KR20160149032A - Method for checking visitor using beacon - Google Patents
Method for checking visitor using beacon Download PDFInfo
- Publication number
- KR20160149032A KR20160149032A KR1020150085986A KR20150085986A KR20160149032A KR 20160149032 A KR20160149032 A KR 20160149032A KR 1020150085986 A KR1020150085986 A KR 1020150085986A KR 20150085986 A KR20150085986 A KR 20150085986A KR 20160149032 A KR20160149032 A KR 20160149032A
- Authority
- KR
- South Korea
- Prior art keywords
- visitor
- information
- identifier
- terminal
- visit
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G07C9/00031—
-
- G07C9/00103—
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
More particularly, the present invention relates to a visitor authentication method and system, and more particularly to a visitor authentication method and a system thereof, The visitor can be authenticated via the visitor authentication server in which the visitor is registered when the visitor is visiting the unfamiliar visitor, and the visitor can be authenticated by the beacon generator Even when a plurality of users receive a beacon signal to be transmitted or a plurality of beacon signals from a plurality of beacon generators are received by a user, a visitor authentication method And a system.
Description
More particularly, the present invention relates to a visitor authentication method and system, and more particularly to a visitor authentication method and a system thereof, The visitor can be authenticated via the visitor authentication server in which the visitor is registered when the visitor is visiting the unfamiliar visitor, and the visitor can be authenticated by the beacon generator Even when a plurality of users receive a beacon signal to be transmitted or a plurality of beacon signals from a plurality of beacon generators are received by a user, a visitor authentication method And a system.
As the number of online shopping malls grows, online purchases are increasing. The commodity purchased through the online shopping mall is usually delivered to the user through the courier service. In addition, when a specific product such as a water purifier or a bidet is purchased as a lease, there is an increasing number of visit management services in which the manager periodically visits the user's home to maintain the product.
In the case of a courier service or a visit management service, the user does not have information about the visitor, and if the courier article or the visiting manager directly delivers the courier goods to the user or manages the visit, the courier article or the visit manager Crime accidents such as disguised robbery accidents occur frequently and are emerging as social problems.
In order to prevent such crime accidents, women 's security courier services have recently been implemented. In order to prevent the crime of a woman living alone, the unattended courier service is installed in a public center or a public institution. When the unattended courier service arrives at the unattended courier storage box, the goods delivery time and the authentication number are transmitted to the registered user terminal Means a service that allows the delivery of goods by courier safely.
However, there is a disadvantage that such a women's relief courier service requires a user to visit the place where the unmanned courier box is installed, and in the case of the visit management service, it is difficult to prevent the crime described above.
SUMMARY OF THE INVENTION The present invention has been made to solve the above-mentioned problems, and an object of the present invention is to provide a visitor authentication method for notifying a user of a visit to a visitor when the visitor is located close to the user.
It is another object of the present invention to provide a method and system for a visitor to visit a user, the user terminal receiving a visitor identifier capable of identifying a visitor from a beacon generator held by the visitor, To provide visitors with a way to authenticate visitors.
It is another object of the present invention to provide a method of authenticating a visitor by notifying a visiting user of a visit only to a visitor according to a visit schedule of a visitor even when a plurality of users are located close to the visitor.
Another object of the present invention is to provide a visitor authentication method capable of first authenticating a visitor with visitor profile information received from a visitor authentication server and secondarily authenticating a visitor with unique information of a visitor who has previously registered in the visitor authentication server .
Another object of the present invention is to provide a visitor authentication method capable of determining whether or not a visitor is normally visited based on a scheduled visit time of visit information received from a visitor authentication server or whether a visitor identifier is re-received.
In order to achieve the object of the present invention, a visitor authentication system according to the present invention receives a visitor identifier from a visitor authentication server and a visitor terminal located in a communication range of a visitor terminal transmitting a beacon signal, And a visitor authentication terminal for transmitting visitor profile information corresponding to the visitor identifier from the visitor authentication server and providing the visitor profile information to the user, wherein the visitor authentication server comprises: a visitor corresponding to the visitor identifier received from the visitor information stored in the visitor information database; Searches the profile information, and controls the transmission of the searched visitor profile information to the user terminal.
Preferably, the visitor authentication server includes an information database having visitor information, user information, or visit schedule information, an information management unit for receiving visitor information, user information, or visit schedule information and storing the information in the information database, A schedule search unit for searching for a visit schedule existing in a set time range before the scheduled visit time based on the visit schedule information on the basis of the visit schedule information, And a visiting information providing unit for providing visiting information of the visitor to the visitor authentication terminal.
Herein, when receiving the visitor-specific information from the visitor management unit, the information management unit stores and manages the visitor-specific information in the information database. The visitor information providing unit selectively transmits the visitor- And is provided from a terminal.
Preferably, the user terminal comprises: a transceiver for receiving a visitor identifier from a visitor terminal located in a communication range; and a transmitter for comparing the received visitor identifier received from the received visitor identifier and the visitor authentication server and comparing the received visitor identifier with a previously stored visitor identifier And an operation control unit for controlling switching to the active mode when the received visitor identifier and the pre-stored visitor identifier are the same, and for providing the visitor to the visitor in the active mode.
Here, the operation control unit transmits the visitor identifier to the visitor authentication server through the transmission / reception unit in the active mode, receives and controls the visitor profile information corresponding to the visitor identifier from the visitor authentication server, and provides and controls the visitor profile to the user.
Preferably, the user terminal further includes a validity determination unit for determining whether the visitor identifier received from the visitor terminal is valid based on whether or not the visiting expectation time or the visitor identifier is re-received in the visit information.
Here, the validity determination unit may delete the previously stored visitor identifier if the visitor identifier received from the visitor terminal is identical to the previously stored visitor identifier.
In order to accomplish the object of the present invention, a visitor authentication method according to an embodiment of the present invention includes the steps of receiving a visitor identifier from a visitor terminal when the visitor terminal is located in a communication range of a visitor terminal transmitting a beacon signal, The method comprising the steps of: transmitting a visitor authentication request message including a visitor identifier to a visitor authentication server and receiving a visitor authentication message including visitor profile information in response to a visitor authentication request message; and providing visitor profile information to the user .
According to another aspect of the present invention, there is provided a visitor authentication method including receiving visit information of a visitor to be visited from a visitor authentication server based on a visit schedule of a visitor and storing the received visit information, Receiving a visitor identifier from a visitor terminal when the visitor terminal is located in a communication range of a visitor terminal that transmits a beacon signal, receiving the visitor identifier of the visited information stored when receiving the visitor identifier from the visitor terminal, And outputting a visit guidance message of the visitor when the visitor identifier of the stored visit information and the visitor identifier received from the visitor terminal are identical to each other.
Preferably, the visitor authentication method according to another embodiment of the present invention further includes a step of determining whether the visitor identifier received from the visitor terminal is valid based on whether or not to re-receive the expected visiting time or the visitor identifier provided in the visited information .
Herein, the threshold range of the scheduled visit time is compared with the reception time at which the visitor identifier is received from the visitor terminal. If the reception time does not exist in the threshold range of the scheduled visit time, the received visitor identifier is determined to be invalid do.
Preferably, the visitor authentication method further includes a step of controlling deletion of the visitor identifier of the stored visit information when the visitor identifier of the stored visit information and the visitor identifier received from the visitor terminal are equal to each other .
The visitor authentication method and system according to the present invention has the following various effects.
First, the visitor authentication method according to the present invention receives a beacon signal transmitted from a beacon generator held by a visitor through a visitor authentication terminal possessed by a user located in a communication range, The user can be informed of the visitor's visit.
Second, in the visitor authentication method according to the present invention, when a visitor visits a user, the visitor authentication terminal possessed by the user receives the visitor identifier capable of identifying the visitor from the beacon generating device held by the visitor, The visitor identifier can be used to authenticate the visitor.
Third, in the visitor authentication method according to the present invention, the visitor authentication terminal stores the visitor identifier in advance according to the visiting schedule of the visitor stored in the visitor authentication server, and when a plurality of users are located close to the visitor The visitor can be authenticated by notifying only the user who receives and stores the visitor identifier.
Fourth, in the visitor authentication method according to the present invention, visitor unique information is additionally provided in addition to visitor profile information at the time of requesting unique information of the visitor from the visitor authentication terminal, thereby first authenticating the visitor with the visitor profile information received from the visitor authentication server, The visitor can be secondly authenticated by the unique information of the visitor who has already registered in the visitor authentication server.
Fifth, the visitor authentication method according to the present invention determines whether or not the visitor identifier received from the beacon generator is valid based on the expected time of visiting the visited information received from the visitor authentication server or whether the visitor identifier is re-received, It is possible to judge whether or not it is a visit.
1 is a functional block diagram illustrating a visitor authentication system according to the present invention.
2 is a functional block diagram illustrating a visitor authentication terminal according to the present invention.
3 is a functional block diagram illustrating a visitor authentication server according to the present invention.
4 is a flowchart illustrating a visitor authentication method according to an embodiment of the present invention.
5 is a flowchart illustrating a visitor authentication method according to another embodiment of the present invention.
FIG. 6 is a view for explaining a feature of the present invention for notifying a visiting visitor of only a visitor corresponding to a visiting schedule.
Hereinafter, a visitor authentication method and system according to the present invention will be described in detail with reference to the accompanying drawings.
1 is a functional block diagram illustrating a visitor authentication system according to the present invention.
1, the
On the other hand, the visitor's
Various wireless communication technologies such as Diffuse-Infrared, Ultrasonic Wave, Radio Frequency (UWB), Ultra Wideband (UWB), and radio wave identification may be used according to the field to which the present invention is applied. And falls within the scope of the present invention. Hereinafter, a visitor identifier is received using a beacon signal.
The
On the other hand, the
When the visitor is registered, the
2 is a functional block diagram illustrating a visitor authentication terminal according to the present invention.
2, the
When receiving the beacon signal, the
The user can confirm the visitor by comparing the impression of the visitor profile information with the actual impression of the visitor through the screen of the interphone. Further, when it is determined that the photograph of the visitor profile is long and the impression of the actually confirmed visitor is different from the impression of the visitor profile information, the user further inputs a user command for requesting the visitor specific information through a user interface (not shown) , The
Preferably, in the visitor authentication system according to the present invention, the visitor authentication server may transmit the visit information of the visitor to the visitor authentication terminal in advance of the scheduled visit time according to the visit schedule of the visitor, And stores the received visit information in the
When receiving the visitor identifier from the beacon generating device, the
When the received visitor identifier and the stored visitor identifier are different from each other, it is determined that the visitor is not the visitor who visited the user. However, if the received visitor identifier and the stored visitor identifier are identical to each other, the
On the other hand, when the difference between the scheduled visit time and the actual visit time exceeds the threshold time range by comparing the scheduled visit time of the visitor stored in the
When the
3 is a functional block diagram illustrating a visitor authentication server according to the present invention.
3, the
The
4 is a flowchart illustrating a visitor authentication method according to an embodiment of the present invention.
4, the visitor authentication terminal recognizes a beacon generating device located in a short-range communication range, for example, a Bluetooth communication range, and receives a beacon signal including a visitor identifier from the beacon generating device (S110) .
When receiving the beacon signal, the visitor authentication terminal extracts the visitor identifier from the beacon signal, generates a visitor authentication request message, and transmits the visitor authentication request message to the visitor authentication server (S130). The visitor authentication request message may include an extracted visitor identifier, a visitor authentication terminal identifier, and the like.
When the visitor authentication terminal receives the visitor authentication message from the visitor authentication server in response to the visitor authentication request message, the visitor authentication terminal outputs information about the visitor to the user (S150). The visitor authentication message may include visitor profile information, expected time of visit, and visitor-specific information, and the visitor profile information may include the visitor's photograph, age, and contact information.
5 is a flowchart illustrating a visitor authentication method according to another embodiment of the present invention.
5, the visitor authentication terminal receives the visit information from the visitor authentication server and registers and stores the received visit information (S210). The visitor authentication server provides the visitor information including the visitor profile information, the visitor identifier, the expected time of visit, and the visitor specific information to the visitor authentication terminal of the user corresponding to the visit schedule according to the visit schedule of the visitor. Through such visitor profile information, the user can contact the visitor to confirm the visit time or change the visit time based on the expected visit time.
On the other hand, the visitor authentication terminal determines whether it receives a beacon signal including a visitor identifier from a beacon generating device located in a short-range communication range (S230), extracts and extracts a visitor identifier included in the beacon signal It is determined whether the visitor identifier and the visitor identifier received and stored from the visitor authentication server are identical (S250). If the received visitor identifier and the stored visitor identifier are equal to each other, it is determined that the visitor who visited the user is visiting.
In this manner, the visitor identifier is received and stored in advance from the visitor authentication server according to the visit schedule of the visitor, and the visitor who is visiting the user is determined by determining whether the stored visitor identifier is the same as the visitor identifier received from the beacon generator, Even if there are a plurality of
If it is determined that the visitor is a visiting visitor, it is determined whether the visitor identifier is valid based on the received visitor identifier (S270). When the difference between the actual visit time and the expected visit time is out of the threshold time range, it is determined as an invalid visitor identifier by comparing the actual visit time received with the visitor identifier and the stored expected visit time. If the actual visiting time and the expected visiting time are different from each other, it is determined that the visitor identifier is not valid, and a warning message or the like is output to the user so that the visitor can be confirmed again, thereby more securely authenticating the visitor.
In the case of re-receiving a visitor identifier identical to the stored visitor identifier from the beacon generator, it is a case where the visitor continues to be in the close range for a certain period of time or the third party illegally steals the visitor identifier. When a beacon generator is located within a predetermined range for a long period of time, such as when a courier delivers a courier service to an apartment, the beacon generator periodically transmits a beacon signal. After receiving the same visitor identifier as the stored visitor identifier, If the same visitor identifier is re-received in the range, it is determined that it is an invalid visitor identifier so as not to notify the user of the visit. Preferably, when receiving the same visitor identifier as the stored visitor identifier, the stored visitor identifier is deleted.
When receiving the valid visitor identifier, the user is controlled to output the visitor visiting information together with the visitor profile information and the visitor specific information (S290).
The above-described embodiments of the present invention can be embodied in a general-purpose digital computer that can be embodied as a program that can be executed in a computer and operates the program using a computer-readable recording medium.
The computer-readable recording medium may be a magnetic storage medium (e.g., ROM, floppy disk, hard disk, etc.), an optical reading medium (e.g. CD ROM, Lt; / RTI > transmission).
While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is evident that many alternatives, modifications and variations will be apparent to those skilled in the art. Accordingly, the true scope of the present invention should be determined by the technical idea of the appended claims.
10: Beacon generator 20: Network
30: visitor terminal 100: visitor authentication terminal
200: Visitor authentication server
Claims (12)
Receives the visitor identifier from the visitor terminal located in the communication range of the visitor terminal transmitting the beacon signal, transmits the visitor identifier to the visitor authentication server, receives the visitor profile information corresponding to the visitor identifier from the visitor authentication server And a visitor authentication terminal for providing the user with the authentication information,
Wherein the visitor authentication server searches for visitor profile information corresponding to the visitor identifier received from the visitor information stored in the visitor information database and controls transmission of the retrieved visitor profile information to the user terminal system.
An information database having visitor information, user information or visit schedule information;
An information management unit for receiving the visitor information, the user information, or the visit schedule information and storing the information in the information database;
A schedule retrieval unit for retrieving a visited schedule existing in a set time range before the scheduled visit time based on the visit schedule information stored in the information database; And
And a visiting information providing unit for searching visitor information and user information corresponding to the searched visiting schedule from the information database and providing visiting information of visitors visiting the user to the visitor authentication terminal system.
Wherein the information management unit stores and manages the visitor-specific information in the information database when receiving the visitor-specific information from the visitor management unit,
Wherein the visitor information providing unit selectively provides the visitor specific information from the visitor authentication terminal when there is a request for visitor specific information from the user terminal.
A transceiver for receiving a visitor identifier from a visitor terminal located in a communication range;
A visitor identification unit for comparing the received visitor identifier with a previously stored visitor identifier received from the visitor authentication server and determining whether the received visitor identifier and the previously stored visitor identifier are the same; And
And an operation control unit for controlling switching to an activation mode when the received visitor identifier is the same as the previously stored visitor identifier, and for providing the visitor with the visiting information of the visitor in the activation mode.
And transmits the visitor identifier to the visitor authentication server through the transceiver in the activation mode to receive and control visitor profile information corresponding to the visitor identifier from the visitor authentication server and to control the visitor profile to be provided to the user Visitor authentication system.
Further comprising a validity judging unit for judging whether the visitor identifier received from the visitor terminal is valid based on the expected time of visit provided in the visited information or whether the visitor identifier is re-received.
If the visitor identifier received from the visitor terminal is identical to the previously stored visitor identifier, deletes the previously stored visitor identifier.
Receiving a visitor identifier from the visitor terminal when the visitor terminal is located in a communication range of the visitor terminal transmitting the beacon signal;
Transmitting a visitor authentication request message including the visitor identifier to the visitor authentication server when receiving the visitor identifier and receiving a visitor authentication message including visitor profile information in response to the visitor authentication request message;
And providing the visitor profile information to a user.
Receiving visit information of a visitor who is expected to visit from a visitor authentication server based on a visit schedule of a visitor and storing the received visit information;
Receiving a visitor identifier from the visitor terminal when the visitor terminal is located in a communication range of the visitor terminal transmitting the beacon signal;
Comparing the visitor identifier of the stored visited information with the visitor identifier received from the visitor terminal when receiving the visitor identifier from the visitor terminal; And
And outputting a visit guidance message of the visitor when the visitor identifier of the stored visit information and the visitor identifier received from the visitor terminal are identical to each other.
Further comprising the step of determining whether the visitor identifier received from the visitor terminal is valid based on a scheduled visit time included in the visited information or whether the visitor identifier is re-received.
And controlling deletion of the visitor identifier of the stored visited information when the stored visitor identifier of the visited information and the visitor identifier received from the visitor terminal are identical to each other.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150085986A KR20160149032A (en) | 2015-06-17 | 2015-06-17 | Method for checking visitor using beacon |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150085986A KR20160149032A (en) | 2015-06-17 | 2015-06-17 | Method for checking visitor using beacon |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20160149032A true KR20160149032A (en) | 2016-12-27 |
Family
ID=57736684
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150085986A KR20160149032A (en) | 2015-06-17 | 2015-06-17 | Method for checking visitor using beacon |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20160149032A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108182740A (en) * | 2017-12-21 | 2018-06-19 | 合肥长天信息技术有限公司 | A kind of gate inhibition's safe and intelligentization regulates and controls method |
KR20190064525A (en) | 2017-11-30 | 2019-06-10 | (주)솔루션뱅크 | Locker using states confirmating device |
-
2015
- 2015-06-17 KR KR1020150085986A patent/KR20160149032A/en active IP Right Grant
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20190064525A (en) | 2017-11-30 | 2019-06-10 | (주)솔루션뱅크 | Locker using states confirmating device |
CN108182740A (en) * | 2017-12-21 | 2018-06-19 | 合肥长天信息技术有限公司 | A kind of gate inhibition's safe and intelligentization regulates and controls method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11847590B2 (en) | Short-range device communications for secured resource access | |
US9898881B2 (en) | Short-range device communications for secured resource access | |
JP6327335B2 (en) | Short-range user identification system and information providing system and method using the same | |
KR100880889B1 (en) | Customized location tracking service | |
US9961543B2 (en) | Method and apparatus for wireless network authentication and authorization | |
KR101363586B1 (en) | System offering information of user at close range | |
KR101507594B1 (en) | Security entrance system using Identification means and Operating Method thereof | |
US11039272B2 (en) | Methods circuits systems and associated computer executable code for localizing and messaging a wireless communication device | |
CN104346548A (en) | Wearable equipment and authentication method thereof | |
KR20050085484A (en) | Location tracking of portable devices in a wireless network | |
KR102139998B1 (en) | Security control system and method for beacon and control apparatus thereof | |
KR102407228B1 (en) | System and method for providing service | |
KR20160149032A (en) | Method for checking visitor using beacon | |
KR101553161B1 (en) | System Providing Advertisement To User At Close Range | |
KR20130097303A (en) | System and method of controlling for digital device using wireless lan detection | |
KR20160129575A (en) | Method and apparatus for providing information in a communication network | |
KR20170023597A (en) | System for providing realtime group information and method thereof | |
CN107360534B (en) | Method and equipment for establishing wireless connection | |
KR101657087B1 (en) | Method and system for personal authentication using beacon | |
KR101877440B1 (en) | System and Method for providing Converged Personal Network Service using of Public-Personal Network Gateway | |
WO2019201651A1 (en) | Peer to peer communication system | |
KR102293119B1 (en) | Easy access system and method for wireless network at the property | |
KR101325805B1 (en) | System and Method of executing application service using Wireless LAN detection | |
CN113556740B (en) | Identity authentication system and method | |
KR20190014165A (en) | Method for Providing Ordering Payment by using Conversational Mode Device for Vehicles |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right |