Remote authorization fingerprint self-service input method and hotel self-service check-in method
A remote authorization and fingerprint technology, applied in the direction of single input/output registers, instruments, data processing applications, etc., can solve problems such as tediousness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] Please refer to figure 1 , this example provides a remote authorized fingerprint self-entry method, which specifically includes the following steps.
[0033] S101: In response to the user's request, send the two-dimensional code with the authorized electronic key to the user's mobile terminal.
[0034] S102: The user's mobile terminal obtains the temporary electronic key by identifying the two-dimensional code, communicates with the fingerprint lock through the Bluetooth signal, and sends the obtained temporary electronic key to the fingerprint lock.
[0035] It should be noted that the electronic keys in this example adopt distributed storage and distribution management. For example, some electronic keys are stored in the fingerprint lock, some electronic keys are stored in the cloud, and some electronic keys are stored in the initialized mobile terminal, so as to improve the security of electronic keys. security.
[0036] The initialization mobile terminal is a mobi...
Embodiment 2
[0057] In this example, house leasing is taken as an example to describe the application of Embodiment 1 in detail.
[0058] The house rented by the landlord A to the tenant B has the function of fingerprint door opening. If the tenant B also wants to enable the fingerprint door opening function, and the landlord A is away on a business trip at the moment, he cannot come back in time to authorize the fingerprint entry to the tenant B. Through the embodiment One method can realize remote authorized fingerprint entry, and the realization method is as follows.
[0059] Step 201: The homeowner A responds to the request of the tenant B, and sends the two-dimensional code with the authorized electronic key to the mobile terminal of the tenant B.
[0060] Step 202: The mobile terminal of the tenant B obtains the temporary electronic key by identifying the two-dimensional code, communicates with the fingerprint lock through the Bluetooth signal, and sends the obtained temporary electr...
Embodiment 3
[0064] Based on Embodiment 1, this example provides a hotel self-check-in method using the fingerprint self-service entry method of Embodiment 1, which can realize self-service check-in in an unmanned hotel. The premise of realizing self-service check-in in an unmanned hotel is that the hotel’s room door lock It is an intelligent fingerprint door lock, and its flow chart is as follows figure 2 As shown, it specifically includes the following steps.
[0065] S301: Respond to the user's request to book a hotel online, and query whether there is a fingerprint key bound to the private information stored in the cloud according to the user's private information.
[0066] When a user makes a hotel reservation online through the hotel's APP system through a mobile terminal, the user needs to input private information such as account number, mobile phone number, and ID number. Fingerprint key.
[0067] S302: If it exists, send the fingerprint key to the fingerprint lock of the selec...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

