Sign-in method and terminals
A terminal and terminal sending technology, applied in the computer field, can solve the problems of high consumption of human resources, low check-in efficiency, poor check-in accuracy, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0081] An embodiment of the present invention provides a check-in method, the flow of the method is as follows figure 1 As shown, the execution steps are as follows:
[0082] S10: The second terminal sends a sign-in request message to the first terminal, where the sign-in request message carries an activity identification (Identification, ID) and a user ID of the second terminal.
[0083] In each activity, there will be organizers and participants. The first terminal is the terminal used by the organizer, the second terminal is the terminal used by the participants, and the participants are the users of the second terminal. The first terminal and the second terminal It can be devices such as mobile phones and tablet computers. Generally, there is only one first terminal, while there can be multiple second terminals.
[0084] When the sign-in time is reached or the user of the second terminal triggers the sign-in, the second terminal starts to request the first terminal for th...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com