CN113065144B - Smart guest room user permission recovery method and device - Google Patents

Smart guest room user permission recovery method and device Download PDF

Info

Publication number
CN113065144B
CN113065144B CN202110297789.1A CN202110297789A CN113065144B CN 113065144 B CN113065144 B CN 113065144B CN 202110297789 A CN202110297789 A CN 202110297789A CN 113065144 B CN113065144 B CN 113065144B
Authority
CN
China
Prior art keywords
user
time
page
management system
guest
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110297789.1A
Other languages
Chinese (zh)
Other versions
CN113065144A (en
Inventor
梁肖
李先极
严文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Hisense Smart Life Technology Co Ltd
Original Assignee
Qingdao Hisense Smart Life Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Hisense Smart Life Technology Co Ltd filed Critical Qingdao Hisense Smart Life Technology Co Ltd
Priority to CN202110297789.1A priority Critical patent/CN113065144B/en
Publication of CN113065144A publication Critical patent/CN113065144A/en
Application granted granted Critical
Publication of CN113065144B publication Critical patent/CN113065144B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/12Hotels or restaurants
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Primary Health Care (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Automation & Control Theory (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention relates to the technical field of smart hotels, in particular to a method and a device for recovering user permission of smart guest rooms. The method comprises the following steps: after confirming that a user accesses a page of the public number of the smart guest room, sending a first permission verification request to a guest control management system, determining whether a first verification result is verification failure, if so, directly canceling the permission of the user to access the page of the public number of the smart guest room, otherwise, determining interval time when the current access time of the user to access the page of the public number of the smart guest room is within the check-in time period of the user; and periodically sending a second permission verification request to the guest management system according to the interval time, and canceling the permission of the user for accessing the page of the public number of the smart guest room after confirming that the second verification result fed back by the guest management system is verification failure. The method and the device realize that the user right can be accurately and timely recovered at the public number end if the user does not have the user right.

Description

Smart guest room user permission recovery method and device
Technical Field
The embodiment of the invention relates to the technical field of smart hotels, in particular to a method and a device for recovering user permission of smart guest rooms.
Background
In the present social environment, along with the application of technologies such as internet, artificial intelligence, big data analysis and the like in various industries, the concept of "wisdom" is gradually formed and accepted by people, and the following smart homes, smart cities, smart hotels and the like are gradually raised. Many industries have begun to gradually transform their own industries toward the intelligent category in order to meet the pace of the era. Then the traditional hotel is also faced with upgrade transformation. One of the development trends of smart hotels is the comprehensive and intelligent hotel service. According to the existing data statistics, the intelligent hotel in the domestic market has an absolute dominant position, so that the existing hotel can improve the information service through digitization and networking, the personalized requirements of customers are fully considered, and the operation cost of the hotel is reduced.
Wisdom hotel can bring intelligent experience for the guest, for example, the guest can carry out a key to the lock through WeChat public number and unblank, replaces to fall traditional having the card to open the door, and the guest no longer worries about for losing the room card. In addition, the guest room equipment can be remotely controlled, for example, after a resident goes out, the air conditioner is turned on before returning to the room, and the room is preheated or precooled in advance. Besides one-key unlocking and remote control of guest room equipment, the WeChat public number can also provide reservation services (reservation invoice, laundry service, car calling service, room returning application and the like). The resident can enjoy the series of intelligent services by operating the public number of the mobile terminal, but after the resident returns, all the permissions of the resident smart room service need to be recovered. If the situation that the recovery cannot be carried out exists, the potential safety hazard brought to the next resident is very large, the dissatisfaction of the resident is easily caused, and a hotel complaint event is generated.
In summary, there is a need for a method for recovering user permissions of smart guest rooms to solve the problem that the user permissions of smart guest rooms cannot be recovered accurately and timely.
Disclosure of Invention
The embodiment of the invention provides a method and a device for recovering user permission of an intelligent guest room, which are used for solving the problem that the user permission of the intelligent guest room cannot be accurately and timely recovered.
In a first aspect, an embodiment of the present invention provides a method for recovering an intelligent guest room user permission, including:
after confirming that a user accesses a public page of an intelligent guest room, sending a first permission verification request to a guest management system so that the guest management system verifies the permission of the user and returns a first verification result; the user's permission is associated with whether the user has returned;
confirming whether the first verification result is verification failure, and if so, directly canceling the authority of the user to access the page of the public number of the smart guest room;
otherwise, when the current access time of the user for accessing the public number page of the intelligent guest room is determined to be within the residence time period of the user, determining the interval time;
and periodically sending a second permission verification request to the guest management system according to the interval time, and canceling the permission of the user for accessing the page of the public number of the intelligent guest room after confirming that the second verification result fed back by the guest management system is verification failure.
In the technical scheme, after a user accesses a page of a public number of an intelligent guest room, a first permission verification request is sent to a guest management system to obtain the current access permission of the user, and a second permission verification request is automatically sent to the guest management system periodically according to interval time when the user is confirmed to have the access permission, so that a verification result can be continuously obtained, and whether the permission of the user for accessing the page of the public number of the intelligent guest room is cancelled or not is determined according to the failure of the verification result. Therefore, the user authority can be accurately and timely recovered at the public number end if the user does not have the user authority. Meanwhile, the public terminal actively sends the authority verification request to the customer management system, and long link does not need to be established between the customer management system and the public terminal, so that the computing resources of the customer management system and the public terminal are saved, and the cost is reduced.
Optionally, the determining the interval time according to the time period of the user's residence and the current visit time of the user visiting the public page of the smart guest room includes:
dividing the residence time period of the user into a plurality of time periods, and respectively setting different interval time for the time periods;
and determining the interval time corresponding to the time period in which the current access time is positioned according to the current access time and the plurality of time periods.
The time period of the user's living is divided into a plurality of time periods, different time periods correspond to different time intervals, and the time intervals corresponding to the time periods are decreased progressively, so that the closer the time point that the user loses the user right is, the more frequent the times of sending the second right verification request are, the lower the frequency of sending the second right verification request when the user has a low possibility of leaving the house is ensured, the resource consumption is saved, meanwhile, the frequency of sending the second right verification request is increased when the user has a high possibility of leaving the house, so that the verification result can be obtained in time, and the user right of the user at the public number end can be recovered in time when the user does not have the user right.
Optionally, the interval time corresponding to each of the time periods is decreased.
Thus, it is realized that the more often the user loses the time point of the user's right, the more frequently the second right verification request is transmitted.
Optionally, the check-in time period includes a check-in start time and a check-in end time;
and the interval time corresponding to the time period containing the check-in ending time in the plurality of time periods is less than a preset threshold value.
Optionally, after the first verification result is confirmed to be verification pass, the method further includes:
if the current access time is determined not to be within the check-in time period of the user, periodically sending a third permission verification request to the guest management system according to a preset interval time, and canceling the permission of the user for accessing the page of the public number of the intelligent guest room after confirming that a third verification result fed back by the guest management system is verification failure;
and the preset interval time is less than the interval time corresponding to the time period containing the check-in ending time in the plurality of time periods.
Optionally, before the page confirming that the user accesses the public number of the smart room, the method further includes:
acquiring personal information of the user;
sending the personal information of the user to the customer control management system; and matching the user with the authority of the user by the client management system, and determining the check-in time period of the user.
By acquiring the personal information of the user and sending the personal information to the customer control management system, the customer control management system can match the user with the authority of the user, so that the user authority can be accurately fed back to the corresponding user.
Optionally, after the canceling the right of the user to access the page of the public number of the smart guest room, the method further includes:
and when receiving an operation instruction of the user on a page of the public number of the intelligent guest room, prompting the user to check in again.
Therefore, the user right of the user at the public number end is timely recovered when the user does not have the user right, and the user is effectively prevented from continuing to use the smart guest room.
In a second aspect, an embodiment of the present invention further provides an apparatus for recovering user permissions in smart guest rooms, including:
the receiving and sending unit is used for sending a first authority verification request to the guest management system after confirming that the user accesses the page of the public number of the smart guest room, so that the guest management system verifies the authority of the user and returns a first verification result; the user's permission is associated with whether the user has returned;
the processing unit is used for confirming whether the first verification result is verification failure or not, and directly canceling the authority of the user for accessing the page of the public number of the intelligent guest room if the first verification result is verification failure; otherwise, when the current access time of the user for accessing the public number page of the intelligent guest room is determined to be within the residence time period of the user, determining the interval time; and periodically sending a second permission verification request to the guest management system according to the interval time, and canceling the permission of the user for accessing the page of the public number of the intelligent guest room after confirming that the second verification result fed back by the guest management system is verification failure.
Optionally, the processing unit is specifically configured to:
dividing the residence time period of the user into a plurality of time periods, and respectively setting different interval time for the time periods;
and determining the interval time corresponding to the time period in which the current access time is positioned according to the current access time and the plurality of time periods.
Optionally, the interval time corresponding to each of the time periods is decreased.
Optionally, the check-in time period includes a check-in start time and a check-in end time;
and the interval time corresponding to the time period containing the check-in ending time in the plurality of time periods is less than a preset threshold value.
Optionally, the processing unit is further configured to:
after the first verification result is confirmed to be passed through verification, if the current access time is determined not to be within the check-in time period of the user, periodically sending a third permission verification request to the guest management system according to preset interval time, and after the third verification result fed back by the guest management system is confirmed to be failed in verification, canceling the permission of the user for accessing the page of the public number of the intelligent guest room;
and the preset interval time is less than the interval time corresponding to the time period containing the check-in ending time in the plurality of time periods.
Optionally, the processing unit is further configured to:
before the user is confirmed to access the page of the public number of the smart guest room, acquiring personal information of the user;
sending the personal information of the user to the customer control management system; and matching the user with the authority of the user by the client management system, and determining the check-in time period of the user.
Optionally, the processing unit is further configured to:
after the permission of the user for accessing the page of the public number of the intelligent guest room is cancelled, when an operation instruction of the user on the page of the public number of the intelligent guest room is received, the user is prompted to transact the residence again.
In a third aspect, an embodiment of the present invention further provides a computing device, including:
a memory for storing a computer program;
and the processor is used for calling the computer program stored in the memory and executing the method for recovering the intelligent guest room user authority listed in any mode according to the obtained program.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, where a computer-executable program is stored, and the computer-executable program is configured to enable a computer to execute the method for recovering the smart room user right set forth in any of the above manners.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic diagram of a system architecture according to an embodiment of the present invention;
fig. 2 is a schematic flowchart illustrating a method for recovering permissions of smart guest room users according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of an overall process involved in an embodiment of the present invention;
FIG. 4 is a schematic diagram of an overall flow involved in an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an intelligent guest room user permission recovery device according to an embodiment of the present invention.
Detailed Description
To make the objects, embodiments and advantages of the present application clearer, the following description of exemplary embodiments of the present application will clearly and completely describe the exemplary embodiments of the present application with reference to the accompanying drawings in the exemplary embodiments of the present application, and it is to be understood that the described exemplary embodiments are only a part of the embodiments of the present application, and not all of the embodiments.
All other embodiments, which can be derived by a person skilled in the art from the exemplary embodiments described herein without inventive step, are intended to be within the scope of the claims appended hereto. In addition, while the disclosure herein has been presented in terms of one or more exemplary examples, it should be appreciated that aspects of the disclosure may be implemented solely as a complete embodiment.
Fig. 1 illustrates an exemplary system architecture provided by an embodiment of the present invention. As shown in fig. 1, the System includes a mobile terminal 100, a PMS System (Property Management System) 200, and a customer Management System 300.
The PMS system 200 is software for modern management of hotels, and is used for entering information of residents, order management and the like.
The customer management system 300 is used for receiving operation instructions of a user and intelligently controlling the devices of the room.
The user enters the hotel, transacts check-in registration in the hotel foreground, and registers check-in information including information such as an identity card and a mobile phone number in the PMS system 200. After successful check-in, the PMS system 200 synchronizes check-in records (including room number, check-in time period, identification card, mobile phone number, etc.) to the customer management system 300.
After a user scans a two-dimensional code of a public number provided by a hotel foreground by using the mobile terminal 100 for paying attention, the WeChat background can push an attention event to the guest management system 300, wherein the attention event comprises a WeChat public number user id.
When a user needs to use the device in the smart guest room, the user opens the public number in the mobile terminal 100 and inputs login information on a popped login page, wherein the login information comprises an identity card number, a mobile phone number and a mobile phone verification code. After completion of the filling, the public number initiates an authority verification request to the customer management system 300, the customer management system 300 matches the check-in record in the database according to the identity card number and the mobile phone number, and if the matching is successful, the user id and the check-in record are associated. And then the public number is opened again next time, and the intelligent guest room page can be directly accessed without user login as long as the matching relationship between the user id and the check-in record is still. After matching is successful, the customer control management system 300 issues information such as room number, outdoor weather, check-in time period and the like to public numbers for displaying, and meanwhile, the user can enjoy smart room service.
After the user enters the smart guest room page, the public number sends a first permission verification request to the guest management system 300, so that the guest management system 300 judges whether the user is in check-in at the foreground or not and whether the user is in a check-in time period or not by combining the user id, and if the user is in check-in, a verification result of successful verification is returned to the public number. The public number opens the intelligent guest room service to the user, and the user can use the intelligent guest room service. As long as the user does not exit the page of the smart room, the smart room service can be used all the time.
However, in practical use, a malicious behavior is inevitable, namely, before the user leaves the room, the user clicks the smart room page in the public number, and after the user leaves the room, the public number still stays in the page. Before the user leaves the room, the authority of the user for using the intelligent guest room is verified successfully, if the user stays on the page all the time, the intelligent guest room service cannot be automatically recovered, and the user can still control equipment, open a room door and the like. The potential safety hazard brought to the next resident is very large, the dissatisfaction of the resident is easily caused, the hotel complaint event is generated, and the management of the hotel is also very unfavorable.
Fig. 2 illustrates a flow of a smart room user right recycling method, which can be executed by a smart room user right recycling apparatus.
As shown in fig. 2, the process specifically includes:
step 201, after confirming that the user accesses the page of the public number of the smart guest room, sending a first permission verification request to the guest management system, so that the guest management system verifies the permission of the user, and returning a first verification result.
The user authority is associated with whether the user returns, the guest control management system obtains the condition whether the user returns through the PMS, if the user returns, the guest control management system does not have the user authority, and a returned first verification result is verification failure; and if the user does not leave the house, the user has the user right, and the returned first verification result is verification success.
It should be noted that before confirming that the user accesses the page of the public number of the smart guest room, the user may also register personal information, specifically, the user's personal information may be acquired, and then the user's personal information is sent to the guest management system, so that the guest management system matches the user with the user's authority, and determines the time period of the user's check-in.
After the guest control management system determines the check-in time period of the user, the guest control management system returns the check-in time period and the first verification result to the public number, and therefore the public number can determine the interval time according to the check-in time period and the current access time of the user.
Step 202, if the first verification result is verification failure, directly canceling the authority of the user to access the page of the public number of the smart guest room.
And if the first verification result is verification failure, namely the user has returned to the house at the moment and does not have the use authority, displaying a prompt of 'you do not have the use authority' to the user.
Step 203, if the first verification result is that the verification is passed, determining the interval time when the current access time of the user for accessing the public number page of the smart guest room is within the residence time period of the user.
In the embodiment of the present invention, there are various ways to determine the interval time, as follows:
in one mode
An empirical value for the interval time may be set, and when it is determined that the current access time is within the user's stay period, the empirical value is determined as the interval time. At this time, the authority verification request may be periodically transmitted according to the empirical value.
Mode two
The interval time may also be determined according to the stay time period, specifically, the stay time period of the user may be divided into a plurality of time periods, and different interval times are respectively set for the plurality of time periods. And then determining the interval time corresponding to the time period in which the current access time is positioned according to the current access time and the plurality of time periods.
Here, the interval time corresponding to each of the plurality of time periods is decreased. At this time, when different interval times are respectively set for a plurality of time periods, the different interval times may be respectively set for the plurality of time periods according to a preset proportion, or a fixed empirical value may be set according to a decreasing manner.
For example, the check-in period of the user is a check-in period registered by the user in the foreground, including a check-in start time and a check-in end time. Since there may be cases where the user actually makes an early check-out and a delayed check-out, whether the user has the usage right is related to whether the user makes a check-out, and not to the stay time period, which is only the interval for determining to transmit the second right authentication request. For example, the check-in time period registered by the user in the foreground is 2:00-6:00, and the user leaves the house at 5:00, and the user does not have the use right after 5: 00. For example, if the user registers in the foreground for a check-in period of 2:00-6:00 and the user leaves the room at 6:20, the user still has the right of use if the user accesses the smart room page at 6: 10. For example, if the user transacts check-in registration in the foreground and the check-in time period is 2021/1/2114: 00-2021/1/2214: 00, the check-in time period of the user can be divided into 3 time periods, namely, a first time period 2021/1/2114: 00-2021/1/2122: 00, a second time period 2021/1/2122: 00-2021/1/226: 00 and a third time period 2021/1/226: 00-2021/1/2214: 00. The first interval set for the first period is 1h, the second interval set for the second period is 30min, and the third interval set for the third period is 10 min.
If the number of the time periods divided according to the check-in time period is large, for example, 5 time periods and 6 time periods, the interval time set for the time period including the check-in ending time may be relatively small, and meets the requirement of requiring the emergency verification permission when the check-in ending time is close to. However, when the number of divided time periods is small, for example, 2, the time set for including the check-in end time period may be relatively large, and this situation may be undesirable.
Therefore, in order to meet the requirement that the emergency authentication authority is required when the check-in ending time is close to, a preset threshold value can be set in the time period close to the check-in ending time of the user, namely the time period including the check-in ending time, so that the interval time corresponding to the time period is smaller than the preset threshold value. The preset threshold may be set empirically. For example, if the preset threshold is set to 10min, the third interval time of the third time period (i.e., the time period including the check-in end time (2021/1/2214: 00)) needs to be less than 10 min; if the preset threshold is set to be 8min, the third interval time of the third time period needs to be less than 8 min. Namely, the set third interval time of 7min is satisfactory, and the set third interval time of 9min is unsatisfactory, and needs to be modified to 7 min.
If the current access time is 2021/1/225: 00, determining that the current access time is in a second time period, and the interval time is 30 min; and if the current access time of the user is 2021/1/229: 00, determining that the current access time is in a third time period, and the interval time is 10 min.
The time period of the user's living is divided into a plurality of time periods, different time periods correspond to different time intervals, and the time intervals corresponding to the time periods are decreased progressively, so that the closer the time point that the user loses the user right is, the more frequent the times of sending the second right verification request are, the lower the frequency of sending the second right verification request when the user has a low possibility of leaving the house is ensured, the resource consumption is saved, meanwhile, the frequency of sending the second right verification request is increased when the user has a high possibility of leaving the house, so that the verification result can be obtained in time, and the user right of the user at the public number end can be recovered in time when the user does not have the user right.
Optionally, when it is determined that the current access time is not in the check-in time period of the user, a third permission verification request may be periodically sent to the guest management system according to a preset interval time, and after it is determined that the third verification result fed back by the guest management system is verification failure, the permission of the user to access the page of the public number of the smart guest room is cancelled. The preset interval time is less than the interval time corresponding to the time period including the check-in ending time in the plurality of time periods. The preset interval time may be set empirically.
Since there may be a case where the user has delayed check-out, in the above example, the user has not checked-out at 2021/1/2215: 00, when the user accesses the public page of the smart room at this time, the current access time is 2021/1/2215: 00, and the user is not in the check-in period 2021/1/2114: 00-2021/1/2214: 00, but the user still has the access right, and the first verification result is that the verification is passed. At this time, since the possibility of the user leaving the room is very high, a preset interval time is set, the preset interval time is smaller than the third interval time in the above example, if the preset interval time is set to be 5min, the public number sends a third permission verification request to the guest management system every 5min, and until the third verification result is verification failure, that is, after the user leaves the room, the permission of the user for accessing the page of the public number of the smart guest room is cancelled.
Step 204, periodically sending a second permission verification request to the guest management system according to the interval time, and canceling the permission of the user for accessing the page of the public number of the smart guest room after confirming that the second verification result fed back by the guest management system is verification failure.
And after the interval time is obtained, a second permission verification request can be periodically sent to the guest management system. For example, if the interval time is 1h, the second permission verification request is sent to the guest management system every 1h based on the current access time.
In addition, after the authority of the user for accessing the page of the public number of the smart guest room is cancelled, if an operation instruction of the user on the page of the public number of the smart guest room is received, the user can be prompted to transact the intelligent guest room again. For example, a prompt message "please re-check in the user" is presented on the public number page.
Further, if the user exits the page of the public number of the smart guest room, the public number ends the work of determining the interval time and periodically sending the second permission verification request according to the interval time, so that resource occupation is avoided.
It should be noted that the first right verification request, the second right verification request, and the third right verification request are all used to request the guest management system to determine whether the user has the right, that is, to determine whether the user is returning, and the first, the second, and the third are only right verification requests sent at different time points.
After a user accesses a page of a public number of the smart guest room, a first permission verification request is sent to the guest management system to obtain the current access permission of the user, and a second permission verification request is sent to the guest management system periodically according to interval time when the user is confirmed to have the access permission, so that a verification result can be obtained continuously, and whether the permission of the user for accessing the page of the public number of the smart guest room is cancelled or not is determined through the failure of the verification result. Therefore, the user authority can be accurately and timely recovered at the public number end if the user does not have the user authority. Meanwhile, the public terminal actively sends the authority verification request to the customer management system, and long link does not need to be established between the customer management system and the public terminal, so that the computing resources of the customer management system and the public terminal are saved, and the cost is reduced.
To more clearly describe the above smart room user right recycling method, fig. 3 shows an overall description of the flow of the method before the user accesses the public number page of the smart room.
Step 301, after the user checks in, check in information is registered through the PMS system.
Step 302, the PMS synchronizes the check-in records to the guest management system.
Step 303, the user scans the code to pay attention to the public number.
Step 304, the customer management system obtains and stores the user id.
Step 305, the user enters the "smart room" and enters login information.
Step 306, the customer control management system compares the login information with the check-in record, if the matching is successful, step 307 is entered, and if the matching is failed, the process is ended.
And 307, the customer control management system associates the user ID with the check-in record, and issues information such as a room number, outdoor weather, check-in time period and the like to a public number for displaying.
Step 308, the public number opens the intelligent guest room service.
FIG. 4 shows a general description of the smart room user rights recovery method flow after the user accesses the public page of the smart room.
Step 401, after the user opens the smart room page each time, the public number issues a permission verification request to the guest management system.
Step 402, the guest management system determines whether there is an association relationship between the user id and the check-in record, if so, step 403 is entered, otherwise, step 410 is entered.
In step 403, the public number obtains the current access time.
In step 404, the public number compares the current access time with the time period of stay.
At step 405, it is determined whether the current access time is within the user's stay time period. If yes, go to step 406, otherwise go to step 411.
Step 406, determining a corresponding interval time according to the current access time of the user.
Step 407, the public number periodically sends a second permission verification request to the customer management system according to the interval time.
Step 408, the guest management system determines whether there is an association relationship between the user id and the check-in record, if yes, returns to step 407, and if not, proceeds to step 409.
And step 409, recovering the intelligent guest room service authority.
And step 410, popping up login information for a user to input the login information, and closing the current smart room page.
Step 411, periodically sending a third permission verification request to the guest management system according to a preset interval time. Step 412, the guest management system determines whether there is an association relationship between the user id and the check-in record, if yes, step 411 is entered, and if not, step 409 is entered.
Based on the same technical concept, fig. 5 exemplarily shows a structure of an intelligent guest room user permission recovery apparatus provided by an embodiment of the present invention, which can execute a process of recovering intelligent guest room user permission.
As shown in fig. 5, the apparatus specifically includes:
the receiving and sending unit 501 is configured to send a first permission verification request to the guest management system after confirming that the user accesses the page of the public number of the smart guest room, so that the guest management system verifies the permission of the user, and returns a first verification result;
the processing unit 502 is configured to determine whether the first verification result is a verification failure, and if so, directly cancel the right of the user to access the page of the public number of the smart guest room; otherwise, when the current access time of the user for accessing the public number page of the intelligent guest room is determined to be within the residence time period of the user, determining the interval time; and periodically sending a second permission verification request to the guest management system according to the interval time, and canceling the permission of the user for accessing the page of the public number of the intelligent guest room after confirming that the second verification result fed back by the guest management system is verification failure.
Optionally, the processing unit 502 is specifically configured to:
dividing the residence time period of the user into a plurality of time periods, and respectively setting different interval time for the time periods;
and determining the interval time corresponding to the time period in which the current access time is positioned according to the current access time and the plurality of time periods.
Optionally, the interval time corresponding to each of the plurality of time periods is decreased.
Optionally, the check-in time period includes a check-in start time and a check-in end time;
and the interval time corresponding to the time period containing the check-in ending time in the plurality of time periods is less than a preset threshold value.
Optionally, the processing unit 502 is further configured to:
after the first verification result is confirmed to be passed through verification, if the current access time is determined not to be within the check-in time period of the user, periodically sending a third permission verification request to the guest management system according to preset interval time, and after the third verification result fed back by the guest management system is confirmed to be failed in verification, canceling the permission of the user for accessing the page of the public number of the intelligent guest room;
and the preset interval time is less than the interval time corresponding to the time period containing the check-in ending time in the plurality of time periods.
Optionally, the processing unit 502 is further configured to:
before the user is confirmed to access the page of the public number of the smart guest room, acquiring personal information of the user;
sending the personal information of the user to the customer control management system; and enabling the client management system to match the user with the authority of the user and determine the residence time period of the user.
Optionally, the processing unit 502 is further configured to:
after the permission of the user for accessing the page of the public number of the intelligent guest room is cancelled, when an operation instruction of the user on the page of the public number of the intelligent guest room is received, the user is prompted to transact the residence again.
Based on the same technical concept, an embodiment of the present invention further provides a computing device, including:
a memory for storing a computer program;
and the processor is used for calling the computer program stored in the memory and executing the method for recovering the intelligent guest room user authority listed in any mode according to the obtained program.
Based on the same technical concept, an embodiment of the present invention further provides a computer-readable storage medium, where a computer-executable program is stored, and the computer-executable program is configured to enable a computer to execute the method for recovering the smart room user right listed in any one of the above manners.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (10)

1. A method for recovering user authority of an intelligent guest room is characterized by comprising the following steps:
after confirming that a user accesses a public page of an intelligent guest room, sending a first permission verification request to a guest management system so that the guest management system verifies the permission of the user and returns a first verification result; the user's permission is associated with whether the user has returned;
confirming whether the first verification result is verification failure, and if so, directly canceling the authority of the user to access the page of the public number of the smart guest room;
otherwise, confirming that the user has the right to access the page of the public number of the intelligent guest room, and determining the interval time when the current access time of the user to access the page of the public number of the intelligent guest room is determined to be within the living time period of the user;
and periodically sending a second permission verification request to the guest management system according to the interval time, and canceling the permission of the user for accessing the page of the public number of the intelligent guest room after confirming that the second verification result fed back by the guest management system is verification failure.
2. The method of claim 1, wherein the determining an interval time comprises:
dividing the residence time period of the user into a plurality of time periods, and respectively setting different interval time for the time periods;
and determining the interval time corresponding to the time period of the current access time according to the current access time and the time periods.
3. The method of claim 2, wherein the interval time for each of the plurality of time periods is decremented.
4. The method of claim 2, wherein the check-in period comprises a check-in start time and a check-in end time;
and the interval time corresponding to the time period containing the check-in ending time in the plurality of time periods is less than a preset threshold value.
5. The method of claim 2, wherein after confirming that the first verification result is verification pass, further comprising:
if the current access time is determined not to be within the check-in time period of the user, periodically sending a third permission verification request to the guest management system according to a preset interval time, and canceling the permission of the user for accessing the page of the public number of the intelligent guest room after confirming that a third verification result fed back by the guest management system is verification failure;
and the preset interval time is less than the interval time corresponding to the time period containing the check-in ending time in the plurality of time periods.
6. The method of claim 1, prior to the confirming the user's access to the page for the public number of the smart room, further comprising:
acquiring personal information of the user;
sending the personal information of the user to the customer control management system; and enabling the client management system to match the user with the authority of the user and determine the residence time period of the user.
7. The method of any of claims 1-6, further comprising, after the revoking the user's right to access a page of the Smart Room's public number:
and when receiving an operation instruction of the user on a page of the public number of the intelligent guest room, prompting the user to check in again.
8. The utility model provides an intelligence guest room user authority recovery unit which characterized in that includes:
the receiving and sending unit is used for sending a first authority verification request to the guest management system after confirming that the user accesses the page of the public number of the smart guest room, so that the guest management system verifies the authority of the user and returns a first verification result; the user's permission is associated with whether the user has returned;
the processing unit is used for confirming whether the first verification result is verification failure or not, and directly canceling the authority of the user for accessing the page of the public number of the intelligent guest room if the first verification result is verification failure; otherwise, confirming that the user has the right to access the page of the public number of the intelligent guest room, and determining the interval time when the current access time of the user to access the page of the public number of the intelligent guest room is determined to be within the living time period of the user; and periodically sending a second permission verification request to the guest management system according to the interval time, and canceling the permission of the user for accessing the page of the public number of the intelligent guest room after confirming that a second verification result fed back by the guest management system is verification failure.
9. A computing device, comprising:
a memory for storing a computer program;
a processor for invoking a computer program stored in said memory for executing the method of any of claims 1 to 7 in accordance with the obtained program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer-executable program for causing a computer to execute the method of any one of claims 1 to 7.
CN202110297789.1A 2021-03-19 2021-03-19 Smart guest room user permission recovery method and device Active CN113065144B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110297789.1A CN113065144B (en) 2021-03-19 2021-03-19 Smart guest room user permission recovery method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110297789.1A CN113065144B (en) 2021-03-19 2021-03-19 Smart guest room user permission recovery method and device

Publications (2)

Publication Number Publication Date
CN113065144A CN113065144A (en) 2021-07-02
CN113065144B true CN113065144B (en) 2022-06-17

Family

ID=76562537

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110297789.1A Active CN113065144B (en) 2021-03-19 2021-03-19 Smart guest room user permission recovery method and device

Country Status (1)

Country Link
CN (1) CN113065144B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117611396A (en) * 2023-12-05 2024-02-27 广州豆芽信息科技有限公司 Intelligent service management method and device in hotel

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109544406A (en) * 2018-11-02 2019-03-29 北京联合大学 A kind of multi-functional Hospitality management system
CN110211002A (en) * 2019-05-27 2019-09-06 广东华卓科技有限公司 A kind of wisdom hotel service management sytem

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187207A (en) * 2014-06-20 2015-12-23 北京新媒传信科技有限公司 Authority authentication method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109544406A (en) * 2018-11-02 2019-03-29 北京联合大学 A kind of multi-functional Hospitality management system
CN110211002A (en) * 2019-05-27 2019-09-06 广东华卓科技有限公司 A kind of wisdom hotel service management sytem

Also Published As

Publication number Publication date
CN113065144A (en) 2021-07-02

Similar Documents

Publication Publication Date Title
CN114495341B (en) Visitor management method, equipment, system and computer readable storage medium
US10325428B1 (en) Access control using device location tracking and blockchains
EP1810093B1 (en) Actuating a security system using a wireless device
KR101920654B1 (en) Enterance control system and method based on near field communication
US10679446B2 (en) Extended instant guest access using near field communication tags
WO2021175018A1 (en) Card making method for hotel, card making system for hotel, and hotel management system
CN105741395A (en) Entrance guard access method and system based on two-dimension code and face identification
WO2016169424A1 (en) Networked community area access control system and community area access method based thereon
CN109243040B (en) Access control passing management method, device, equipment and storage medium
CN109615757B (en) Visitor access control management method, system and storage medium
WO2022156315A1 (en) Door lock control method and apparatus, door lock, and storage medium
CN103544749A (en) Cloud control access control management system and authentication method thereof
US11922747B2 (en) Access control for property management
CN113065144B (en) Smart guest room user permission recovery method and device
CN107454046B (en) Cross-device authentication method and device
CN105915714A (en) Method and device for prompting terminal loss
CN108876987A (en) Building access control method, Cloud Server and computer readable storage medium
KR102461963B1 (en) Artificial intelligence-based on-site car wash information provision and vehicle door device control method, device and system
CN112989851A (en) NFC card activation method and device and electronic equipment
TWI667632B (en) Access control system and management method thereof
US10601835B2 (en) Resource sharing using device location tracking and blockchains
CN110706388A (en) Access control management method and related product
KR102599345B1 (en) Smart home system able to manage residents and visitors of multi-family houses
US10181229B2 (en) Method and system for implementing a universal key card
KR102344137B1 (en) System and method for user authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant