CN111583542A - Unattended management method and system - Google Patents
Unattended management method and system Download PDFInfo
- Publication number
- CN111583542A CN111583542A CN202010360443.7A CN202010360443A CN111583542A CN 111583542 A CN111583542 A CN 111583542A CN 202010360443 A CN202010360443 A CN 202010360443A CN 111583542 A CN111583542 A CN 111583542A
- Authority
- CN
- China
- Prior art keywords
- information
- management
- storage object
- image information
- locking
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/10—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property
- G07F17/12—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property comprising lockable containers, e.g. for accepting clothes to be cleaned
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/083—Shipping
- G06Q10/0832—Special goods or special handling procedures, e.g. handling of hazardous or fragile goods
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
Landscapes
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Economics (AREA)
- Signal Processing (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses an unattended management method and system, wherein the unattended management method is applied to an unattended management system, and the unattended management system comprises a management end and a service end; the method comprises the following steps: when the storage object is fixed in the management terminal, the server receives the locking information sent by the management terminal; the server acquires image information carrying a storage object based on the locking information; and when the image information is acquired, the server judges that the storage object is successfully returned. The invention takes the locking instruction generated when the storage object is fixed at the management terminal as the precondition, receives the image information under the precondition, and determines that the storage object is fixed in the management terminal according to the image information, thereby improving the safety of the unattended storage object by fixing the storage object first and then acquiring the image of the storage object.
Description
Technical Field
The invention relates to the technical field of computer communication, in particular to an unattended management method and system.
Background
Currently, the distribution of articles (for example, the distribution of articles in chain stores, particularly fresh and cooked foods and the like) is generally carried out in the early morning. However, in the morning, the delivery store is in a rest state, and store personnel are required to be left to wait for delivery vehicles to arrive at the store; this increases store personnel working time and increases store operating costs.
Thus, the prior art has yet to be improved and enhanced.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide an unattended management method and system, aiming at the deficiencies of the prior art.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows:
an unattended management method is applied to an unattended management system, wherein the unattended management system comprises a management end and a service end; the method comprises the following steps:
when the storage object is fixed in the management terminal, the server receives the locking information sent by the management terminal;
the server acquires image information carrying a storage object based on the locking information;
and when the image information is acquired, the server judges that the storage object is successfully returned.
In one implementation, the acquisition time of the image information is later than the reception time of the lock information.
In one implementation manner, before the server receives the locking information sent by the manager, the method includes:
when the storage object is fixed in the management terminal, the management terminal sends a locking certificate to a terminal device, wherein the terminal device is connected with the management terminal;
and controlling the terminal equipment to send locking information to a server based on the locking certificate so that the server receives the locking information.
In one implementation, the image information is an image shot by the terminal device, wherein the shooting time of the image information is later than the receiving time of the locking certificate.
In one implementation, the step of, when the image information is acquired, after the server determines that the custody object is successfully returned, includes:
and the server side acquires user information corresponding to the image information and associates the user information with the image information.
In one implementation, the step of determining, by the server, that the custody object is successfully returned when the image information is acquired specifically includes:
when the image information is acquired, identifying storage object information corresponding to the image information;
comparing the storage object information with target storage object information corresponding to the management terminal;
if the storage object information is the same as the target storage object information, it is determined that the storage object is successfully returned.
In one implementation, the management side comprises a storage box for fixing the custody objects; when the server determines that the custody object is successfully returned when the image information is acquired, the method further includes:
an unattended operation management system comprises a management end and a service end, wherein the management end is connected with the service end; the server is used for receiving locking information sent by the management terminal when the storage object is fixed in the management terminal; acquiring image information carrying a custody object based on the lock information, and determining that the custody object is successfully returned when the image information is acquired.
In one implementation manner, the management terminal is configured to connect with a terminal device, send a locking credential to the terminal device, and control the terminal device to send locking information to a server based on the locking credential, so that the server receives the locking information.
Has the advantages that: compared with the prior art, the invention provides an unattended management method and system, wherein the unattended management method is applied to an unattended management system, and the unattended management system comprises a management end and a service end; the method comprises the following steps: when the storage object is fixed in the management terminal, the server receives the locking information sent by the management terminal; the server acquires image information carrying a storage object based on the locking information; and when the image information is acquired, the server judges that the storage object is successfully returned. The invention takes the locking instruction generated when the storage object is fixed at the management terminal as the precondition, receives the image information under the precondition, and determines that the storage object is fixed in the management terminal according to the image information, thereby improving the safety of the unattended storage object by fixing the storage object first and then acquiring the image of the storage object.
Drawings
Fig. 1 is a flowchart of an unattended operation management method according to the present invention.
Fig. 2 is a schematic flow chart of the unattended management method provided by the present invention.
Fig. 3 is a schematic diagram of an unattended management method according to the present invention.
Detailed Description
The present invention provides an unattended management method and system, and in order to make the purpose, technical scheme and effect of the present invention clearer and clearer, the present invention is further described in detail below by referring to the attached drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
It will be understood by those skilled in the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The inventor researches and finds that the distribution of articles (such as the distribution of articles in chain stores, particularly fresh and cooked foods and the like) is generally carried out in the early morning at present. However, in the morning, the delivery store is in a rest state, and store personnel are required to be left to wait for delivery vehicles to arrive at the store; this increases store personnel working time and increases store operating costs. In order to reduce the working time of store personnel, the scheme adopted at present is that a store key is arranged on a delivery driver, the door is opened by using the key during delivery at each time, and the key is delivered to a delivery center for uniform storage after delivery is completed, so that the key utilization is low, and the management is troublesome, and the online management cannot be realized (for example, the driver vehicle type needs to be changed temporarily, and the delivery store is inconvenient to change a line), and meanwhile, the key also has the risk of being troublesome in delivery management and unsafe.
In order to solve the above problems, the present invention provides an unattended management method and system, wherein the unattended management method is applied to an unattended management system, and the unattended management system comprises a management end and a service end; the method comprises the following steps: when the storage object is fixed in the management terminal, the server receives the locking information sent by the management terminal; the server acquires image information carrying a storage object based on the locking information; and when the image information is acquired, the server judges that the storage object is successfully returned. The invention takes the locking instruction generated when the storage object is fixed at the management terminal as the precondition, receives the image information under the precondition, and determines that the storage object is fixed in the management terminal according to the image information, thereby improving the safety of the unattended storage object by fixing the storage object first and then acquiring the image of the storage object.
For example, the embodiment provides an unattended management method applied to the distribution industry, and a storage object is a key; and each store is provided with a management end, and the management end is internally used for placing keys corresponding to the stores, so that the self-service unmanned key handover and search management process is realized. The specific implementation process of the embodiment of the present application may be: the management terminal is configured in a store, the key is locked in the management terminal, a distributor can acquire the key through the management terminal, and when the key is returned, the service terminal corresponding to the management terminal can acquire the image information carrying the key through the locking information formed by fixing the key in the management terminal; and when the image information is acquired, the server side judges that the key returning is successful. Therefore, the security of the unattended key can be improved by firstly fixing the key and then acquiring the key image.
The invention will be further explained by the description of the embodiments with reference to the drawings.
The implementation provides an unattended management method, which is applied to an unattended management system, as shown in fig. 3, the unattended management system includes a management end 100 and a server 300, the management end 100 communicates with the server 300 to send locking information to the server when a managed object is fixed to the management end; the management end comprises a storage box and a fixing buckle; the fixing buckle is arranged in the storage box and used for fixing the storage objects in the storage box. As illustrated in fig. 1 and 2, the method comprises:
and S10, when the storage object is fixed in the management terminal, the server terminal receives the locking information sent by the management terminal.
Specifically, the storage object fixing and managing terminal is that a storage object is fixed in a storage box through a fixing buckle, and after the storage object is fixed in the storage box through the fixing buckle, the storage object is locked by the fixing buckle and cannot be separated from the storage box. The locking information is formed by locking the storage object in a storage box through a fixed buckle, wherein the locking information may be directly transmitted to a server by a management side or transmitted to the server through an external terminal device (for example, a smart phone). The management terminal is used for placing storage objects, wherein the storage objects can be keys, certificates and the like.
In an implementation manner of this embodiment, the locking information is sent from the external device to the server, where the external terminal device is connected to the management terminal and can communicate with the management terminal. Therefore, before the server receives the locking information sent by the management terminal, the method includes:
s11, when the object is fixed in the management end, the management end sends a locking certificate to a terminal device, wherein, the terminal device is connected with the management end;
s12, controlling the terminal device to send locking information to a server based on the locking certificate, so that the server receives the locking information.
Specifically, the terminal device is connected to the management terminal through a wireless network, and the terminal device may communicate with the management terminal, and when a storage object is fixed in the management terminal, the management terminal may form a locking credential (e.g., a locking identifier, etc.), and send the locking credential to the terminal device, so that the terminal device obtains the locking credential. In one implementation manner, the terminal device may have a management APP or applet and the like corresponding to the management end in advance, and the management APP or applet is connected to the management end and connected to the background service end corresponding to the management end.
In addition, in order to ensure that the terminal device can receive the locking certificate sent by the management terminal, the terminal device needs to establish a connection with the management terminal in advance. The specific process of establishing the connection may be: the terminal equipment communicates with a server corresponding to the management terminal through the management app or the applet and performs identity authentication; and after the identity authentication is successful, the server side sends the equipment identification of the management side to the terminal equipment, and the terminal equipment establishes wireless connection with the management side according to the equipment identification. The wireless connection can be wireless network connection, Bluetooth connection and the like; when the management terminal is connected with the terminal equipment through a wireless network, the management terminal can be in a networking state or can be connected with the terminal equipment through a WiFi hotspot shared by the terminal equipment; when the management terminal is connected with the terminal device through the Bluetooth, the management terminal can be configured with a Bluetooth function, and the terminal device can search the management terminal through the device identifier of the management terminal and is connected with the management terminal through the Bluetooth.
Further, after the management end is connected with the terminal device, when the management end detects that the fixing buckle is in the locking state, a locking certificate is formed based on the locking state, and the locking certificate is sent to the terminal device, so that the terminal device can obtain the locking certificate. The fact that the fixing buckle is in the locking state means that the fixing buckle is converted from the unlocking state to the locking state, and it can be understood that the basis of the management end forming the locking certificate is as follows: the state of the fixing buckle is changed from the unlocking state to the locking state, at this time, it is stated that a storage object is placed in the fixing buckle and locked in the storage box through the fixing buckle, based on the situation, the management end forms a locking certificate, and the terminal device is informed that the storage object is returned through the locking certificate. In addition, the locking of the fixing buckle can be realized by a control key arranged on the hole for storage, or can be realized by sending a locking instruction to the management terminal by the terminal equipment, or can be realized by manually shifting the fixing buckle by a user.
And S20, the server acquires the image information of the carried storage object based on the locking information.
Specifically, the image information is image information corresponding to the management side, and is used for fixing the state of the storage object in the management side. The image information carries an image of the storage object, and in the image information, the storage object is locked in a storage box by a fixing buckle. Thus, the security of the management of the storage object can be improved by verifying the state in which the storage object is locked in the box based on the image information. In addition, the shooting time corresponding to the image information is later than the receiving time of the locking information, namely, the image information is shot after the storage object is locked in the storage box through the fixing buckle, so that the situation that a user adopts the previously shot image as a locking certificate can be avoided, and the safety of the return supervision of the storage object is further improved.
In an implementation manner of this embodiment, the image information is captured and uploaded by the terminal device, and the image information is an image directly captured by the terminal device by starting a capture function, so that the terminal device is prevented from using an image pre-stored in the terminal device as the image information sent to the server. It can be understood that after the terminal device receives the locking certificate, the terminal device starts a shooting function, shoots image information of the management terminal in real time through the shooting function, and sends the shot image information to the server, wherein the terminal device carries shooting time of the image information when sending the image information to the server, so that the server can obtain shooting time corresponding to the image information.
Based on this, in one specific implementation, before the server acquires image information carrying a storage object based on the lock information, the method includes:
after the terminal equipment receives the locking certificate, starting an imaging module to shoot an image of a management end through the imaging model, wherein the image carries the storage object;
and recording the shooting time corresponding to the image, and sending the image and the shooting time as image information to a server so that the server receives the image information.
Specifically, the imaging module may be a terminal device, an external imaging module (for example, a digital camera) connected to the terminal device, or a program module configured by the management terminal itself. In addition, the imaging module is used for shooting images of the management end, wherein when the imaging module shoots the images, the storage object locked on the management end is located in the shooting range of the imaging module, so that the imaging module can shoot the images carried by the storage object.
In one implementation manner of this embodiment, the image information is an image captured by the terminal device, and the capture time of the image information is later than the receiving time of the locking certificate. It can be understood that the precondition for the terminal device to capture the image information is that the terminal device receives the lock voucher sent by the management end, so that the time for the terminal device to send the lock information to the server is earlier than the time for the terminal device to capture the image information, in other words, the lock information is the precondition for the server to obtain the image information, the server will receive the image information after obtaining the lock information, and the capture time corresponding to the image information needs to be later than the time for receiving the lock information, and by limiting the sequence of the capture time of the image and the time for receiving the lock information, the conformity between the image information and the real situation can be ensured, and the security of the management of the storage object can be further improved. In addition, in practical applications, after the lock information is received, if the time interval between the acquisition time of the image information or the acquisition time of the image information and the receiving time of the lock information is greater than a preset threshold, it is determined that the storage object is failed to return, and at this time, prompt information is generated. The prompt information can be sent to the terminal equipment of the contact corresponding to the management terminal, and meanwhile, an acousto-optic prompt can be generated to prompt the previous image information of the borrowed and custody object and the like.
And S30, when the image information is acquired, the server judges that the storage object is successfully returned.
Specifically, the fact that the storage object has been restored indicates that the storage object is locked in the management side, that is, the image information is used to prove that the storage object is locked in the management side. In order to improve the security of the storage objects, after the image information is acquired, the storage object images included in the image information may be identified to determine whether the storage objects corresponding to the management terminal are the same as the storage objects carried by the storage object images. Accordingly, in an implementation manner of this embodiment, the determining, by the server, that the custody object is successfully returned when the image information is acquired specifically includes:
when the image information is acquired, identifying storage object information corresponding to the image information;
comparing the storage object information with target storage object information corresponding to the management terminal;
if the storage object information is the same as the target storage object information, it is determined that the storage object is successfully returned.
Specifically, the target storage object is a storage object corresponding to the management terminal, and is used for verifying whether a storage object image corresponding to the image information is the same as the target storage object. Therefore, after the image information is acquired, the storage object image corresponding to the image information can be identified, and the storage object information identified is compared with the target storage object information corresponding to the management terminal so as to determine whether the storage object information identified is the same as the target storage object information; if the storage object information is the same as the target storage object information, determining that the storage object is successfully returned; if the storage object information is different from the target storage object information, it is determined that the storage object return has failed.
Further, when the image information is acquired, the server receives a management terminal image based on the image information, wherein a storage box and a box door in the management terminal image are in a locked state; and when the management side image is received, judging that the storage object is successfully returned. The shooting time of the management side image is later than the shooting time corresponding to the image information, and the time interval between the shooting time of the management side image and the shooting time corresponding to the image information is smaller than a preset time interval, such as 2 minutes, 3 minutes and the like. Further, the server, after acquiring the box image and the image information, may store the box image (for proof of locking as a box) and the image information (for proof of locking as a storage object in a box), and may associate the image information with the user information of the box image corresponding to the terminal device, respectively, to determine the user information of the storage object to be restored. Thus, the server, when acquiring the image information, after determining that the custody object is successfully returned, includes: and the server side acquires user information corresponding to the image information and associates the user information with the image information. Of course, after the server determines that the custody object is unsuccessfully returned, the server records the user information corresponding to the terminal device, and sends the user information to the contact person corresponding to the management terminal.
Based on this, in one implementation of the present embodiment; when the server determines that the custody object is successfully returned when the image information is acquired, the method further includes: and the server side issues a locking instruction to the management side, wherein the locking instruction is used for controlling the box door of the storage box to be configured with a closed state and an open state. And before receiving the locking instruction, the door of the storage box is configured with an opening state. Of course, it should be noted that the open state of the door of the storage box means that the door cannot be switched from the open state to the locked state.
Based on the above-mentioned unattended operation management method, the present embodiment provides a computer-readable storage medium storing one or more programs, which are executable by one or more processors to implement the steps in the unattended operation management method according to the above-mentioned embodiment.
Based on the above unattended management method, the present embodiment provides an unattended management system, as shown in fig. 3, the management system includes that the unattended management system includes a management end 100 and a service end 300; the server 300 is configured to receive the locking information transmitted from the management side when the managed object is fixed in the management side; acquiring image information carrying a custody object based on the lock information, and determining that the custody object is successfully returned when the image information is acquired.
Further, the management end 100 is configured to connect with the terminal device 200, send a locking credential to the terminal device, and control the terminal device to send locking information to the server based on the locking credential, so that the server receives the locking information.
In addition, the specific processes loaded and executed by the instruction processors in the storage medium and the working processes of the devices in the unattended management system are described in detail in the method, and are not stated herein.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (8)
1. The unattended management method is characterized by being applied to an unattended management system, wherein the unattended management system comprises a management end and a service end; the method comprises the following steps:
when the storage object is fixed in the management terminal, the server receives the locking information sent by the management terminal;
the server acquires image information carrying a storage object based on the locking information;
and when the image information is acquired, the server judges that the storage object is successfully returned.
2. The unattended management method according to claim 1, wherein the image information is acquired later than a reception time of the lock information.
3. The unattended management method according to claim 1, wherein before the server receives the lock information sent by the manager, the method comprises:
when the storage object is fixed in the management terminal, the management terminal sends a locking certificate to a terminal device, wherein the terminal device is connected with the management terminal;
and controlling the terminal equipment to send locking information to a server based on the locking certificate so that the server receives the locking information.
4. The unattended management method according to claim 3, wherein the image information is an image captured by the terminal device, wherein the image information is captured later than a reception time when the lock voucher is received.
5. The unattended management method according to claim 1, wherein the step of, when the image information is acquired, after the server side determines that the custody object is successfully returned, comprises:
and the server side acquires user information corresponding to the image information and associates the user information with the image information.
6. The unattended management method according to claim 1, wherein the step of determining, by the server, that the custody object is successfully returned when the image information is acquired specifically includes:
when the image information is acquired, identifying storage object information corresponding to the image information;
comparing the storage object information with target storage object information corresponding to the management terminal;
if the storage object information is the same as the target storage object information, it is determined that the storage object is successfully returned.
7. An unattended management system is characterized in that the unattended management system comprises a management end and a service end; the server is used for receiving locking information sent by the management terminal when the storage object is fixed in the management terminal; acquiring image information carrying a custody object based on the lock information, and determining that the custody object is successfully returned when the image information is acquired.
8. The unattended management system according to claim 7, wherein the management terminal is configured to connect to a terminal device, send a locking credential to the terminal device, and control the terminal device to send locking information to the server terminal based on the locking credential, so that the server terminal receives the locking information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010360443.7A CN111583542A (en) | 2020-04-30 | 2020-04-30 | Unattended management method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010360443.7A CN111583542A (en) | 2020-04-30 | 2020-04-30 | Unattended management method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111583542A true CN111583542A (en) | 2020-08-25 |
Family
ID=72113247
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010360443.7A Pending CN111583542A (en) | 2020-04-30 | 2020-04-30 | Unattended management method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111583542A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001338269A (en) * | 1992-07-06 | 2001-12-07 | Shimizu Corp | Card reader |
US20050185289A1 (en) * | 2004-02-23 | 2005-08-25 | Fujinon Corporation | Lens barrel and image taking apparatus |
CN101826226A (en) * | 2010-04-30 | 2010-09-08 | 中山大学 | Intelligent entrance guard control method and device |
JP2011087016A (en) * | 2009-10-13 | 2011-04-28 | Panasonic Electric Works Co Ltd | Location management system |
CN103456065A (en) * | 2013-09-27 | 2013-12-18 | 李冬 | Unattended key management method |
CN105882602A (en) * | 2015-10-23 | 2016-08-24 | 乐卡汽车智能科技(北京)有限公司 | Method and device for monitoring vehicle key, and vehicle |
US20190049995A1 (en) * | 2017-07-28 | 2019-02-14 | Nuro, Inc. | Autonomous robot vehicle with securable compartments |
CN110675287A (en) * | 2019-10-12 | 2020-01-10 | 南京我爱我家信息科技有限公司 | Real estate industry house key management system and method |
-
2020
- 2020-04-30 CN CN202010360443.7A patent/CN111583542A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001338269A (en) * | 1992-07-06 | 2001-12-07 | Shimizu Corp | Card reader |
US20050185289A1 (en) * | 2004-02-23 | 2005-08-25 | Fujinon Corporation | Lens barrel and image taking apparatus |
JP2011087016A (en) * | 2009-10-13 | 2011-04-28 | Panasonic Electric Works Co Ltd | Location management system |
CN101826226A (en) * | 2010-04-30 | 2010-09-08 | 中山大学 | Intelligent entrance guard control method and device |
CN103456065A (en) * | 2013-09-27 | 2013-12-18 | 李冬 | Unattended key management method |
CN105882602A (en) * | 2015-10-23 | 2016-08-24 | 乐卡汽车智能科技(北京)有限公司 | Method and device for monitoring vehicle key, and vehicle |
US20190049995A1 (en) * | 2017-07-28 | 2019-02-14 | Nuro, Inc. | Autonomous robot vehicle with securable compartments |
CN110675287A (en) * | 2019-10-12 | 2020-01-10 | 南京我爱我家信息科技有限公司 | Real estate industry house key management system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8553883B2 (en) | Method and apparatus for managing subscription credentials in a wireless communication device | |
US9070279B2 (en) | Electronic key registration system | |
CN110546670A (en) | sharing system | |
US20110028126A1 (en) | System for managing unregistered terminals with shared authentication information and method thereof | |
US10321319B2 (en) | Securing access to vehicles | |
CN110300953A (en) | Vehicle-mounted more new system, vehicle-mounted updating device, mobile unit and update method | |
US9271151B2 (en) | Fingerprinting a mobile device through near field communication | |
US12134367B2 (en) | Locking and unlocking system for a vehicle based on a valid period of authentication | |
CN109255873A (en) | Bluetooth method for unlocking, apparatus and system | |
CN110176091A (en) | A method of smart lock safety is improved by mobile terminal device code | |
CN105898733A (en) | Machine changing method and device based on eSIM card, mobile terminal and server | |
US20120225641A1 (en) | Method, device and system for updating security algorithm of mobile terminal | |
CN112911207A (en) | Calling method and intelligent talkback system | |
EP4057661A1 (en) | System, module, circuitry and method | |
US20230370840A1 (en) | Method, ue, and network entity for handling synchronization of security key in wireless network | |
CN111583542A (en) | Unattended management method and system | |
US20190279154A1 (en) | Server device and delivery system | |
CN105025548A (en) | Connection control method and connection control device for SIM (Subscriber Identity Module) card | |
CN111038444A (en) | Communication method of PEPS system | |
CN105825144A (en) | Intelligent account and password storage device and method based on cloud storage | |
KR101927336B1 (en) | APPARATUS AND METHOD FOR IDENTIFY TERMINAL DEVICE USER and FALSIFICATION OR TEMPERING | |
CN103843378A (en) | Method for binding secure device to a wireless phone | |
CN109698876B (en) | Monitoring method of mobile phone intelligent lock | |
CN114554462A (en) | Networking method, networking device, electronic device and storage medium | |
KR100982575B1 (en) | Apparatus and Method for Changing Sim Lock Information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200825 |