Implementation method of visitor system based on two-dimensional code recognition

A technology of visitor system and implementation method, which is applied in the direction of instruments, time registers, single input port/output port registers, etc., can solve the problems of access control cards that are easy to be lost, not returned in time, and labor-intensive, so as to avoid loss and non-timely return, reduce workload, and ensure the effect of enterprise safety

Inactive Publication Date: 2019-03-01
SHANGHAI SIIC LONGCHUANG SMARTER ENERGY TECH CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This process requires manual processing, which consumes manpower, and the access control card is prone to loss and failure to return it in time.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method of visitor system based on two-dimensional code recognition
  • Implementation method of visitor system based on two-dimensional code recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0033] This application proposes a method for implementing a visitor system based on two-dimensional code identification, such as figure 1 shown, including the following steps:

[0034] S1. Send the invitation information to the visitor in the form of a short message;

[0035] S2. The visitor obtains the access control QR code according to the invitation information;

[0036] S3. Verify at the access control whether the two-dimensional code of the access control meets the requirements for opening the access control. If yes, the verification is successful, and a door opening signal is sent to the corresponding access control; otherwise, the verification fails.

[0037] The invitation information includes at least one of an invitation two-dimensional code and an invitation digital code. In this embodiment, the short message sent to the visitor includes a link of the visit invitation, and the link is clicked to extract the invitation information, and the invitation information ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an implementation method of a visitor system based on two-dimensional code recognition. The implementation method comprises the following steps: S1, invitation information issent to a visitor in a message mode; S2, the visitor obtains an access control two-dimensional code according to the invitation information; and S3, whether the access control two-dimensional code meets the access control opening requirement or not is verified at the access control position, if yes, verification succeeds, a door opening signal is sent to the corresponding access control, and otherwise, verification fails. Compared with the prior art, verification from invitation to arriving at the site and passage in the office environment of the visitor are achieved through a two-dimensionalcode technology, in the case of the network, self-service registration and passage of the visitor are completed, the situations that an access control card is lost and not returned in time are avoided, the workload of a receptionist in the existing office environment is reduced while the enterprise safety is guaranteed, unattended reception in wisdom office is achieved, and the office efficiency is improved indirectly.

Description

technical field [0001] The invention relates to the technical field of access control management, in particular to a method for realizing a visitor system based on two-dimensional code identification. Background technique [0002] The current visitor system is a PC-based WEB application. After receiving the invitation message, the visitor goes to the front desk of the company to get a temporary access control card and then enters. This process requires manual processing, which consumes manpower, and the access control card is prone to loss and failure to return it in time. Contents of the invention [0003] The purpose of the present invention is to provide a method for implementing a visitor system based on two-dimensional code identification in order to overcome the above-mentioned defects in the prior art. [0004] The purpose of the present invention can be achieved through the following technical solutions: [0005] A method for realizing a visitor system based on ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
CPCG07C9/22G07C9/27
Inventor 葛俊
Owner SHANGHAI SIIC LONGCHUANG SMARTER ENERGY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products