Unlock instant, AI-driven research and patent intelligence for your innovation.

A remote authorized fingerprint self-entry method and hotel self-check-in method

A remote authorization, fingerprint technology, applied in the direction of a single input port/output port register, data processing applications, instruments, etc., can solve problems such as tediousness

Active Publication Date: 2021-09-03
上海奥宜电子科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, for occasions with strong personnel mobility such as house rental and hotel check-in, the current fingerprint entry method is very restrictive for the administrator (for example, the administrator cannot leave the fingerprint entry site), and the administrator needs to repeatedly operate the fingerprint The input action is prone to tediousness

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A remote authorized fingerprint self-entry method and hotel self-check-in method
  • A remote authorized fingerprint self-entry method and hotel self-check-in method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] Please refer to figure 1 , this example provides a remote authorized fingerprint self-entry method, which specifically includes the following steps.

[0033] S101: In response to the user's request, send the two-dimensional code with the authorized electronic key to the user's mobile terminal.

[0034] S102: The user's mobile terminal obtains the temporary electronic key by identifying the two-dimensional code, communicates with the fingerprint lock through the Bluetooth signal, and sends the obtained temporary electronic key to the fingerprint lock.

[0035] It should be noted that the electronic keys in this example adopt distributed storage and distribution management. For example, some electronic keys are stored in the fingerprint lock, some electronic keys are stored in the cloud, and some electronic keys are stored in the initialized mobile terminal, so as to improve the security of electronic keys. security.

[0036] The initialization mobile terminal is a mobi...

Embodiment 2

[0057] In this example, house leasing is taken as an example to describe the application of Embodiment 1 in detail.

[0058] The house rented by the landlord A to the tenant B has the function of fingerprint door opening. If the tenant B also wants to enable the fingerprint door opening function, and the landlord A is away on a business trip at the moment, he cannot come back in time to authorize the fingerprint entry to the tenant B. Through the embodiment One method can realize remote authorized fingerprint entry, and the realization method is as follows.

[0059] Step 201: The homeowner A responds to the request of the tenant B, and sends the two-dimensional code with the authorized electronic key to the mobile terminal of the tenant B.

[0060] Step 202: The mobile terminal of the tenant B obtains the temporary electronic key by identifying the two-dimensional code, communicates with the fingerprint lock through the Bluetooth signal, and sends the obtained temporary electr...

Embodiment 3

[0064] Based on Embodiment 1, this example provides a hotel self-check-in method using the fingerprint self-service entry method of Embodiment 1, which can realize self-service check-in in an unmanned hotel. The premise of realizing self-service check-in in an unmanned hotel is that the hotel’s room door lock It is an intelligent fingerprint door lock, and its flow chart is as follows figure 2 As shown, it specifically includes the following steps.

[0065] S301: Respond to the user's request to book a hotel online, and query whether there is a fingerprint key bound to the private information stored in the cloud according to the user's private information.

[0066] When a user makes a hotel reservation online through the hotel's APP system through a mobile terminal, the user needs to input private information such as account number, mobile phone number, and ID number. Fingerprint key.

[0067] S302: If it exists, send the fingerprint key to the fingerprint lock of the selec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A remote authorized fingerprint self-service entry method, comprising the steps of: responding to a user's request, sending a two-dimensional code with an authorized electronic key to the user's mobile terminal; waiting for the user's mobile terminal to recognize the two-dimensional code to obtain a temporary electronic key and pass the bluetooth signal Communicate with the fingerprint lock, send the temporary electronic key to the fingerprint lock, and the fingerprint lock will synthesize the stored electronic key with the received temporary electronic key, if the synthesis is successful, the fingerprint lock will automatically enter the fingerprint to the user. Since the remote authorization of fingerprints is realized by authorizing the electronic key, and the self-entry of fingerprints without the presence of an administrator, it breaks the current situation where the administrator authorizes the entry of fingerprints; when it is applied to hotel check-in, it can be realized without a room card / key Self-service check-in at unmanned hotels.

Description

technical field [0001] The invention relates to the technical field of fingerprint entry for fingerprint locks, in particular to a remote authorized fingerprint self-entry method and a hotel self-service check-in method. Background technique [0002] In order to facilitate users to unlock, fingerprint locks are currently used to realize convenient unlocking through fingerprint recognition. At present, there are two ways to enter fingerprints. One way is to add fingerprints to passwords. Every time fingerprints are recorded, the administrator needs to enter the password first. , after the password is correct, follow the operation steps to enter fingerprints for other users; another way is to verify the administrator's master fingerprint first, and then allow the administrator to follow the operation steps to enter fingerprints for other users after the verification of the master fingerprint is successful . It can be seen that no matter in which way the fingerprints of other ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/00G06Q50/12
Inventor 余朝东
Owner 上海奥宜电子科技有限公司