Nothing Special   »   [go: up one dir, main page]

KR20160149032A - Method for checking visitor using beacon - Google Patents

Method for checking visitor using beacon Download PDF

Info

Publication number
KR20160149032A
KR20160149032A KR1020150085986A KR20150085986A KR20160149032A KR 20160149032 A KR20160149032 A KR 20160149032A KR 1020150085986 A KR1020150085986 A KR 1020150085986A KR 20150085986 A KR20150085986 A KR 20150085986A KR 20160149032 A KR20160149032 A KR 20160149032A
Authority
KR
South Korea
Prior art keywords
visitor
information
identifier
terminal
visit
Prior art date
Application number
KR1020150085986A
Other languages
Korean (ko)
Inventor
유대명
강정현
Original Assignee
주식회사 코드글램
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 코드글램 filed Critical 주식회사 코드글램
Priority to KR1020150085986A priority Critical patent/KR20160149032A/en
Publication of KR20160149032A publication Critical patent/KR20160149032A/en

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C9/00031
    • G07C9/00103

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

More particularly, the present invention relates to a visitor authentication method and system, and more particularly to a visitor authentication method and a system thereof, The visitor can be authenticated via the visitor authentication server in which the visitor is registered when the visitor is visiting the unfamiliar visitor, and the visitor can be authenticated by the beacon generator Even when a plurality of users receive a beacon signal to be transmitted or a plurality of beacon signals from a plurality of beacon generators are received by a user, a visitor authentication method And a system.

Description

Technical Field [0001] The present invention relates to a visitor authentication system and method using a beacon signal,

More particularly, the present invention relates to a visitor authentication method and system, and more particularly to a visitor authentication method and a system thereof, The visitor can be authenticated via the visitor authentication server in which the visitor is registered when the visitor is visiting the unfamiliar visitor, and the visitor can be authenticated by the beacon generator Even when a plurality of users receive a beacon signal to be transmitted or a plurality of beacon signals from a plurality of beacon generators are received by a user, a visitor authentication method And a system.

As the number of online shopping malls grows, online purchases are increasing. The commodity purchased through the online shopping mall is usually delivered to the user through the courier service. In addition, when a specific product such as a water purifier or a bidet is purchased as a lease, there is an increasing number of visit management services in which the manager periodically visits the user's home to maintain the product.

In the case of a courier service or a visit management service, the user does not have information about the visitor, and if the courier article or the visiting manager directly delivers the courier goods to the user or manages the visit, the courier article or the visit manager Crime accidents such as disguised robbery accidents occur frequently and are emerging as social problems.

In order to prevent such crime accidents, women 's security courier services have recently been implemented. In order to prevent the crime of a woman living alone, the unattended courier service is installed in a public center or a public institution. When the unattended courier service arrives at the unattended courier storage box, the goods delivery time and the authentication number are transmitted to the registered user terminal Means a service that allows the delivery of goods by courier safely.

However, there is a disadvantage that such a women's relief courier service requires a user to visit the place where the unmanned courier box is installed, and in the case of the visit management service, it is difficult to prevent the crime described above.

SUMMARY OF THE INVENTION The present invention has been made to solve the above-mentioned problems, and an object of the present invention is to provide a visitor authentication method for notifying a user of a visit to a visitor when the visitor is located close to the user.

It is another object of the present invention to provide a method and system for a visitor to visit a user, the user terminal receiving a visitor identifier capable of identifying a visitor from a beacon generator held by the visitor, To provide visitors with a way to authenticate visitors.

It is another object of the present invention to provide a method of authenticating a visitor by notifying a visiting user of a visit only to a visitor according to a visit schedule of a visitor even when a plurality of users are located close to the visitor.

Another object of the present invention is to provide a visitor authentication method capable of first authenticating a visitor with visitor profile information received from a visitor authentication server and secondarily authenticating a visitor with unique information of a visitor who has previously registered in the visitor authentication server .

Another object of the present invention is to provide a visitor authentication method capable of determining whether or not a visitor is normally visited based on a scheduled visit time of visit information received from a visitor authentication server or whether a visitor identifier is re-received.

In order to achieve the object of the present invention, a visitor authentication system according to the present invention receives a visitor identifier from a visitor authentication server and a visitor terminal located in a communication range of a visitor terminal transmitting a beacon signal, And a visitor authentication terminal for transmitting visitor profile information corresponding to the visitor identifier from the visitor authentication server and providing the visitor profile information to the user, wherein the visitor authentication server comprises: a visitor corresponding to the visitor identifier received from the visitor information stored in the visitor information database; Searches the profile information, and controls the transmission of the searched visitor profile information to the user terminal.

Preferably, the visitor authentication server includes an information database having visitor information, user information, or visit schedule information, an information management unit for receiving visitor information, user information, or visit schedule information and storing the information in the information database, A schedule search unit for searching for a visit schedule existing in a set time range before the scheduled visit time based on the visit schedule information on the basis of the visit schedule information, And a visiting information providing unit for providing visiting information of the visitor to the visitor authentication terminal.

Herein, when receiving the visitor-specific information from the visitor management unit, the information management unit stores and manages the visitor-specific information in the information database. The visitor information providing unit selectively transmits the visitor- And is provided from a terminal.

Preferably, the user terminal comprises: a transceiver for receiving a visitor identifier from a visitor terminal located in a communication range; and a transmitter for comparing the received visitor identifier received from the received visitor identifier and the visitor authentication server and comparing the received visitor identifier with a previously stored visitor identifier And an operation control unit for controlling switching to the active mode when the received visitor identifier and the pre-stored visitor identifier are the same, and for providing the visitor to the visitor in the active mode.

Here, the operation control unit transmits the visitor identifier to the visitor authentication server through the transmission / reception unit in the active mode, receives and controls the visitor profile information corresponding to the visitor identifier from the visitor authentication server, and provides and controls the visitor profile to the user.

Preferably, the user terminal further includes a validity determination unit for determining whether the visitor identifier received from the visitor terminal is valid based on whether or not the visiting expectation time or the visitor identifier is re-received in the visit information.

Here, the validity determination unit may delete the previously stored visitor identifier if the visitor identifier received from the visitor terminal is identical to the previously stored visitor identifier.

In order to accomplish the object of the present invention, a visitor authentication method according to an embodiment of the present invention includes the steps of receiving a visitor identifier from a visitor terminal when the visitor terminal is located in a communication range of a visitor terminal transmitting a beacon signal, The method comprising the steps of: transmitting a visitor authentication request message including a visitor identifier to a visitor authentication server and receiving a visitor authentication message including visitor profile information in response to a visitor authentication request message; and providing visitor profile information to the user .

According to another aspect of the present invention, there is provided a visitor authentication method including receiving visit information of a visitor to be visited from a visitor authentication server based on a visit schedule of a visitor and storing the received visit information, Receiving a visitor identifier from a visitor terminal when the visitor terminal is located in a communication range of a visitor terminal that transmits a beacon signal, receiving the visitor identifier of the visited information stored when receiving the visitor identifier from the visitor terminal, And outputting a visit guidance message of the visitor when the visitor identifier of the stored visit information and the visitor identifier received from the visitor terminal are identical to each other.

Preferably, the visitor authentication method according to another embodiment of the present invention further includes a step of determining whether the visitor identifier received from the visitor terminal is valid based on whether or not to re-receive the expected visiting time or the visitor identifier provided in the visited information .

Herein, the threshold range of the scheduled visit time is compared with the reception time at which the visitor identifier is received from the visitor terminal. If the reception time does not exist in the threshold range of the scheduled visit time, the received visitor identifier is determined to be invalid do.

Preferably, the visitor authentication method further includes a step of controlling deletion of the visitor identifier of the stored visit information when the visitor identifier of the stored visit information and the visitor identifier received from the visitor terminal are equal to each other .

The visitor authentication method and system according to the present invention has the following various effects.

First, the visitor authentication method according to the present invention receives a beacon signal transmitted from a beacon generator held by a visitor through a visitor authentication terminal possessed by a user located in a communication range, The user can be informed of the visitor's visit.

Second, in the visitor authentication method according to the present invention, when a visitor visits a user, the visitor authentication terminal possessed by the user receives the visitor identifier capable of identifying the visitor from the beacon generating device held by the visitor, The visitor identifier can be used to authenticate the visitor.

  Third, in the visitor authentication method according to the present invention, the visitor authentication terminal stores the visitor identifier in advance according to the visiting schedule of the visitor stored in the visitor authentication server, and when a plurality of users are located close to the visitor The visitor can be authenticated by notifying only the user who receives and stores the visitor identifier.

Fourth, in the visitor authentication method according to the present invention, visitor unique information is additionally provided in addition to visitor profile information at the time of requesting unique information of the visitor from the visitor authentication terminal, thereby first authenticating the visitor with the visitor profile information received from the visitor authentication server, The visitor can be secondly authenticated by the unique information of the visitor who has already registered in the visitor authentication server.

Fifth, the visitor authentication method according to the present invention determines whether or not the visitor identifier received from the beacon generator is valid based on the expected time of visiting the visited information received from the visitor authentication server or whether the visitor identifier is re-received, It is possible to judge whether or not it is a visit.

1 is a functional block diagram illustrating a visitor authentication system according to the present invention.
2 is a functional block diagram illustrating a visitor authentication terminal according to the present invention.
3 is a functional block diagram illustrating a visitor authentication server according to the present invention.
4 is a flowchart illustrating a visitor authentication method according to an embodiment of the present invention.
5 is a flowchart illustrating a visitor authentication method according to another embodiment of the present invention.
FIG. 6 is a view for explaining a feature of the present invention for notifying a visiting visitor of only a visitor corresponding to a visiting schedule.

Hereinafter, a visitor authentication method and system according to the present invention will be described in detail with reference to the accompanying drawings.

1 is a functional block diagram illustrating a visitor authentication system according to the present invention.

1, the network 20 includes a visitor authentication terminal 100 and 100 'owned by a user, a visitor terminal 30 held by a visitor, and a visitor authentication server 200 for performing authentication of a visitor Are connected. Here, the network 20 transmits and receives data between the visitor authentication terminals 100 and 100 'and the visitor authentication server 200, transmits and receives data between the visitor terminal 30 and the visitor authentication server 200, Various types of wired / wireless networks for transmitting and receiving data between the terminals 100 and 100 'and the visitor terminal 30 can be used.

On the other hand, the visitor's beacon generator 10 and the visitor authentication terminals 100 and 100 'transmit and receive a beacon signal via a local area network. The beacon signal is transmitted to a beacon generator (BLE (Bluetooth Low Energy) To the visitor authentication terminals 100 and 100 '. The beacon generator 10 is configured to transmit and receive a beacon signal in a Bluetooth manner to the visitor authentication terminals 100 and 100 '. The beacon signal of Bluetooth type is a short range wireless communication method based on Bluetooth 4.0 (BLE) protocol and can communicate with devices within a maximum distance of 70m. The beacon signal is highly accurate enough to distinguish 5 ~ 10cm units, There are advantages.

Various wireless communication technologies such as Diffuse-Infrared, Ultrasonic Wave, Radio Frequency (UWB), Ultra Wideband (UWB), and radio wave identification may be used according to the field to which the present invention is applied. And falls within the scope of the present invention. Hereinafter, a visitor identifier is received using a beacon signal.

The visitor authentication terminal 100 or 100 'is provided with a visitor identifier from the beacon generator 10 in a short distance communication method when the visitor is located near the user while the visitor is holding the beacon generator 10 Receives visitor information from the visitor authentication server 200 based on the visit schedule of the visitor or receives the visitor information from the visitor authentication server 200 on the basis of the visiting schedule of the visitor by transmitting the received visitor identifier to the visitor authentication server 200 via the network 20 A smart phone 100, a smart interphone 100 ', etc., which can be used, can be used.

On the other hand, the visitor terminal 30 accesses the visitor authentication server 200 through the network 20 to input the login information of the visitor, the profile information of the visitor, the visit schedule, and the unique information of the visitor, 200, a smart phone, a personal computer, or the like can be used.

When the visitor is registered, the visitor authentication server 200 allocates and provides the visitor identifier unique to the visitor to the visitor terminal 30, and the visitor registers and stores the assigned visitor identifier in the beacon generator 10. [ The beacon generator 10 periodically generates a beacon signal having a visitor identifier and transmits a beacon signal in a short range communication in a multicasting manner.

2 is a functional block diagram illustrating a visitor authentication terminal according to the present invention.

2, the transceiver 110 recognizes a beacon generator positioned in a short-range communication range and receives a beacon signal from the beacon generator.

When receiving the beacon signal, the visitor identification unit 130 extracts the visitor identifier of the beacon signal and provides the extracted visitor identifier to the operation control unit 150. The operation control unit 150 transmits the visitor identifier to the visitor authentication server through the transmission / reception unit 110, and when the visitor profile information corresponding to the visitor identifier is received from the visitor authentication server, the operation control unit 150 outputs the visitor profile information through the output unit 190 And informs the user of the visitor profile information along with the fact that the visitor has visited.

The user can confirm the visitor by comparing the impression of the visitor profile information with the actual impression of the visitor through the screen of the interphone. Further, when it is determined that the photograph of the visitor profile is long and the impression of the actually confirmed visitor is different from the impression of the visitor profile information, the user further inputs a user command for requesting the visitor specific information through a user interface (not shown) , The operation control unit 150 generates a request message for requesting the visitor specific information and transmits the request message to the visitor terminal through the transceiver unit 110. [ When the unique information is received from the visitor terminal, the operation control unit 150 controls the output unit 190 to output the unique information received from the visitor terminal.

Preferably, in the visitor authentication system according to the present invention, the visitor authentication server may transmit the visit information of the visitor to the visitor authentication terminal in advance of the scheduled visit time according to the visit schedule of the visitor, And stores the received visit information in the visiting information database 120. The visiting information database 120 stores the visiting information in the visiting information database 120. [ Here, the visit information includes a visitor identifier, visitor profile information, expected time of visit, visitor specific information, and the like.

When receiving the visitor identifier from the beacon generating device, the visitor identifier 130 compares the received visitor identifier with the visitor identifier stored in the visited information database, and determines whether the received visitor identifier is the same as the stored visitor identifier .

When the received visitor identifier and the stored visitor identifier are different from each other, it is determined that the visitor is not the visitor who visited the user. However, if the received visitor identifier and the stored visitor identifier are identical to each other, the operation control unit 150 controls the activation mode to provide the visitor with the visiting information through the output unit 190 in the active mode. The operation control unit 150 can provide the visit information together with the visiting information such as the visitor profile information, the expected time of visiting, and the visitor specific information stored in the visiting information database 120 together with the fact of the visit.

On the other hand, when the difference between the scheduled visit time and the actual visit time exceeds the threshold time range by comparing the scheduled visit time of the visitor stored in the visit information database 120 with the actual visit time of the visitor , It is determined that the visit is invalid, and a warning signal is generated. When receiving the warning signal from the validity determination unit 170, the operation control unit 150 outputs a warning message for informing that the visit of the visitor is an invalid visit through the output unit 190. [ Based on the warning message, the user can additionally request unique information to the visitor, and can compare the unique information received from the visitor with the unique information stored in advance to securely authenticate the visitor.

When the validity determination unit 170 receives the visitor identifier stored in the visiting information database 120 and then re-receives the same visitor identifier within a predetermined time, the validity determination unit 170 generates an invalidation signal and provides the invalidation signal to the operation control unit 150 do. In the case of receiving the invalid signal, the operation control unit 150 controls the fact that the visiting visitor is not notified to the user even if the visitor identifier is received. Furthermore, the validity judging unit 170 deletes the visitor identifier stored in the visiting information database 120 after receiving the same visitor identifier as the visitor identifier stored in the visiting information database 120 from the beacon generating apparatus 120 .

3 is a functional block diagram illustrating a visitor authentication server according to the present invention.

3, the transceiver 210 receives visitor information or visit schedule information from a visitor terminal, or receives user information and a visitor identifier from a visitor authentication terminal. The transmission and reception unit 210 provides the received information to the information management unit 220. The information management unit 220 separates the received information according to the information type and stores and manages the information in the information database 230. [ For example, the information management unit 220 stores and manages information such as a visitor profile received from the visitor terminal in the visitor information database 235, and stores user information such as user name, address, age, and contact information received from the visitor authentication terminal Stores and manages the visit schedule information received from a visitor terminal or a server of a visitor management company that has contracted with a visitor and the visitor is employed in the schedule information database 231. [

The schedule searching unit 250 periodically searches the schedule information stored in the schedule information database 231 to search for a visit schedule existing in a predetermined time range before the visit time, and the visit information providing unit 270 searches The user information and visitor information corresponding to the visit schedule are respectively extracted from the user information database 233 and the visitor information database 235 and transmitted and controlled to the visitor authentication terminal through the transceiver 210. For example, among the visit schedules stored in the visit schedule information database 231, a visit schedule corresponding to 48 hours to 24 hours before the visit time is searched, and the visitor schedules corresponding to the visited schedule The visitor information such as the visitor's profile information, the visitor identifier, and the expected time of visiting.

4 is a flowchart illustrating a visitor authentication method according to an embodiment of the present invention.

4, the visitor authentication terminal recognizes a beacon generating device located in a short-range communication range, for example, a Bluetooth communication range, and receives a beacon signal including a visitor identifier from the beacon generating device (S110) .

When receiving the beacon signal, the visitor authentication terminal extracts the visitor identifier from the beacon signal, generates a visitor authentication request message, and transmits the visitor authentication request message to the visitor authentication server (S130). The visitor authentication request message may include an extracted visitor identifier, a visitor authentication terminal identifier, and the like.

When the visitor authentication terminal receives the visitor authentication message from the visitor authentication server in response to the visitor authentication request message, the visitor authentication terminal outputs information about the visitor to the user (S150). The visitor authentication message may include visitor profile information, expected time of visit, and visitor-specific information, and the visitor profile information may include the visitor's photograph, age, and contact information.

5 is a flowchart illustrating a visitor authentication method according to another embodiment of the present invention.

5, the visitor authentication terminal receives the visit information from the visitor authentication server and registers and stores the received visit information (S210). The visitor authentication server provides the visitor information including the visitor profile information, the visitor identifier, the expected time of visit, and the visitor specific information to the visitor authentication terminal of the user corresponding to the visit schedule according to the visit schedule of the visitor. Through such visitor profile information, the user can contact the visitor to confirm the visit time or change the visit time based on the expected visit time.

On the other hand, the visitor authentication terminal determines whether it receives a beacon signal including a visitor identifier from a beacon generating device located in a short-range communication range (S230), extracts and extracts a visitor identifier included in the beacon signal It is determined whether the visitor identifier and the visitor identifier received and stored from the visitor authentication server are identical (S250). If the received visitor identifier and the stored visitor identifier are equal to each other, it is determined that the visitor who visited the user is visiting.

In this manner, the visitor identifier is received and stored in advance from the visitor authentication server according to the visit schedule of the visitor, and the visitor who is visiting the user is determined by determining whether the stored visitor identifier is the same as the visitor identifier received from the beacon generator, Even if there are a plurality of visitor authentication terminals 101, 103 and 105 in the communication range BR of the beacon generator 10 as shown in Fig. 6 (a) . 6 (b), even if the visitor authentication terminals 101, 103, 105 overlap the communication ranges of the plurality of beacon generating devices 11, 13 and receive a plurality of beacon signals, Only those users can be notified of the visit.

If it is determined that the visitor is a visiting visitor, it is determined whether the visitor identifier is valid based on the received visitor identifier (S270). When the difference between the actual visit time and the expected visit time is out of the threshold time range, it is determined as an invalid visitor identifier by comparing the actual visit time received with the visitor identifier and the stored expected visit time. If the actual visiting time and the expected visiting time are different from each other, it is determined that the visitor identifier is not valid, and a warning message or the like is output to the user so that the visitor can be confirmed again, thereby more securely authenticating the visitor.

In the case of re-receiving a visitor identifier identical to the stored visitor identifier from the beacon generator, it is a case where the visitor continues to be in the close range for a certain period of time or the third party illegally steals the visitor identifier. When a beacon generator is located within a predetermined range for a long period of time, such as when a courier delivers a courier service to an apartment, the beacon generator periodically transmits a beacon signal. After receiving the same visitor identifier as the stored visitor identifier, If the same visitor identifier is re-received in the range, it is determined that it is an invalid visitor identifier so as not to notify the user of the visit. Preferably, when receiving the same visitor identifier as the stored visitor identifier, the stored visitor identifier is deleted.

When receiving the valid visitor identifier, the user is controlled to output the visitor visiting information together with the visitor profile information and the visitor specific information (S290).

The above-described embodiments of the present invention can be embodied in a general-purpose digital computer that can be embodied as a program that can be executed in a computer and operates the program using a computer-readable recording medium.

The computer-readable recording medium may be a magnetic storage medium (e.g., ROM, floppy disk, hard disk, etc.), an optical reading medium (e.g. CD ROM, Lt; / RTI > transmission).

While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is evident that many alternatives, modifications and variations will be apparent to those skilled in the art. Accordingly, the true scope of the present invention should be determined by the technical idea of the appended claims.

10: Beacon generator 20: Network
30: visitor terminal 100: visitor authentication terminal
200: Visitor authentication server

Claims (12)

Visitor authentication server; And
Receives the visitor identifier from the visitor terminal located in the communication range of the visitor terminal transmitting the beacon signal, transmits the visitor identifier to the visitor authentication server, receives the visitor profile information corresponding to the visitor identifier from the visitor authentication server And a visitor authentication terminal for providing the user with the authentication information,
Wherein the visitor authentication server searches for visitor profile information corresponding to the visitor identifier received from the visitor information stored in the visitor information database and controls transmission of the retrieved visitor profile information to the user terminal system.
The system according to claim 1, wherein the visitor authentication server
An information database having visitor information, user information or visit schedule information;
An information management unit for receiving the visitor information, the user information, or the visit schedule information and storing the information in the information database;
A schedule retrieval unit for retrieving a visited schedule existing in a set time range before the scheduled visit time based on the visit schedule information stored in the information database; And
And a visiting information providing unit for searching visitor information and user information corresponding to the searched visiting schedule from the information database and providing visiting information of visitors visiting the user to the visitor authentication terminal system.
3. The method of claim 2,
Wherein the information management unit stores and manages the visitor-specific information in the information database when receiving the visitor-specific information from the visitor management unit,
Wherein the visitor information providing unit selectively provides the visitor specific information from the visitor authentication terminal when there is a request for visitor specific information from the user terminal.
3. The method of claim 2, wherein the user terminal
A transceiver for receiving a visitor identifier from a visitor terminal located in a communication range;
A visitor identification unit for comparing the received visitor identifier with a previously stored visitor identifier received from the visitor authentication server and determining whether the received visitor identifier and the previously stored visitor identifier are the same; And
And an operation control unit for controlling switching to an activation mode when the received visitor identifier is the same as the previously stored visitor identifier, and for providing the visitor with the visiting information of the visitor in the activation mode.
5. The apparatus of claim 4, wherein the operation control unit
And transmits the visitor identifier to the visitor authentication server through the transceiver in the activation mode to receive and control visitor profile information corresponding to the visitor identifier from the visitor authentication server and to control the visitor profile to be provided to the user Visitor authentication system.
6. The method of claim 5, wherein the user terminal
Further comprising a validity judging unit for judging whether the visitor identifier received from the visitor terminal is valid based on the expected time of visit provided in the visited information or whether the visitor identifier is re-received.
7. The apparatus of claim 6, wherein the validity determination unit
If the visitor identifier received from the visitor terminal is identical to the previously stored visitor identifier, deletes the previously stored visitor identifier.
A method for authenticating a visitor through a visitor authentication terminal possessed by a user,
Receiving a visitor identifier from the visitor terminal when the visitor terminal is located in a communication range of the visitor terminal transmitting the beacon signal;
Transmitting a visitor authentication request message including the visitor identifier to the visitor authentication server when receiving the visitor identifier and receiving a visitor authentication message including visitor profile information in response to the visitor authentication request message;
And providing the visitor profile information to a user.
A method for authenticating a visitor through a visitor authentication terminal possessed by a user,
Receiving visit information of a visitor who is expected to visit from a visitor authentication server based on a visit schedule of a visitor and storing the received visit information;
Receiving a visitor identifier from the visitor terminal when the visitor terminal is located in a communication range of the visitor terminal transmitting the beacon signal;
Comparing the visitor identifier of the stored visited information with the visitor identifier received from the visitor terminal when receiving the visitor identifier from the visitor terminal; And
And outputting a visit guidance message of the visitor when the visitor identifier of the stored visit information and the visitor identifier received from the visitor terminal are identical to each other.
10. The method of claim 9,
Further comprising the step of determining whether the visitor identifier received from the visitor terminal is valid based on a scheduled visit time included in the visited information or whether the visitor identifier is re-received.
The method according to claim 10, further comprising: comparing a threshold range of the scheduled visit time with a reception time at which the visitor identifier is received from the visitor terminal; if the reception time does not exist in the threshold range of the scheduled visit time, Is determined to be invalid. The method of claim 10, wherein the visitor authentication method
And controlling deletion of the visitor identifier of the stored visited information when the stored visitor identifier of the visited information and the visitor identifier received from the visitor terminal are identical to each other.
KR1020150085986A 2015-06-17 2015-06-17 Method for checking visitor using beacon KR20160149032A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150085986A KR20160149032A (en) 2015-06-17 2015-06-17 Method for checking visitor using beacon

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150085986A KR20160149032A (en) 2015-06-17 2015-06-17 Method for checking visitor using beacon

Publications (1)

Publication Number Publication Date
KR20160149032A true KR20160149032A (en) 2016-12-27

Family

ID=57736684

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150085986A KR20160149032A (en) 2015-06-17 2015-06-17 Method for checking visitor using beacon

Country Status (1)

Country Link
KR (1) KR20160149032A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108182740A (en) * 2017-12-21 2018-06-19 合肥长天信息技术有限公司 A kind of gate inhibition's safe and intelligentization regulates and controls method
KR20190064525A (en) 2017-11-30 2019-06-10 (주)솔루션뱅크 Locker using states confirmating device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20190064525A (en) 2017-11-30 2019-06-10 (주)솔루션뱅크 Locker using states confirmating device
CN108182740A (en) * 2017-12-21 2018-06-19 合肥长天信息技术有限公司 A kind of gate inhibition's safe and intelligentization regulates and controls method

Similar Documents

Publication Publication Date Title
US11847590B2 (en) Short-range device communications for secured resource access
US9898881B2 (en) Short-range device communications for secured resource access
JP6327335B2 (en) Short-range user identification system and information providing system and method using the same
KR100880889B1 (en) Customized location tracking service
US9961543B2 (en) Method and apparatus for wireless network authentication and authorization
KR101363586B1 (en) System offering information of user at close range
KR101507594B1 (en) Security entrance system using Identification means and Operating Method thereof
US11039272B2 (en) Methods circuits systems and associated computer executable code for localizing and messaging a wireless communication device
CN104346548A (en) Wearable equipment and authentication method thereof
KR20050085484A (en) Location tracking of portable devices in a wireless network
KR102139998B1 (en) Security control system and method for beacon and control apparatus thereof
KR102407228B1 (en) System and method for providing service
KR20160149032A (en) Method for checking visitor using beacon
KR101553161B1 (en) System Providing Advertisement To User At Close Range
KR20130097303A (en) System and method of controlling for digital device using wireless lan detection
KR20160129575A (en) Method and apparatus for providing information in a communication network
KR20170023597A (en) System for providing realtime group information and method thereof
CN107360534B (en) Method and equipment for establishing wireless connection
KR101657087B1 (en) Method and system for personal authentication using beacon
KR101877440B1 (en) System and Method for providing Converged Personal Network Service using of Public-Personal Network Gateway
WO2019201651A1 (en) Peer to peer communication system
KR102293119B1 (en) Easy access system and method for wireless network at the property
KR101325805B1 (en) System and Method of executing application service using Wireless LAN detection
CN113556740B (en) Identity authentication system and method
KR20190014165A (en) Method for Providing Ordering Payment by using Conversational Mode Device for Vehicles

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E701 Decision to grant or registration of patent right