CN110910523A - Conference sign-in method, conference room operation terminal and computer storage medium - Google Patents

Conference sign-in method, conference room operation terminal and computer storage medium Download PDF

Info

Publication number
CN110910523A
CN110910523A CN201811082357.3A CN201811082357A CN110910523A CN 110910523 A CN110910523 A CN 110910523A CN 201811082357 A CN201811082357 A CN 201811082357A CN 110910523 A CN110910523 A CN 110910523A
Authority
CN
China
Prior art keywords
participant
conference
information
identification code
conference room
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811082357.3A
Other languages
Chinese (zh)
Other versions
CN110910523B (en
Inventor
邓成东
刘洪政
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Consumer Finance Ltd By Share Ltd
Original Assignee
Consumer Finance Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Consumer Finance Ltd By Share Ltd filed Critical Consumer Finance Ltd By Share Ltd
Priority to CN201811082357.3A priority Critical patent/CN110910523B/en
Publication of CN110910523A publication Critical patent/CN110910523A/en
Application granted granted Critical
Publication of CN110910523B publication Critical patent/CN110910523B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/10Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application discloses a conference sign-in method, a conference room operation terminal and a computer storage medium, wherein the conference sign-in method comprises the following steps: acquiring information of a party participating in a meeting, which is sent by an application terminal; generating a participant identification code for each participant based on the participant information and the information of the conference room allocated for the application terminal; sending the participant identification code to the corresponding participant; scanning the participant identification code of the participant and judging whether the participant identification code is effective or not; and if the participant identification code is valid, determining that the participant signs in successfully. Through the mode, the identity information of each participant can be verified, the situation that other personnel are mixed in is avoided, and the privacy and the safety of the conference are guaranteed.

Description

Conference sign-in method, conference room operation terminal and computer storage medium
Technical Field
The application relates to the technical field of Internet of things conferences, in particular to a conference sign-in method, a conference room operation terminal and a computer storage medium.
Background
With the increasingly deepened daily life of the internet, a lot of business activities are transferred from online to offline, and government agencies, buildings or large hotels set meeting rooms to rent out for meetings.
The existing conference room using mode is that the application terminal reserves a conference room from the owner of the conference room, and sends a conference address and conference time to the participants through telephone, short message or mail. During the meeting, the meeting place is entered after the meeting is checked in by paper or the two-dimensional code pasted by the participant is scanned.
Although the conference can be normally carried out in the mode, the paper check-in mode is not beneficial to environmental protection and low in efficiency. Although signing in through the mode of participant's scanning two-dimensional code is more intelligent, because above-mentioned two-dimensional code is public information, can't filter participant's identity validity.
Disclosure of Invention
The technical problem mainly solved by the application is to provide a conference sign-in method, a conference room operation device, a terminal and a computer storage medium, which can more conveniently and safely realize the sign-in of a conference.
In order to solve the above technical problem, the first technical solution adopted by the present application is: a conference check-in method is provided, which comprises the following steps: acquiring information of a party participating in a meeting, which is sent by an application terminal;
generating a participant identification code for each participant based on the participant information and the information of the conference room allocated to the application terminal;
sending the participant identification code to a corresponding participant;
scanning the participant identification code of the participant and judging whether the participant identification code is valid;
and if the participant identification code is valid, determining that the participant signs in successfully.
In order to solve the above technical problem, the second technical solution adopted by the present application is: provides a meeting room operating device, a meeting room operating device acquisition module, an identification code generation module, a sending module, a scanning module and a sign-in determination module,
the acquisition module is used for acquiring the information of the party participating in the meeting sent by the application terminal;
the identification code generation module is used for generating a participant identification code for each participant based on the information of the participants and the information of the conference room distributed to the application terminal;
the sending module is used for sending the participant identification code to the corresponding participant;
the scanning module is used for scanning the participant identification code of the participant and judging whether the participant identification code is valid or not;
the attendance determination module is used for determining that the participant signs in successfully when the participant identification code is valid.
In order to solve the above technical problem, the third technical solution adopted by the present application is: the conference room operation terminal comprises a processor and a human-computer interaction control circuit which are coupled with each other, wherein the processor is used for being matched with the human-computer interaction control circuit to realize the conference sign-in method of any one of the above embodiments.
In order to solve the above technical problem, a fourth technical solution adopted by the present application is: there is provided a computer storage medium having stored thereon program data which, when executed by a processor, implements a conference check-in method of any of the above.
Compared with the prior art, the beneficial effects of this application are: in the application, after the meeting room management terminal acquires the information of the participants sent by the application party, a participant identification code is generated for each participant based on the information of the participants and the information of the meeting room distributed by the application terminal, and the participant identification code is sent to the corresponding participant. By the unified sending mode, the trouble that the application terminals send the conference notification information one by one is saved. And a unique participant identification code is customized for each participant, and when participating in a conference, whether the participant successfully signs in is determined by scanning the participant identification code displayed by the participant, so that the identity information of each participant can be verified, the mixing of other personnel is avoided, and the privacy and the safety of the conference are ensured.
Drawings
FIG. 1 is a schematic diagram of an embodiment of a meeting check-in system of the present application;
FIG. 2 is an interaction diagram of an embodiment of a conference check-in method of the present application;
FIG. 3 is a schematic flow chart diagram illustrating an embodiment of a method for meeting check-in of the present application;
FIG. 4 is a schematic structural diagram of an embodiment of a conference room operating apparatus according to the present application;
FIG. 5 is a schematic structural diagram of another embodiment of a conference room operating apparatus according to the present application;
FIG. 6 is a schematic structural diagram of an embodiment of a conference room operator terminal according to the present application;
FIG. 7 is a schematic structural diagram of an embodiment of a computer storage medium according to the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Under the promotion of the mobile internet technology and the internet of things technology, the sharing economy is rapidly developed and popularized in various industries, such as sharing a bicycle, sharing a charging pile, sharing a power supply treasure and the like. The shared meeting room is used as an important component of the shared office scene, so that the purposes of reducing cost and improving efficiency can be achieved by meeting the demand of a demand party by using the meeting room as required, idle resources can be more reasonably and fully utilized by meeting room operation units, the maximum benefit is achieved, and the win-win effect is achieved.
The conference room sharing method and the conference room sharing system have the advantages that the conference organization, the information sending and the intelligent sign-in multiple effects are achieved on the premise of sharing the conference room. Specifically, referring to fig. 1 and 2, fig. 1 is a schematic structural diagram of an embodiment of a conference check-in system of the present application. Fig. 2 is an interaction diagram of an embodiment of a conference check-in method of the present application.
As shown in fig. 1, the conference check-in system of the present embodiment includes a conference room operation terminal 1, an application terminal 2, and a participant 3. The conference room operation terminal 1 includes a computer, a smart phone, a tablet computer, and the like. The application terminal 2 comprises intelligent equipment such as a smart phone, a computer and a PC.
With reference to fig. 2, the workflow of the conference check-in system is as follows:
the conference room operation terminal 1 issues the idle conference room resource through the network, the application terminal 2 acquires the conference room resource from the network according to the requirement, and initiates a conference room reservation request to the conference room operation terminal 1. The conference room reservation request comprises a conference room address or number and a use time, after receiving the reservation request, the conference room operation terminal 1 examines and approves the conference room reservation request according to the conference room address or number and the use time, and if the corresponding conference room is idle in the use time, the conference room reservation request allocates the authority for entering the information of the participants to the application terminal 2.
The meeting party information that application terminal 2 will collect sends meeting room operation terminal 1, and meeting room operation terminal 1 is based on meeting party information and for the information of the meeting room of application terminal 2 distribution, for every meeting party 3 generates a meeting identification code of participating in. And sending the participant identification code to the corresponding participant 3.
When the party is in a meeting, the party 3 displays the party identification code, and specifically, the party can display the party identification code through a terminal or paper or other carriers printed with the party identification code. The conference room operation terminal 1 scans the participant identification code, judges whether the participant identification code is valid, and determines that the participant 3 successfully signs in if the participant identification code is valid.
The mode of generating the participant identification code and sending the participant identification code through the conference room operation terminal 1 can effectively simplify the workload of the application terminal 2, and the participant identification code of the participant 3 is scanned through the conference room operation terminal 1 to carry out the identity confirmation process, so that the identity of the participant 3 can be screened and authenticated, and the risk-free conference is ensured.
For clarity of the above working process, please refer to fig. 3, and fig. 3 is a schematic flow chart of an embodiment of a conference check-in method of the present application. The method comprises the following steps:
step 301: and obtaining the information of the party participating in the meeting sent by the application terminal.
The conference room operation terminal issues the idle conference room information to the network through the network.
Wherein the meeting room information includes meeting room address or number, size, capacity, idle period, charging standard, etc.
The corresponding application terminal inquires the meeting room information through the network, determines a proper meeting room according to meeting requirements, and sends a meeting room reservation request to the meeting room operation terminal. The conference room reservation request includes conference room information such as a conference room address or number, and a usage time of the conference room such as a usage start time and an end time. In an alternative embodiment, in order to ensure the quality of the conference room usage, the conference room reservation request further includes a conference subject and a participant type for the conference room operation terminal to refer to whether to approve the conference room reservation request.
In another alternative embodiment, in order to ensure the utilization rate of the conference room, the application terminal needs to make a reservation within a time period specified by the operation terminal of the conference room, such as reservation made 1-3 days before use.
And the conference room operation terminal receives the conference room reservation request and audits the conference room reservation request, specifically including auditing the use time of the conference room, auditing the conference theme and the like, and if the use time included in the conference room reservation request belongs to the idle time period of the conference room and the conference theme meets the approval standard, the auditing is passed. And the conference room operation terminal sends a notice of reservation passing to the application terminal and allocates the authority for inputting the information of the participants to the application terminal. The conference room operation terminal can send the notification through a short message, a mail or other social contact platforms.
And after receiving the notification that the application passes, the application terminal sends the collected information of the participants to the conference room operation terminal. The information of the participants at least comprises names, contact ways and mailboxes of the participants.
In an optional embodiment, in order to facilitate a smoother conference, when the application terminal sends the information of the participant, the participant capable of representing the application terminal side is specified, for example, the identification information representing the application terminal is added to the participant identification code of the participant.
In an alternative embodiment, to further secure the conference, the participant information may also include a positive clear picture of the participants' head portrait.
If the meeting has the data, the application terminal can also send the electronic file of the data to the meeting room operation terminal.
Correspondingly, the conference room operation terminal receives and stores the information of the participants and the conference materials.
Step 302: and generating a participant identification code for each participant based on the participant information and the information of the conference room distributed for the application terminal.
After receiving the information of the participants, the conference room operation terminal jointly binds the information of the participants and the distributed information of the conference room, and distributes a participant identification code comprising the information of the participants and the information of the conference room for each participant. In order to ensure the safety of information transmission and facilitate transmission, the conference room operating system correspondingly generates an address link according to each participant identification code. And the participant acquires the corresponding participant identification code by accessing the address link. The conference room operation terminal acquires the names, contact ways, mailboxes and other information of the participants according to the received two-dimensional code information, and the information is used for finishing authentication of the participants, namely determining whether the participants have authority to participate in the conference, in other words, determining whether the information of the participants is consistent with the information of the participants received by the conference room operation terminal in advance, if so, the authentication is passed, otherwise, the authentication is not passed.
Wherein, in an alternative embodiment, the participant identification code is a bar code such as a two-dimensional code.
Step 303: and sending the participant identification code to the corresponding participant.
The conference room operation terminal can send the participant identification codes or the address links to each participant in a short message or mail mode.
If the application terminal uploads the conference materials, the conference room operation terminal can also send the address link which can access the conference materials to each application terminal. Further to ensure the security of the data, in an optional embodiment, the address link is not open, and the conference room operation terminal sends the access link to the participants and simultaneously sends the download account and the password to each participant.
In other embodiments, the application terminal may detect the transmitted conference identifier for application through the public number or application software of the conference room operating system, and if the application terminal finds that the conference identifier is missing, the application terminal may reissue the notification information or remind the conference room operating terminal to retransmit the notification information, which is not limited herein.
Step 304: and scanning the participant identification code of the participant, and judging whether the participant identification code is valid.
On the same day of the meeting, the participants display the received participant identification codes, correspondingly, the meeting room operation terminal scans the participant identification codes through a client, such as a tablet personal computer, a code scanning instrument and other equipment, and acquires the participant information in the participant identification codes, such as names, contact information, mailboxes and other information of participants, and meeting room information of the participants, such as meeting room addresses or numbers, use time and the like.
And the conference room operation terminal judges whether the server stores data information consistent with the information of the participant or not, and if the server does not store the data information consistent with the information of the participant, the participant identification code is invalid. If so, further participant information is matched with the meeting room information. Specifically, the conference room operating terminal determines whether the conference room information applied by the conference in which the participant participates is consistent with the conference room information in the participant identification code according to the participant information. If the participant identification codes are consistent, the participant identification codes are determined to be valid, and if the participant identification codes are not consistent, the participant identification codes are determined to be invalid.
Further, if the participant identification code is invalid, the conference room operating terminal sends prompt information through the client, such as displaying the reason for the invalid participant identification code.
In another optional implementation manner, in order to prevent others from stealing the participant identification code and ensure the security of the conference, the conference room operation terminal further acquires facial head portrait information of the participant, such as taking a picture through a camera, compares the acquired picture with a pre-stored image, and determines whether the participant is the participant himself/herself corresponding to the participant identification code, if so, determines that the participant identification code is valid, otherwise, even if the participant identification code itself passes the verification, the participant identification code is still invalid because the participant is illegal.
Step 305: and if the participant identification code is valid, determining that the participant signs in successfully.
And after the conference room operation terminal determines that the participant identification code is valid, the participant signs in successfully. In an optional embodiment, after determining that the check-in is successful, the conference room operation terminal sends a control instruction to the corresponding conference room entrance guard, and the conference room entrance guard is unlocked. The participants can enter the conference room.
In another optional implementation manner, in order to save labor, the conference room operating terminal adds all the intelligent devices in the conference room to the conference system, and after acquiring the participant identification codes of the participants, the conference room operating terminal judges whether the participant identification codes include the identification information of the application terminal. And if the intelligent equipment comprises the identity identification information, after the conference participating identification code is verified to be valid and the entrance guard of the conference room is opened, the intelligent equipment of the conference room is further opened. Specifically, the intelligent device for opening the conference room comprises the steps of starting a projector, lowering a projection curtain and a curtain, adjusting the brightness of the light of the conference room, starting a microphone and the like.
And in the process of meeting, if the application terminal needs to stop or prolong the using time of the meeting room, sending an application for ending or prolonging the using time to the operation terminal of the meeting room. Correspondingly, the conference room operation terminal receives the application and checks the application. If it is stopped, the remaining time of the conference room is set to idle. If the application is the use time extension application, the conference room operation terminal further judges whether the time period for which the application is extended is the idle time period of the conference room. If the idle period is the idle period, the usage time extension application is approved. And if the time is not the idle time, refusing the service time extension application and returning the reason to the application terminal.
In another optional implementation manner, the intelligent device in the conference room further includes a detection device, such as an infrared sensing device, for determining whether there is a person in the conference room according to the detection signal. Specifically, the detection device detects whether a person is in the conference room once every three minutes according to a set frequency, if yes, no action is performed, and if no person is detected in the conference room, the intelligent conference device of the conference room is turned off. In an alternative embodiment, in order to prevent misoperation, the detection device turns off the intelligent conference device of the conference room when the number of times of continuously detecting that the conference room is in an unattended state reaches a set value, for example, 5 times.
In another embodiment, a situation may occur in which a conference is temporarily cancelled and the conference room operation terminal does not acquire information. In order to avoid the above situation, if the conference room operation terminal does not scan a valid conference identification code within a set time period after the conference starts, such as half an hour or 40 minutes, the conference room reservation request is cancelled, the state of the current time period of the conference room is set to be idle, and notification information is sent to the application terminal, so as to save conference room resources.
Different from the prior art, in this embodiment, after the meeting room management terminal acquires the meeting party information sent by the applicant, based on the meeting party information and the meeting room information allocated to the applicant terminal, a meeting identification code is generated for each meeting party, and is sent to the corresponding meeting party. By the unified sending mode, the trouble that the application terminals send the conference notification information one by one is saved. And a unique conference identification code is customized for each participant, and when participating in a conference, the conference room management terminal determines whether the participant is signed in successfully or not in a mode of scanning the conference identification code displayed by the participants, so that the identity information of each participant can be verified, the mixing of other personnel is avoided, and the privacy and the safety of the conference are ensured.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an embodiment of a conference room operating apparatus according to the present application. As shown in fig. 4, the conference room operating apparatus according to the present embodiment includes an acquisition module 401, an identification code generation module 402, a transmission module 403, a scanning module 404, and a check-in determination module 405.
The obtaining module 401 is configured to obtain information of a participant sent by an application terminal.
The sending module 403 of the conference room operating apparatus publishes the free conference room information onto the network through the network. Wherein the meeting room information includes meeting room address or number, size, capacity, idle period, charging standard, etc.
The corresponding application terminal inquires the meeting room information through the network, determines a proper meeting room according to meeting requirements, and sends a meeting room reservation request to the meeting room operation device. The conference room reservation request includes conference room information such as a conference room address or number, and a usage time of the conference room such as a usage start time and an end time. In an alternative embodiment, in order to ensure the quality of the conference room usage, the conference room reservation request further includes a conference subject and a participant type for the conference room operation terminal to refer to whether to approve the conference room reservation request.
In another alternative embodiment, in order to ensure the utilization rate of the conference room, the application terminal needs to make a reservation within a time period specified by the operation device of the conference room, such as reservation made 1-3 days before use.
The obtaining module 401 receives the meeting room reservation request, and performs auditing on the meeting room reservation request, specifically including auditing the use time of the meeting room, auditing the meeting theme, and the like. The sending module 403 sends a notification of reservation passing to the application terminal, and assigns the authority to enter the information of the participant to the application terminal. The sending module 403 may send the notification through a short message, a mail, or another social platform.
And after receiving the notification that the application passes, the application terminal sends the collected information of the participants to the conference room operation device. The information of the participants at least comprises names, contact ways and mailboxes of the participants.
In an optional embodiment, in order to facilitate a smoother conference, when the application terminal sends the information of the participant, the participant capable of representing the application terminal side is specified, for example, the identification information representing the application terminal is added to the participant identification code of the participant.
In an alternative embodiment, to further secure the conference, the participant information may also include a positive clear picture of the participants' head portrait.
Correspondingly, the obtaining module 401 receives and stores the information of the participants and the conference materials.
The identifier generation module 402 is configured to generate a participant identifier for each participant based on the information of the participants and the information of the conference room allocated to the application terminal.
Specifically, after the obtaining module 401 receives the information of the participants, the identification code generating module 402 performs joint binding on the information of the participants and the allocated information of the conference room, and allocates a participant identification code including the information of the participants and the information of the conference room to each participant. In order to ensure the security of information transmission and facilitate transmission, the identifier generation module 402 generates an address link according to each participant identifier. The participant acquires the corresponding participant identification code by accessing the address link, and acquires the information of names, contact ways, mailboxes and the like of the participants after identifying the participant identification code. The conference room operation device acquires the names, contact ways, mailboxes and other information of the participants according to the received two-dimensional code information, so as to complete authentication of the participants, that is, determine whether the participants have permission to participate in the conference, in other words, determine whether the information of the participants is consistent with the information of the participants received by the conference acquisition module 401 in advance, if so, the authentication is passed, otherwise, the authentication is not passed.
Wherein, in an optional embodiment, the participant identification code is a bar code or a two-dimensional code.
The sending module 403 is configured to send the participant identification code to a corresponding participant.
The sending module 403 may send the participant identification code or the address link to each participant by means of a short message or an email.
If the application terminal uploads the conference material, the sending module 403 may also send an address link that can access the conference material to each application terminal. Further to ensure the security of the data, in an optional embodiment, the address link is not open, and the sending module 403 sends the access link to the participants and sends the download account and the password to each participant.
In other embodiments, the application terminal may detect the transmitted participant identification code of the participant through the public number or application software of the meeting room operating system, and if the participant identification code is found to be missing, the application terminal may re-transmit the notification information or remind the transmitting module 403 of the meeting room operating apparatus to re-transmit the notification information, which is not limited herein.
The scanning module 404 is configured to scan the participant identification code of the participant and determine whether the participant identification code is valid.
On the same day of the meeting, the participants display the received participant identification codes, and correspondingly, the scanning module 404 scans the participant identification codes through a client, such as a tablet computer, a code scanning instrument and other devices, to obtain the participant information in the participant identification codes, such as names, contact information, mailboxes and other information of the participants, and meeting room information of the participants, such as meeting room addresses or numbers, use time and the like.
The scanning module 404 determines whether the server stores data information consistent with the participant terminal information, and if not, the participant identification code is invalid. If so, further participant information is matched with the meeting room information. Specifically, the scanning module 404 determines whether the meeting room information applied by the meeting in which the participant participates is consistent with the meeting room information in the meeting identification code according to the participant information. If the participant identification codes are consistent, the participant identification codes are determined to be valid, and if the participant identification codes are not consistent, the participant identification codes are determined to be invalid.
Further, if the participant id is invalid, the scanning module 404 sends a prompt message through the client, such as displaying the reason why the participant id is invalid.
In another alternative embodiment, in order to prevent others from stealing the participant identification code and ensure the security of the conference, the scanning module 404 further obtains facial portrait information of the participant, such as taking a picture through a camera, compares the obtained picture with a pre-stored image, and determines whether the participant is the participant himself/herself corresponding to the participant identification code, if so, determines that the participant identification code is valid, otherwise, even if the participant identification code itself passes the verification, the participant identification code is still invalid because the participant is illegal.
The sign-in determination module 405 is configured to determine that the participant successfully signs in when the participant identification code is valid.
The sign-in determination module 405 determines that the participant signed in successfully after determining that the participant identification code is valid. In an optional embodiment, after determining that the check-in is successful, the check-in determining module 405 sends a control command to the corresponding entrance guard of the conference room, and the entrance guard of the conference room is unlocked. The participants can enter the conference room.
In another optional implementation manner, in order to save labor, the conference room operating apparatus adds all the intelligent devices in the conference room to the conference system, and after acquiring the participant identification codes of the participants, the scanning module 404 determines whether the participant identification codes include the identification information of the application terminal. If the identification information is included, the check-in determination module 405 further opens the intelligent device of the conference room after verifying that the conference participating identification code is valid and opening the entrance guard of the conference room. Specifically, the intelligent device for opening the conference room comprises the steps of starting a projector, lowering a projection curtain and a curtain, adjusting the brightness of the light of the conference room, starting a microphone and the like.
And in the process of meeting, if the application terminal needs to stop or prolong the using time of the meeting room, sending an application for stopping or prolonging the using time to the meeting room relation device. Correspondingly, the obtaining module 401 receives the application and checks the application. If it is stopped, the remaining time of the conference room is set to idle. If the application is a service time extension application, the conference room operating device further judges whether the time period for which the application is extended is an idle time period of the conference room. If the idle period is the idle period, the usage time extension application is approved. And if the time is not the idle time, refusing the service time extension application and returning the reason to the application terminal.
In another embodiment, in order to avoid the situation that the conference is temporarily cancelled and the conference room management apparatus does not acquire information, if the scanning module 404 does not scan a valid conference identification code within a set time period, such as half an hour or 40 minutes, after the conference starts, the scanning module cancels the conference room reservation request, sets the state of the current time period of the conference room to be idle, and the sending module 403 sends notification information to the application terminal. To save conference room resources.
In another alternative embodiment, as shown in fig. 5, the conference room operating apparatus further includes a monitoring module 506, and the monitoring module 506 detects a human body signal through a detection device, such as an infrared sensing device, to determine whether a person is in the conference room. Specifically, the detection module 506 detects whether a person is present in the conference room once every three minutes according to a set frequency, if so, does not perform any action, and if it is detected that the conference room is in an unattended state, turns off the intelligent conference device of the conference room. In an alternative embodiment, to prevent misoperation, the monitoring module 506 turns off the intelligent conference device of the conference room when the number of times of continuously detecting that the conference room is in an unattended state reaches a set value, for example, 5 times.
Different from the prior art, in this embodiment, after the obtaining module of the conference room operating device obtains the information of the participants who apply for sending, the identification code generating module generates a participant identification code for each participant based on the information of the participants and the information of the conference room allocated to the application terminal, and the sending module sends the participant identification code to the corresponding participant. By the unified sending mode, the trouble that the application terminals send the conference notification information one by one is saved. And a unique participant identification code is customized for each participant, and when participating, the mode of whether the participant is signed in successfully or not is determined by the mode of scanning the participant identification code displayed by the participant through the scanning module, so that the identity information of each participant can be verified, the mixing of other personnel is avoided, and the privacy and the safety of the conference are ensured.
Referring to fig. 6, fig. 6 is a schematic structural diagram of an embodiment of the conference operating terminal of the present application. The acquisition terminal 60 of the present embodiment includes a processor 601 and a human-computer interaction control circuit 602 coupled to each other. The human-computer interaction control circuit 602 is used for receiving a user or an execution object instruction.
The processor 601 is used for implementing the conference check-in method of any one of the above embodiments in cooperation with the human-computer interaction control circuit 602.
Please refer to fig. 7, the present application further provides a schematic structural diagram of an embodiment of a computer storage medium. In this embodiment, the computer storage medium 70 stores processor-executable program data 71, the program data 71 being used for executing the method in the above-described embodiment.
The computer storage medium 70 may be a medium that can store the program data 71, such as a usb disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk, or may be a server that stores the program data 71, and the server may transmit the stored program data 71 to another device for operation, or may self-operate the stored program data 71.
In the several embodiments provided in the present application, it should be understood that the disclosed method and apparatus may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, e.g., a unit or division of units is merely a logical division, and other divisions may be realized in practice, e.g., a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the purpose of illustrating embodiments of the present application and is not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application or are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (10)

1. A conference check-in method, characterized in that the conference check-in method comprises:
acquiring information of a party participating in a meeting, which is sent by an application terminal;
generating a participant identification code for each participant based on the participant information and the information of the conference room allocated to the application terminal;
sending the participant identification code to the corresponding participant;
scanning the participant identification code of the participant and judging whether the participant identification code is valid;
and if the participant identification code is valid, determining that the participant signs in successfully.
2. The conference check-in method of claim 1, wherein said step of determining that said participant signed in successfully if said participant identification code is valid further comprises:
and opening the entrance guard of the conference room matched with the participant identification code.
3. The conference check-in method of claim 1, wherein the step of scanning the participant identification codes displayed by the participants and determining whether the participant identification codes are valid comprises:
scanning the participant identification codes displayed by the participants, and acquiring information of the participants and information of the conference room from the participant identification codes;
judging whether data information matched with the participant information is stored or not;
if yes, judging whether the information of the participants is matched with the information of the conference room;
if the participant identification codes are matched, determining that the participant identification codes are valid; otherwise, the participant identification code is invalid.
4. The conference check-in method of claim 1, wherein if the participant identification code is valid, the conference check-in method further comprises:
judging whether the participant identification code comprises the identity identification information of the application terminal;
and if the intelligent conference equipment comprises the identification information of the application terminal, starting the intelligent conference equipment of the conference room.
5. The conference check-in method according to claim 1, wherein the step of obtaining the information of the participants sent by the application terminal further comprises:
receiving a meeting room reservation request sent by the application terminal; wherein the meeting room reservation request comprises information of the meeting room and the use time;
and auditing the meeting room reservation request, and distributing the authority for inputting the information of the participants to the application terminal after the auditing is passed.
6. The conference check-in method of claim 5, wherein the usage time comprises a usage start time and an end time, the conference check-in method further comprising:
and if the effective meeting identification code is not scanned in the set time period after the use starting time, canceling the appointment request of the meeting room at the time, and sending notification information to the application terminal.
7. The conference check-in method of claim 1, further comprising:
receiving meeting materials sent by the application terminal;
and sending the access address of the conference material to the participant.
8. The conference check-in method of claim 1, further comprising:
detecting whether the conference room is in an unmanned state through detection equipment;
and if the conference room is in the unmanned state, closing the intelligent conference equipment of the conference room.
9. A conference room operation terminal, characterized in that the conference room operation terminal comprises:
a processor and a human-computer interaction control circuit which are coupled with each other, wherein the processor is used for realizing the conference check-in method according to any one of claims 1-8 in cooperation with the human-computer interaction control circuit.
10. A computer storage medium having stored thereon program data which, when executed by a processor, implements a conference check-in method as claimed in any one of claims 1 to 8.
CN201811082357.3A 2018-09-17 2018-09-17 Conference sign-in method, conference room operation terminal and computer storage medium Active CN110910523B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811082357.3A CN110910523B (en) 2018-09-17 2018-09-17 Conference sign-in method, conference room operation terminal and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811082357.3A CN110910523B (en) 2018-09-17 2018-09-17 Conference sign-in method, conference room operation terminal and computer storage medium

Publications (2)

Publication Number Publication Date
CN110910523A true CN110910523A (en) 2020-03-24
CN110910523B CN110910523B (en) 2022-04-15

Family

ID=69813094

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811082357.3A Active CN110910523B (en) 2018-09-17 2018-09-17 Conference sign-in method, conference room operation terminal and computer storage medium

Country Status (1)

Country Link
CN (1) CN110910523B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111416829A (en) * 2020-03-27 2020-07-14 太仓秦风广告传媒有限公司 Multimedia conference system based on Internet of things and working method thereof
CN111815262A (en) * 2020-06-11 2020-10-23 芜湖海创实业有限责任公司 Operation auditing and managing method in danger source
CN112541495A (en) * 2020-12-22 2021-03-23 厦门亿联网络技术股份有限公司 Conference message detection method, device, server and storage medium
CN112967791A (en) * 2021-04-02 2021-06-15 北京声智科技有限公司 Information management method, management platform and terminal
CN113206847A (en) * 2021-04-29 2021-08-03 广州朗国电子科技有限公司 Conference summary tracking method, device, medium and product based on electronic whiteboard
CN114826798A (en) * 2021-01-28 2022-07-29 星络家居云物联科技有限公司 Conference control method, conference control apparatus, and computer-readable storage medium
CN115630719A (en) * 2022-10-11 2023-01-20 深圳中正信息科技有限公司 Conference room reservation method, system and computer-readable storage medium
TWI809535B (en) * 2021-10-21 2023-07-21 兆豐國際商業銀行股份有限公司 Electronic sign-in system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103106562A (en) * 2013-02-04 2013-05-15 深圳市东方智邑信息技术有限公司 Two-dimension code management control method and system
CN103136806A (en) * 2012-12-28 2013-06-05 腾讯科技(深圳)有限公司 Method, system, scanning terminal and display terminal for sign-in based on two-dimension code
CN103546561A (en) * 2013-10-25 2014-01-29 武汉钢铁(集团)公司 Conference information push method, device and system for NFC terminal
CN103778702A (en) * 2014-01-22 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Access control method, NFC (near field communication) terminal, access control device and access control system
CN104166827A (en) * 2013-05-16 2014-11-26 北大方正集团有限公司 Two-dimensional code-based service processing system and two-dimensional code-based service processing method
CN106067850A (en) * 2016-08-04 2016-11-02 张春枫 Many meeting rooms automatic distribution system based on mobile terminal
CN107423947A (en) * 2016-05-31 2017-12-01 昆山龙腾光电有限公司 A kind of conference management method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103136806A (en) * 2012-12-28 2013-06-05 腾讯科技(深圳)有限公司 Method, system, scanning terminal and display terminal for sign-in based on two-dimension code
CN103106562A (en) * 2013-02-04 2013-05-15 深圳市东方智邑信息技术有限公司 Two-dimension code management control method and system
CN104166827A (en) * 2013-05-16 2014-11-26 北大方正集团有限公司 Two-dimensional code-based service processing system and two-dimensional code-based service processing method
CN103546561A (en) * 2013-10-25 2014-01-29 武汉钢铁(集团)公司 Conference information push method, device and system for NFC terminal
CN103778702A (en) * 2014-01-22 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Access control method, NFC (near field communication) terminal, access control device and access control system
CN107423947A (en) * 2016-05-31 2017-12-01 昆山龙腾光电有限公司 A kind of conference management method and system
CN106067850A (en) * 2016-08-04 2016-11-02 张春枫 Many meeting rooms automatic distribution system based on mobile terminal

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111416829A (en) * 2020-03-27 2020-07-14 太仓秦风广告传媒有限公司 Multimedia conference system based on Internet of things and working method thereof
CN111815262A (en) * 2020-06-11 2020-10-23 芜湖海创实业有限责任公司 Operation auditing and managing method in danger source
CN111815262B (en) * 2020-06-11 2023-09-01 安徽海螺环保集团有限公司 Method for auditing and managing operation in dangerous source
CN112541495A (en) * 2020-12-22 2021-03-23 厦门亿联网络技术股份有限公司 Conference message detection method, device, server and storage medium
CN114826798A (en) * 2021-01-28 2022-07-29 星络家居云物联科技有限公司 Conference control method, conference control apparatus, and computer-readable storage medium
CN112967791A (en) * 2021-04-02 2021-06-15 北京声智科技有限公司 Information management method, management platform and terminal
CN113206847A (en) * 2021-04-29 2021-08-03 广州朗国电子科技有限公司 Conference summary tracking method, device, medium and product based on electronic whiteboard
TWI809535B (en) * 2021-10-21 2023-07-21 兆豐國際商業銀行股份有限公司 Electronic sign-in system
CN115630719A (en) * 2022-10-11 2023-01-20 深圳中正信息科技有限公司 Conference room reservation method, system and computer-readable storage medium
CN115630719B (en) * 2022-10-11 2023-09-12 深圳中正信息科技有限公司 Conference room reservation method, conference room reservation system, and computer-readable storage medium

Also Published As

Publication number Publication date
CN110910523B (en) 2022-04-15

Similar Documents

Publication Publication Date Title
CN110910523B (en) Conference sign-in method, conference room operation terminal and computer storage medium
CN108881290B (en) Block chain based digital certificate use method, system and storage medium
EP3266192B1 (en) Communication system and method of using the same
CN103493465B (en) Authorized user participates in the meeting of carrying out by communication network
JP5925373B1 (en) Communication support system
US11334958B2 (en) System and method for visitation management in a controlled environment
CN111352740B (en) Application interaction processing method and device
US20060265262A1 (en) Distributed conference scheduling
CN112257110A (en) Electronic signature management method, management system and computer readable storage medium
CN110458994B (en) Property management self-issuing card system and method
CN110545274A (en) Method, device and system for UMA service based on people and evidence integration
CN110491008A (en) A kind of community-based managing caller side and system, storage medium
CN114793483A (en) Conference system, conference information pushing method and device
CN110572458A (en) property management owner end system
CN108447167A (en) One kind can call Guest Pass integrated system and its control method
CN108711205B (en) Visitor authentication system of conference system
CN103379093A (en) Method and device for achieving account intercommunication
WO2018006318A1 (en) Method and system for using intelligent entrance guard on basis of mobile terminal
CN110599029A (en) Property management property end system
CN112887922B (en) Message sending method and electronic equipment
CN111611600B (en) Service processing method and system based on cloud platform
US10075431B1 (en) Image capture to enforce remote agent adherence
JP2003304518A (en) Electronic conference system, electronic conference method, program, and storage medium
CN110557614A (en) Property management intercom system
CN113055194B (en) Cloud conference box rapid conference entering method, cloud conference box and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
OL01 Intention to license declared
OL01 Intention to license declared