Background
Among the prior art, when meeting personnel get into and have obstacle lock gate meeting place, send general admission card to meeting personnel usually through advancing, punch the card and get into the meeting place based on this general admission card at obstacle lock gate, lead to relevant personnel to need further verify meeting personnel again, the efficiency of registering is low, and the existence no matter meeting personnel who are invited or the meeting personnel who are not invited all can get into the meeting place through the mode that general admission card punched the card, lead to big the meeting place personnel management degree of difficulty, the managerial efficiency is low.
Disclosure of Invention
The main purpose of the present disclosure is to provide a conference check-in method based on a barrier gate, so as to solve the problem that the check-in efficiency is low because related personnel need to further verify the participators when a card of a general entrance card is swiped into the conference place through the barrier gate.
In order to achieve the above object, according to a first aspect of the present disclosure, there is provided a conference check-in method based on barrier gates, including: in response to receiving the sign-in instruction, calling a local detection module to detect the authentication information of the target person to obtain detection information; matching the detection information with pre-stored identity information of conference personnel to obtain a matching result; and if the matching result indicates that the detection information of the target person is matched with the pre-stored identity information of the conference person, calling a switch interface of the barrier gate to open the barrier gate of the barrier gate.
Optionally, in response to receiving the sign-in instruction, calling a local detection module, and checking identity information of the target person to obtain detection information, where: responding to a received sign-in instruction which is the same as a preset sign-in mode, and calling a local detection module corresponding to the preset sign-in mode; and detecting the authentication information of the target person based on the called detection module corresponding to the preset sign-in mode to obtain detection information.
Optionally, before invoking a local detection module in response to receiving the sign-in instruction to detect the identity information of the target person and obtain detection information, the method further includes: responding to an acquired request for logging in a preset conference account, and verifying a login password contained in the request; if the result of verifying the login password contained in the request indicates that the verification is passed, acquiring the conference content contained in the preset conference; and responding to a received request for editing a preset sign-in mode of the conference content contained in the preset conference, and editing the preset sign-in mode.
Optionally, matching the detection information with pre-stored identity information of conference staff to obtain a matching result includes: matching the detection information with pre-stored identity information of conference personnel to obtain a first matching result; and/or matching the detection information with pre-stored preset condition information which is required to be met by conference personnel to obtain a second matching result.
According to a second aspect of the present disclosure, there is provided a barrier gate for conference check-in,
according to a second aspect of the present disclosure, there is provided an apparatus comprising: the barrier gate processing device and the barrier gate executing device are electrically connected in a detachable structure; the barrier gate processing device is configured to respond to the received sign-in instruction, call a local detection module, detect the authentication information of the target person and obtain detection information; matching the detection information with pre-stored identity information of conference personnel to obtain a matching result; calling an executing device of the barrier gate based on the matching result; the execution device of the barrier gate is configured to execute the opening and closing action of the barrier gate based on the matching result.
According to a third aspect of the disclosure, a conference check-in device based on an obstacle gate is provided, which includes a calling unit configured to call a local detection module in response to receiving a check-in instruction, and detect authentication information of a target person to obtain detection information; the matching unit is configured to match the detection information with pre-stored identity information of conference personnel to obtain a matching result; a first calling unit configured to call a switch interface of an obstacle gate to open an obstacle door of the obstacle gate if the matching result indicates that the target person matches with a pre-stored conference person.
According to a fourth aspect of the present disclosure, there is provided a computer-readable storage medium storing computer instructions for causing the computer to execute the barrier gate-based conference check-in method according to any one of the embodiments of the first aspect.
According to a fifth aspect of the present disclosure, there is provided an electronic device comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores a computer program executable by the at least one processor, the computer program being executable by the at least one processor to cause the at least one processor to perform the barrier gate-based conference check-in method of any one of the embodiments of the first aspect.
In the embodiment of the disclosure, the local detection module is called in response to the received sign-in instruction, and the authentication information of the target person is detected to obtain the detection information; matching the detection information with pre-stored identity information of conference personnel to obtain a matching result; and if the matching result indicates that the detection information of the target person is matched with the pre-stored identity information of the conference person, calling a switch interface of the barrier gate to open the barrier gate of the barrier gate. Through utilizing the barrier gate to directly realize the conference and sign in to can improve the conference and sign in efficiency, can carry out more accurate verification to meeting personnel's identity information simultaneously, avoid getting into the meeting place because of meeting personnel who are not invited or are not conform to the condition, reduce the degree of difficulty of the management of signing in to meeting participant.
Detailed Description
In order to make the technical solutions of the present disclosure better understood by those skilled in the art, the technical solutions of the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are only some embodiments of the present disclosure, not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the present disclosure may be described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Furthermore, the terms "mounted," "disposed," "provided," "connected," and "sleeved" are to be construed broadly. For example, it may be a fixed connection, a removable connection, or a unitary construction; can be a mechanical connection, or an electrical connection; may be directly connected, or indirectly connected through intervening media, or may be in internal communication between two devices, elements or components. The specific meaning of the above terms in the present disclosure can be understood by those of ordinary skill in the art as appropriate.
It should be noted that, in the present disclosure, the embodiments and features of the embodiments may be combined with each other without conflict. The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
According to the embodiment of the present disclosure, there is provided a conference check-in method based on barrier gate, as shown in fig. 1, the method includes thefollowing steps 101 to 103:
step 101: and calling a local detection module in response to the received sign-in instruction to detect the authentication information of the target person to obtain detection information.
In this embodiment, the execution main body may be a user end device, and the user end device interacts with the target person through a human-computer interaction interface. And after receiving a sign-in instruction triggered by the target person through the user interface, the execution main body calls a local detection module to detect the authentication information of the target person to obtain detection information. The authentication information of the target person may include identity authentication information of the target person or authentication information for determining whether the meeting place meets a preset condition, and the identity authentication information may be information for indicating the identity of the target person, including but not limited to identity card information, face information, and identity information stored in RFID. The authentication information for determining that the meeting place needs to meet the preset conditions can be body temperature information for determining that the target person needs to meet the preset body temperature when entering the meeting place.
Specifically, the sign-in instruction may be an instruction for signing in according to one or more preset manners, including but not limited to an identification card detection sign-in manner, where a user may attach an identification card to a user terminal, and when the user terminal detects identification card information (which may be identification card chip information), the sign-in instruction is triggered; the sign-in instruction in the preset mode can also be a face detection sign-in mode, and when the user side detects a face, the sign-in instruction is triggered; the preset check-in instruction can also be an RFID check-in mode, and after the user side detects RFID information, the check-in instruction is triggered; the preset check-in instruction can also be a body temperature detection check-in mode, when the user side detects the body temperature of a human body, the check-in instruction is triggered, and the trigger mode of the check-in instruction can also be a combination of the modes. The authentication information of the target person may be identification card information, face information, identification information and/or body temperature information of the target person included in the RFID, and the like corresponding to the preset check-in mode.
As an optional implementation manner of this embodiment, in response to receiving the sign-in instruction, the local detection module is invoked to check the identity information of the target person, and obtaining the detection information includes: in response to receiving a sign-in instruction which is the same as the preset sign-in mode, calling a local detection module corresponding to the preset sign-in mode; and detecting the authentication information of the target person based on the called detection module corresponding to the preset sign-in mode to obtain detection information.
In this embodiment, the preset sign-in mode, that is, the locally preset sign-in mode at the user end, may be set by a user (may be related personnel at a meeting undertaking side) through a human-computer interaction interface at the user end, and the preset mode corresponds to the preset meeting. For example, the conference site has three barrier gates, the first user side corresponds to the first barrier gate and the first conference site, and the sign-in mode is identity authentication and body temperature detection; the second user side corresponds to a second barrier gate and a second conference meeting place, and the corresponding sign-in modes are an identity authentication detection sign-in mode, a face detection sign-in mode and a body temperature detection sign-in mode; and the third user side corresponds to a third barrier gate and a third conference meeting place, and the corresponding check-in mode is an RFID detection check-in mode.
The preset check-in mode can also correspond to the detection module so as to realize that the corresponding detection module is called after the check-in command which is the same as the preset check-in mode is received. For example, an identification card reading device corresponding to an identification card check-in mode, an image acquisition device corresponding to a human face detection mode, an RFID reading device corresponding to an RFID check-in mode, and/or a human body temperature measuring device corresponding to a body temperature detection check-in mode may also be used.
Specifically, the execution main body may detect the authentication information of the target person based on the called detection module corresponding to the preset sign-in mode to obtain detection information, for example, identity card information, face information, body temperature information of the target person and/or information stored in the RFID card of the target person may be obtained through detection.
As an optional implementation manner of this embodiment, before invoking a local detection module in response to receiving a sign-in instruction to detect identity information of a target person and obtain detection information, the method further includes: responding to an acquired request for logging in a preset conference account, and verifying a login password contained in the request; if the result of verifying the login password contained in the request indicates that the verification is passed, acquiring the conference content contained in the preset conference; and responding to a received request for editing a preset sign-in mode of the conference content contained in the preset conference, and editing the preset sign-in mode.
In this embodiment, the execution main body may obtain a request for logging in a conference account number triggered by a user through a human-computer interaction interface, then verify a password included in the login request, obtain conference content included in a preset conference from the server if the password is verified, and edit a preset sign-in mode of the conference content included in the preset conference if the execution main body receives a request for editing the preset sign-in mode triggered by the user through the human-computer interaction interface.
The conference account may be a login account that a user (conference host) previously passes through a setting of an execution subject (which may be a human-computer interaction interface of the execution subject) or other user side. The meeting content of the preset meeting comprises meeting place information of the preset meeting or a preset check-in mode of the preset meeting, and can also comprise meeting name information and the like.
Specifically, the executive agent may receive a request for registering a login account and setting a login password, which are input by a user (a conference host) through the executive agent man-machine interaction interface, and then store the set login account and login password on a designated server. The execution main body can also receive the meeting content of the preset meeting input by a user (a meeting host) through the man-machine interaction interface of the execution main body, the meeting content of the preset meeting is stored on the appointed server, the execution main body can receive a request for editing the preset check-in mode of the preset meeting triggered by the user through the interaction interface of the execution main body, the preset check-in mode is edited, the editing can be the modification of the preset check-in mode, and the identity card detection check-in mode is modified into the face detection check-in mode. It can be understood that the login account, the login password, and the conference content of the preset conference can be preset and stored by other clients.
Step 102: and matching the detection information with the pre-stored identity information of the conference staff to obtain a matching result.
In this embodiment, the execution subject may receive, through the human-computer interaction interface, the identity authentication information of the participant of the designated conference, which is input by the user (may be the related person of the conference undertaking) through the human-computer interaction interface of the execution subject in advance, store the identity authentication information in the designated server, and then match the detection information of the target person with the pre-stored identity authentication information of the participant of the designated conference to obtain a matching result.
As an optional implementation manner of this embodiment, the detection information is matched with pre-stored identity information of conference staff to obtain a first matching result; and/or matching the detection information with pre-stored preset condition information which is required to be met by conference personnel to obtain a second matching result.
In this embodiment, the matching process may be to match the identity authentication information in the detection information with the pre-stored identity information of the conference staff to obtain a matching result or a non-matching result; the authentication information (for example, the body temperature information of the target person) in the detection information for determining whether the meeting place meets the preset condition is compared with the preset authentication information meeting the preset condition to obtain a matching result or a non-matching result, if the detection results of the two are consistent, the matching result is determined to be that the detection information of the target person is matched with the pre-stored identity information of the meeting person, otherwise, the detection information is determined to be not matched.
For example, the identity card information of the target person who wants to enter the first meeting place is matched with the pre-stored identity card information of the meeting persons in the first meeting place, the detection result may include that the identity card information matched with the identity card information of the target person exists in the local storage device, if the body temperature detection result indicates that the target person enters the meeting place and meets the preset body temperature, the temperature is normal, and the matching result indicates that the detection information of the target person is matched with the pre-stored identity card information of the meeting persons. It can be understood that the process of matching the detection information of the target person participating in the conference in the other conference place with the pre-stored identity information of the conference person is the same as described above, and is not described herein again.
Step 103: and if the matching result indicates that the target person is matched with the pre-stored conference person, calling a switch interface of the barrier gate to open the barrier gate of the barrier gate.
In this embodiment, when the matching result obtained instep 102 is obtained, the switch interface of the barrier gate is called to open or close the barrier gate of the barrier gate.
From the above description, it can be seen that the present disclosure achieves the following technical effects: can realize utilizing the barrier floodgate machine directly to realize the conference and sign in to can improve the conference and sign in efficiency, can carry out more accurate verification to meeting personnel's identity information simultaneously, avoid getting into the meeting place because of meeting personnel that are not invited or are not conform to the condition, reduce the degree of difficulty of the management of signing in to meeting participant.
With continued reference to FIG. 2, a flow of one embodiment of a barrier gate for conference check-in according to the present disclosure is shown. The barrier gate for conference check-in comprises: the barriergate processing device 201 and the barriergate executing device 202 are electrically connected in a detachable structure; barrier gate processing means 201; the system is configured to respond to the received sign-in instruction, call a local detection module, and detect the authentication information of the target person to obtain detection information; matching the detection information with pre-stored identity information of conference personnel to obtain a matching result; calling an executing device of the barrier gate based on the matching result; and barrier gate executing means 202 configured to execute an opening and closing operation of the barrier gate based on the matching result.
In this embodiment, the barriergate processing device 201 and the barriergate executing device 202 may be connected by a detachable structure, and the barriergate processing device 201 and the barriergate executing device 202 may be detachably connected by a buckle and a card slot. The barrier gate processing means 201 may be any terminal device that can communicate with the barrier gate executing means 202 (e.g., may include a switch that invokes a smart gate).
Specifically, the detection of the authentication information of the target person and the matching of the detection information with the pre-stored identity information of the conference person can be implemented by software of the barriergate processing device 201 in cooperation with hardware.
In the embodiment, the barriergate processing device 201 and the barriergate execution device 202 are detachably connected, and the implementation method of conference sign-in is set on the barriergate processing device 201, so that the barriergate processing device 201 can be applied to any conference sign-in scene with a barrier gate, and the applicability is stronger.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
According to an embodiment of the present disclosure, there is also provided a barrier gate-based conference check-in apparatus for implementing the barrier gate-based conference check-in method, as shown in fig. 3, the apparatus includes:
the callingunit 301 is configured to call the local detection module in response to receiving the sign-in instruction, and detect the authentication information of the target person to obtain detection information; amatching unit 302 configured to match the detection information with pre-stored identity information of conference personnel, so as to obtain a matching result; afirst calling unit 303 configured to call a switch interface of an obstacle gate to open an obstacle door of the obstacle gate if the matching result indicates that the target person matches with a pre-stored conference person.
Optionally, the invokingunit 301 is further configured to include: the first calling module is configured to respond to the fact that a sign-in instruction which is the same as the preset sign-in mode is received, and call a local detection module corresponding to the preset sign-in mode; and the first detection module is used for detecting the identity information of the target personnel based on the called detection module corresponding to the preset sign-in mode to obtain detection information.
Optionally, the apparatus further comprises: the verification unit is configured to respond to the request for obtaining the login preset conference account number and verify a login password contained in the request; an acquisition unit configured to acquire conference content included in a preset conference if a result of verifying a login password included in the request indicates that verification is passed; the editing unit is configured to respond to a received request for editing a preset check-in mode of conference content contained in the preset conference and edit the preset check-in mode.
The disclosed embodiment provides an electronic device, as shown in fig. 4, which includes one ormore processors 41 and amemory 42, and oneprocessor 43 is taken as an example in fig. 4.
The controller may further include: aninput device 43 and anoutput device 44.
Theprocessor 41, thememory 42, theinput device 43 and theoutput device 44 may be connected by a bus or other means, and fig. 4 illustrates the connection by a bus as an example.
Theprocessor 41 may be a Central Processing Unit (CPU). Theprocessor 41 may also be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or combinations thereof. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Thememory 42, which is a non-transitory computer readable storage medium, may be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the control methods in the embodiments of the present disclosure. Theprocessor 41 executes various functional applications of the server and data processing by running non-transitory software programs, instructions and modules stored in thememory 42, namely, implements the barrier gate-based conference check-in method of the above-described method embodiment.
Thememory 42 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of a processing device operated by the server, and the like. Further, thememory 42 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments,memory 42 may optionally include memory located remotely fromprocessor 41, which may be connected to a network connection device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
Theinput device 43 may receive input numeric or character information and generate key signal inputs related to user settings and function control of the processing device of the server. Theoutput device 44 may include a display device such as a display screen.
One or more modules are stored in thememory 42, which when executed by the one ormore processors 41, perform the method as shown in fig. 1.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program to instruct related hardware, and the program can be stored in a computer readable storage medium, and when executed, the program can include the processes of the embodiments of the motor control methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-only memory (ROM), a Random Access Memory (RAM), a flash memory (FlashMemory), a hard disk (hard disk drive, abbreviated as HDD) or a Solid State Drive (SSD), etc.; the storage medium may also comprise a combination of memories of the kind described above.
Although the embodiments of the present disclosure have been described in conjunction with the accompanying drawings, those skilled in the art may make various modifications and variations without departing from the spirit and scope of the present disclosure, and such modifications and variations fall within the scope defined by the appended claims.