WO2020258839A1 - 安全入住方法及装置 - Google Patents
安全入住方法及装置 Download PDFInfo
- Publication number
- WO2020258839A1 WO2020258839A1 PCT/CN2020/071123 CN2020071123W WO2020258839A1 WO 2020258839 A1 WO2020258839 A1 WO 2020258839A1 CN 2020071123 W CN2020071123 W CN 2020071123W WO 2020258839 A1 WO2020258839 A1 WO 2020258839A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- target
- information
- lock device
- door lock
- occupant
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 103
- 238000012795 verification Methods 0.000 claims abstract description 33
- 230000004044 response Effects 0.000 claims description 69
- 230000008569 process Effects 0.000 claims description 35
- 230000001815 facial effect Effects 0.000 claims description 14
- 230000000977 initiatory effect Effects 0.000 claims description 7
- 230000005540 biological transmission Effects 0.000 claims description 4
- 230000000694 effects Effects 0.000 abstract description 11
- 238000010586 diagram Methods 0.000 description 27
- 230000006870 function Effects 0.000 description 11
- 238000004590 computer program Methods 0.000 description 9
- 230000006872 improvement Effects 0.000 description 9
- 238000005516 engineering process Methods 0.000 description 6
- 238000012545 processing Methods 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 5
- 238000011161 development Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- XUIMIQQOPSSXEZ-UHFFFAOYSA-N Silicon Chemical compound [Si] XUIMIQQOPSSXEZ-UHFFFAOYSA-N 0.000 description 1
- 239000006227 byproduct Substances 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 239000000047 product Substances 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 239000010979 ruby Substances 0.000 description 1
- 229910001750 ruby Inorganic materials 0.000 description 1
- 229910052710 silicon Inorganic materials 0.000 description 1
- 239000010703 silicon Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/02—Reservations, e.g. for tickets, services or events
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0645—Rental transactions; Leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/12—Hotels or restaurants
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Definitions
- This manual relates to the field of security technology, in particular to a safe check-in method and device, safe check-in equipment and storage medium.
- the purpose of one or more embodiments of this specification is to provide a safe check-in method, device, equipment, and storage medium, so as to solve the problem that the occupant cannot be checked whether the occupant is the room reservation person in the prior art.
- one or more embodiments of this specification provide a safe check-in method, which is applied to the back-end server of a rental platform, including:
- the method further includes:
- the generating token information for opening the target room and sending the token information to the rental platform includes:
- Generate token information for opening the target room and record the generation time and valid time limit of the token information, and send the token information, the generation time and the valid time limit to the rental platform.
- the method further includes:
- the door opening request includes the identification information of the target door lock device, the token information, the generation time, The effective time limit and the receiving time when the target door lock device receives the token information;
- issuing a door opening instruction to the target door lock device includes:
- the issuing a door opening instruction to the target door lock device includes:
- the door opening instruction is issued to the rental platform, so that the door opening instruction is issued to the target door lock device through the NFC of the user terminal loaded with the rental platform.
- the method further includes:
- the target order information is generated according to the identity information of the reservation person, check-in information, and target room information.
- one or more embodiments of this specification provide a safe check-in method applied to a rental platform, including:
- the face image information of the occupant and the identity information of the reservation person are sent to the back-end server of the rental platform, so that the back-end server can use the face image information of the occupant and the reservation person’s Identity information combined with an electronic identity authentication system to verify whether the booker and the occupant are the same person;
- the token information is transmitted to the target door lock device of the target room, so that the target door lock device initiates a door opening request to the background server based on the token information.
- the method further includes:
- the door opening instruction being generated by the background server in response to the door opening request, wherein the door opening request includes the identification information of the target door lock device and the token information;
- the door opening instruction is transmitted to the target door lock device via Bluetooth or NFC of the user terminal loaded with the rental platform, so that the target door lock device opens the target room in response to the door opening instruction.
- obtaining the identity information of the person who rents the target room in the target order information and obtaining the face image information of the check-in person includes:
- the judging whether the occupant is in the area where the target room in the target order information is located includes:
- the target door lock device that transmits the token information to the target room includes:
- the token information is transmitted to the target door lock device through the NFC of the user terminal loaded with the rental platform.
- one or more embodiments of this specification provide a secure check-in device, which is applied to the back-end server of a rental platform, including:
- the first acquisition module is used to acquire the identity information of the person who booked the target room for rent and the face image information of the person who stayed in the target room;
- the verification module is used to verify whether the booker and the occupant are the same person through the electronic identity authentication system and combined with the identity information of the reservation person and the facial image information of the occupant;
- the first generating module is configured to, if yes, generate token information for opening the target room, and send the token information to the rental platform, so that the occupant can open the apartment through the token information State the target room.
- the device further includes:
- the first receiving module is configured to receive a door opening request sent by the target door lock device of the target room based on the token information, wherein the door opening request includes the identification information of the target door lock device and the token information;
- the query module is configured to query the order information corresponding to the target door lock device according to the identification information of the target door lock device;
- a matching module for matching the identity information of the subscriber in the order information corresponding to the target door lock device with the identity information of the subscriber whose token information is successfully verified;
- the issuing module is configured to issue a door opening instruction to the target door lock device if it matches, so that the target door lock device opens the target room in response to the door opening instruction.
- the first generation module is specifically configured to, if yes, generate token information for opening the target room and record the generation time and effective time limit of the token information, and combine the token information with The generation time and the effective time limit are sent to the rental platform.
- the device further includes:
- the first receiving module is configured to receive a door opening request sent by the target door lock device of the target room based on the token information, wherein the door opening request includes the identification information of the target door lock device and the token Information, the generation time, the effective time limit, and the receiving time when the target door lock device receives the token information;
- a judging module configured to judge whether the token information is valid according to the generation time, the valid time limit, and the receiving time
- the query module is configured to, if yes, query the order information corresponding to the target door lock device according to the identification information of the target door lock device;
- a matching module for matching the identity information of the subscriber in the order information corresponding to the target door lock device with the identity information of the subscriber whose token information is successfully verified;
- the issuing module is configured to issue a door opening instruction to the target door lock device if it matches, so that the target door lock device opens the target room in response to the door opening instruction.
- the issuing module includes:
- the first acquiring unit is configured to, if it matches, acquire the check-in time period for the reservation person to rent the target room, and determine whether the current time meets check-in conditions according to the check-in time period;
- the issuing unit is configured to, if yes, issue a door opening instruction to the target door lock device.
- the issuing module is specifically used for:
- the door opening instruction is issued to the rental platform, so that the door opening instruction is issued to the target door lock device through the NFC of the user terminal loaded with the rental platform.
- the device further includes:
- the second receiving module is configured to receive the identity information, check-in information, and target room information of the booker sent by the rental platform in response to the housing rental request;
- the second generating unit is used to generate target order information according to the identity information of the reservation person, check-in information, and target room information.
- one or more embodiments of this specification provide a safe check-in device applied to a rental platform, including:
- the second obtaining module is used to obtain the identity information of the person who rents the target room in the target order information in response to the check-in request based on the target order information, and obtain the face image information of the staying person;
- the sending module is used to send the face image information of the occupant and the identity information of the reservation person to the back-end server of the rental platform, so that the back-end server can according to the face image information of the occupant and
- the identity information of the reservation person combined with an electronic identity authentication system to verify whether the reservation person and the occupant are the same person;
- the third receiving module is configured to receive token information sent by the background server after verifying that the reservation person and the occupant are the same person;
- the initiation module is configured to transmit the token information to the target door lock device of the target room, so that the target door lock device initiates a door opening request to the background server based on the token information.
- the device further includes:
- the fourth receiving module is configured to receive a door opening instruction sent by the background server, the door opening instruction being generated by the background server in response to the door opening request, wherein the door opening request includes the identification information of the target door lock device And the token information;
- the transmission module is configured to transmit the door opening instruction to the target door lock device via Bluetooth or NFC of the user terminal loaded with the rental platform, so that the target door lock device opens the target in response to the door opening instruction room.
- the second acquisition module includes:
- the judging unit is configured to determine whether the occupant is in the area where the target room in the target order information is located in response to the check-in request based on the target order information;
- the second acquiring unit is configured to, if yes, acquire the identity information of the person who rents the target room from the target order information, and acquire the face image information of the occupant.
- the judgment unit is specifically configured to:
- the initiation module is specifically used for:
- the token information is transmitted to the target door lock device through the NFC of the user terminal loaded with the rental platform.
- one or more embodiments of this specification provide a safe check-in device, which is applied to the back-end server of a rental platform, including:
- a memory arranged to store computer-executable instructions which, when executed, cause the processor to:
- one or more embodiments of this specification provide a safe check-in device applied to a rental platform, including:
- a memory arranged to store computer-executable instructions which, when executed, cause the processor to:
- the face image information of the occupant and the identity information of the reservation person are sent to the back-end server of the rental platform, so that the back-end server can use the face image information of the occupant and the reservation person’s Identity information combined with an electronic identity authentication system to verify whether the booker and the occupant are the same person;
- the token information is transmitted to the target door lock device of the target room, so that the target door lock device initiates a door opening request to the background server based on the token information.
- one or more embodiments of the present specification provide a storage medium, which is applied to a backend server of a rental platform, and is used to store computer-executable instructions that, when executed, implement the following processes:
- one or more embodiments of this specification provide a storage medium applied to a rental platform for storing computer-executable instructions, and the computer-executable instructions realize the following process when executed:
- the face image information of the occupant and the identity information of the reservation person are sent to the back-end server of the rental platform, so that the back-end server can use the face image information of the occupant and the reservation person’s Identity information combined with an electronic identity authentication system to verify whether the booker and the occupant are the same person;
- the token information is transmitted to the target door lock device of the target room, so that the target door lock device initiates a door opening request to the background server based on the token information.
- the electronic identity authentication system through the electronic identity authentication system and the identity information of the reservation person and the face image information of the occupant, it is verified whether the reservation person and the occupant are the same person. If so, it is generated for opening
- the token information of the target room realizes the consistency verification of the occupant and the booker, achieves the effect of real person check-in, and ensures the safety of check-in.
- the verification steps are simple, easy to implement, and efficient.
- the facial image information verifies the token information sent when the booker and the occupant are the same person, and transmits the token information to the target door lock device, so that the target door lock device initiates a door opening request to the background server based on the token information, that is, when verifying the reservation After the person and the occupant are the same person, a door opening request is initiated to achieve the effect of a real person check-in and ensure the safety of the check-in.
- FIG. 1 is a first schematic diagram of a flow chart of a safe check-in method provided by an embodiment of this application;
- FIG. 2 is a schematic diagram of the process of renting a room provided by an embodiment of the application
- FIG. 3 is a schematic diagram 1 of the process of opening a target room according to a door opening request according to an embodiment of the application;
- FIG. 4 is a second schematic diagram of the process of opening a target room according to a door opening request according to an embodiment of the application;
- FIG. 5 is a second schematic diagram of the flow of the safe check-in method provided by an embodiment of the application.
- Fig. 6 is a schematic structural diagram of a safe check-in system provided by an embodiment of the application.
- Figure 7 is a schematic diagram of the flow of check-in and door opening provided by an embodiment of the application.
- Figure 8 is a schematic diagram 1 of the composition of the safe check-in device provided by the embodiment of the application.
- FIG. 9 is a second schematic diagram of the composition of the safe check-in device provided by an embodiment of the application.
- Fig. 10 is a schematic structural diagram of a safe check-in device provided by an embodiment of the application.
- One or more embodiments of the present specification provide a safe check-in method, device, equipment, and storage medium, so as to solve the problem that the occupant cannot be checked whether the occupant is the room reservation person in the prior art.
- Fig. 1 is a schematic diagram 1 of the flow of a safe check-in method provided by an embodiment of this application. As shown in Fig. 1, the method may include the following steps:
- Step S102 Obtain the identity information of the booker of the rental target room and the facial image information of the person staying in the target room.
- the process of renting a room on the renting platform by the booker is first explained.
- the specific process may include the following two steps, among which:
- the first step receiving the identity information, check-in information, and target room information of the booker sent by the rental platform in response to the housing rental request.
- the rental platform displays housing information to bookers.
- the booker browses the housing information on the rental platform, selects the target room (that is, the intended room) in the housing information, and initiates a housing rental request to the rental platform based on the target room.
- the rental platform responds to the rental request to obtain the reservation's identity information, occupant information, and sends the reservation's identity information, check-in information, and target room information to the backend server of the rental platform, specifically, the reservation's identity information It can include the ID number, contact information, name, address, etc. of the booker.
- Check-in information can include check-in time period, number of people staying, etc.
- the information of the target room includes the identification information of the target door lock device of the target room and the location information of the target room.
- the rental platform can provide the booker with an information filling page, so that the booker can fill in the booker’s identity information and check-in information on the information filling page.
- the back-end server of the rental platform receives the identity information, check-in information, and target room information of the booker sent by the rental platform.
- the second step generate target order information according to the identity information of the reservation person, check-in information and information of the target room. That is, the back-end server of the rental platform can bind the identity information of the booker, the check-in information, and the information of the target room to obtain the target order information.
- FIG. 2 is a schematic diagram of the process of renting a room provided by an embodiment of the application. It can be seen from Figure 2 that the process of renting a house can include: 1. The renting platform displays housing information, 2. The booker views the rented house through the user terminal loaded with the renting platform The housing information displayed on the platform, and the target room is selected in the housing information. 3. The booker initiates a housing rental request to the rental platform based on the target room. 4. The rental platform requests the booker to enter the booker’s identity information and check-in information. 5. The reservation person enters the reservation's identity information and check-in information. 6. The rental platform uploads the reservation's identity information, check-in information and the information of the target room to the rental platform's back-end server. 7.
- the rental platform's back-end server will The identity information, check-in information and the information of the target room are bound to generate target order information. 8.
- the back-end server of the rental platform returns the result of successful rental of the target room to the rental platform so that the booker can view it through the user terminal loaded with the rental platform Lease result.
- the check-in process may include: the occupant queries the target order information through the user terminal loaded on the rental platform, and then initiates a check-in request to the rental platform based on the target order information.
- the rental platform obtains the identity information of the booker and the face image information of the occupant from the target order information. Specifically, the rental platform can obtain the face image of the occupant through the camera of the user terminal on which it is loaded.
- the acquired identity information of the reservation person that is, the identity information of the reservation person of the rental target room
- the face image information of the occupant that is, the face image information of the occupant of the target room
- the back-end server receives the face image information of the occupant and the identity information of the reservation person.
- Step S104 through the electronic identity authentication system, combined with the identity information of the reservation person and the face image information of the occupant, verify whether the reservation person and the occupant are the same person.
- the back-end server of the rental platform can upload the identity information of the reservation person and the face image information of the occupant to the electronic identity authentication system.
- the electronic identity authentication system is based on the face image information of the occupant and the face image information of the reservation person.
- the identity information verifies whether the booker and the occupant are the same person.
- the electronic identity authentication system stores the electronic ID card of each citizen.
- the electronic ID card is the online function certificate of the resident ID card (also known as the network certificate).
- the trusted identity authentication platform of the Ministry of Public Security authenticates and issues, and the electronic ID card can be used as an individual's legal identity verification certificate.
- Each electronic ID card includes at least citizen's identity information and face image information.
- the verification process can include: the electronic identity authentication system compares the identity information of the reservation person with the identity information in the electronic ID of each citizen, and compares the identity information of the citizen whose identity information is the same as the identity information of the reservation person.
- the ID card is determined as the target electronic ID card, and the face image information on the target electronic ID card is compared with the face image information of the occupant. If the comparison is successful, the verification successful receipt information will be returned to the back-end server of the rental platform , The back-end server of the rental platform determines that the booker and the occupant are the same person according to the successful verification receipt information.
- Step S106 If yes, generate token information for opening the target room, and send the token information to the rental platform, so that the occupant can open the target room through the token information.
- the token information used to open the target room is generated. It should be noted that the token information can also be used to characterize the successful identity verification. Successful verification means that the booker and the staying person are the same person.
- the token information is sent to the rental platform, and the rental platform transmits the token information to the target door lock device of the target room, and the target door lock device generates a door opening request according to the received token information and the identification information of the target door lock device, And send the door opening request to the back-end server of the rental platform. It should be noted that the process by which the rental platform transmits the token information to the target door lock device of the target room will be described below, so it will not be described here.
- FIG. 3 is a schematic diagram 1 of the process of opening a target room according to a door opening request according to an embodiment of the application. As shown in Figure 3, the following steps can be included:
- Step S302 Receive a door opening request sent by the target door lock device of the target room based on the token information, where the door opening request includes the identification information and token information of the target door lock device.
- Step S304 Query the order information corresponding to the target door lock device according to the identification information of the target door lock device.
- the identification information of the target door lock device is compared with the identification information of the door lock device in each order information, and the identification information of the target door lock device is compared with the identification information of the target door lock device.
- the door lock device belongs to The order information of is determined as the order information corresponding to the target door lock device.
- Step S306 Match the identity information of the subscriber in the order information corresponding to the target door lock device with the identity information of the subscriber whose token information is successfully verified.
- the identity information of the subscriber whose token information is successfully verified is the identity information of the subscriber in step S102.
- Step S308 if it matches, issue a door opening instruction to the target door lock device, so that the target door lock device opens the target room in response to the door opening instruction.
- the door opening instruction is issued to the target door lock device,
- the target door lock device receives and responds to the door opening instruction to open the target room.
- the following will describe three ways for the background server of the rental platform to issue a door opening instruction to the target door lock device.
- the first type directly issue a door opening instruction to the target door lock device.
- the second type the door opening instruction is issued to the rental platform, and the door opening instruction is issued to the target door lock device through the Bluetooth of the user terminal loaded with the rental platform.
- the backend server of the rental platform issues the door opening instruction to the rental platform installed on the user terminal of the occupant, and the rental platform issues the door opening instruction to the target door lock device through the Bluetooth of the user terminal.
- the third type the door opening instruction is issued to the rental platform, and the door opening instruction is issued to the target door lock device through the NFC of the user terminal loaded on the rental platform.
- the back-end server of the rental platform issues the door opening instruction to the rental platform installed on the user terminal of the occupant, and the rental platform issues the door opening instruction to the target door lock device through the NFC of the user terminal.
- generating token information for opening the target room, and sending the token information to the rental platform may include: generating token information for opening the target room and recording the generation time of the token information and Valid time limit, the token information, generation time and valid time limit are sent to the rental platform.
- the specific value of the effective time limit can be set by oneself, for example, the effective time limit can be 45 seconds, or 1 minute, etc. This exemplary embodiment does not specifically limit this. It should be noted that in order to ensure the safety of check-in, the value of the effective time limit should not be set too long.
- the backend server of the rental platform sends the token information, generation time, and valid time limit to the rental platform.
- the rental platform sends the token information, generation time, and valid time limit to the target door lock device.
- the target door lock receives the token information, Record the receiving time of the token information, and generate a door opening request based on the token information, generation time, valid time limit, receiving time, and identification information of the target door lock device, and upload the door opening request to the backend server of the rental platform. It should be noted that the process of transmitting the token information, generation time, and effective time limit to the target door lock device of the target room by the rental platform will be described below, so it will not be repeated here.
- FIG. 4 is a second schematic diagram of a process of opening a target room according to a door opening request according to an embodiment of the application. As shown in Figure 4, the following steps can be included:
- Step S402 Receive a door opening request sent by the target door lock device of the target room based on the token information, where the door opening request includes the identification information of the target door lock device, token information, generation time, effective time limit, and the target door lock device receiving order The time the card information was received.
- Step S404 judging whether the token information is valid according to the generation time, the valid time limit, and the receiving time.
- the time difference between the receiving time and the generating time is calculated, and it is judged whether the time difference is within the valid time limit, if it is, it is judged that the token information is valid, if not, it is judged that the token information is invalid.
- Step S406 If yes, query the order information corresponding to the target door lock device according to the identification information of the target door lock device. In the embodiment of the present application, if the token information is valid, the order information corresponding to the target door lock device is queried. Since the principle of querying the order information corresponding to the target door lock device has been described above, it will not be repeated here.
- Step S408 Match the identity information of the subscriber in the order information corresponding to the target door lock device with the identity information of the subscriber whose token information is successfully verified. In the embodiment of the present application, since this step has been described above, it will not be repeated here.
- Step S410 If it matches, issue a door opening instruction to the target door lock device, so that the target door lock device opens the target room in response to the door opening instruction.
- the description is not repeated here.
- issuing a door opening instruction to the target door lock device may include: if it matches, obtain the check-in time period of the reservation person renting the target room, and judge whether the current time meets the check-in conditions according to the check-in time period ; If yes, issue a door opening instruction to the target door lock device.
- the check-in time period of the reservation person renting the target room is obtained from the target order information, and it is judged whether the current time is within the check-in time period. Meet the check-in conditions.
- the electronic identity authentication system and the identity information of the reservation person and the face image information of the occupant verify whether the booker and the occupant are the same person. If so, generate token information for opening the target room to achieve
- the consistency verification of the occupant and the booker achieves the effect of real check-in and ensures the safety of check-in.
- the verification steps are simple, easy to implement, and efficient.
- FIG. 5 is a second schematic diagram of the flow of the safe check-in method provided by an embodiment of the application. As shown in FIG. 5, the method may include the following steps:
- Step S502 In response to the check-in request based on the target order information, obtain the identity information of the person who rents the target room in the target order information, and obtain the face image information of the check-in person.
- the rental platform when the occupant stays in the target room, he can query the target order information through the rental platform loaded in his user terminal, and initiate a check-in request to the rental platform based on the target order information.
- the rental platform obtains the identity information of the booker of the rental target room in the target order information, and obtains the facial image information of the occupant.
- the rental platform can obtain it through the camera on the user terminal where it is loaded. Face image information of the occupant.
- obtaining the identity information of the person who rents the target room in the target order information and obtaining the face image information of the check-in person may include: Check-in request of order information, determine whether the occupant is in the area where the target room in the target order information is located; if so, obtain the identity information of the person who rents the target room in the target order information, and obtain the face image of the occupant information.
- the methods for judging whether the occupant is in the area where the target room in the target order information is located may include the following three methods, among which:
- the second type to determine whether the user terminal of the occupant loading the rental platform is connected to the target door lock device of the target room via Bluetooth. That is, when the occupant checks in, the occupant is first reminded to connect the user terminal loaded with the rental platform to the target door lock device of the target room through Bluetooth, and the user terminal loaded with the rental platform connects to the target door lock device of the target room through Bluetooth When the connection is maintained, it is determined that the occupant is in the area where the target room in the target order information is located.
- the third type is to determine whether the user terminal of the occupant loading the rental platform is connected to the target door lock device of the target room through NFC. That is, when the occupant checks in, he first reminds the occupant to connect the user terminal loaded with the rental platform to the target door lock device of the target room through NFC, and connect the user terminal loaded with the rental platform to the target door lock device of the target room through NFC When the connection is maintained, it is determined that the occupant is in the area where the target room in the target order information is located.
- Step S504 Send the face image information of the occupant and the identity information of the reservation person to the back-end server of the rental platform, so that the back-end server verifies according to the face image information of the occupant and the identity information of the reservation person in combination with the electronic identity authentication system Whether the booker and the occupant are the same person.
- the rental platform sends the facial image information of the occupant and the identity information of the reservation to the back-end server of the rental platform.
- the back-end server combines the facial image information of the occupant and the identity information of the reservation.
- the electronic identity authentication system verifies whether the booker and the occupant are the same person. If they are the same person, it generates token information for opening the target room, and sends the token information to the rental platform.
- Step S506 Receive the token information sent by the backend server after verifying that the reservation person and the occupant are the same person.
- Step S508 The token information is transmitted to the target door lock device of the target room, so that the target door lock device initiates a door opening request to the background server based on the token information.
- the rental platform can transmit the token information to the target door lock device of the target room in the following three ways:
- the first method is to generate a door opening QR code based on the token information, and transmit the door opening QR code to the target door lock device through the camera on the target door lock device to transmit the token information to the target door lock device.
- the rental platform generates a door opening QR code based on the token information
- the user displays the door opening QR code to the camera of the target door lock device through the user terminal loaded with the rental platform, and the camera on the target door lock device passes Scan the door opening QR code to obtain the door opening QR code, thereby obtaining the token information from the door opening QR code.
- the second type the token information is transmitted to the target door lock device through the Bluetooth of the user terminal loaded with the rental platform.
- the third type the token information is transmitted to the target door lock device through the NFC of the user terminal loaded on the rental platform.
- the target door lock device receives the token information, generates a door opening request according to the token information and the identification information of the target door lock device, and sends the door opening request to the back-end server of the rental platform, and the back-end server receives the door opening request.
- the door opening request includes the token information and the identification information of the target door lock device.
- the background server responds to the door opening request, generates a door opening instruction according to the door opening request, and sends the door opening instruction to the rental platform.
- the process of generating the door opening instruction by the back-end server according to the door-opening request may include: the back-end server obtains the token information and the identification information of the target door lock device according to the door-opening request, and searches for the information corresponding to the target door lock device according to the identification information of the target door lock device. Order information, and match the identity information of the subscriber in the order information corresponding to the target door lock device with the identity information of the subscriber whose token information is successfully verified, if it matches the reservation in the order information corresponding to the target door lock device If the identity information of the person matches the identity information of the booker whose token information is successfully verified, an opening instruction is generated, and the opening instruction is issued to the rental platform.
- the process of opening the target room according to the door opening instruction may include: first, receiving the door opening instruction sent by the background server.
- the door opening instruction is generated by the background server in response to the door opening request.
- the door opening request includes the identification information and token information of the target door lock device.
- the door opening instruction is transmitted to the target door lock device through the Bluetooth or NFC of the user terminal loaded with the rental platform, so that the target door lock device opens the target room in response to the door opening instruction.
- Fig. 6 is a schematic structural diagram of a safe check-in system provided by an embodiment of the application.
- the safe check-in system may include: a user terminal 601 loaded with a rental platform, a target door lock device 602 of a target room, and a backend of the rental platform Server 603 and electronic identity authentication system 604.
- the booker can view housing information, determine the target room, and initiate a housing rental request through the rental platform in the user terminal 601 loaded with the rental platform, and the rental platform in the user terminal 601 loaded with the rental platform can obtain the reservation Identity information, check-in information, and upload the reservation’s identity information, check-in information, and target room information to the back-end server 603 of the rental platform.
- the back-end server 603 of the rental platform is based on the reservation’s identity information, check-in information, and target room information Generate target order information.
- the occupant can query the target order information through the rental platform in the user terminal 601 loaded with the rental platform, and initiate a check-in request, and the rental platform in the user terminal 601 loaded with the rental platform obtains the identity of the booker in the target order information in response to the check-in request Information, and obtain the facial image information of the occupant through the camera on the user terminal 601 loaded on the rental platform, and upload the identity information of the reservation person and the facial image information of the occupant to the back-end server 603 of the rental platform.
- the backend server 603 uploads the received facial image information of the occupant and the identity information of the reservation to the electronic identity authentication system 604.
- the electronic identity authentication system 604 verifies the occupant according to the facial image information of the occupant and the identity information of the reservation.
- the reservation is the same person and the verification receipt is sent to the backend server 603 of the rental platform
- the verification receipt received by the backend server 603 of the rental platform is verified, that is, the booker and the occupant are the same person, a token is generated
- the token information is sent to the rental platform in the user terminal 601 loaded with the rental platform, and the rental platform in the user terminal 601 loaded with the rental platform transmits the token information to the target door lock device 602 of the target room.
- the target door lock device 602 transmits the token information and the identification information of the target door lock device 602 of the target room to the backend server 603 of the rental platform, and the backend server 603 of the rental platform determines the order corresponding to the target door lock device 602 of the target room Whether the identity information of the reservation person in the information is the same as the identity information of the reservation person who has passed the token information verification, if they are the same, a door opening instruction is generated, and the door opening instruction is issued to the target door lock device 602 of the target room.
- the door lock device 602 opens the target room in response to the door opening instruction.
- FIG. 7 is a schematic diagram of the flow of check-in and door opening provided by an embodiment of the application. As shown in FIG. 7, the flow of check-in and door opening may include:
- the occupant initiates a check-in request to the rental platform
- the rental platform In response to the check-in request, the rental platform requires the occupant to brush his face and obtain the identity information of the booker;
- the rental platform uploads the facial image information of the occupant and the identity information of the reservation to the back-end server of the rental platform;
- the back-end server of the rental platform requests to verify the booker and the occupant according to the identity information of the booker and the face image information of the occupant;
- the electronic identity authentication system searches for the face image information of the reservation person according to the identity information of the reservation person, and compares the face image information of the occupant with the face image information of the reservation person;
- the electronic identity authentication system returns a verification receipt to the back-end server of the rental platform
- the backend service of the rental platform returns token information to the rental platform
- the rental platform transmits the token information to the target door lock device
- the target door lock device uploads the acquired token information and the identification information of the target door lock to the back-end server of the rental platform;
- the back-end server of the rental platform queries the identity information of the booker in the order information corresponding to the target door lock device according to the identification information of the target door lock device;
- the back-end server of the rental platform queries the identity information of the booker whose verification is successful according to the token information;
- the target door lock device executes the door opening instruction to open the target room.
- FIG. 8 is a diagram of the safe check-in device provided by the embodiment of the application. Composition diagram one. The device is used to implement the safe check-in method shown in FIG. 1 above.
- the device 800 may include: a first acquisition module 801, a verification module 802, and a first generation module 803, wherein:
- the first obtaining module 801 is configured to obtain the identity information of the reservation person of the rental target room and the facial image information of the person staying in the target room;
- the verification module 802 is used for verifying whether the reservation person and the staying person are the same person through the electronic identity authentication system and combining the identity information of the reservation person and the face image information of the staying person;
- the first generation module 803 is configured to, if yes, generate token information for opening the target room, and send the token information to the rental platform, so that the occupant can open the target room through the token information The target room.
- the device 800 may further include:
- the first receiving module is configured to receive a door opening request sent by the target door lock device of the target room based on the token information, wherein the door opening request includes the identification information of the target door lock device and the token information;
- the query module is configured to query the order information corresponding to the target door lock device according to the identification information of the target door lock device;
- a matching module for matching the identity information of the subscriber in the order information corresponding to the target door lock device with the identity information of the subscriber whose token information is successfully verified;
- the issuing module is configured to issue a door opening instruction to the target door lock device if it matches, so that the target door lock device opens the target room in response to the door opening instruction.
- the first generation module 803 is specifically configured to, if yes, generate token information for opening the target room and record the generation time and valid time limit of the token information, and convert the token information , The generation time and the effective time limit are sent to the rental platform.
- the device 800 may further include:
- the first receiving module is configured to receive a door opening request sent by the target door lock device of the target room based on the token information, wherein the door opening request includes the identification information of the target door lock device and the token Information, the generation time, the effective time limit, and the receiving time when the target door lock device receives the token information;
- a judging module configured to judge whether the token information is valid according to the generation time, the valid time limit, and the receiving time
- the query module is configured to, if yes, query the order information corresponding to the target door lock device according to the identification information of the target door lock device;
- a matching module for matching the identity information of the subscriber in the order information corresponding to the target door lock device with the identity information of the subscriber whose token information is successfully verified;
- the issuing module is configured to issue a door opening instruction to the target door lock device if it matches, so that the target door lock device opens the target room in response to the door opening instruction.
- the issuing module includes:
- the first acquiring unit is configured to, if it matches, acquire the check-in time period for the reservation person to rent the target room, and determine whether the current time meets check-in conditions according to the check-in time period;
- the issuing unit is configured to, if yes, issue a door opening instruction to the target door lock device.
- the issuing module is specifically used for:
- the door opening instruction is issued to the rental platform, so that the door opening instruction is issued to the target door lock device through the NFC of the user terminal loaded with the rental platform.
- the device 800 may further include:
- the second receiving module is configured to receive the identity information, check-in information, and target room information of the booker sent by the rental platform in response to the housing rental request;
- the second generating unit is used to generate target order information according to the identity information of the reservation person, check-in information, and target room information.
- the security check-in device in the embodiment of the present application verifies whether the booker and the occupant are the same person through the electronic identity authentication system and the identity information of the booker and the face image information of the occupant.
- the token information realizes the consistency verification of the occupant and the reservation person, achieves the effect of real check-in, and ensures the safety of check-in.
- the verification steps are simple, easy to implement, and efficient.
- FIG. 9 is a second schematic diagram of the composition of the safe check-in device provided by the embodiment of the application. The device is used to perform the safe check-in method shown in FIG. 5 above.
- the device 900 may include: a second acquiring module 901, a sending module 902, a third receiving module 903, and an initiating module 904. :
- the second obtaining module 901 is configured to obtain the identity information of the person who rents the target room in the target order information in response to the check-in request based on the target order information, and obtain the face image information of the check-in person;
- the sending module 902 is configured to send the face image information of the occupant and the identity information of the reservation person to the back-end server of the rental platform, so that the back-end server can according to the face image information of the occupant And the identity information of the reservation person in combination with the electronic identity authentication system to verify whether the reservation person and the occupant are the same person;
- the third receiving module 903 is configured to receive token information sent by the background server after verifying that the reservation person and the occupant are the same person;
- the initiation module 904 is configured to transmit the token information to the target door lock device of the target room, so that the target door lock device initiates a door opening request to the background server based on the token information.
- the device 900 may further include:
- the fourth receiving module is configured to receive a door opening instruction sent by the background server, the door opening instruction being generated by the background server in response to the door opening request, wherein the door opening request includes the identification information of the target door lock device And the token information;
- the transmission module is configured to transmit the door opening instruction to the target door lock device via Bluetooth or NFC of the user terminal loaded with the rental platform, so that the target door lock device opens the target in response to the door opening instruction room.
- the second obtaining module 901 may include:
- the judging unit is configured to determine whether the occupant is in the area where the target room in the target order information is located in response to the check-in request based on the target order information;
- the second acquiring unit is configured to, if yes, acquire the identity information of the person who rents the target room from the target order information, and acquire the face image information of the occupant.
- the judgment unit is specifically configured to:
- the initiation module 904 is specifically configured to:
- the token information is transmitted to the target door lock device through the NFC of the user terminal loaded with the rental platform.
- the security check-in device in the embodiment of the present application sends the identity information of the reservation person and the face image information of the occupant to the back-end server, and receives verification by the back-end server according to the identity information of the reservation person and the face image information of the occupant.
- the token information sent when the booker and the occupant are the same person, and the token information is transmitted to the target door lock device, so that the target door lock device initiates a door opening request to the background server based on the token information, that is, when the booker and occupant are verified After the same person, a request to open the door is initiated, which achieves the effect of real person check-in and ensures the safety of check-in.
- FIG. 10 is a schematic structural diagram of the safe check-in device provided by the embodiment of the application, and the device is used to perform the above-mentioned safe check-in. method.
- the security check-in device may have relatively large differences due to different configurations or performances, and may include one or more processors 1001 and a memory 1002.
- the memory 1002 may store one or more storage application programs or data. Among them, the memory 1002 may be short-term storage or persistent storage.
- the application program stored in the memory 1002 may include one or more modules (not shown in the figure), and each module may include a series of computer-executable instructions for the safe check-in device.
- the processor 1001 may be configured to communicate with the memory 1002, and execute a series of computer executable instructions in the memory 1002 on the security check-in device.
- the security check-in device may also include one or more power supplies 1003, one or more wired or wireless network interfaces 1004, one or more input and output interfaces 1005, one or more keyboards 1006, and the like.
- the safe check-in device is applied to the back-end server of the rental platform.
- the safe check-in device includes a memory and one or more programs. One or more programs are stored in the memory, and one or more programs are stored in the memory.
- the program may include one or more modules, and each module may include a series of computer-executable instructions for the safe check-in device, and is configured to be executed by one or more processors. The following computer executable instructions:
- the instructions when executed, after the token information is sent to the rental platform, the instructions further include:
- the generating token information for opening the target room and sending the token information to the rental platform includes:
- Generate token information for opening the target room and record the generation time and valid time limit of the token information, and send the token information, the generation time and the valid time limit to the rental platform.
- the method further includes:
- the door opening request includes the identification information of the target door lock device, the token information, the generation time, The effective time limit and the receiving time when the target door lock device receives the token information;
- issuing the door opening instruction to the target door lock device includes:
- the issuing the door opening instruction to the target door lock device includes:
- the door opening instruction is issued to the rental platform, so that the door opening instruction is issued to the target door lock device through the NFC of the user terminal loaded with the rental platform.
- the computer executable instructions when executed, they also include:
- the target order information is generated according to the identity information of the reservation person, check-in information, and target room information.
- the security check-in device in the embodiment of the present application verifies whether the booker and the occupant are the same person through the electronic identity authentication system and the identity information of the booker and the face image information of the occupant.
- the token information realizes the consistency verification of the occupant and the booker, achieves the effect of real check-in, and ensures the safety of check-in.
- the verification steps are simple, easy to implement, and efficient.
- the safe check-in device is applied to a rental platform.
- the safe check-in device includes a memory and one or more programs.
- One or more programs are stored in the memory, and one or more programs can be It includes one or more modules, and each module may include a series of computer-executable instructions for the safe check-in device, and is configured to be executed by one or more processors.
- the one or more programs include a computer for performing the following Executable instructions:
- the face image information of the occupant and the identity information of the reservation person are sent to the back-end server of the rental platform, so that the back-end server can use the face image information of the occupant and the reservation person’s Identity information combined with an electronic identity authentication system to verify whether the booker and the occupant are the same person;
- the token information is transmitted to the target door lock device of the target room, so that the target door lock device initiates a door opening request to the background server based on the token information.
- the computer executable instructions when executed, they also include:
- the door opening instruction being generated by the background server in response to the door opening request, wherein the door opening request includes the identification information of the target door lock device and the token information;
- the door opening instruction is transmitted to the target door lock device via Bluetooth or NFC of the user terminal loaded with the rental platform, so that the target door lock device opens the target room in response to the door opening instruction.
- the computer-executable instructions in response to the check-in request based on the target order information, obtain the identity information of the person who rents the target room in the target order information, and obtain the face image information of the person who stays.
- the judging whether the occupant is in the area where the target room in the target order information is located includes:
- the target door lock device that transmits the token information to the target room includes:
- the token information is transmitted to the target door lock device through the NFC of the user terminal loaded with the rental platform.
- the security check-in device in the embodiment of this application sends the identity information of the reservation person and the face image information of the occupant to the back-end server, and receives the verification by the back-end server based on the identity information of the reservation person and the face image information of the occupant.
- the token information sent when the booker and the occupant are the same person, and the token information is transmitted to the target door lock device, so that the target door lock device initiates a door opening request to the background server based on the token information, that is, when the booker and occupant are verified After the same person, a request to open the door was initiated to achieve the effect of a real person check-in and ensure the safety of check-in.
- the embodiment of the present application also provides a storage medium for storing computer executable instructions.
- the storage medium is applied to the back-end server of the rental platform.
- the storage medium can be a U disk, an optical disk, a hard disk, etc., and the computer executable instructions stored in the storage medium can be implemented when executed by the processor. The following process:
- the method further includes:
- the generating token information for opening the target room, and sending the token information to the rental platform includes:
- Generate token information for opening the target room and record the generation time and valid time limit of the token information, and send the token information, the generation time and the valid time limit to the rental platform.
- the method further includes:
- the door opening request includes the identification information of the target door lock device, the token information, the generation time, The effective time limit and the receiving time when the target door lock device receives the token information;
- issuing a door opening instruction to the target door lock device includes:
- the issuing the door opening instruction to the target door lock device includes:
- the door opening instruction is issued to the rental platform, so that the door opening instruction is issued to the target door lock device through the NFC of the user terminal loaded with the rental platform.
- the computer executable instructions stored in the storage medium when executed by the processor, they further include:
- the target order information is generated according to the identity information of the reservation person, check-in information, and target room information.
- the electronic identity authentication system and the identity information of the reservation person and the facial image information of the occupant verify whether the reservation person and the occupant are the same person If it is, the token information used to open the target room is generated, which realizes the consistency verification of the occupant and the booker, achieves the effect of real check-in, and ensures the safety of check-in.
- the verification steps are simple and easy High efficiency in execution and verification.
- the storage medium is applied to a rental flat
- the storage medium may be a U disk, an optical disk, a hard disk, etc.
- the following process can be realized:
- the face image information of the occupant and the identity information of the reservation person are sent to the back-end server of the rental platform, so that the back-end server can use the face image information of the occupant and the reservation person’s Identity information combined with an electronic identity authentication system to verify whether the booker and the occupant are the same person;
- the token information is transmitted to the target door lock device of the target room, so that the target door lock device initiates a door opening request to the background server based on the token information.
- the computer executable instructions stored in the storage medium when executed by the processor, they further include:
- the door opening instruction being generated by the background server in response to the door opening request, wherein the door opening request includes the identification information of the target door lock device and the token information;
- the door opening instruction is transmitted to the target door lock device via Bluetooth or NFC of the user terminal loaded with the rental platform, so that the target door lock device opens the target room in response to the door opening instruction.
- the computer-executable instructions stored in the storage medium are executed by the processor, in response to the check-in request based on the target order information, obtain the identity information of the person who rents the target room in the target order information, and obtain The face image information of the occupant includes:
- the determining whether the occupant is in the area where the target room in the target order information is located includes:
- the target door lock device for transmitting the token information to the target room includes:
- the token information is transmitted to the target door lock device through the NFC of the user terminal loaded with the rental platform.
- the computer-executable instructions stored in the storage medium in the embodiment of the present application When executed by the processor, they send the identity information of the reservation person and the face image information of the occupant to the back-end server, and receive the back-end server in accordance with the reservation person’s
- the identity information and the face image information of the occupant verify the token information sent when the booker and occupant are the same person, and transmit the token information to the target door lock device so that the target door lock device initiates to the background server based on the token information
- the door opening request is to initiate a door opening request after verifying that the booker and the occupant are the same person, which achieves the effect of real person check-in and ensures the safety of check-in.
- a programmable logic device Programmable Logic Device, PLD
- FPGA Field Programmable Gate Array
- HDL Hardware Description Language
- ABEL Advanced Boolean Expression Language
- AHDL Altera Hardware Description Language
- HDCal JHDL
- Lava Lava
- Lola MyHDL
- PALASM RHDL
- Verilog Verilog
- the controller can be implemented in any suitable manner.
- the controller can take the form of, for example, a microprocessor or a processor and a computer-readable medium storing computer-readable program codes (such as software or firmware) executable by the (micro)processor. , Logic gates, switches, application specific integrated circuits (ASICs), programmable logic controllers and embedded microcontrollers.
- controllers include but are not limited to the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicon Labs C8051F320, the memory controller can also be implemented as a part of the memory control logic.
- controller in addition to implementing the controller in a purely computer-readable program code manner, it is entirely possible to program the method steps to make the controller use logic gates, switches, application specific integrated circuits, programmable logic controllers and embedded The same function can be realized in the form of a microcontroller, etc. Therefore, such a controller can be regarded as a hardware component, and the devices included in it for implementing various functions can also be regarded as a structure within the hardware component. Or even, the device for realizing various functions can be regarded as both a software module for realizing the method and a structure within a hardware component.
- a typical implementation device is a computer.
- the computer may be, for example, a personal computer, a laptop computer, a cell phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or Any combination of these devices.
- the embodiments of the present application may be provided as methods, systems, or computer program products. Therefore, the present application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, this application may adopt the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes.
- a computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- These computer program instructions can also be stored in a computer-readable memory that can guide a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device.
- the device implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
- These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment.
- the instructions provide steps for implementing functions specified in a flow or multiple flows in the flowchart and/or a block or multiple blocks in the block diagram.
- the computing device includes one or more processors (CPU), input/output interfaces, network interfaces, and memory.
- processors CPU
- input/output interfaces network interfaces
- memory volatile and non-volatile memory
- the memory may include non-permanent memory in computer readable media, random access memory (RAM) and/or non-volatile memory, such as read-only memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
- RAM random access memory
- ROM read-only memory
- flash RAM flash memory
- Computer-readable media include permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology.
- the information can be computer-readable instructions, data structures, program modules, or other data.
- Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) or other optical storage, Magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves.
- this application can be provided as methods, systems, or computer program products. Therefore, this application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, this application may adopt the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes.
- computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types.
- This application can also be practiced in distributed computing environments. In these distributed computing environments, remote processing devices connected through a communication network perform tasks.
- program modules can be located in local and remote computer storage media including storage devices.
Landscapes
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Tourism & Hospitality (AREA)
- Marketing (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Human Resources & Organizations (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Entrepreneurship & Innovation (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Lock And Its Accessories (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Automatic Disk Changers (AREA)
- Indicating And Signalling Devices For Elevators (AREA)
- Memory System Of A Hierarchy Structure (AREA)
Abstract
一种安全入住方法及装置,应用于租房平台的后台服务器,该安全入住方法包括:获取租赁目标房间的预订人的身份信息和入住目标房间的入住人的人脸图像信息(S102);通过电子身份认证系统,并结合预订人的身份信息和入住人的人脸图像信息验证预订人与入住人是否为同一人(S104);若是,则生成用于开启目标房间的令牌信息,将令牌信息发送至租房平台,以使入住人通过令牌信息开启目标房间(S106)。所述方法实现了对入住人和预订人的一致性验证,达到了实人入住的效果,保证了入住的安全性,此外,验证步骤简单、易于执行、验证效率高。
Description
本说明书涉及安防技术领域,尤其涉及一种安全入住方法及装置、安全入住设备及存储介质。
随着科技和城市的不断发展,在房屋租赁行业中,开始呈现出通过门锁远程管理房源的趋势,给入住人和房东带来了极大的便利。
但是,在现有的远程房源管理的过程中,存在无法核对入住人是否是房间预订人的问题,导致房间的入住存在一定的安全隐患。
发明内容
本说明书一个或多个实施例的目的是提供一种安全入住方法及装置、设备及存储介质,用以解决现有技术中无法核对入住人是否是房间预订人的问题。
为解决上述技术问题,本说明书一个或多个实施例是这样实现的:
一方面,本说明书一个或多个实施例提供一种安全入住方法,应用于租房平台的后台服务器,包括:
获取租赁目标房间的预订人的身份信息和入住所述目标房间的入住人的人脸图像信息;
通过电子身份认证系统,并结合所述预订人的身份信息和所述入住人的人脸图像信息验证所述预订人与所述入住人是否为同一人;
若是,则生成用于开启所述目标房间的令牌信息,将所述令牌信息发送至所述租房平台,以使所述入住人通过所述令牌信息开启所述目标房间。
可选的,在所述将所述令牌信息发送至所述租房平台之后,还包括:
接收所述目标房间的目标门锁设备基于所述令牌信息发送的开门请求,其中,所述开门请求中包括所述目标门锁设备的标识信息和所述令牌信息;
根据所述目标门锁设备的标识信息查询与所述目标门锁设备对应的订单信息;
将与所述目标门锁设备对应的订单信息中的预订人的身份信息与所述令牌信息验证成功的预订人的身份信息进行匹配;
若匹配,则向所述目标门锁设备下发开门指令,以使所述目标门锁设备响应于所述开门指令开启所述目标房间。
可选的,所述生成用于开启所述目标房间的令牌信息,将所述令牌信息发送至所述租房平台包括:
生成用于开启所述目标房间的令牌信息并记录所述令牌信息的生成时间和有效时限,将所述令牌信息、所述生成时间和所述有效时限发送至所述租房平台。
可选的,在所述将所述令牌信息、所述生成时间和所述有效时限发送至所述租房平台之后还包括:
接收所述目标房间的目标门锁设备基于所述令牌信息发送的开门请求,其中,所述开门请求中包括所述目标门锁设备的标识信息、所述令牌信息、所述生成时间、所述有效时限以及所述目标门锁设备接收所述令牌信息的接收时间;
根据所述生成时间、所述有效时限、所述接收时间判断所述令牌信息是否有效;
若是,则根据所述目标门锁设备的标识信息查询与所述目标门锁设备对应的订单信息;
将与所述目标门锁设备对应的订单信息中的预订人的身份信息与所述令牌信息验证成功的预订人的身份信息进行匹配;
若匹配,则向所述目标门锁设备下发开门指令,以使所述目标门锁设备响应于所述开门指令开启所述目标房间。
可选的,若匹配,则向所述目标门锁设备下发开门指令包括:
若匹配,则获取所述预订人租赁所述目标房间的入住时间段,根据所述入住时间段判断当前时间是否符合入住条件;
若是,则向所述目标门锁设备下发开门指令。
可选的,所述向所述目标门锁设备下发开门指令包括:
向所述目标门锁设备直接下发所述开门指令;或者
将所述开门指令下发至所述租房平台,以通过装载所述租房平台的用户终端的蓝牙 将所述开门指令下发至所述目标门锁设备;或者
将所述开门指令下发至所述租房平台,以通过装载所述租房平台的用户终端的NFC将所述开门指令下发至所述目标门锁设备。
可选的,所述方法还包括:
接收所述租房平台响应于房源租赁请求发送的所述预订人的身份信息、入住信息以及目标房间的信息;
根据所述预订人的身份信息、入住信息以及目标房间的信息生成目标订单信息。
另一方面,本说明书一个或多个实施例提供一种安全入住方法,应用于租房平台,包括:
响应于基于目标订单信息的入住请求,在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取入住人的人脸图像信息;
将所述入住人的人脸图像信息和所述预订人的身份信息发送至所述租房平台的后台服务器,以使所述后台服务器根据所述入住人的人脸图像信息和所述预订人的身份信息并结合电子身份认证系统验证所述预订人和所述入住人是否为同一人;
接收所述后台服务器在验证所述预订人和所述入住人为同一人后发送的令牌信息;
将所述令牌信息传输至所述目标房间的目标门锁设备,以使所述目标门锁设备基于所述令牌信息向所述后台服务器发起开门请求。
可选的,所述方法还包括:
接收所述后台服务器发送的开门指令,所述开门指令由所述后台服务器响应于所述开门请求生成,其中所述开门请求中包括所述目标门锁设备的标识信息和所述令牌信息;
将所述开门指令通过装载所述租房平台的用户终端的蓝牙或者NFC传输至所述目标门锁设备,以使所述目标门锁设备响应于所述开门指令开启所述目标房间。
可选的,所述响应于基于目标订单信息的入住请求,在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取入住人的人脸图像信息包括:
响应于基于目标订单信息的入住请求,判断所述入住人是否在所述目标订单信息中的目标房间所在的区域内;
若是,则在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取所述 入住人的人脸图像信息。
可选的,所述判断所述入住人是否在所述目标订单信息中的目标房间所在的区域内包括:
判断所述入住人装载所述租房平台的用户终端的位置是否在所述目标订单信息中的目标房间所在的区域内;或者
判断所述入住人装载所述租房平台的用户终端是否通过蓝牙与所述目标房间的目标门锁设备连接;或者
判断所述入住人装载所述租房平台的用户终端是否通过NFC与所述目标房间的目标门锁设备连接。
可选的,所述将所述令牌信息传输至所述目标房间的目标门锁设备包括:
根据所述令牌信息生成开门二维码,将所述开门二维码通过所述目标门锁设备上的摄像头传输至所述目标门锁设备,以将所述令牌信息传输至所述目标门锁设备;或者
将所述令牌信息通过装载所述租房平台的用户终端的蓝牙传输至所述目标门锁设备;或者
将所述令牌信息通过装载所述租房平台的用户终端的NFC传输至所述目标门锁设备。
另一方面,本说明书一个或多个实施例提供一种安全入住装置,应用于租房平台的后台服务器,包括:
第一获取模块,用于获取租赁目标房间的预订人的身份信息和入住所述目标房间的入住人的人脸图像信息;
验证模块,用于通过电子身份认证系统,并结合所述预订人的身份信息和所述入住人的人脸图像信息验证所述预订人与所述入住人是否为同一人;
第一生成模块,用于若是,则生成用于开启所述目标房间的令牌信息,将所述令牌信息发送至所述租房平台,以使所述入住人通过所述令牌信息开启所述目标房间。
可选的,所述装置还包括:
第一接收模块,用于接收所述目标房间的目标门锁设备基于所述令牌信息发送的开门请求,其中,所述开门请求中包括所述目标门锁设备的标识信息和所述令牌信息;
查询模块,用于根据所述目标门锁设备的标识信息查询与所述目标门锁设备对应的订单信息;
匹配模块,用于将与所述目标门锁设备对应的订单信息中的预订人的身份信息与所述令牌信息验证成功的预订人的身份信息进行匹配;
下发模块,用于若匹配,则向所述目标门锁设备下发开门指令,以使所述目标门锁设备响应于所述开门指令开启所述目标房间。
可选的,所述第一生成模块,具体用于若是,则生成用于开启所述目标房间的令牌信息并记录所述令牌信息的生成时间和有效时限,将所述令牌信息、所述生成时间和所述有效时限发送至所述租房平台。
可选的,所述装置还包括:
第一接收模块,用于接收所述目标房间的目标门锁设备基于所述令牌信息发送的开门请求,其中,所述开门请求中包括所述目标门锁设备的标识信息、所述令牌信息、所述生成时间、所述有效时限以及所述目标门锁设备接收所述令牌信息的接收时间;
判断模块,用于根据所述生成时间、所述有效时限、所述接收时间判断所述令牌信息是否有效;
查询模块,用于若是,则根据所述目标门锁设备的标识信息查询与所述目标门锁设备对应的订单信息;
匹配模块,用于将与所述目标门锁设备对应的订单信息中的预订人的身份信息与所述令牌信息验证成功的预订人的身份信息进行匹配;
下发模块,用于若匹配,则向所述目标门锁设备下发开门指令,以使所述目标门锁设备响应于所述开门指令开启所述目标房间。
可选的,所述下发模块包括:
第一获取单元,用于若匹配,则获取所述预订人租赁所述目标房间的入住时间段,根据所述入住时间段判断当前时间是否符合入住条件;
下发单元,用于若是,则向所述目标门锁设备下发开门指令。
可选的,所述下发模块具体用于:
向所述目标门锁设备直接下发所述开门指令;或者
将所述开门指令下发至所述租房平台,以通过装载所述租房平台的用户终端的蓝牙将所述开门指令下发至所述目标门锁设备;或者
将所述开门指令下发至所述租房平台,以通过装载所述租房平台的用户终端的NFC将所述开门指令下发至所述目标门锁设备。
可选的,所述装置还包括:
第二接收模块,用于接收所述租房平台响应于房源租赁请求发送的所述预订人的身份信息、入住信息以及目标房间的信息;
第二生成单元,用于根据所述预订人的身份信息、入住信息以及目标房间的信息生成目标订单信息。
另一方面,本说明书一个或多个实施例提供一种安全入住装置,应用于租房平台,包括:
第二获取模块,用于响应于基于目标订单信息的入住请求,在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取入住人的人脸图像信息;
发送模块,用于将所述入住人的人脸图像信息和所述预订人的身份信息发送至所述租房平台的后台服务器,以使所述后台服务器根据所述入住人的人脸图像信息和所述预订人的身份信息并结合电子身份认证系统验证所述预订人和所述入住人是否为同一人;
第三接收模块,用于接收所述后台服务器在验证所述预订人和所述入住人为同一人后发送的令牌信息;
发起模块,用于将所述令牌信息传输至所述目标房间的目标门锁设备,以使所述目标门锁设备基于所述令牌信息向所述后台服务器发起开门请求。
可选的,所述装置还包括:
第四接收模块,用于接收所述后台服务器发送的开门指令,所述开门指令由所述后台服务器响应于所述开门请求生成,其中所述开门请求中包括所述目标门锁设备的标识信息和所述令牌信息;
传输模块,用于将所述开门指令通过装载所述租房平台的用户终端的蓝牙或者NFC传输至所述目标门锁设备,以使所述目标门锁设备响应于所述开门指令开启所述目标房间。
可选的,所述第二获取模块包括:
判断单元,用于响应于基于目标订单信息的入住请求,判断所述入住人是否在所述目标订单信息中的目标房间所在的区域内;
第二获取单元,用于若是,则在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取所述入住人的人脸图像信息。
可选的,所述判断单元,具体用于:
判断所述入住人装载所述租房平台的用户终端的位置是否在所述目标订单信息中的目标房间所在的区域内;或者
判断所述入住人装载所述租房平台的用户终端是否通过蓝牙与所述目标房间的目标门锁设备连接;或者
判断所述入住人装载所述租房平台的用户终端是否通过NFC与所述目标房间的目标门锁设备连接。
可选的,所述发起模块,具体用于:
根据所述令牌信息生成开门二维码,将所述开门二维码通过所述目标门锁设备上的摄像头传输至所述目标门锁设备,以将所述令牌信息传输至所述目标门锁设备;或者
将所述令牌信息通过装载所述租房平台的用户终端的蓝牙传输至所述目标门锁设备;或者
将所述令牌信息通过装载所述租房平台的用户终端的NFC传输至所述目标门锁设备。
另一方面,本说明书一个或多个实施例提供一种安全入住设备,应用于租房平台的后台服务器,包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述计算机可执行指令在被执行时使所述处理器:
获取租赁目标房间的预订人的身份信息和入住所述目标房间的入住人的人脸图像信息;
通过电子身份认证系统,并结合所述预订人的身份信息和所述入住人的人脸图像信息验证所述预订人与所述入住人是否为同一人;
若是,则生成用于开启所述目标房间的令牌信息,将所述令牌信息发送至所述租房平台,以使所述入住人通过所述令牌信息开启所述目标房间。
另一方面,本说明书一个或多个实施例提供一种安全入住设备,应用于租房平台,包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述计算机可执行指令在被执行时使所述处理器:
响应于基于目标订单信息的入住请求,在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取入住人的人脸图像信息;
将所述入住人的人脸图像信息和所述预订人的身份信息发送至所述租房平台的后台服务器,以使所述后台服务器根据所述入住人的人脸图像信息和所述预订人的身份信息并结合电子身份认证系统验证所述预订人和所述入住人是否为同一人;
接收所述后台服务器在验证所述预订人和所述入住人为同一人后发送的令牌信息;
将所述令牌信息传输至所述目标房间的目标门锁设备,以使所述目标门锁设备基于所述令牌信息向所述后台服务器发起开门请求。
另一方面,本说明书一个或多个实施例提供一种存储介质,应用于租房平台的后台服务器,用于存储计算机可执行指令,所述计算机可执行指令在被执行时实现以下流程:
获取租赁目标房间的预订人的身份信息和入住所述目标房间的入住人的人脸图像信息;
通过电子身份认证系统,并结合所述预订人的身份信息和所述入住人的人脸图像信息验证所述预订人与所述入住人是否为同一人;
若是,则生成用于开启所述目标房间的令牌信息,将所述令牌信息发送至所述租房平台,以使所述入住人通过所述令牌信息开启所述目标房间。
另一方面,本说明书一个或多个实施例提供一种存储介质,应用于租房平台,用于存储计算机可执行指令,所述计算机可执行指令在被执行时实现以下流程:
响应于基于目标订单信息的入住请求,在目标订单信息中获取租赁目标房间的 预订人的身份信息,以及获取入住人的人脸图像信息;
将所述入住人的人脸图像信息和所述预订人的身份信息发送至所述租房平台的后台服务器,以使所述后台服务器根据所述入住人的人脸图像信息和所述预订人的身份信息并结合电子身份认证系统验证所述预订人和所述入住人是否为同一人;
接收所述后台服务器在验证所述预订人和所述入住人为同一人后发送的令牌信息;
将所述令牌信息传输至所述目标房间的目标门锁设备,以使所述目标门锁设备基于所述令牌信息向所述后台服务器发起开门请求。
采用本说明书一个或多个实施例的技术方案,通过电子身份认证系统以及预订人的身份信息和入住人的人脸图像信息验证预订人和入住人是否为同一人,若是,则生成用于开启目标房间的令牌信息,实现了对入住人和预订人的一致性验证,达到了实人入住的效果,保证了入住的安全性,此外,验证步骤简单、易于执行、验证效率高。
采用本说明书另一个或多个实施例的技术方案,通过将预订人的身份信息和入住人的人脸图像信息发送至后台服务器,并接收后台服务器在根据预订人的身份信息和入住人的人脸图像信息验证预订人和入住人为同一人时发送的令牌信息,以及将令牌信息传输目标门锁设备,以使目标门锁设备基于令牌信息向后台服务器发起开门请求,即在验证预订人和入住人为同一人后,发起开门请求,达到了实人入住的效果,保证了入住的安全性。
为了更清楚地说明本说明书一个或多个实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本说明书一个或多个实施例中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本申请实施例提供的安全入住方法的流程示意图一;
图2为本申请实施例提供的租赁房间的流程示意图;
图3为本申请实施例提供的根据开门请求开启目标房间的流程示意图一;
图4为本申请实施例提供的根据开门请求开启目标房间的流程示意图二;
图5为本申请实施例提供的安全入住方法的流程示意图二;
图6为本申请实施例提供的安全入住系统的结构示意图;
图7为本申请实施例提供的入住和开门的流程示意图;
图8为本申请实施例提供的安全入住装置的组成示意图一
图9为本申请实施例提供的安全入住装置的组成示意图二;
图10为本申请实施例提供的安全入住设备的结构示意图。
本说明书一个或多个实施例提供一种安全入住方法及装置、设备及存储介质,用以解决现有技术中无法核对入住人是否是房间预订人的问题。
为了使本技术领域的人员更好地理解本说明书一个或多个实施例中的技术方案,下面将结合本说明书一个或多个实施例中的附图,对本说明书一个或多个实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本说明书一部分实施例,而不是全部的实施例。基于本说明书一个或多个实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都应当属于本说明书一个或多个实施例保护的范围。
本申请实施例提供了一种安全入住方法,应用于租房平台的后台服务器,租房平台的后台服务器例如可以为独立的一个服务器,也可以为由多个服务器组成的服务器集群,本示例性实施例对此不做特殊限定。图1为本申请实施例提供的安全入住方法的流程示意图一,如图1所示,该方法可以包括以下步骤:
步骤S102、获取租赁目标房间的预订人的身份信息和入住目标房间的入住人的人脸图像信息。
在本申请实施例中,首先对预订人在租房平台中租赁房间的过程进行说明,具体的过程可以包括以下两个步骤,其中:
第一步骤:接收租房平台响应于房源租赁请求发送的预订人的身份信息、入住信息以及目标房间的信息。
租房平台向预订人展示房源信息。预订人在租房平台上浏览房源信息,并在房源信息中选择目标房间(即意向房间)以及基于目标房间向租房平台发起房源租赁请求。 租房平台响应该房源租赁请求获取预订人的身份信息、入住人信息,以及将预订人的身份信息、入住信息以及目标房间的信息发送至租房平台的后台服务器,具体的,预订人的身份信息可以包括预订人的身份证号、联系方式、姓名、住址等,入住信息可以包括入住时间段、入住人数等,目标房间的信息包括目标房间的目标门锁设备的标识信息、目标房间的位置信息等,本实施例对比不做特殊限定。需要说明的是,租房平台可以通过向预订人提供一信息填写页面,使预订人在信息填写页面填写预订人的身份信息和入住信息。租房平台的后台服务器接收租房平台发送的预订人的身份信息、入住信息和目标房间的信息。
第二步骤:根据预订人的身份信息、入住信息以及目标房间的信息生成目标订单信息。即租房平台的后台服务器可以将预订人的身份信息、入住信息以及目标房间的信息进行绑定,以得到目标订单信息。
图2为本申请实施例提供的租赁房间的流程示意图,从图2中可知,租房的流程可以包括:1、租房平台展示房源信息,2、预订人通过装载了租房平台的用户终端查看租房平台展示的房源信息,并在房源信息中选择目标房间,3、预订人基于目标房间向租房平台发起房源租赁请求,4、租房平台请求预订人输入预订人的身份信息、入住信息,5、预订人输入预订人的身份信息、入住信息,6、租房平台向租房平台的后台服务器上传预订人的身份信息、入住信息以及目标房间的信息,7、租房平台的后台服务器将预订人的身份信息、入住信息以及目标房间的信息进行绑定,以生成目标订单信息,8、租房平台的后台服务器向租房平台返回目标房间租赁成功的结果,以使预订人通过装载租房平台的用户终端查看租赁结果。
接下来,若入住人要入住目标房间,入住流程可以包括:入住人通过装载租房平台的用户终端查询目标订单信息,然后,基于目标订单信息向租房平台发起入住请求。租房平台响应于该入住请求,从目标订单信息中获取预订人的身份信息以及获取入住人的人脸图像信息,具体的,租房平台可以通过装载其的用户终端的摄像头获取入住人的人脸图像,接下来,将获取的预订人的身份信息(即租赁目标房间的预订人的身份信息)、入住人的人脸图像信息(即入住目标房间的入住人的人脸图像信息)发送至租房平台的后台服务器,该后台服务器接收入住人的人脸图像信息和预订人的身份信息。
步骤S104、通过电子身份认证系统,并结合预订人的身份信息和入住人的人脸图像信息验证预订人与入住人是否为同一人。
在本申请实施例中,租房平台的后台服务器可以将预订人的身份信息和入住人 的人脸图像信息上传至电子身份认证系统,电子身份认证系统根据入住人的人脸图像信息和预订人的身份信息验证预订人与入住人是否为同一人,其中,电子身份认证系统中保存有每个公民的电子身份证,电子身份证是居民身份证网上功能凭证(又称为网证),其由公安部可信身份认证平台认证并颁发,该电子身份证可以作为个人合法身份的验证凭证。每个电子身份证至少包括公民的身份信息和人脸图像信息。基于此,验证的过程可以包括:电子身份认证系统将预订人的身份信息与每个公民的电子身份证中的身份信息进行比对,并将身份信息与预订人的身份信息相同的公民的电子身份证确定为目标电子身份证,将目标电子身份证上的人脸图像信息与入住人的人脸图像信息进行比对,若比对成功,则向租房平台的后台服务器返回验证成功的回执信息,租房平台的后台服务器根据该验证成功的回执信息确定预订人与入住人为同一人。
步骤S106、若是,则生成用于开启目标房间的令牌信息,将令牌信息发送至租房平台,以使入住人通过令牌信息开启目标房间。
在本申请实施例中,若预订人与入住人为同一人,则生成用于开启目标房间的令牌信息,需要说明的是,该令牌信息还可以用于表征身份验证成功,此处的身份验证成功指预订人和入住人为同一人。
将令牌信息发送至租房平台,租房平台将该令牌信息传输至目标房间的目标门锁设备,该目标门锁设备根据接收到的令牌信息和目标门锁设备的标识信息生成开门请求,并将该开门请求发送至租房平台的后台服务器。需要说明的是,租房平台将令牌信息传输至目标房间的目标门锁设备的过程将在下文中进行说明,因此此处不再进行说明。
下面将对根据开门请求开启目标房间的过程进行说明。图3为本申请实施例提供的根据开门请求开启目标房间的流程示意图一。如图3所示,可以包括以下步骤:
步骤S302、接收目标房间的目标门锁设备基于令牌信息发送的开门请求,其中,开门请求中包括目标门锁设备的标识信息和令牌信息。
步骤S304、根据目标门锁设备的标识信息查询与目标门锁设备对应的订单信息。
在本申请实施例中,将目标门锁设备的标识信息与每个订单信息中的门锁设备的标识信息进行比对,并将与目标门锁设备的标识信息比对成功的门锁设备所属的订单信息确定为与目标门锁设备对应的订单信息。
步骤S306、将与目标门锁设备对应的订单信息中的预订人的身份信息与令牌信息验证成功的预订人的身份信息进行匹配。
在本申请实施例中,令牌信息验证成功的预订人的身份信息为步骤S102中的预订人的身份信息。从与目标门锁设备对应的每个订单信息中获取预订人的身份信息,将令牌信息验证成功的预订人的身份信息分别与目标门锁设备对应的每个订单信息中的预订人的身份信息进行匹配。
步骤S308、若匹配,则向目标门锁设备下发开门指令,以使目标门锁设备响应于开门指令开启所述目标房间。
在本申请实施例中,若令牌信息验证成功的预订人的身份信息与目标门锁设备对应的一个订单信息中的预订人的身份信息匹配成功,则向目标门锁设备下发开门指令,目标门锁设备接收并响应该开门指令开启目标房间。
下面将对租房平台的后台服务器向目标门锁设备下发开门指令的三种方式进行说明。
第一种:向目标门锁设备直接下发开门指令。
第二种:将开门指令下发至租房平台,以通过装载租房平台的用户终端的蓝牙将开门指令下发至目标门锁设备。租房平台的后台服务器将开门指令下发至入住人的用户终端上安装的租房平台,该租房平台通过该用户终端的蓝牙将开门指令下发至目标门锁设备。
第三种:将开门指令下发至租房平台,以通过装载租房平台的用户终端的NFC将开门指令下发至目标门锁设备。租房平台的后台服务器将开门指令下发至入住人的用户终端上安装的租房平台,该租房平台通过该用户终端的NFC将开门指令下发至目标门锁设备。
需要说明的是,上述三种方式仅为示例性的,并不用于限定本发明。
为了进一步的提高入住的安全性,生成用于开启目标房间的令牌信息,将令牌信息发送至租房平台可以包括:生成用于开启目标房间的令牌信息并记录令牌信息的生成时间和有效时限,将令牌信息、生成时间和有效时限发送至租房平台。
在本申请实施例中,有效时限的具体数值可以自行设置,例如,有效时限可以为45秒,还可以为1分钟等,本示例性实施例对此不做特殊限定。需要说明的是,为了确保入住的安全性,该有效时限的数值不要设置的过长。
租房平台的后台服务器将令牌信息、生成时间、有效时限发送至租房平台,租 房平台将令牌信息、生成时间、有效时限发送至目标门锁设备,目标门锁在接收到令牌信息时,记录令牌信息的接收时间,以及根据令牌信息、生成时间、有效时限、接收时间以及目标门锁设备的标识信息生成开门请求,并将该开门请求上传至租房平台的后台服务器。需要说明的是,租房平台将令牌信息、生成时间、有效时限传输至目标房间的目标门锁设备的过程将在下文中进行说明,因此此处不再进行赘述。
基于此,下面将对根据开门请求开启目标房间的过程进行说明。图4为本申请实施例提供的根据开门请求开启目标房间的流程示意图二。如图4所示,可以包括以下步骤:
步骤S402、接收目标房间的目标门锁设备基于令牌信息发送的开门请求,其中,开门请求中包括目标门锁设备的标识信息、令牌信息、生成时间、有效时限以及目标门锁设备接收令牌信息的接收时间。
步骤S404、根据生成时间、有效时限、接收时间判断令牌信息是否有效。在本申请实施例中,计算接收时间与生成时间的时间差,并判断该时间差是否在有效时限内,若是,则判定令牌信息有效,若否,则判定令牌信息失效。
步骤S406、若是,则根据目标门锁设备的标识信息查询与目标门锁设备对应的订单信息。在本申请实施例中,若令牌信息有效,则查询与目标门锁设备对应的订单信息。由于查询与目标门锁设备对应的订单信息的原理已经在上文中进行了说明,因此此处不再进行赘述。
步骤S408、将与目标门锁设备对应的订单信息中的预订人的身份信息与令牌信息验证成功的预订人的身份信息进行匹配。在本申请实施例中,由于该步骤已经在上文中进行了说明,因此此处不在进行赘述。
步骤S410、若匹配,则向目标门锁设备下发开门指令,以使目标门锁设备响应于开门指令开启目标房间。在本申请实施例中,由于该步骤已经在上文中进行了说明,因此此处不再进行说明。
由上可知,通过设置令牌信息的有效时限,验证令牌信息的有效性,并在令牌信息有效时,进行下一步的验证,提高了入住的安全性。
为了确保入住时间的合理性,若匹配,则向目标门锁设备下发开门指令可以包括:若匹配,则获取预订人租赁目标房间的入住时间段,根据入住时间段判断当前时间是否符合入住条件;若是,则向目标门锁设备下发开门指令。
在本申请实施例中,从目标订单信息中获取预订人租赁目标房间的入住时间段,判断当前时间是否在入住时间段内,若是,则判定当前时间符合入住条件,若否在判定当前时间不符合入住条件。
显然,通过根据入住时间段判断当前时间是否符合入住条件,可以确保入住时间的合理性,从而提高了入住的安全性。
综上所述,通过电子身份认证系统以及预订人的身份信息和入住人的人脸图像信息验证预订人和入住人是否为同一人,若是,则生成用于开启目标房间的令牌信息,实现了对入住人和预订人的一致性验证,达到了实人入住的效果,保证了入住的安全性,此外,验证步骤简单、易于执行、验证效率高。
本申请实施例还提供了另一种安全入住方法,应用于租房平台。图5为本申请实施例提供的安全入住方法的流程示意图二,如图5所示,该方法可以包括以下步骤:
步骤S502、响应于基于目标订单信息的入住请求,在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取入住人的人脸图像信息。
在本申请实施例中,入住人在入住目标房间时,可以通过其用户终端中装载的租房平台查询目标订单信息,并基于目标订单信息向租房平台发起入住请求。租房平台响应于该入住请求,在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取入住人的人脸图像信息,具体的,租房平台可以通过装载其的用户终端上的摄像头获取入住人的人脸图像信息。
为了进一步确保入住的安全性,响应于基于目标订单信息的入住请求,在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取入住人的人脸图像信息可以包括:响应于基于目标订单信息的入住请求,判断入住人是否在目标订单信息中的目标房间所在的区域内;若是,则在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取入住人的人脸图像信息。
具体的,判断入住人是否在目标订单信息中的目标房间所在的区域内的方式可以包括以下三种,其中:
第一种:判断入住人装载租房平台的用户终端的位置是否在目标订单信息中的目标房间所在的区域内,即获取入住人当前用于处理入住流程且装载租房平台的用户终端的位置,以及,判断该用户终端的位置是否在目标订单信息中的目标房间所在的区域内,若是,则判定入住人在目标订单信息中的目标房间所在的区域内。
第二种:判断入住人装载租房平台的用户终端是否通过蓝牙与目标房间的目标门锁设备连接。即在入住人办理入住的时,首先提醒入住人将装载租房平台的用户终端通过蓝牙与目标房间的目标门锁设备连接,并在装载租房平台的用户终端通过蓝牙与目标房间的目标门锁设备保持连接时,判定入住人在目标订单信息中的目标房间所在的区域内。
第三种:判断入住人装载租房平台的用户终端是否通过NFC与目标房间的目标门锁设备连接。即在入住人办理入住的时,首先提醒入住人将装载租房平台的用户终端通过NFC与目标房间的目标门锁设备连接,并在装载租房平台的用户终端通过NFC与目标房间的目标门锁设备保持连接时,判定入住人在目标订单信息中的目标房间所在的区域内。
步骤S504、将入住人的人脸图像信息和预订人的身份信息发送至租房平台的后台服务器,以使后台服务器根据入住人的人脸图像信息和预订人的身份信息并结合电子身份认证系统验证预订人和入住人是否为同一人。
在本申请实施例中,租房平台将入住人的人脸图像信息和预订人的身份信息发送至租房平台的后台服务器,该后台服务器根据入住人的人脸图像信息和预订人的身份信息并结合电子身份认证系统验证预订人和入住人是否为同一人,若为同一人,则生成用于开启目标房间的令牌信息,并将令牌信息发送至租房平台。
步骤S506、接收后台服务器在验证预订人和入住人为同一人后发送的令牌信息。
步骤S508、将令牌信息传输至目标房间的目标门锁设备,以使目标门锁设备基于令牌信息向后台服务器发起开门请求。
在本申请实施例中,租房平台将令牌信息传输至目标房间的目标门锁设备的方式可以包括以下三种:
第一种:根据令牌信息生成开门二维码,将开门二维码通过目标门锁设备上的摄像头传输至目标门锁设备,以将令牌信息传输至目标门锁设备。
在本申请实施例中,租房平台根据令牌信息生成开门二维码,用户通过装载该租房平台的用户终端向目标门锁设备的摄像头展示该开门二维码,目标门锁设备上的摄像头通过扫描开门二维码获取该开门二维码,从而从开门二维码中获取令牌信息。
第二种:将令牌信息通过装载租房平台的用户终端的蓝牙传输至目标门锁设备。
第三种:将令牌信息通过装载租房平台的用户终端的NFC传输至目标门锁设备。
目标门锁设备接收该令牌信息,并根据该令牌信息和目标门锁设备的标识信息生成开门请求,将该开门请求发送至租房平台的后台服务器中,后台服务器接收该开门请求,具体的,开门请求中包括令牌信息和目标门锁设备的标识信息。后台服务器响应于该开门请求,并根据该开门请求生成开门指令,以及将开门指令发送至租房平台。具体的,后台服务器根据开门请求生成开门指令的过程可以包括:后台服务器根据开门请求获取令牌信息和目标门锁设备的标识信息,根据目标门锁设备的标识信息查找与目标门锁设备对应的订单信息,并将与目标门锁设备对应的订单信息中的预订人的身份信息与令牌信息验证成功的预订人的身份信息进行匹配,若与目标门锁设备对应的一个订单信息中的预订人的身份信息与令牌信息验证成功的预订人的身份信息匹配,则生成开门指令,并将开门指令下发至租房平台。
根据开门指令开启目标房间的过程可以包括:首先,接收后台服务器发送的开门指令,开门指令由后台服务器响应于开门请求生成,其中开门请求中包括目标门锁设备的标识信息和令牌信息。然后,将开门指令通过装载租房平台的用户终端的蓝牙或者NFC传输至目标门锁设备,以使目标门锁设备响应于开门指令开启目标房间。
综上所述,通过将预订人的身份信息和入住人的人脸图像信息发送至后台服务器,并接收后台服务器在根据预订人的身份信息和入住人的人脸图像信息验证预订人和入住人为同一人时发送的令牌信息,以及将令牌信息传输目标门锁设备,以使目标门锁设备基于令牌信息向后台服务器发起开门请求,即在验证预订人和入住人为同一人后,发起开门请求,达到了实人入住的效果,保证了入住的安全性。
图6为本申请实施例提供的安全入住系统的结构示意图,如图6所示,该安全入住系统可以包括:装载租房平台的用户终端601、目标房间的目标门锁设备602、租房平台的后台服务器603以及电子身份认证系统604。从图6中可知,预订人可以通过装载租房平台的用户终端601中的租房平台查看房源信息、确定目标房间、发起房屋租赁请求,装载租房平台的用户终端601中的租房平台获取预订人的身份信息、入住信息,并将预订人的身份信息、入住信息、目标房间的信息上传至租房平台的后台服务器603,租房平台的后台服务器603根据预订人的身份信息、入住信息以及目标房间的信息生成目标订单信息。
入住人可以通过装载租房平台的用户终端601中的租房平台查询目标订单信息,并发起入住请求,装载租房平台的用户终端601中的租房平台响应于入住请求获取目标 订单信息中的预订人的身份信息,并通过装载租房平台的用户终端601上的摄像头获取入住人的人脸图像信息,以及将预订人的身份信息和入住人的人脸图像信息上传至租房平台的后台服务器603,租房平台的后台服务器603将接收到的入住人的人脸图像信息和预订人的身份信息上传至电子身份认证系统604,电子身份认证系统604根据入住人的人脸图像信息和预订人的身份信息验证入住人和预订人是否为同一人,并将验证回执发送至租房平台的后台服务器603,若租房平台的后台服务器603接收到的验证回执为通过验证,即预订人与入住人为同一人,则生成令牌信息,并将令牌信息下发至装载租房平台的用户终端601中的租房平台,装载租房平台的用户终端601中的租房平台将令牌信息传输至目标房间的目标门锁设备602,目标房间的目标门锁设备602将令牌信息和目标房间的目标门锁设备602的标识信息传输至租房平台的后台服务器603,租房平台的后台服务器603判断与目标房间的目标门锁设备602对应的订单信息中的预订人的身份信息与令牌信息验证通过的预订人的身份信息是否相同,若相同,生成开门指令,并将开门指令下发至目标房间的目标门锁设备602,目标房间的目标门锁设备602响应该开门指令开启目标房间。
图7为本申请实施例提供的入住和开门的流程示意图,如图7所示,入住和开门的流程可以包括:
7.1、入住人向租房平台发起入住请求;
7.2、租房平台响应于入住请求要求入住人刷脸并获取预订人的身份信息;
7.3、入住人刷脸;
7.4、租房平台将入住人的人脸图像信息和预订人的身份信息上传至租房平台的后台服务器;
7.5、租房平台的后台服务器根据预订人的身份信息、入住人的人脸图像信息请求对预订人和入住人进行验证;
7.6、电子身份认证系统根据预订人的身份信息查找预订人的人脸图像信息,并比对入住人的人脸图像信息和预订人的人脸图像信息;
7.7、电子身份认证系统向租房平台的后台服务器返回验证回执;
7.8、若验证通过,即预订人和入住人为同一人,则租房平台的后台服务器生成令牌信息;
7.9、租房平台的后台服务向租房平台返回令牌信息;
7.10、租房平台将令牌信息传输至目标门锁设备;
7.11、目标门锁设备将获取的令牌信息和目标门锁的标识信息上传至租房平台的后台服务器;
7.12、租房平台的后台服务器根据目标门锁设备的标识信息查询与目标门锁设备对应的订单信息中的预订人的身份信息;
7.13、租房平台的后台服务器根据令牌信息查询其验证成功的预订人的身份信息;
7.14、将7.12中查询的预订人的身份信息与7.13中查询的预订人的身份信息进行比对;
7.15、若比对成功,则向目标门锁设备下发开门指令;
7.16、目标门锁设备执行开门指令打开目标房间。
对应上述图1中的安全入住方法,基于相同的技术构思,本申请实施例还提供了一种安全入住装置,应用于租房平台的后台服务器,图8为本申请实施例提供的安全入住装置的组成示意图一,该装置用于执行上述图1中示出的安全入住方法,如图8所示,该装置800可以包括:第一获取模块801、验证模块802、第一生成模块803,其中:
第一获取模块801,用于获取租赁目标房间的预订人的身份信息和入住所述目标房间的入住人的人脸图像信息;
验证模块802,用于通过电子身份认证系统,并结合所述预订人的身份信息和所述入住人的人脸图像信息验证所述预订人与所述入住人是否为同一人;
第一生成模块803,用于若是,则生成用于开启所述目标房间的令牌信息,将所述令牌信息发送至所述租房平台,以使所述入住人通过所述令牌信息开启所述目标房间。
可选的,所述装置800还可以包括:
第一接收模块,用于接收所述目标房间的目标门锁设备基于所述令牌信息发送的开门请求,其中,所述开门请求中包括所述目标门锁设备的标识信息和所述令牌信息;
查询模块,用于根据所述目标门锁设备的标识信息查询与所述目标门锁设备对应的订单信息;
匹配模块,用于将与所述目标门锁设备对应的订单信息中的预订人的身份信息 与所述令牌信息验证成功的预订人的身份信息进行匹配;
下发模块,用于若匹配,则向所述目标门锁设备下发开门指令,以使所述目标门锁设备响应于所述开门指令开启所述目标房间。
可选的,所述第一生成模块803,具体用于若是,则生成用于开启所述目标房间的令牌信息并记录所述令牌信息的生成时间和有效时限,将所述令牌信息、所述生成时间和所述有效时限发送至所述租房平台。
可选的,所述装置800还可以包括:
第一接收模块,用于接收所述目标房间的目标门锁设备基于所述令牌信息发送的开门请求,其中,所述开门请求中包括所述目标门锁设备的标识信息、所述令牌信息、所述生成时间、所述有效时限以及所述目标门锁设备接收所述令牌信息的接收时间;
判断模块,用于根据所述生成时间、所述有效时限、所述接收时间判断所述令牌信息是否有效;
查询模块,用于若是,则根据所述目标门锁设备的标识信息查询与所述目标门锁设备对应的订单信息;
匹配模块,用于将与所述目标门锁设备对应的订单信息中的预订人的身份信息与所述令牌信息验证成功的预订人的身份信息进行匹配;
下发模块,用于若匹配,则向所述目标门锁设备下发开门指令,以使所述目标门锁设备响应于所述开门指令开启所述目标房间。
可选的,所述下发模块包括:
第一获取单元,用于若匹配,则获取所述预订人租赁所述目标房间的入住时间段,根据所述入住时间段判断当前时间是否符合入住条件;
下发单元,用于若是,则向所述目标门锁设备下发开门指令。
可选的,所述下发模块具体用于:
向所述目标门锁设备直接下发所述开门指令;或者
将所述开门指令下发至所述租房平台,以通过装载所述租房平台的用户终端的蓝牙将所述开门指令下发至所述目标门锁设备;或者
将所述开门指令下发至所述租房平台,以通过装载所述租房平台的用户终端的 NFC将所述开门指令下发至所述目标门锁设备。
可选的,所述装置800还可以包括:
第二接收模块,用于接收所述租房平台响应于房源租赁请求发送的所述预订人的身份信息、入住信息以及目标房间的信息;
第二生成单元,用于根据所述预订人的身份信息、入住信息以及目标房间的信息生成目标订单信息。
本申请实施例中的安全入住装置,通过电子身份认证系统以及预订人的身份信息和入住人的人脸图像信息验证预订人和入住人是否为同一人,若是,则生成用于开启目标房间的令牌信息,实现了对入住人和预订人的一致性验证,达到了实人入住的效果,保证了入住的安全性,此外,验证步骤简单、易于执行、验证效率高。
对应上述图5中的安全入住方法,基于相同的技术构思,本申请实施例还提供了一种安全入住装置,应用于租房平台,图9为本申请实施例提供的安全入住装置的组成示意图二,该装置用于执行上述图5中示出的安全入住方法,如图9所示,该装置900可以包括:第二获取模块901、发送模块902、第三接收模块903、发起模块904,其中:
第二获取模块901,用于响应于基于目标订单信息的入住请求,在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取入住人的人脸图像信息;
发送模块902,用于将所述入住人的人脸图像信息和所述预订人的身份信息发送至所述租房平台的后台服务器,以使所述后台服务器根据所述入住人的人脸图像信息和所述预订人的身份信息并结合电子身份认证系统验证所述预订人和所述入住人是否为同一人;
第三接收模块903,用于接收所述后台服务器在验证所述预订人和所述入住人为同一人后发送的令牌信息;
发起模块904,用于将所述令牌信息传输至所述目标房间的目标门锁设备,以使所述目标门锁设备基于所述令牌信息向所述后台服务器发起开门请求。
可选的,所述装置900还可以包括:
第四接收模块,用于接收所述后台服务器发送的开门指令,所述开门指令由所述后台服务器响应于所述开门请求生成,其中所述开门请求中包括所述目标门锁设备的标识信息和所述令牌信息;
传输模块,用于将所述开门指令通过装载所述租房平台的用户终端的蓝牙或者NFC传输至所述目标门锁设备,以使所述目标门锁设备响应于所述开门指令开启所述目标房间。
可选的,所述第二获取模块901可以包括:
判断单元,用于响应于基于目标订单信息的入住请求,判断所述入住人是否在所述目标订单信息中的目标房间所在的区域内;
第二获取单元,用于若是,则在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取所述入住人的人脸图像信息。
可选的,所述判断单元,具体用于:
判断所述入住人装载所述租房平台的用户终端的位置是否在所述目标订单信息中的目标房间所在的区域内;或者
判断所述入住人装载所述租房平台的用户终端是否通过蓝牙与所述目标房间的目标门锁设备连接;或者
判断所述入住人装载所述租房平台的用户终端是否通过NFC与所述目标房间的目标门锁设备连接。
可选的,所述发起模块904,具体用于:
根据所述令牌信息生成开门二维码,将所述开门二维码通过所述目标门锁设备上的摄像头传输至所述目标门锁设备,以将所述令牌信息传输至所述目标门锁设备;或者
将所述令牌信息通过装载所述租房平台的用户终端的蓝牙传输至所述目标门锁设备;或者
将所述令牌信息通过装载所述租房平台的用户终端的NFC传输至所述目标门锁设备。
本申请实施例中的安全入住装置,通过将预订人的身份信息和入住人的人脸图像信息发送至后台服务器,并接收后台服务器在根据预订人的身份信息和入住人的人脸图像信息验证预订人和入住人为同一人时发送的令牌信息,以及将令牌信息传输目标门锁设备,以使目标门锁设备基于令牌信息向后台服务器发起开门请求,即在验证预订人和入住人为同一人后,发起开门请求,达到了实人入住的效果,保证了入住的安全性。
对应上述安全入住方法,基于相同的技术构思,本申请实施例还提供了一种安全入住设备,图10为本申请实施例提供的安全入住设备的结构示意图,该设备用于执行上述的安全入住方法。
如图10所示,安全入住设备可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上的处理器1001和存储器1002,存储器1002中可以存储有一个或一个以上存储应用程序或数据。其中,存储器1002可以是短暂存储或持久存储。存储在存储器1002的应用程序可以包括一个或一个以上模块(图示未示出),每个模块可以包括对安全入住设备中的一系列计算机可执行指令。更进一步地,处理器1001可以设置为与存储器1002通信,在安全入住设备上执行存储器1002中的一系列计算机可执行指令。安全入住设备还可以包括一个或一个以上电源1003,一个或一个以上有线或无线网络接口1004,一个或一个以上输入输出接口1005,一个或一个以上键盘1006等。
在一个具体的实施例中,安全入住设备应用于租房平台的后台服务器,安全入住设备包括有存储器,以及一个或一个以上的程序,其中一个或者一个以上程序存储于存储器中,且一个或者一个以上程序可以包括一个或一个以上模块,且每个模块可以包括对安全入住设备中的一系列计算机可执行指令,且经配置以由一个或者一个以上处理器执行该一个或者一个以上程序包含用于进行以下计算机可执行指令:
获取租赁目标房间的预订人的身份信息和入住所述目标房间的入住人的人脸图像信息;
通过电子身份认证系统,并结合所述预订人的身份信息和所述入住人的人脸图像信息验证所述预订人与所述入住人是否为同一人;
若是,则生成用于开启所述目标房间的令牌信息,将所述令牌信息发送至所述租房平台,以使所述入住人通过所述令牌信息开启所述目标房间。
可选的,计算机可执行指令在被执行时,在所述将所述令牌信息发送至所述租房平台之后,还包括:
接收所述目标房间的目标门锁设备基于所述令牌信息发送的开门请求,其中,所述开门请求中包括所述目标门锁设备的标识信息和所述令牌信息;
根据所述目标门锁设备的标识信息查询与所述目标门锁设备对应的订单信息;
将与所述目标门锁设备对应的订单信息中的预订人的身份信息与所述令牌信息验证成功的预订人的身份信息进行匹配;
若匹配,则向所述目标门锁设备下发开门指令,以使所述目标门锁设备响应于所述开门指令开启所述目标房间。
可选的,计算机可执行指令在被执行时,所述生成用于开启所述目标房间的令牌信息,将所述令牌信息发送至所述租房平台包括:
生成用于开启所述目标房间的令牌信息并记录所述令牌信息的生成时间和有效时限,将所述令牌信息、所述生成时间和所述有效时限发送至所述租房平台。
可选的,计算机可执行指令在被执行时,在所述将所述令牌信息、所述生成时间和所述有效时限发送至所述租房平台之后还包括:
接收所述目标房间的目标门锁设备基于所述令牌信息发送的开门请求,其中,所述开门请求中包括所述目标门锁设备的标识信息、所述令牌信息、所述生成时间、所述有效时限以及所述目标门锁设备接收所述令牌信息的接收时间;
根据所述生成时间、所述有效时限、所述接收时间判断所述令牌信息是否有效;
若是,则根据所述目标门锁设备的标识信息查询与所述目标门锁设备对应的订单信息;
将与所述目标门锁设备对应的订单信息中的预订人的身份信息与所述令牌信息验证成功的预订人的身份信息进行匹配;
若匹配,则向所述目标门锁设备下发开门指令,以使所述目标门锁设备响应于所述开门指令开启所述目标房间。
可选的,计算机可执行指令在被执行时,若匹配,则向所述目标门锁设备下发开门指令包括:
若匹配,则获取所述预订人租赁所述目标房间的入住时间段,根据所述入住时间段判断当前时间是否符合入住条件;
若是,则向所述目标门锁设备下发开门指令。
可选的,计算机可执行指令在被执行时,所述向所述目标门锁设备下发开门指令包括:
向所述目标门锁设备直接下发所述开门指令;或者
将所述开门指令下发至所述租房平台,以通过装载所述租房平台的用户终端的 蓝牙将所述开门指令下发至所述目标门锁设备;或者
将所述开门指令下发至所述租房平台,以通过装载所述租房平台的用户终端的NFC将所述开门指令下发至所述目标门锁设备。
可选的,计算机可执行指令在被执行时,还包括:
接收所述租房平台响应于房源租赁请求发送的所述预订人的身份信息、入住信息以及目标房间的信息;
根据所述预订人的身份信息、入住信息以及目标房间的信息生成目标订单信息。
本申请实施例中的安全入住设备,通过电子身份认证系统以及预订人的身份信息和入住人的人脸图像信息验证预订人和入住人是否为同一人,若是,则生成用于开启目标房间的令牌信息,实现了对入住人和预订人的一致性验证,达到了实人入住的效果,保证了入住的安全性,此外,验证步骤简单、易于执行、验证效率高。
在另一个具体的实施例中,安全入住设备应用于租房平台,安全入住设备包括有存储器,以及一个或一个以上的程序,其中一个或者一个以上程序存储于存储器中,且一个或者一个以上程序可以包括一个或一个以上模块,且每个模块可以包括对安全入住设备中的一系列计算机可执行指令,且经配置以由一个或者一个以上处理器执行该一个或者一个以上程序包含用于进行以下计算机可执行指令:
响应于基于目标订单信息的入住请求,在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取入住人的人脸图像信息;
将所述入住人的人脸图像信息和所述预订人的身份信息发送至所述租房平台的后台服务器,以使所述后台服务器根据所述入住人的人脸图像信息和所述预订人的身份信息并结合电子身份认证系统验证所述预订人和所述入住人是否为同一人;
接收所述后台服务器在验证所述预订人和所述入住人为同一人后发送的令牌信息;
将所述令牌信息传输至所述目标房间的目标门锁设备,以使所述目标门锁设备基于所述令牌信息向所述后台服务器发起开门请求。
可选的,计算机可执行指令在被执行时,还包括:
接收所述后台服务器发送的开门指令,所述开门指令由所述后台服务器响应于所述开门请求生成,其中所述开门请求中包括所述目标门锁设备的标识信息和所述令牌 信息;
将所述开门指令通过装载所述租房平台的用户终端的蓝牙或者NFC传输至所述目标门锁设备,以使所述目标门锁设备响应于所述开门指令开启所述目标房间。
可选的,计算机可执行指令在被执行时,所述响应于基于目标订单信息的入住请求,在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取入住人的人脸图像信息包括:
响应于基于目标订单信息的入住请求,判断所述入住人是否在所述目标订单信息中的目标房间所在的区域内;
若是,则在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取所述入住人的人脸图像信息。
可选的,计算机可执行指令在被执行时,所述判断所述入住人是否在所述目标订单信息中的目标房间所在的区域内包括:
判断所述入住人装载所述租房平台的用户终端的位置是否在所述目标订单信息中的目标房间所在的区域内;或者
判断所述入住人装载所述租房平台的用户终端是否通过蓝牙与所述目标房间的目标门锁设备连接;或者
判断所述入住人装载所述租房平台的用户终端是否通过NFC与所述目标房间的目标门锁设备连接。
可选的,计算机可执行指令在被执行时,所述将所述令牌信息传输至所述目标房间的目标门锁设备包括:
根据所述令牌信息生成开门二维码,将所述开门二维码通过所述目标门锁设备上的摄像头传输至所述目标门锁设备,以将所述令牌信息传输至所述目标门锁设备;或者
将所述令牌信息通过装载所述租房平台的用户终端的蓝牙传输至所述目标门锁设备;或者
将所述令牌信息通过装载所述租房平台的用户终端的NFC传输至所述目标门锁设备。
本申请实施例中的安全入住设备,通过将预订人的身份信息和入住人的人脸图 像信息发送至后台服务器,并接收后台服务器在根据预订人的身份信息和入住人的人脸图像信息验证预订人和入住人为同一人时发送的令牌信息,以及将令牌信息传输目标门锁设备,以使目标门锁设备基于令牌信息向后台服务器发起开门请求,即在验证预订人和入住人为同一人后,发起开门请求,达到了实人入住的效果,保证了入住的安全性。
对应上述安全入住方法,基于相同的技术构思,本申请实施例还提供了一种存储介质,用于存储计算机可执行指令。
在一个具体的实施例中,该存储介质应用于租房平台的后台服务器,该存储介质可以为U盘、光盘、硬盘等,该存储介质存储的计算机可执行指令在被处理器执行时,能实现以下流程:
获取租赁目标房间的预订人的身份信息和入住所述目标房间的入住人的人脸图像信息;
通过电子身份认证系统,并结合所述预订人的身份信息和所述入住人的人脸图像信息验证所述预订人与所述入住人是否为同一人;
若是,则生成用于开启所述目标房间的令牌信息,将所述令牌信息发送至所述租房平台,以使所述入住人通过所述令牌信息开启所述目标房间。
可选的,该存储介质存储的计算机可执行指令在被处理器执行时,在所述将所述令牌信息发送至所述租房平台之后,还包括:
接收所述目标房间的目标门锁设备基于所述令牌信息发送的开门请求,其中,所述开门请求中包括所述目标门锁设备的标识信息和所述令牌信息;
根据所述目标门锁设备的标识信息查询与所述目标门锁设备对应的订单信息;
将与所述目标门锁设备对应的订单信息中的预订人的身份信息与所述令牌信息验证成功的预订人的身份信息进行匹配;
若匹配,则向所述目标门锁设备下发开门指令,以使所述目标门锁设备响应于所述开门指令开启所述目标房间。
可选的,该存储介质存储的计算机可执行指令在被处理器执行时,所述生成用于开启所述目标房间的令牌信息,将所述令牌信息发送至所述租房平台包括:
生成用于开启所述目标房间的令牌信息并记录所述令牌信息的生成时间和有效时限,将所述令牌信息、所述生成时间和所述有效时限发送至所述租房平台。
可选的,该存储介质存储的计算机可执行指令在被处理器执行时,在所述将所述令牌信息、所述生成时间和所述有效时限发送至所述租房平台之后还包括:
接收所述目标房间的目标门锁设备基于所述令牌信息发送的开门请求,其中,所述开门请求中包括所述目标门锁设备的标识信息、所述令牌信息、所述生成时间、所述有效时限以及所述目标门锁设备接收所述令牌信息的接收时间;
根据所述生成时间、所述有效时限、所述接收时间判断所述令牌信息是否有效;
若是,则根据所述目标门锁设备的标识信息查询与所述目标门锁设备对应的订单信息;
将与所述目标门锁设备对应的订单信息中的预订人的身份信息与所述令牌信息验证成功的预订人的身份信息进行匹配;
若匹配,则向所述目标门锁设备下发开门指令,以使所述目标门锁设备响应于所述开门指令开启所述目标房间。
可选的,该存储介质存储的计算机可执行指令在被处理器执行时,若匹配,则向所述目标门锁设备下发开门指令包括:
若匹配,则获取所述预订人租赁所述目标房间的入住时间段,根据所述入住时间段判断当前时间是否符合入住条件;
若是,则向所述目标门锁设备下发开门指令。
可选的,该存储介质存储的计算机可执行指令在被处理器执行时,所述向所述目标门锁设备下发开门指令包括:
向所述目标门锁设备直接下发所述开门指令;或者
将所述开门指令下发至所述租房平台,以通过装载所述租房平台的用户终端的蓝牙将所述开门指令下发至所述目标门锁设备;或者
将所述开门指令下发至所述租房平台,以通过装载所述租房平台的用户终端的NFC将所述开门指令下发至所述目标门锁设备。
可选的,该存储介质存储的计算机可执行指令在被处理器执行时,还包括:
接收所述租房平台响应于房源租赁请求发送的所述预订人的身份信息、入住信息以及目标房间的信息;
根据所述预订人的身份信息、入住信息以及目标房间的信息生成目标订单信息。
本申请实施例中的存储介质存储的计算机可执行指令在被处理器执行时,通过电子身份认证系统以及预订人的身份信息和入住人的人脸图像信息验证预订人和入住人是否为同一人,若是,则生成用于开启目标房间的令牌信息,实现了对入住人和预订人的一致性验证,达到了实人入住的效果,保证了入住的安全性,此外,验证步骤简单、易于执行、验证效率高。
在一个具体的实施例中,该存储介质应用于租房平,该存储介质可以为U盘、光盘、硬盘等,该存储介质存储的计算机可执行指令在被处理器执行时,能实现以下流程:
响应于基于目标订单信息的入住请求,在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取入住人的人脸图像信息;
将所述入住人的人脸图像信息和所述预订人的身份信息发送至所述租房平台的后台服务器,以使所述后台服务器根据所述入住人的人脸图像信息和所述预订人的身份信息并结合电子身份认证系统验证所述预订人和所述入住人是否为同一人;
接收所述后台服务器在验证所述预订人和所述入住人为同一人后发送的令牌信息;
将所述令牌信息传输至所述目标房间的目标门锁设备,以使所述目标门锁设备基于所述令牌信息向所述后台服务器发起开门请求。
可选的,该存储介质存储的计算机可执行指令在被处理器执行时,还包括:
接收所述后台服务器发送的开门指令,所述开门指令由所述后台服务器响应于所述开门请求生成,其中所述开门请求中包括所述目标门锁设备的标识信息和所述令牌信息;
将所述开门指令通过装载所述租房平台的用户终端的蓝牙或者NFC传输至所述目标门锁设备,以使所述目标门锁设备响应于所述开门指令开启所述目标房间。
可选的,该存储介质存储的计算机可执行指令在被处理器执行时,所述响应于基于目标订单信息的入住请求,在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取入住人的人脸图像信息包括:
响应于基于目标订单信息的入住请求,判断所述入住人是否在所述目标订单信 息中的目标房间所在的区域内;
若是,则在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取所述入住人的人脸图像信息。
可选的,该存储介质存储的计算机可执行指令在被处理器执行时,所述判断所述入住人是否在所述目标订单信息中的目标房间所在的区域内包括:
判断所述入住人装载所述租房平台的用户终端的位置是否在所述目标订单信息中的目标房间所在的区域内;或者
判断所述入住人装载所述租房平台的用户终端是否通过蓝牙与所述目标房间的目标门锁设备连接;或者
判断所述入住人装载所述租房平台的用户终端是否通过NFC与所述目标房间的目标门锁设备连接。
可选的,该存储介质存储的计算机可执行指令在被处理器执行时,所述将所述令牌信息传输至所述目标房间的目标门锁设备包括:
根据所述令牌信息生成开门二维码,将所述开门二维码通过所述目标门锁设备上的摄像头传输至所述目标门锁设备,以将所述令牌信息传输至所述目标门锁设备;或者
将所述令牌信息通过装载所述租房平台的用户终端的蓝牙传输至所述目标门锁设备;或者
将所述令牌信息通过装载所述租房平台的用户终端的NFC传输至所述目标门锁设备。
本申请实施例中的存储介质存储的计算机可执行指令在被处理器执行时,通过将预订人的身份信息和入住人的人脸图像信息发送至后台服务器,并接收后台服务器在根据预订人的身份信息和入住人的人脸图像信息验证预订人和入住人为同一人时发送的令牌信息,以及将令牌信息传输目标门锁设备,以使目标门锁设备基于令牌信息向后台服务器发起开门请求,即在验证预订人和入住人为同一人后,发起开门请求,达到了实人入住的效果,保证了入住的安全性。
在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的 改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable Gate Array,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。
控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算 机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本申请时可以把各单元的功能在同一个或多个软件和/或硬件中实现。
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算 机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。
本领域技术人员应明白,本申请的实施例可提供为方法、系统或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本申请,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
以上所述仅为本申请的实施例而已,并不用于限制本申请。对于本领域技术人员来说,本申请可以有各种更改和变化。凡在本申请的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本申请的权利要求范围之内。
Claims (28)
- 一种安全入住方法,应用于租房平台的后台服务器,其特征在于,包括:获取租赁目标房间的预订人的身份信息和入住所述目标房间的入住人的人脸图像信息;通过电子身份认证系统,并结合所述预订人的身份信息和所述入住人的人脸图像信息验证所述预订人与所述入住人是否为同一人;若是,则生成用于开启所述目标房间的令牌信息,将所述令牌信息发送至所述租房平台,以使所述入住人通过所述令牌信息开启所述目标房间。
- 根据权利要求1所述的安全入住方法,其特征在于,在所述将所述令牌信息发送至所述租房平台之后,还包括:接收所述目标房间的目标门锁设备基于所述令牌信息发送的开门请求,其中,所述开门请求中包括所述目标门锁设备的标识信息和所述令牌信息;根据所述目标门锁设备的标识信息查询与所述目标门锁设备对应的订单信息;将与所述目标门锁设备对应的订单信息中的预订人的身份信息与所述令牌信息验证成功的预订人的身份信息进行匹配;若匹配,则向所述目标门锁设备下发开门指令,以使所述目标门锁设备响应于所述开门指令开启所述目标房间。
- 根据权利要求1所述的安全入住方法,其特征在于,所述生成用于开启所述目标房间的令牌信息,将所述令牌信息发送至所述租房平台包括:生成用于开启所述目标房间的令牌信息并记录所述令牌信息的生成时间和有效时限,将所述令牌信息、所述生成时间和所述有效时限发送至所述租房平台。
- 根据权利要求3所述的安全入住方法,其特征在于,在所述将所述令牌信息、所述生成时间和所述有效时限发送至所述租房平台之后还包括:接收所述目标房间的目标门锁设备基于所述令牌信息发送的开门请求,其中,所述开门请求中包括所述目标门锁设备的标识信息、所述令牌信息、所述生成时间、所述有效时限以及所述目标门锁设备接收所述令牌信息的接收时间;根据所述生成时间、所述有效时限、所述接收时间判断所述令牌信息是否有效;若是,则根据所述目标门锁设备的标识信息查询与所述目标门锁设备对应的订单信息;将与所述目标门锁设备对应的订单信息中的预订人的身份信息与所述令牌信息验证成功的预订人的身份信息进行匹配;若匹配,则向所述目标门锁设备下发开门指令,以使所述目标门锁设备响应于所述开门指令开启所述目标房间。
- 根据权利要求2或4所述的安全入住方法,其特征在于,若匹配,则向所述目标门锁设备下发开门指令包括:若匹配,则获取所述预订人租赁所述目标房间的入住时间段,根据所述入住时间段判断当前时间是否符合入住条件;若是,则向所述目标门锁设备下发开门指令。
- 根据权利要求根据权利要求2或4所述的安全入住方法,其特征在于,所述向所述目标门锁设备下发开门指令包括:向所述目标门锁设备直接下发所述开门指令;或者将所述开门指令下发至所述租房平台,以通过装载所述租房平台的用户终端的蓝牙将所述开门指令下发至所述目标门锁设备;或者将所述开门指令下发至所述租房平台,以通过装载所述租房平台的用户终端的NFC将所述开门指令下发至所述目标门锁设备。
- 根据权利要求1所述的安全入住方法,其特征在于,所述方法还包括:接收所述租房平台响应于房源租赁请求发送的所述预订人的身份信息、入住信息以及目标房间的信息;根据所述预订人的身份信息、入住信息以及目标房间的信息生成目标订单信息。
- 一种安全入住方法,应用于租房平台,其特征在于,包括:响应于基于目标订单信息的入住请求,在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取入住人的人脸图像信息;将所述入住人的人脸图像信息和所述预订人的身份信息发送至所述租房平台的后台服务器,以使所述后台服务器根据所述入住人的人脸图像信息和所述预订人的身份信息并结合电子身份认证系统验证所述预订人和所述入住人是否为同一人;接收所述后台服务器在验证所述预订人和所述入住人为同一人后发送的令牌信息;将所述令牌信息传输至所述目标房间的目标门锁设备,以使所述目标门锁设备基于所述令牌信息向所述后台服务器发起开门请求。
- 根据权利要求8所述的安全入住方法,其特征在于,所述方法还包括:接收所述后台服务器发送的开门指令,所述开门指令由所述后台服务器响应于所述开门请求生成,其中所述开门请求中包括所述目标门锁设备的标识信息和所述令牌信息;将所述开门指令通过装载所述租房平台的用户终端的蓝牙或者NFC传输至所述目 标门锁设备,以使所述目标门锁设备响应于所述开门指令开启所述目标房间。
- 根据权利要求8所述的安全入住方法,其特征在于,所述响应于基于目标订单信息的入住请求,在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取入住人的人脸图像信息包括:响应于基于目标订单信息的入住请求,判断所述入住人是否在所述目标订单信息中的目标房间所在的区域内;若是,则在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取所述入住人的人脸图像信息。
- 根据权利要求10所述的安全入住方法,其特征在于,所述判断所述入住人是否在所述目标订单信息中的目标房间所在的区域内包括:判断所述入住人装载所述租房平台的用户终端的位置是否在所述目标订单信息中的目标房间所在的区域内;或者判断所述入住人装载所述租房平台的用户终端是否通过蓝牙与所述目标房间的目标门锁设备连接;或者判断所述入住人装载所述租房平台的用户终端是否通过NFC与所述目标房间的目标门锁设备连接。
- 根据权利要求8所述的安全入住方法,其特征在于,所述将所述令牌信息传输至所述目标房间的目标门锁设备包括:根据所述令牌信息生成开门二维码,将所述开门二维码通过所述目标门锁设备上的摄像头传输至所述目标门锁设备,以将所述令牌信息传输至所述目标门锁设备;或者将所述令牌信息通过装载所述租房平台的用户终端的蓝牙传输至所述目标门锁设备;或者将所述令牌信息通过装载所述租房平台的用户终端的NFC传输至所述目标门锁设备。
- 一种安全入住装置,应用于租房平台的后台服务器,其特征在于,包括:第一获取模块,用于获取租赁目标房间的预订人的身份信息和入住所述目标房间的入住人的人脸图像信息;验证模块,用于通过电子身份认证系统,并结合所述预订人的身份信息和所述入住人的人脸图像信息验证所述预订人与所述入住人是否为同一人;第一生成模块,用于若是,则生成用于开启所述目标房间的令牌信息,将所述令牌信息发送至所述租房平台,以使所述入住人通过所述令牌信息开启所述目标房间。
- 根据权利要求13所述的安全入住装置,其特征在于,所述装置还包括:第一接收模块,用于接收所述目标房间的目标门锁设备基于所述令牌信息发送的开门请求,其中,所述开门请求中包括所述目标门锁设备的标识信息和所述令牌信息;查询模块,用于根据所述目标门锁设备的标识信息查询与所述目标门锁设备对应的订单信息;匹配模块,用于将与所述目标门锁设备对应的订单信息中的预订人的身份信息与所述令牌信息验证成功的预订人的身份信息进行匹配;下发模块,用于若匹配,则向所述目标门锁设备下发开门指令,以使所述目标门锁设备响应于所述开门指令开启所述目标房间。
- 根据权利要求13所述的安全入住装置,其特征在于,所述第一生成模块,具体用于若是,则生成用于开启所述目标房间的令牌信息并记录所述令牌信息的生成时间和有效时限,将所述令牌信息、所述生成时间和所述有效时限发送至所述租房平台。
- 根据权利要求15所述的安全入住装置,其特征在于,所述装置还包括:第一接收模块,用于接收所述目标房间的目标门锁设备基于所述令牌信息发送的开门请求,其中,所述开门请求中包括所述目标门锁设备的标识信息、所述令牌信息、所述生成时间、所述有效时限以及所述目标门锁设备接收所述令牌信息的接收时间;判断模块,用于根据所述生成时间、所述有效时限、所述接收时间判断所述令牌信息是否有效;查询模块,用于若是,则根据所述目标门锁设备的标识信息查询与所述目标门锁设备对应的订单信息;匹配模块,用于将与所述目标门锁设备对应的订单信息中的预订人的身份信息与所述令牌信息验证成功的预订人的身份信息进行匹配;下发模块,用于若匹配,则向所述目标门锁设备下发开门指令,以使所述目标门锁设备响应于所述开门指令开启所述目标房间。
- 根据权利要求14或16所述的安全入住装置,其特征在于,所述下发模块包括:第一获取单元,用于若匹配,则获取所述预订人租赁所述目标房间的入住时间段,根据所述入住时间段判断当前时间是否符合入住条件;下发单元,用于若是,则向所述目标门锁设备下发开门指令。
- 根据权利要求根据权利要求14或16所述的安全入住装置,其特征在于,所述下发模块具体用于:向所述目标门锁设备直接下发所述开门指令;或者将所述开门指令下发至所述租房平台,以通过装载所述租房平台的用户终端的蓝牙将所述开门指令下发至所述目标门锁设备;或者将所述开门指令下发至所述租房平台,以通过装载所述租房平台的用户终端的NFC将所述开门指令下发至所述目标门锁设备。
- 根据权利要求13所述的安全入住装置,其特征在于,所述装置还包括:第二接收模块,用于接收所述租房平台响应于房源租赁请求发送的所述预订人的身份信息、入住信息以及目标房间的信息;第二生成单元,用于根据所述预订人的身份信息、入住信息以及目标房间的信息生成目标订单信息。
- 一种安全入住装置,应用于租房平台,其特征在于,包括:第二获取模块,用于响应于基于目标订单信息的入住请求,在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取入住人的人脸图像信息;发送模块,用于将所述入住人的人脸图像信息和所述预订人的身份信息发送至所述租房平台的后台服务器,以使所述后台服务器根据所述入住人的人脸图像信息和所述预订人的身份信息并结合电子身份认证系统验证所述预订人和所述入住人是否为同一人;第三接收模块,用于接收所述后台服务器在验证所述预订人和所述入住人为同一人后发送的令牌信息;发起模块,用于将所述令牌信息传输至所述目标房间的目标门锁设备,以使所述目标门锁设备基于所述令牌信息向所述后台服务器发起开门请求。
- 根据权利要求20所述的安全入住装置,其特征在于,所述装置还包括:第四接收模块,用于接收所述后台服务器发送的开门指令,所述开门指令由所述后台服务器响应于所述开门请求生成,其中所述开门请求中包括所述目标门锁设备的标识信息和所述令牌信息;传输模块,用于将所述开门指令通过装载所述租房平台的用户终端的蓝牙或者NFC传输至所述目标门锁设备,以使所述目标门锁设备响应于所述开门指令开启所述目标房间。
- 根据权利要求20所述的安全入住装置,其特征在于,所述第二获取模块包括:判断单元,用于响应于基于目标订单信息的入住请求,判断所述入住人是否在所述目标订单信息中的目标房间所在的区域内;第二获取单元,用于若是,则在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取所述入住人的人脸图像信息。
- 根据权利要求22所述的安全入住装置,其特征在于,所述判断单元,具体用于:判断所述入住人装载所述租房平台的用户终端的位置是否在所述目标订单信息中的目标房间所在的区域内;或者判断所述入住人装载所述租房平台的用户终端是否通过蓝牙与所述目标房间的目标门锁设备连接;或者判断所述入住人装载所述租房平台的用户终端是否通过NFC与所述目标房间的目标门锁设备连接。
- 根据权利要求20所述的安全入住装置,其特征在于,所述发起模块,具体用于:根据所述令牌信息生成开门二维码,将所述开门二维码通过所述目标门锁设备上的摄像头传输至所述目标门锁设备,以将所述令牌信息传输至所述目标门锁设备;或者将所述令牌信息通过装载所述租房平台的用户终端的蓝牙传输至所述目标门锁设备;或者将所述令牌信息通过装载所述租房平台的用户终端的NFC传输至所述目标门锁设备。
- 一种安全入住设备,应用于租房平台的后台服务器,其特征在于,包括:处理器;以及被安排成存储计算机可执行指令的存储器,所述计算机可执行指令在被执行时使所述处理器:获取租赁目标房间的预订人的身份信息和入住所述目标房间的入住人的人脸图像信息;通过电子身份认证系统,并结合所述预订人的身份信息和所述入住人的人脸图像信息验证所述预订人与所述入住人是否为同一人;若是,则生成用于开启所述目标房间的令牌信息,将所述令牌信息发送至所述租房平台,以使所述入住人通过所述令牌信息开启所述目标房间。
- 一种安全入住设备,应用于租房平台,其特征在于,包括:处理器;以及被安排成存储计算机可执行指令的存储器,所述计算机可执行指令在被执行时使所述处理器:响应于基于目标订单信息的入住请求,在目标订单信息中获取租赁目标房间的预订 人的身份信息,以及获取入住人的人脸图像信息;将所述入住人的人脸图像信息和所述预订人的身份信息发送至所述租房平台的后台服务器,以使所述后台服务器根据所述入住人的人脸图像信息和所述预订人的身份信息并结合电子身份认证系统验证所述预订人和所述入住人是否为同一人;接收所述后台服务器在验证所述预订人和所述入住人为同一人后发送的令牌信息;将所述令牌信息传输至所述目标房间的目标门锁设备,以使所述目标门锁设备基于所述令牌信息向所述后台服务器发起开门请求。
- 一种存储介质,应用于租房平台的后台服务器,用于存储计算机可执行指令,其特征在于,所述计算机可执行指令在被执行时实现以下流程:获取租赁目标房间的预订人的身份信息和入住所述目标房间的入住人的人脸图像信息;通过电子身份认证系统,并结合所述预订人的身份信息和所述入住人的人脸图像信息验证所述预订人与所述入住人是否为同一人;若是,则生成用于开启所述目标房间的令牌信息,将所述令牌信息发送至所述租房平台,以使所述入住人通过所述令牌信息开启所述目标房间。
- 一种存储介质,应用于租房平台,用于存储计算机可执行指令,其特征在于,所述计算机可执行指令在被执行时实现以下流程:响应于基于目标订单信息的入住请求,在目标订单信息中获取租赁目标房间的预订人的身份信息,以及获取入住人的人脸图像信息;将所述入住人的人脸图像信息和所述预订人的身份信息发送至所述租房平台的后台服务器,以使所述后台服务器根据所述入住人的人脸图像信息和所述预订人的身份信息并结合电子身份认证系统验证所述预订人和所述入住人是否为同一人;接收所述后台服务器在验证所述预订人和所述入住人为同一人后发送的令牌信息;将所述令牌信息传输至所述目标房间的目标门锁设备,以使所述目标门锁设备基于所述令牌信息向所述后台服务器发起开门请求。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/883,730 US11282002B2 (en) | 2019-06-28 | 2020-05-26 | Method and apparatus for secure check-in |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910573793.9 | 2019-06-28 | ||
CN201910573793.9A CN110334824B (zh) | 2019-06-28 | 2019-06-28 | 安全入住方法及装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/883,730 Continuation US11282002B2 (en) | 2019-06-28 | 2020-05-26 | Method and apparatus for secure check-in |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020258839A1 true WO2020258839A1 (zh) | 2020-12-30 |
Family
ID=68144508
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/071123 WO2020258839A1 (zh) | 2019-06-28 | 2020-01-09 | 安全入住方法及装置 |
Country Status (3)
Country | Link |
---|---|
CN (2) | CN110334824B (zh) |
TW (1) | TWI786370B (zh) |
WO (1) | WO2020258839A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230316160A1 (en) * | 2020-09-29 | 2023-10-05 | Nec Corporation | Server, system, server control method, and non-transitory computer readable medium |
CN119379408A (zh) * | 2024-10-23 | 2025-01-28 | 南京华康智能科技有限公司 | 高安全性网约房监管系统与方法 |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110334824B (zh) * | 2019-06-28 | 2021-03-02 | 创新先进技术有限公司 | 安全入住方法及装置 |
US11282002B2 (en) | 2019-06-28 | 2022-03-22 | Advanced New Technologies Co., Ltd. | Method and apparatus for secure check-in |
CN112383423B (zh) * | 2020-11-10 | 2024-05-03 | 深圳Tcl新技术有限公司 | 租赁空间内设备的配网方法、装置、系统及存储介质 |
CN112767073A (zh) * | 2021-01-07 | 2021-05-07 | 北京码牛科技有限公司 | 一种入住管理控制方法、装置、移动终端及存储介质 |
CN113285913A (zh) * | 2021-02-07 | 2021-08-20 | 福建省中电网络科技有限公司 | 基于智能锁的数据获取方法、系统、电子设备及存储介质 |
CN115880107A (zh) * | 2022-12-19 | 2023-03-31 | 广东城启科技有限公司 | 智能公寓管理平台及其控制方法、计算机可读存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070079128A1 (en) * | 2005-08-26 | 2007-04-05 | Hon Hai Precision Industry Co., Ltd. | Electronic signature system and method |
CN108877006A (zh) * | 2018-06-29 | 2018-11-23 | 深圳春沐源控股有限公司 | 一种门禁管理方法、系统及相关设备 |
CN109242634A (zh) * | 2018-09-25 | 2019-01-18 | 北京奇虎科技有限公司 | 智能锁解锁的方法、装置、服务器及可读存储介质 |
CN110334824A (zh) * | 2019-06-28 | 2019-10-15 | 阿里巴巴集团控股有限公司 | 安全入住方法及装置 |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3716647B2 (ja) * | 1998-11-11 | 2005-11-16 | 日産自動車株式会社 | 自動車用の安全促進装置 |
NO314530B1 (no) * | 2000-02-25 | 2003-03-31 | Ericsson Telefon Ab L M | Trådlös reservering, innsjekking, tilgangskontroll, utsjekking og betaling |
US20100201536A1 (en) * | 2009-02-10 | 2010-08-12 | William Benjamin Robertson | System and method for accessing a structure using a mobile device |
DE102013101990A1 (de) * | 2013-02-28 | 2014-08-28 | Eberhard Göbel GmbH & Co. KG | Mietwagen und Verfahren zur Durchführung eines Mietvorganges eines Mietwagens |
CN104182798B (zh) * | 2014-09-02 | 2017-08-01 | 广州商景网络科技有限公司 | 基于移动设备的自助订房方法及系统 |
CN104574599A (zh) * | 2014-12-30 | 2015-04-29 | 张泽 | 身份验证方法、装置和智能门锁 |
CN105551118B (zh) * | 2015-10-31 | 2018-08-24 | 东莞酷派软件技术有限公司 | 一种电子钥匙开启门禁方法及其装置、系统 |
CN105354619A (zh) * | 2015-12-09 | 2016-02-24 | 姜恒 | 一种酒店自助入住方法及系统 |
CN107239984A (zh) * | 2016-03-29 | 2017-10-10 | 阿里巴巴集团控股有限公司 | 一种租赁方法、装置和控制设备 |
CN105956677A (zh) * | 2016-05-12 | 2016-09-21 | 重庆佐鸣科技有限公司 | 一种房间管理方法及系统 |
CN107231235B (zh) * | 2016-08-02 | 2019-12-31 | 天地融科技股份有限公司 | 电子凭条生成方法、业务办理系统及智能密钥设备 |
CN106453605A (zh) * | 2016-10-28 | 2017-02-22 | 深圳市欧瑞博电子有限公司 | 酒店订房信息传递方法及系统 |
CN107154091A (zh) * | 2017-04-24 | 2017-09-12 | 孟庆国 | 基于身份证识别和人脸识别的开锁方法、装置及系统 |
WO2018232550A1 (zh) * | 2017-06-19 | 2018-12-27 | 绿仕科技控股有限公司 | 酒店管理系统 |
CN107798750B (zh) * | 2017-09-01 | 2021-05-11 | 北京佳阳科技有限公司 | 一种智能开锁方法及设备以及入住办理方法及设备 |
CN107682339B (zh) * | 2017-10-13 | 2023-11-10 | 唐利伟 | 住宿数据处理方法、装置、存储介质和计算机设备 |
CN107993310A (zh) * | 2017-10-31 | 2018-05-04 | 北京三快在线科技有限公司 | 自助入住管理系统及方法、电子设备及存储介质 |
CN109035521A (zh) * | 2018-07-27 | 2018-12-18 | 北京三快在线科技有限公司 | 身份验证方法、服务器、系统、电子设备及可读存储介质 |
US20210407230A1 (en) * | 2018-11-21 | 2021-12-30 | Carrier Corporation | A system of seamless automated customer id verification at the hotel entrance and releasing the hotel room key |
CN109472675A (zh) * | 2018-11-29 | 2019-03-15 | 阿里巴巴集团控股有限公司 | 租赁业务的处理方法、装置、系统及设备 |
-
2019
- 2019-06-28 CN CN201910573793.9A patent/CN110334824B/zh active Active
- 2019-06-28 CN CN202110349790.4A patent/CN113077067B/zh active Active
-
2020
- 2020-01-09 WO PCT/CN2020/071123 patent/WO2020258839A1/zh active Application Filing
- 2020-02-07 TW TW109103865A patent/TWI786370B/zh active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070079128A1 (en) * | 2005-08-26 | 2007-04-05 | Hon Hai Precision Industry Co., Ltd. | Electronic signature system and method |
CN108877006A (zh) * | 2018-06-29 | 2018-11-23 | 深圳春沐源控股有限公司 | 一种门禁管理方法、系统及相关设备 |
CN109242634A (zh) * | 2018-09-25 | 2019-01-18 | 北京奇虎科技有限公司 | 智能锁解锁的方法、装置、服务器及可读存储介质 |
CN110334824A (zh) * | 2019-06-28 | 2019-10-15 | 阿里巴巴集团控股有限公司 | 安全入住方法及装置 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230316160A1 (en) * | 2020-09-29 | 2023-10-05 | Nec Corporation | Server, system, server control method, and non-transitory computer readable medium |
CN119379408A (zh) * | 2024-10-23 | 2025-01-28 | 南京华康智能科技有限公司 | 高安全性网约房监管系统与方法 |
Also Published As
Publication number | Publication date |
---|---|
CN110334824B (zh) | 2021-03-02 |
CN110334824A (zh) | 2019-10-15 |
CN113077067A (zh) | 2021-07-06 |
TW202101361A (zh) | 2021-01-01 |
TWI786370B (zh) | 2022-12-11 |
CN113077067B (zh) | 2024-06-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020258839A1 (zh) | 安全入住方法及装置 | |
US11572713B1 (en) | Smart lock box | |
WO2021068636A1 (zh) | 基于区块链的可验证声明的创建方法、装置、设备及系统 | |
US10764278B2 (en) | Authentication on a computing device | |
US11282002B2 (en) | Method and apparatus for secure check-in | |
WO2021175057A1 (zh) | 一种业务处理系统、业务处理的方法、装置及设备 | |
CN102930199B (zh) | 多承租人订阅环境中的安全机器登记 | |
US9887992B1 (en) | Sight codes for website authentication | |
WO2020108134A1 (zh) | 租赁业务的处理方法、装置、系统及设备 | |
JP2020518142A (ja) | 認証方法及びブロックチェーンに基づいた認証データ処理方法及び装置 | |
US7672483B2 (en) | Controlling and customizing access to spatial information | |
WO2021114937A1 (zh) | 一种基于区块链的业务处理方法、装置及设备 | |
US10679446B2 (en) | Extended instant guest access using near field communication tags | |
US11265165B2 (en) | Initial provisioning through shared proofs of knowledge and crowdsourced identification | |
CN110768968A (zh) | 基于可验证声明的授权方法、装置、设备及系统 | |
WO2020223918A1 (zh) | 一种临时身份认证方法、装置及系统 | |
US20130337827A1 (en) | Reliability for location services | |
CN114491430A (zh) | 一种基于区块链的业务处理方法、装置及设备 | |
US10498724B2 (en) | Digital community system | |
CN114041131A (zh) | 使用从访问令牌访问的信息的客户端-服务器安全增强 | |
WO2021143547A1 (zh) | 会话建立方法、跨境支付方法、装置及系统 | |
US20240380741A1 (en) | Website verification with proof of origin | |
CN116962061A (zh) | 一种基于区块链的用户身份核验方法、装置及设备 | |
US11606696B2 (en) | Security mechanism for wireless authentication devices | |
CN116049297A (zh) | 数字虚拟空间的创建方法、数字资产处理方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20832756 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20832756 Country of ref document: EP Kind code of ref document: A1 |