invasion while preventing crime by impersonation of a visitor in advance.

It is to be understood, however, that the scope of the present invention is not limited to the above-mentioned objects, and may be embodied from the following description, which may be understood by those skilled in the art to which the present invention belongs. have.

In order to accomplish the above object, a representative structure of the present invention is as follows.

According to an embodiment of the present invention, there is provided an information processing system including a storage unit for storing visitor identification information, a communication unit for transmitting the visitor identification information using near field wireless communication, Wherein the user terminal device determines whether or not the visitor is a visitor who is scheduled to visit by comparing the received visitor identification information with the visitor judgment information stored in advance by the user terminal device The visitor terminal device can be provided.

The visitor terminal apparatus may further include a sensor unit for detecting whether the user terminal apparatus is within a predetermined distance range.

In addition, the visitor identification information and the visitor determination information may include identification information on the affiliation of the visitor.

In addition, the visitor identification information and the visitor determination information may include identification information on the visitor's affiliation and identification information on the visitor individual.

Further, the visitor identification information may be encrypted and transmitted between the visitor terminal device and the user terminal device using a predetermined encryption key.

According to an embodiment of the present invention, there is provided a visitor identification system including a user terminal device and a management server, the visitor identification device comprising: visitor identification information corresponding to a visitor who requested a visit by a user of the user terminal device; And transmits the visitor identification information of the visitor to the visitor terminal device when the visitor identification information is received from the visitor terminal device, And a user terminal device that determines whether the visitor is a visitor who is scheduled to visit based on the comparison of the visitor decision information that has been made by the user and notifies the visitor of the visit based on the determination .

The visitor confirmation system may further include an amplifying device provided between the visitor terminal device and the user terminal device and amplifying the radio signal transmitted by the visitor terminal device and including the visitor identification information.

According to an embodiment of the present invention, there is provided a method for confirming a visitor using a visitor terminal device and a user terminal device capable of short-range wireless communication, the method comprising: receiving, from the visitor terminal device, And a second step of determining whether or not the visitor is a visitor scheduled to visit based on a comparison between the visitor identification information and visitor judgment information stored in advance by the user terminal device A visitor identification method including a second step of judging whether or not the visitor has been registered can be provided.

In addition, the visitor terminal device may broadcast the visitor identification information using the short-distance wireless communication.

The visitor identification method may further include, before the first step, detecting whether the user terminal device exists within a predetermined distance range by the visitor terminal device, The visitor identification information is transmitted from the visitor terminal device to the detected user terminal device using the short-distance wireless communication.

The detecting step may include a step in which the visitor terminal device transmits a user terminal device search signal and a step of receiving a response signal to the search signal.

According to an embodiment of the present invention, there is provided a visitor identification method performed in a user terminal device, the visitor identification method comprising: a first step of receiving visitor identification information from a visitor terminal device using short-range wireless communication; A second step of determining whether the visitor is a visitor who is scheduled to visit by comparing the visitor judgment information stored in advance by the user terminal device and a second step of determining whether the visitor is visiting the visitor based on the determination result A visitor identification method including a third step of notifying the user of the visitor information can be provided.

In addition, the visitor identification information and the visitor determination information may include identification information on the affiliation of the visitor.

In addition, the visitor identification information and the visitor determination information may include identification information on the visitor's affiliation and identification information on the visitor individual.

The second step may include transmitting the visitor identification information to the management server via the communication network upon receiving the visitor identification information and receiving the identification information on the visitor from the server, Step 3 may include outputting the identity information through the user terminal device based on the determination.

Also, before the first step, the user terminal device requests the management server to transmit the identity information to the visitor, and receiving the identity information from the management server and storing the identity information in the user terminal device The third step may include outputting the identity information through the user terminal device based on the determination.

In addition, the user terminal device can receive the visitor identification information from the visitor terminal device through short-range wireless communication only when the user terminal device is activated.

The visitor confirmation method may further include activating the user terminal device for a predetermined period of time based on a scheduled visit time, if there is a visit request from the user.

The visitor confirmation method may further include, in the second step, when the visitor corresponding to the visitor identification information is a visitor who is scheduled to visit, the user terminal is deactivated immediately after the end of the second step .

According to the embodiment of the present invention, the visitor terminal apparatus held by the visitor by the 1: 1 wireless communication transmits the visitor identification information to the user terminal apparatus held by the user, and the visitor identification information is transmitted to the user terminal apparatus A visitor confirmation system and method may be provided in which the user terminal device informs the user of the visitor's visit when the personal information is responded to.

The system and method of the present invention using a 1: 1 wireless communication scheme is easy to implement and maintain, and has an advantage that a user can use it easily and conveniently. In addition, visitor notification can be protected from damage due to privacy invasion only when the signal of the scheduled visitor is received by the user who requested the visitor. The user receives only the necessary notifications and can be safeguarded from the crime of impersonation without unnecessary life disturbance.

1 is a configuration diagram of a visitor identification system according to an embodiment of the present invention.
FIG. 2 is a block diagram showing components included in the visitor identification system of FIG. 1. FIG.
3 is a flowchart illustrating a visitor identification method performed by a visitor terminal device and a user terminal device according to an exemplary embodiment of the present invention.
4 is a flowchart illustrating a visitor identification method performed in a user terminal according to an exemplary embodiment of the present invention.
5 is a flowchart illustrating a visitor identification method performed in a user terminal according to an exemplary embodiment of the present invention.
FIG. 6 is a flowchart illustrating a visitor identification method performed in a user terminal according to an exemplary embodiment of the present invention. Referring to FIG.

BRIEF DESCRIPTION OF THE DRAWINGS The advantages and features of the present invention, and the manner of achieving them, will be apparent from and elucidated with reference to the embodiments described hereinafter in conjunction with the accompanying drawings. The present invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. To fully disclose the scope of the invention to those skilled in the art, and the invention is only defined by the scope of the claims.

In the following description of the present invention, a detailed description of known functions and configurations incorporated herein will be omitted when it may make the subject matter of the present invention rather unclear. The following terms are defined in consideration of the functions in the embodiments of the present invention, which may vary depending on the intention of the user, the intention or the custom of the operator. Therefore, the definition should be based on the contents throughout this specification.

1 is a configuration diagram of a visitor identification system according to an embodiment of the present invention. The visitor confirmation system 10 of FIG. 1 may include a visitor terminal device 100, a user terminal device 200, and a management server 300. However, since the visitor identification system 10 of FIG. 1 is only an embodiment of the present invention, the present invention is not limited to FIG. Thus, the visitor identification system 10 may be implemented with at least one component removed, or with at least one additional component.

The visitor terminal device 100 is a device carried by a visitor who provides a service such as a courier service, a meter reading service, and a visit repair service when visiting a service user. The visitor terminal device 100 can transmit the visitor identification information for identifying the visitor terminal device 100 to the user terminal device 200 via the near field wireless communication. Such a visitor terminal device 100 generally includes a handheld-based (portable) terminal such as a smartphone, a smart pad, a tablet PC, a PDA (personal digital assistant) The application software for transmitting visitor identification information may be installed in the universal wireless communication device but may be implemented as a dedicated wireless communication device for transmitting visitor identification information only and is not necessarily limited to the example .

Based on the visitor identification information received from the visitor terminal device 100, the user terminal device 200 determines whether or not the visitor who transmitted the visitor identification information is a visitor who has requested the visitor to visit, If it is a scheduled visitor, a visitor notification can be performed informing the user that the visitor has come near. The user terminal 200 may be implemented as a form in which application software for performing the determination process is installed in the general-purpose wireless communication device as in the case of the visitor terminal device 100, or a dedicated wireless communication device for performing the determination process However, the present invention is not limited thereto. Also, the user terminal device 200 may receive visitor identification information from the visitor terminal device 100 through short-range wireless communication, and the short-range wireless communication may be Near Field Communication (NFC) or Bluetooth.

The management server 300 may generate visitor identification information for identifying the visitor terminal device 100 and may transmit the generated visitor identification information to the visitor terminal device 100. [ In addition, the management server 300 may generate visitor determination information corresponding to the visitor who requested the visit and the identity information of the visitor, and may provide the generated information to the user terminal 200. The management server 300 may be a computer such as a personal computer (PC) or a server. The management server 300 is connected to the visitor terminal device 100 and the user terminal device 200 via a wired or wireless network and may be preferably Wi-Fi, 3G, 4G, LTE, etc. when connected to a wireless network.

FIG. 2 is a block diagram showing components included in the visitor identification system of FIG. 1. FIG. The visitor confirmation system 10 of FIG. 2 may include a visitor terminal device 100, a user terminal device 200, and a management server 300 as in the case of FIG.

The visitor terminal device 100 may include a first storage unit 110, a first communication unit 120, a first control unit 130, and a sensor unit 140.

The first storage unit 110 may store visitor identification information for identifying the visitor terminal device 100. For example, the visitor identification information may include at least one of identification information on a visitor's affiliation and identification information on a visitor individual. That is, the visitor identification information is determined so as to specify the visitor based on the information of the individual visitor. Also, the first storage unit 110 may store the identification information of the visitor holding the visitor terminal device 100. The identification information may include text including a visitor's name, affiliation, contact information, etc., . ≪ / RTI > The first storage unit 110 may be embodied as a computer-readable recording medium. Examples of such a computer-readable recording medium include a hardware apparatus specially configured to store and execute program instructions such as ROM, RAM, flash memory, have.

The first communication unit 120 can transmit the visitor identification information stored in the first storage unit 110 to the user terminal 200 through the near field wireless communication. The first communication unit 120 may also receive the visitor identification information or the visitor's identity information from the management server 300. [ In order to perform these operations, the first communication unit 120 may include a communication module for exchanging data with the user terminal 200 or the management server 300.

The first control unit 130 may control operations of the first storage unit 110 and the first communication unit 120. Specifically, the first controller 130 may store visitor identification information and visitor identity information received by the first communication unit 120 in the first storage unit 110, Information to the user terminal device 200 can be transmitted. Also, the first control unit 130 may encrypt the visitor identification information using a predetermined encryption key between the visitor terminal device 100 and the user terminal device 200 to improve security, To the terminal device (200). The first controller 130 may be implemented through a computing device including a microprocessor.

The sensor unit 140 can detect whether the user terminal device 200 is within a predetermined range. Specifically, the controller 130 may transmit a search signal for searching the user terminal 200 through the sensor unit 140. [ In addition, the controller 130 can detect that the user terminal 200 is present within a predetermined range by receiving a response signal for the search signal from the user terminal 200 through the sensor unit 140.

The user terminal 200 may include a second storage unit 210, a second communication unit 220, a second control unit 230, and an output unit 240.

The second storage unit 210 may store visitor determination information and identity information about a visitor. The visitor determination information is information for determining whether or not a visitor corresponding to the visitor identification information received from the visitor terminal device 100 is a visitor requested by the user of the user terminal device 200. [ The identity information of the visitor may also include personal information such as text including the visitor's name, affiliation and contact information, or an image file that is a photograph of the visitor. The second storage unit 210 may be embodied as a computer readable recording medium. Examples of the computer readable medium include a computer readable medium such as the one described in the description of the first storage unit 110 of the visitor terminal 100 same.

The second communication unit 220 can receive the visitor identification information from the visitor terminal device 100 via the near field wireless communication or transmit it to the management server 300. [ The second communication unit 220 can also receive the visitor determination information and the visitor identity information from the management server 300. In order to perform these operations, the second communication unit 220 may include a communication module for exchanging data with the visitor terminal 100 or the management server 300.

The second control unit 230 may control the operation of the second storage unit 210 and the second communication unit 220. Specifically, the second control unit 230 may store the visitor determination information and the visitor identity information received by the second communication unit 220 in the second storage unit 210. The second control unit 230 receives the visitor identification information through the second communication unit 220 and compares the received visitor identification information with the visitor determination information stored in advance in the second storage unit 210, It is possible to judge whether or not the visitor corresponding to the visitor is actually a visitor scheduled to visit. For example, if the visitor identification information and the visitor determination information include information corresponding to the same visitor, the second control unit 230 may determine that the visitor is a genuine visitor scheduled to visit. In this case, the second control unit 230 can notify the user through the output unit 240 that the visitor has come near. The second controller 230 may be implemented through a computing device including a microprocessor.

Also, the second controller 230 deactivates the short-range wireless communication function between the user terminal 200 and the visitor terminal 100 before the predetermined time has elapsed according to the embodiment, It is possible to activate the local wireless communication function so that visitor identification information can be received from the visitor terminal device 100. [ The information on the predetermined time may be received from the management server 300 through the second communication unit 220 and information on the received predetermined time may be stored in the second storage unit 210 . Basically, the user terminal 200 is disabled when the predetermined time has elapsed, but the visitor corresponding to the visitor identification information received from the visitor terminal 100 according to the embodiment is not visited The wireless communication function may be deactivated immediately after the determination.

The output unit 240 can inform the user of the visitor's visit based on the control of the second control unit 230. [ Such notifications may be output through visual means such as text or images, auditory means such as voice or other effect sounds for the user to perceive. Accordingly, the output unit 240 may include a display device such as an LCD (Liquid Crystal Display) or an OLED (Organic Light Emitting Diode) and a speaker according to the aspect of the visitor notification. The output unit 240 may also output the identity information of the visitor so that the user can identify the identity of the visitor.

The management server 300 may include a server storage unit 310, a server communication unit 320, and a server control unit 330.

The server storage unit 310 may store visitor identification information that identifies the visitor terminal device 100. In addition, the server storage unit 310 may store visitor determination information for determining whether a visitor corresponding to the visitor identification information is a visitor requested by the user of the user terminal 200, and may also store the visitor identification information . The identity information may include personal information such as text including a visitor's name, affiliation and contact information, or an image file that is a photograph of the visitor. The server storage unit 310 may be embodied as a computer readable recording medium. Examples of the computer readable recording medium include magnetic media such as a hard disk, a floppy disk, and a magnetic tape in addition to ROM, RAM, Such as magneto-optical media such as optical media such as CD-ROMs and DVDs, magneto-optical media such as floppy disks, and the like. .

The server communication unit 320 may transmit the visitor identification information to the visitor terminal device 100 or may receive the visitor identification information from the user terminal device 200 and may transmit the visitor determination information to the user terminal device 200. [ The server communication unit 320 can also transmit the identity information of the visitor to the visitor terminal device 100 or the user terminal device 200. [ In order to perform these operations, the server communication unit 320 may include a communication module for exchanging data with the visitor terminal device 100 and the user terminal device 200.

The server control unit 330 can control the operations of the second storage unit 210 and the second communication unit 220. [ Specifically, the server control unit 330 may generate the visitor identification information, the visitor determination information, and the visitor identification information, and store the identification information in the server storage unit 310. The server control unit 330 can control the visitor identification information to be transmitted to the visitor terminal device 100 through the server communication unit 320 and the visitor determination information is transmitted to the user terminal device 200 through the server communication unit 320 To be transmitted. In addition, the server control unit 330 can control the server communication unit 320 to transmit the visitor identity information to the visitor terminal device 100 and the user terminal device 200. The server control unit 330 may be implemented through a computing device including a microprocessor.

The visitor confirmation system 10 may further include an amplifying device (not shown) provided between the visitor terminal device 100 and the user terminal device 200 and capable of amplifying a short-range wireless communication signal, in addition to the above- have. The short-range wireless communication signal is transmitted by the visitor terminal device 100 and may include visitor identification information. When the near-field wireless communication is used to transmit the visitor identification information, the signal is attenuated due to a physical obstacle such as a door or a wall, and the user terminal 200 normally receives the wireless signal including the visitor identification information It can happen. To solve this problem, an amplifying device capable of amplifying a radio signal can be installed at or near a physical obstacle. The amplifying device may be installed alone or may be integrated with other devices such as a door lock device of a door.

3 is a flowchart illustrating a visitor identification method performed by a visitor terminal device and a user terminal device according to an exemplary embodiment of the present invention. Referring to FIG. 3, each step of the visitor identification method performed by the visitor terminal device will be described.

First, the visitor terminal device 100 transmits visitor identification information to the user terminal device 200 using the short-range wireless communication (S120). In step S130, the user terminal 200 determines whether the visitor is a visitor scheduled to visit by comparing the visitor identification information with the visitor determination information stored in advance by the user terminal device.

The transmission of the visitor identification information can be performed, for example, by broadcasting the visitor identification information through the near field wireless communication regardless of whether the visitor terminal device 100 exists or not. When the broadcasted visitor identification information is received by the user terminal device 200, the user terminal device 200 compares the visitor identification information with the visitor determination information stored in advance by the user terminal device, It is possible to judge whether or not the visitor is a visitor scheduled to visit. The broadcasting may be performed at predetermined time intervals. The visitor identification method may further include a step S110 of detecting whether the user terminal 200 exists within a predetermined distance range before the visitor identification information is transmitted. The process of detecting whether or not a user terminal device exists within a predetermined distance range can be performed as follows. When the visitor terminal device 100 transmits a search signal for searching the user terminal device 200 and the user terminal device 200 receiving the search signal sends a response signal to the search signal, The detection process can be performed by receiving the response signal. According to the present embodiment, unlike the embodiment in which the broadcasting is performed, when the user terminal device 200 exists within a predetermined distance range, the visitor terminal device 100 notifies the detected user terminal device 200 of the visitor identification Information can be transmitted.

4 is a flowchart illustrating a visitor identification method performed in a user terminal according to an exemplary embodiment of the present invention. Referring to FIG. 4, each step of the visitor identification method performed in the user terminal will be described below, and a description overlapping with the case of FIG. 3 may be omitted.

First, the user terminal device 200 receives the visitor identification information from the visitor terminal device 100 (S210). Next, the user terminal device 200 transmits the visitor identification information to the management server 300 through the communication network established with the management server 300 (S220). Then, the user terminal device 200 receives the visitor identity information corresponding to the visitor identification information from the management server 300 (S230). Next, the user terminal 200 determines whether the visitor is a visitor scheduled to visit by comparing the visitor identification information and visitor judgment information stored in advance in the user terminal (S240). Finally, based on the determination, the user is notified of the visit of the visitor (S250).

The process of notifying a user of a visit to a visitor may be implemented by simply generating a notification that can be sensed by only the visual or auditory sense, but may further include notifying the user of the identity of the visitor. Therefore, the user terminal 200 can output a certain type of notification or notify the user of the visitor's identity information only when the visitor is actually a visitor who is scheduled to visit. In addition, the identity information of the visitor may be encrypted, and the encryption may be released only when the visitor corresponding to the visitor identification information is a visitor scheduled to visit, so that the user can view the identity information of the visitor. By doing so, the visitor's personal information can be protected.

When the above steps are performed, the wireless signal transmitted by the visitor terminal device 100 may be received by a plurality of user terminal devices 200 within a certain distance. However, only when the visitor corresponding to the visitor identification information matches the visitor who requested the visit of the user of the user terminal 200, according to the result of comparison between the visitor identification information and the visitor judgment information, the user can know that the visitor has come near And can confirm the identity of the visitor. Therefore, it is possible to prevent personal information of the visitor from being exposed to the user. In addition, since the user can obtain accurate information about the access of the visitor, the visitor can be protected from crime by impersonation of the visitor. Also, when the visitor who transmitted the visitor identification information is not the visitor who requested the visit, It is possible to prevent disturbance of life.

5 is a flowchart illustrating a visitor identification method performed in a user terminal according to an exemplary embodiment of the present invention. Referring to FIG. 5, each step of the visitor identification method performed in the user terminal will be described below, and redundant description to those of FIGS. 3 and 4 may be omitted.

The user terminal device 200 requests the management server 300 to transmit the identity information of the visitor who requested the visit from the management server 300 through the communication network established with the management server 300 at step S310. Next, the user terminal 200 receives the identity information from the management server 300 and stores it in the user terminal 200 (S320). Then, the user terminal device 200 receives the visitor identification information of the visitor from the visitor terminal device 100 (S330). Next, in step S340, the user terminal 200 determines whether the visitor is a visitor scheduled to visit by comparing the visitor identification information with visitor judgment information stored in advance by the user terminal device. Finally, based on the determination, the user is notified of the visit of the visitor (S350).

According to the method, all steps after the user terminal device 200 receives and stores the identity information from the management server 300 are all performed in the short distance wireless communication between the visitor terminal device 100 and the user terminal device 200 . Therefore, it is possible to confirm the visitor irrespective of whether or not a problem occurs in the communication network connected to the management server 300. [

FIG. 6 is a flowchart illustrating a visitor identification method performed in a user terminal according to an exemplary embodiment of the present invention. Referring to FIG. Referring to FIG. 6, each step of the visitor identification method performed in the user terminal will be described below, and a description overlapping with those of FIGS. 3 to 5 may be omitted.

The user terminal device 200 in the present embodiment is characterized in that visitor identification information can be received from the visitor terminal device 100 through short-range wireless communication only when the user terminal device 200 is in the activated state.

First, the user terminal 200 determines whether a preset time for activating wireless communication has arrived (S410). The user terminal device 200 activates the user terminal device 200 so that the user terminal device 200 can receive the visitor identification information of the visitor from the visitor terminal device 100 in step S420. After the activation, the user terminal 200 determines whether the predetermined time has expired (S430). The user terminal 200 receives the visitor identification information of the visitor from the visitor terminal device 100 until the preset time is terminated (S440). Next, in step S450, the user terminal device 200 determines whether the visitor is a visitor scheduled to visit by comparing the visitor identification information with the visitor judgment information stored in advance by the user terminal device. Based on the determination, the user is notified of the visit of the visitor (S460). Finally, when the preset time has expired, the wireless communication function of the user terminal 200 is disabled (S470).

According to an embodiment, the predetermined time may be determined based on a scheduled visit time of a visitor received from the management server 300. [ The scheduled time of the visitor may be determined by reflecting the visit request time of the user. Also, according to the embodiment, the user terminal device 200 may be inactivated when the visitor confirmation is completed even though the predetermined time has not expired.

As described above, by activating the wireless communication function only for a predetermined period of time that a visitor is expected to visit, power consumption due to activation of the wireless communication function can be reduced. In addition, even if the predetermined time period does not expire, the power saving effect can be maximized by deactivating the wireless communication function when the visitor confirmation is completed.

Since the steps of the visitor checking method performed in the visitor terminal device 100 and the visitor checking method performed in the user terminal device 200 are not constrained to the described order, Of course. Further, each step of the method may be performed by an application program driven by the visitor terminal device 100 or the user terminal device 200. [

Embodiments of the present invention include a computer-readable medium having program instructions for performing various computer-implemented operations. Embodiments of the invention also include a computer program stored on a computer readable medium for performing the steps of the method. Such a computer-readable recording medium may include program commands, data files, data structures, and the like, alone or in combination. Such media or program instructions may be those specially designed and constructed for application to embodiments of the present invention or may be known and available to those skilled in the computer software arts. Examples of computer-readable media include magnetic media such as hard disks, floppy disks and magnetic tape; optical media such as CD-ROMs and DVDs; magnetic media such as floppy disks; Magneto-optical media, and hardware devices specifically configured to store and execute program instructions such as ROM, RAM, flash memory, and the like. Examples of program instructions include machine language code such as those generated by a compiler, as well as high-level language code that can be executed by a computer using an interpreter or the like.

The features, structures, effects and the like described in the embodiments are included in at least one embodiment of the present invention and are not necessarily limited to only one embodiment. Furthermore, the features, structures, effects and the like illustrated in the embodiments can be combined and modified by other persons skilled in the art to which the embodiments belong. Therefore, it should be understood that the present invention is not limited to these combinations and modifications.

While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is clearly understood that the same is by way of illustration and example only and is not to be taken by way of illustration, It can be seen that various modifications and applications are possible. For example, each component specifically shown in the embodiments can be modified and implemented. It is to be understood that all changes and modifications that come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.

10: Visitor verification system
100: Visitor terminal device
200: User terminal
300: management server

Claims (20)

A storage unit for storing visitor identification information;
A communication unit for transmitting the visitor identification information using short-distance wireless communication; And
And a control unit for allowing the visitor identification information to be transmitted to the user terminal of the user via the communication unit,
The user terminal device determines whether the visitor is a visitor who is scheduled to visit by comparing the visitor identification information that is received with the visitor judgment information stored in advance by the user terminal device
A visitor terminal device.
The method according to claim 1,
And a sensor unit for detecting whether the user terminal device is within a predetermined distance range
A visitor terminal device.
The method according to claim 1,
Wherein the visitor identification information and the visitor determination information include identification information on the affiliation of the visitor
A visitor terminal device.
The method of claim 3,
Wherein the visitor identification information and the visitor determination information include identification information on the visitor's affiliation and identification information on the visitor individual
A visitor terminal device.
The method according to claim 1,
Wherein the visitor identification information is encrypted and transmitted between the visitor terminal device and the user terminal device using a predetermined encryption key
A visitor terminal device.
A visitor confirmation system comprising a user terminal device and a management server,
A management server for transmitting visitor identification information corresponding to a visitor who requests a visit by the user of the user terminal and the identification information of the visitor to the user terminal device and transmitting the visitor identification information of the visitor to the visitor terminal device; And
When the visitor identification information is received from the visitor terminal device, the visitor identification information is compared with the visitor judgment information stored in advance by the user terminal device to determine whether the visitor is a visitor scheduled to visit And a user terminal device for notifying the visit of the visitor based on the judgment
Visitor verification system.
The method according to claim 6,
And an amplifying device provided between the visitor terminal device and the user terminal device and amplifying the radio signal including the visitor identification information and transmitted by the visitor terminal device
Visitor verification system.
A method for confirming a visitor by a visitor terminal device and a user terminal device capable of short-range wireless communication,
A first step in which visitor identification information is transmitted from the visitor terminal device to the user terminal device using the short-range wireless communication; And
And a second step of determining, by the user terminal device, whether the visitor is a visitor scheduled to visit based on the comparison between the visitor identification information and visitor judgment information stored in advance by the user terminal device doing
Visitor verification method.
9. The method of claim 8,
And the visitor terminal device broadcasts the visitor identification information using the short-distance wireless communication
Visitor verification method.
9. The method of claim 8,
Before the first step,
Further comprising the step of detecting, by the visitor terminal device, whether the user terminal device exists within a predetermined distance range,
The first step
When the user terminal device is detected, visitor identification information is transmitted from the visitor terminal device to the detected user terminal device using the short-range wireless communication
Visitor verification method.
11. The method of claim 10,
Wherein the detecting comprises:
The visitor terminal device transmitting a user terminal device search signal; And
And receiving a response signal to the search signal
Visitor verification method.
A method for identifying a visitor performed at a user terminal,
A first step of receiving visitor identification information from a visitor terminal device using short-range wireless communication;
A second step of determining whether the visitor is a visitor who is scheduled to visit by comparing the visitor identification information received with the visitor judgment information stored in advance by the user terminal device; And
And a third step of informing the user of the visit of the visitor based on the determination
Visitor verification method.
13. The method of claim 12,
Wherein the visitor identification information and the visitor determination information include identification information on the affiliation of the visitor
Visitor verification method.
14. The method of claim 13,
Wherein the visitor identification information and the visitor determination information include identification information on the visitor's affiliation and identification information on the visitor individual
Visitor verification method.
13. The method of claim 12,
The second step comprises:
Receiving the visitor identification information, transmitting the visitor identification information to a management server through a communication network; And
Receiving identity information for the visitor from the server,
In the third step,
And outputting the identity information through the user terminal device based on the determination
Visitor verification method.
13. The method of claim 12,
Before the first step,
The user terminal requesting the management server to transmit the identity information to the visitor; And
Receiving the identification information from the management server and storing the identification information in the user terminal device,
In the third step,
And outputting the identity information through the user terminal device based on the determination
Visitor verification method.
13. The method of claim 12,
Wherein the visitor terminal device is capable of receiving the visitor identification information from the visitor terminal device through short-range wireless communication only when the user terminal device is activated
Visitor verification method.
18. The method of claim 17,
And activates the user terminal device for a predetermined time based on the expected time of visiting from the user when there is a visit request for the visitor
Visitor verification method.
19. The method of claim 18,
Wherein, in the second step, when the visitor corresponding to the visitor identification information is a visitor scheduled to visit, the user terminal is deactivated immediately after the end of the second step
Visitor verification method.
19. An application program stored on a computer-readable medium for performing the respective steps according to the method of any one of claims 8 to 19.
KR1020150126447A 2015-09-07 2015-09-07 System and method for visitor identification using wireless communication KR101797726B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150126447A KR101797726B1 (en) 2015-09-07 2015-09-07 System and method for visitor identification using wireless communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150126447A KR101797726B1 (en) 2015-09-07 2015-09-07 System and method for visitor identification using wireless communication

Publications (2)

Publication Number Publication Date
KR20170029292A true KR20170029292A (en) 2017-03-15
KR101797726B1 KR101797726B1 (en) 2017-12-12

Family

ID=58403351

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150126447A KR101797726B1 (en) 2015-09-07 2015-09-07 System and method for visitor identification using wireless communication

Country Status (1)

Country Link
KR (1) KR101797726B1 (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140148184A (en) 2013-06-21 2014-12-31 이강혜 Safety parcel delivery information offering method using location information

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008177929A (en) * 2007-01-19 2008-07-31 Seiko Instruments Inc Door phone system and visitor information display method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140148184A (en) 2013-06-21 2014-12-31 이강혜 Safety parcel delivery information offering method using location information

Also Published As

Publication number Publication date
KR101797726B1 (en) 2017-12-12

Similar Documents

Publication Publication Date Title
US20180167769A1 (en) Public and private geo-fences
CN106465115B (en) The verifying of indicator is currently moved based on safety
US10553052B2 (en) Event identification and notification via an automation hub
EP3221774B1 (en) Method and apparatus for displaying information
US20160373893A1 (en) Ibeacon compatible bluetooth low energy device monitoring system
US11284219B2 (en) Lost device detection using geospatial location data
CN106940535B (en) Apparatus and method for controlling operation thereof
US20220005299A1 (en) Smart Home Delivery and Services
US11928741B1 (en) Systems and methods for detecting items at a property
JP2018173812A (en) Information processing device, information processing system and processing method thereof and program
JP6534585B2 (en) Loss prevention system
CN107657199B (en) Mobile device, verification device and verification method thereof
JP2007033310A (en) Notification system for lost child, method, management server, and program
US9681420B2 (en) Beacon sharing platform
JP2013257835A (en) Antitheft supporting server and system
US9016562B1 (en) Verifying relative locations of machine-readable tags using composite sensor data
JP2006260238A (en) Portable terminal for preventing reading of electronic tag, and electronic tag
KR101797726B1 (en) System and method for visitor identification using wireless communication
US10896402B2 (en) Short-range wireless determination of a vehicle's asset inventory
JP6326604B1 (en) Unauthorized use detection system and unauthorized use detection program
KR20140148020A (en) Using a mobile device Unmanned Security System and method for providing
US10748364B1 (en) Methods and systems for access control
CN110910055B (en) Data processing method, device, logistics object processing system and machine readable medium
CN109544176B (en) Verification method, device, server and system for stolen article retrieval order
US20140189857A1 (en) Method, system, and apparatus for securely operating computer

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
AMND Amendment
E601 Decision to refuse application
AMND Amendment
X701 Decision to grant (after re-examination)
GRNT Written decision to grant