[go: up one dir, main page]

CN114139021A - A kind of index information management method and system - Google Patents

A kind of index information management method and system Download PDF

Info

Publication number
CN114139021A
CN114139021A CN202210100036.1A CN202210100036A CN114139021A CN 114139021 A CN114139021 A CN 114139021A CN 202210100036 A CN202210100036 A CN 202210100036A CN 114139021 A CN114139021 A CN 114139021A
Authority
CN
China
Prior art keywords
information
item
user
access
index
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210100036.1A
Other languages
Chinese (zh)
Other versions
CN114139021B (en
Inventor
易奇
陈彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunding Network Technology Beijing Co Ltd
Original Assignee
Yunding Network Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunding Network Technology Beijing Co Ltd filed Critical Yunding Network Technology Beijing Co Ltd
Priority to CN202210100036.1A priority Critical patent/CN114139021B/en
Priority to CN202210575045.6A priority patent/CN114861007A/en
Priority to CN202210575220.1A priority patent/CN114861008A/en
Publication of CN114139021A publication Critical patent/CN114139021A/en
Priority to PCT/CN2022/096621 priority patent/WO2022253274A1/en
Application granted granted Critical
Publication of CN114139021B publication Critical patent/CN114139021B/en
Priority to PCT/CN2022/104406 priority patent/WO2023280273A1/en
Priority to CN202280048533.XA priority patent/CN117730524A/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computational Linguistics (AREA)
  • Software Systems (AREA)
  • Lock And Its Accessories (AREA)
  • Storage Device Security (AREA)

Abstract

本申请实施例公开了一种索引信息管理方法和系统。该方法的一具体实施方式包括:获取用户访问物品管理区域的请求;基于所述访问请求,对所述用户的身份进行安全验证,并生成访问信息,所述物品管理区域为可闭合空间;获取受信用户访问期间所述物品管理区域的物品信息和/或所述物品的存取信息;基于所述物品信息和/或所述物品的存取信息,确定索引信息,所述索引信息至少还基于所述访问信息确定。该实施方式实现了储物装置的物品信息识别及物品信息记录、管理及查询。

Figure 202210100036

The embodiments of the present application disclose an index information management method and system. A specific implementation of the method includes: acquiring a user's request for accessing an item management area; based on the access request, performing security verification on the user's identity, and generating access information, the item management area is a closable space; acquiring Item information of the item management area and/or access information of the item during the visit of the trusted user; index information is determined based on the item information and/or the access information of the item, and the index information is at least further based on The access information is determined. This embodiment realizes the item information identification and item information recording, management and query of the storage device.

Figure 202210100036

Description

Index information management method and system
Technical Field
The present disclosure relates to the field of information identification processing and query, and in particular, to a method and system for managing index information.
Background
With the rapid development of the fields of e-commerce, smart home and the like, the storage/storage application scenes in production and life are increased, and the requirement of an applicator on index information management under the corresponding scene is increased day by day. For example, in a multi-user application scenario of an intelligent warehouse, if the information management system of the intelligent warehouse mainly performs comprehensive recording and management on the types and the quantities of articles entering and exiting the warehouse, it is difficult for a user to intuitively manage and inquire article information of the user or other users through the index information management system, and it is difficult to backtrack the historical entry and exit conditions of a specific user or article. Therefore, there is a need for an index information management method and system that can be used to identify, process and query item information.
Disclosure of Invention
The embodiment of the application provides an index information management method and system.
In a first aspect, an embodiment of the present application provides an index information management method, including: acquiring a request of a user for accessing an article management area; based on the access request, carrying out security verification on the identity of the user and generating access information, wherein the article management area is a closable space; acquiring article information and/or article access information of the article management area during access of a trusted user; determining index information based on the item information and/or access information of the item, the index information being determined based at least also on the access information.
In some embodiments, said determining, based on said item information and/or access information of said item, index information, said index information being determined based at least further on said access information comprises: when the created index information is not detected, the index information is created based on the article information and/or the access information of the article, and the index information is at least created based on the access information and a preset rule.
In some embodiments, the determining, based on the item information and/or access information for the item, index information further comprises, based at least on the access information determination: upon detecting the created index information, updating the index information based on the item information and/or access information of the item, the index information being updated based at least also on the access information.
In some embodiments, the method further comprises: and performing query display based on the index information.
In some embodiments, said obtaining item information and/or item access information for said item management area during said trusted user access comprises: acquiring detection information of the article management area; based on the detection information, the item information and/or the access information of the item is determined.
In some embodiments, the item information includes at least an attribute of the item and/or a value of the item.
In some embodiments, the detection information is acquired by a sensor including at least one of an image sensor, a laser sensor, an infrared sensor, an ultrasonic sensor, and a pressure sensor.
In some embodiments, before the determining index information based on the item information and/or access information of the item, the method further comprises: determining ownership information of the item based at least on the access information and/or the probe information.
In some embodiments, said determining ownership information of the item based at least on said access information and/or said probe information further comprises: and determining ownership information of the stored article based on the access information and the detection information.
In some embodiments, said determining ownership information of the item based at least on said access information and/or said probe information further comprises: acquiring historical ownership information of the articles in the article management area; and determining the ownership information of the taken-out article based on the detection information and the historical ownership information.
In some embodiments, the index information is also determined based on the ownership information.
In some embodiments, the access request carries user information corresponding to an identity of the user; the securely verifying the identity of the user comprises: and judging whether the user is a trusted user or not based on the user information of the user, and sending alarm information when the judgment result is negative.
In a second aspect, an embodiment of the present application provides an index information management system, which includes a security module and a management module. The security module is configured to: acquiring a request of a user for accessing an article management area; and based on the access request, carrying out safety verification on the identity of the user and generating access information, wherein the article management area is a closable space. The management module is configured to: acquiring article information of the article management area and/or access information of the article during access of a trusted user; determining index information based on the item information and/or access information of the item, the index information being determined based at least also on the access information.
In a third aspect, an embodiment of the present application provides an intelligent storage device, including: the input module receives a user instruction; a lock body; and a processor performing the operations of: acquiring a request of the user for accessing an article management area, which is received by an input module; based on the access request of the user, carrying out safety verification on the identity of the user, controlling the lock body to execute unlocking operation so as to allow a trusted user to access an article management area, and generating access information, wherein the article management area is a closable space; acquiring article information of the article management area and/or access information of the article during the access of the trusted user; determining index information based on the item information and/or access information of the item, the index information being determined based at least also on the access information.
In a fourth aspect, the present application provides a computer-readable medium, on which a computer program is stored, where the program, when executed by a processor, implements the method as described in any implementation manner of the first aspect.
In a fifth aspect, an embodiment of the present application provides a processor, where the processor is configured to execute a program, where the program when executed implements the method described in any implementation manner of the first aspect.
In a sixth aspect, an embodiment of the present application provides an electronic device, including: one or more processors;
a storage device having one or more programs stored thereon; the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method described in any of the implementations of the first aspect.
According to the index information management method and system, safety verification is carried out after the access request of the user is responded, comprehensive statistics is carried out on the access information of the user and the article information in the article management area, and indexes are established, so that the problems of intelligent control of the article management area and management and query of the article information are solved, and the application scene of the storage device in home life and office places is expanded.
Drawings
The present description will be further explained by way of exemplary embodiments, which will be described in detail by way of the accompanying drawings. These embodiments are not intended to be limiting, and in these embodiments like numerals are used to indicate like structures, wherein:
FIG. 1 is a schematic diagram of an application scenario of an exemplary index information management system according to some embodiments of the present application;
FIG. 2 is a block diagram of an exemplary index information management apparatus according to some embodiments of the present application;
FIG. 3 is a block diagram of an exemplary index information management system shown in accordance with some embodiments of the present application;
FIG. 4 is a block diagram of another exemplary index information management system, shown in accordance with some embodiments of the present application;
FIG. 5 is an exemplary flow diagram illustrating index information management according to some embodiments of the present application;
FIG. 6 is an exemplary flow chart of authentication steps shown in accordance with some embodiments of the present application;
fig. 7 is an exemplary application scenario diagram of an index information management system according to some embodiments of the present application.
Detailed Description
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings used in the description of the embodiments will be briefly described below. It is obvious that the drawings in the following description are only examples or embodiments of the present description, and that for a person skilled in the art, the present description can also be applied to other similar scenarios on the basis of these drawings without inventive effort. Unless otherwise apparent from the context, or otherwise indicated, like reference numbers in the figures refer to the same structure or operation.
It should be understood that "system", "apparatus", "unit" and/or "module" as used herein is a method for distinguishing different components, elements, parts, portions or assemblies at different levels. However, other words may be substituted by other expressions if they accomplish the same purpose.
As used in this specification and the appended claims, the terms "a," "an," "the," and/or "the" are not intended to be inclusive in the singular, but rather are intended to be inclusive in the plural, unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that steps and elements are included which are explicitly identified, that the steps and elements do not form an exclusive list, and that a method or apparatus may include other steps or elements.
Flow charts are used in this description to illustrate operations performed by a system according to embodiments of the present description. It should be understood that the preceding or following operations are not necessarily performed in the exact order in which they are performed. Rather, the various steps may be processed in reverse order or simultaneously. Meanwhile, other operations may be added to the processes, or a certain step or several steps of operations may be removed from the processes.
The embodiment of the application relates to an index information management method and system. In some embodiments, the method and system may be applied to device control of article storage devices including, but not limited to, safes, safe deposit boxes, jewel cases, smart cases, and the like, and management of access to article information. In some embodiments, the method and system can also be applied to the control of intelligent warehouses and the management of access to article information. In some embodiments, the method and system can be applied to control of safe deposit boxes used by a single person or a plurality of persons in a family use scene, information management of stored private articles and the like. In some embodiments, the method and the system can be applied to information management and the like of public articles controlled and accessed by a storage cabinet used by a single person or a plurality of persons in an office use scene. By the method and the system, the following steps can be realized: the method comprises the following steps of performing one or more functions of safety authentication on a user, identifying and accessing an article, establishing an index of information of the user and the article and the like. The index information management method and the index information management system can achieve one or more beneficial effects of intelligent control of the article storage device, efficient management and query of article information, improvement of safety and convenience of use of the article storage device, adaptation to more use scenes and the like.
Fig. 1 is a schematic diagram of an application scenario of an exemplary index information management system according to some embodiments of the present application. As shown in fig. 1, the index information management system 100 may include a server 110, a network 120, an intelligent storage device 130, a user terminal 140, and a storage apparatus 150.
The index information management system 100 may perform security verification on a user who accesses the article management area of the intelligent storage device 130, and perform corresponding operations according to the verification result. For example, after confirming that the user is a trusted user, the user may open the storage device or perform other operations.
The index information management system 100 may acquire item information within the smart storage device 130 and identify an item based on the item information. For example, an attribute of the item is determined and the item is classified according to the attribute of the item.
The index information management system 100 may provide services for trusted users. For example, a trusted user is provided with a service to access an item management area, or an item query service.
Server 110 may be used to process information and/or data related to index information management. For example, the server 110 may process the user information acquired by the smart storage device 130 and complete security verification of the user according to the user information. For another example, the server 110 may process the detection information related to the article obtained from the smart storage device 130 and determine the article information based on the detection information. Also for example, the server 110 may identify a service request of a trusted user and provide a service to the trusted user based on the service request.
The server 110 may be hardware or software. For example, the server 110 may be a hardware device provided on the smart storage device 130 to provide a data processing function. As another example, the server 110 may be software that causes the gateway to implement data processing functions.
In some embodiments, server 110 may include a processor 112, and processor 112 may process data, information, and/or processing results obtained from other devices or system components and execute program instructions based on the data, information, and/or processing results to perform one or more of the functions described herein.
The network 120 may be used to provide a conduit for information exchange. In some embodiments, information may be exchanged between the server 110, the smart storage device 130, the user terminal 140, and the storage device 150 via the network 120. For example, the trusted user is communicatively connected to the server 110 via the user terminal 140 through the network 120 to obtain the information related to the items in the intelligent storage device 130 stored in the storage device 150.
In some embodiments, network 120 may include one or more network access points. For example, the network 120 may include wired or wireless network access points, e.g., base stations and/or network switching points 120-1, 120-2, etc.
The smart storage device 130 may be used to provide a closeable item management area to store items and to obtain information and/or data related to items. In some embodiments, the smart storage device 130 may obtain user information. For example, the user information is acquired by one or more of a fingerprint, an iris, face recognition, a digital password, and the like. In some embodiments, the smart storage device 130 may obtain information about items within the item management area. For example, the article information is acquired by one or more devices of a laser sensor, an infrared sensor, an ultrasonic sensor, a pressure sensor, and the like that are provided.
The user may use the services provided by the system 100 through the user terminal 140. For example, the trusted user may send a query request through the user terminal 140 to query the items in the item management area of the intelligent storage device 130. For another example, the intelligent storage device 130 may send an alarm to the user through the user terminal 140 to alert the user that the stored articles are in an unsafe state.
In some embodiments, the user terminal 140 may include one or any combination of a smartphone 140-1, a tablet computer 140-2, a laptop computer 140-3, etc., or other device having input and/or output capabilities. In some embodiments, the user terminal 140 may be a display terminal having a display function for displaying the item information. In some embodiments, a user may manipulate the components of system 100 based on user terminal 140.
Storage device 150 may be used to store data and/or instructions. For example, the storage device 150 may store item information for an item management area of the smart storage device 130. As another example, the storage device 150 may store information for reference items.
Fig. 2 is a block diagram of an exemplary smart storage device 200 according to some embodiments of the present application. As shown in fig. 2, the smart storage device 200 includes an input module 210, a detection module 220, a lock body 230, and a processor 112. The smart storage device 200 may provide an item management area, which is a closable space, and the opening and closing of the item management area is controlled by the lock 230. It should be noted that the modules and units mentioned in the present application can be implemented by hardware, software or a combination of software and hardware. The hardware implementation may include a circuit or a structure formed by solid components; the implementation of software may include storing operations corresponding to the modules, units in a memory in the form of codes, which are executed by appropriate hardware, such as a microprocessor. When a module or a unit mentioned herein performs its operation, if not specifically stated, it may mean that software code including the function is executed or that hardware having the function is used. Meanwhile, when the modules and units mentioned herein correspond to hardware, the structures of the corresponding hardware are not limited, and the hardware capable of implementing the functions of the modules and units is within the scope of the present application. For example, different modules and units mentioned in this document may correspond to the same hardware structure. Also for example, the same module or unit referred to herein may correspond to a plurality of separate hardware configurations.
The input module 210 is configured to receive a user instruction. For example only, the user instructions may include a request to access an item management area, and the user instructions may also include a query request, a setup request, an administration request, and the like. In some embodiments, the input module 210 includes a device such as a keyboard, mouse, touch screen, microphone, etc., which may be used to receive user instructions. For example only, the user presses a key of a keyboard, clicks a touch screen, or sends a voice message indicating a wake-up, so that the input module 210 receives a wake-up command. The input module is further configured to collect user information. In some embodiments, the input module includes a device for collecting user information, such as a fingerprint collection device, a finger vein collection device, a palm print collection device, an iris scan device, an image collection device (e.g., camera, video camera), a retina scan device, an image collection device, a microphone, a password input device, and the like. For example only, the input module 210 obtains face information and fingerprint information of the user through a camera and a fingerprint acquisition device.
The detection module 220 is configured to acquire detection information of items within the item management area of the smart storage device 200. In some embodiments, the detection module 220 includes sensors, such as image capture devices, laser sensors, infrared sensors, ultrasonic sensors, pressure sensors, etc., that can be used to obtain detection information. For example only, the detection module 220 acquires image signal data of the article through an image acquisition device, infrared signal data of the article through an infrared sensor, and pressure signal data of the article through a pressure sensor. In some embodiments, the detection module 220 is further configured to acquire status information of the lock body 230. The state information of the smart storage device 200 is used to indicate the working state (e.g., the unlocked state, the locked state) of the lock body 230. In some embodiments, the detection module 220 further includes a sensor for acquiring status information of the lock body 230, such as a pressure sensor, a contact sensor, a hall sensor, etc. mounted on the lock body 230.
The lock body 230 is configured to perform an unlocking operation based on the control signal issued by the processor 112. For example only, the processor 112 sends an unlock control signal to the lock body 230 based on an access request by a trusted user; in response to receiving the unlock control signal, the lock body 230 performs an unlock operation to allow a trusted user to access the article management area. In some embodiments, the lock body 230 is further configured to perform a lock-off operation based on a control signal issued by the processor 112. For example only, the processor 112 determines that the lock body 230 is in the unlocked state and the unlocked state exceeds a predetermined time (e.g., 10 minutes, 15 minutes, or 20 minutes) based on the state information of the lock body 230 acquired by the detection module 220, and the processor 112 sends a locking control signal to the lock body 230; in response to receiving the locking control signal, the lock body 230 performs a locking operation to close the article management area.
The processor 112 is configured to process information and/or data in the index information management process, including obtaining an access request of a user; based on the access request, the identity of the user is safely verified, the lock body 230 is controlled to perform unlocking operation to allow the trusted user to access the article management area, and access information is generated; acquiring article information and/or article access information of an article management area during access of a trusted user; index information is determined based on the item information and/or access information for the item, the index information being determined based at least further on the access information. For details of information and/or data in the process of processing the index information by the processor 112, reference may be made to other parts of the present application, such as fig. 3 and fig. 4 and the description thereof, and details are not repeated here.
In some embodiments, the smart storage device 200 may also include a positioning module 240. The positioning module 240 is configured to obtain location information of the smart storage device 200. In some embodiments, the positioning module 240 includes a positioning device for acquiring the position information, such as a GPS positioning device, a beidou positioning device, a GPS beidou dual-mode positioning device, and the like.
In some embodiments, the smart storage device 200 may also include an output module 250. The output module 250 is configured to output a signal to the outside based on a control signal of the processor 112, such as displaying index information to a user, or issuing alarm information indicating that security authentication is not passed to the user, or the like. In some embodiments, the output module 250 includes a device for outputting a visual signal, such as a display. In some embodiments, output module 250 includes a device for outputting audio signals, such as a speaker.
Fig. 3 is a block diagram of an exemplary index information management system 300, shown in accordance with some embodiments of the present application. As shown in fig. 3, system 300 includes a security module 310 and a management module 320. In some embodiments, the security module 310 and the management module 320 may be implemented on the server 110 or the smart storage device 200, such as the processor 112.
The security module 310 is configured to obtain a user request to access an item management area. In some embodiments, the security module 310 may obtain the user's access request by communicating with the input module 210 of the smart storage device 200, or the security module 310 may obtain the user's access request by communicating with the user terminal 140.
The security module 310 is further configured to securely verify the identity of the user based on the user's access request to allow a trusted user to access an item management area, which is a closable space, and to generate access information. Access information refers to a set of information associated with an access request. By way of example only, the access information may include, but is not limited to, a user identification (e.g., a user ID, a user name, a user avatar, etc.), an access event, an access time (e.g., an unlock time, a lock time), and the like. In some embodiments, the security module 310 performs an unlocking operation by controlling the lock body 230 of the smart storage device 200 to allow a trusted user to access the item management area of the smart storage device 200.
In some embodiments, the security module 310 includes a user authentication sub-module 411. In some embodiments, the access request carries user information corresponding to the user identity, and the user authentication sub-module is configured to determine whether the user is a trusted user based on the user information of the user, and issue an alarm message when the determination result is negative. As used herein, the term "trusted user" refers to a user that has access to the item management area of smart storage device 200. There may be one or more trusted users. For example, a user may set and enter user information of the user during accessing the smart storage device 200 in an initialization state (e.g., a state in which the smart storage device 200 is first used, a state in which data is reset, and a state in which data is lost), and the processor 112 determines that the user is a trusted user based on the user setting, so that the user obtains access rights. As another example, a trusted user may set and enter user information for other users during access to smart storage device 200 to obtain access rights for the other users, which processor 112 determines to be trusted users based on the user settings.
In some embodiments, the user verification sub-module is further configured to compare the user information of the user who issued the access request with the preset trusted user, and determine whether the user is a trusted user based on the comparison result. As used herein, the term "user information" refers to a collection of information that can be used to indicate the identity of a user. In some embodiments, the user information of the preset trusted user is pre-entered and stored in the storage device 150, and the user authentication sub-module may call the user information of the preset trusted user stored in the storage device 150. In some embodiments, the user information may include one or more of fingerprint information, finger vein information, palm print information, iris information, retina information, face information, voice print information, digital password information.
In some embodiments, the user authentication sub-module is further configured to issue an alarm message when the determination result is negative. In particular, alert information issued in response to determining that a user is not a trusted user may be used to alert an untrusted user of access behavior. In some embodiments, the alarm information may include local alarm information and remote alarm information, and the alarm information may be emitted in the form of at least one of a voice signal, a vibration signal, and a text signal. In some embodiments, the local alarm message is issued via the output module 250 of the smart storage device 200. For example, the image information of the untrusted user may be acquired by the image acquisition apparatus of the input module 210 through the display of the output module 250 displaying the image information of the untrusted user and displaying the text information that the access request of the untrusted user has been denied. In some embodiments, the remote alert message is issued through an output device of the user terminal 140 of the trusted user. For example, the user terminal 140 receives a remote alarm message, displays an image message of the untrusted user through the display, and broadcasts a voice message indicating that the untrusted user accessing event occurs to the smart storage device 200 through the speaker.
Through the safety verification of the user verification sub-module and the warning of the access behavior of the untrusted user, the access behavior of the untrusted user can be interfered, and the trusted user is given a safety prompt to ensure the storage safety of the goods.
The management module 320 is configured to obtain item identification information of the item management area during access by the trusted user, the item identification information including item information and/or access information of the item; based on the item identification information, index information is determined, the index information being further determined based at least on the access information. The index information is used at least to indicate access information for items of the trusted user during the access. As used herein, the term "access period" refers to the period of time from the beginning of execution of an access request to the end of execution of the access request. For example only, the access period may be a period of time from when the lock body 230 of the smart storage device 200 performs an unlocking operation until the lock body 230 is locked.
In some embodiments, the management module 320 further includes an identification sub-module 321. The identifying sub-module 321 is configured to acquire the probe information acquired by the probe module 220; based on the detection information obtained by the detection module 220, item identification information for the item management area during trusted user access is determined. In some embodiments, the item identification information includes item information, such as an attribute (type, material, etc.) and value of the item. In some embodiments, the item identification information includes access information for the item, such as access status and access time for the item.
In some embodiments, the identification submodule 321 may include an access determination unit; the access determination unit is configured to determine access information of the item based on the probe information. The access information of the articles is used to indicate the access conditions of the articles, including access conditions of all articles that are accessed or not accessed in the article management area of the intelligent storage device 200 during the access period. In some embodiments, the access status may include in, out, and inherent. Here, the intrinsic state refers to a state in which the article is stored in the intelligent storage device 200 before the access request is executed (i.e., before the article management area is opened), and is not taken out after the access request is executed (i.e., after the article management area is closed).
The change displayed by the chronological arrangement of the detection information can be used for indicating the access state of the article. In some embodiments, the access determination unit may determine the access status of the item based on a change in the detection information. For example, the access status of the item may be determined by analyzing changes in the pressure sensing data (e.g., an increase in pressure indicates that the item is deposited). For another example, the access state of the article can be determined by comparing the image data at the unlocking time point and the locking time point of the intelligent storage device 200.
In some embodiments, the access determination unit is further configured to determine an item access time based on the detection information, such as a data change time stamp of the pressure sensing data may be taken as a deposit time or a withdrawal time of the item.
In some embodiments, the identify sub-module 321 may include an attribute determination unit; the attribute determination unit is configured to determine an attribute of the item based on the detection information. As used herein, the term "attribute of an article" refers to a set of features inherent to the article itself. By way of example only, the attributes of the item may include, but are not limited to, the type, specification, material, etc. of the item. The types of the articles can include, but are not limited to, jewelry, currency, certificate files, calligraphy and painting works and art works and the like; the specifications of the article may include, but are not limited to, weight, volume, size, color, etc.; the material of the article may include, but is not limited to, metal, gem stone, paper, textile, etc.
In some embodiments, the attribute determination unit may determine the type of the item based on the detection data. For example, the type of the article may be identified by the AI identification model using image data or laser scan data. In some embodiments, the attribute determination unit may determine a material of the item based on the detection data. For example, for jewelry items, infrared sensing data can be used to determine the material of the item by infrared spectroscopy. In some embodiments, the attribute determination unit may determine a specification of the item based on the detection data. For example, the weight of the item may be determined through analytical calculations using the pressure sensing data.
In some embodiments, the attribute determination unit is further configured to determine an item attribute of the item through a multidata fusion algorithm based on the detection information. The multiple data fusion integrates incomplete information about the attributes of the same article provided by multiple sensors to form relatively complete and consistent perception descriptions, thereby realizing more accurate recognition and judgment functions. The accuracy and efficiency of article attribute identification can be improved by determining the article attributes through a multi-data fusion algorithm.
In some embodiments, the identifying sub-module 321 further comprises a value determining unit. In some embodiments, the value determination unit is configured to determine a value of the deposited item based on the detection information. The value of an item generally refers to the market value of the item. In some embodiments, the value determination unit may retrieve a reference item matching the deposited item based on the detection information, and determine the value of the deposited item based on the value of the reference item. In some embodiments, the value determination unit may also determine the value of the deposited item based on user input.
For details of determining the access status of the item, determining the attribute of the item, and determining the value of the deposited item, reference may be made to other parts of the present application, such as step 530 in fig. 5 and the description thereof, which are not repeated herein.
The identification submodule determines the article information, the access state and the access time of the article by quickly identifying the article, and provides a basis for realizing the comprehensive management and the quick query of the article information.
In some embodiments, management module 320 further includes an index sub-module 322; the indexing sub-module 322 is configured to determine indexing information based at least on the item identification information and the access information. The article identification information comprises article information and/or article access information.
In some embodiments, the indexing submodule 322 further includes an index generation unit; the index generation unit is configured to create index information based on at least the access information, the item identification information, and a preset rule when the created index information is not detected. Wherein the created index information may be stored in the storage device 150. As used herein, the term "preset rules" refers to rules for creating, querying, and displaying index information. For the intelligent storage device 200 in the initialized state, if the index sub-module 322 does not detect the created index information (e.g., the index information is not created, the created index information is lost, or the created index information is reset), the index generation unit may create the index information. In some embodiments, the index generation unit may create the index information based on a management request of the trusted user to create the index information. In some embodiments, the index generation unit may automatically create the index information after the lock body 230 enters the lock state from the unlock state.
In some embodiments, the index submodule 322 further includes an index update unit; the index updating unit is configured to update the index information based on at least the access information and the item identification information when the created index information is detected. For the intelligent storage device 200 that has created the index information, after the lock body 230 enters the locked state (i.e., the article management area is closed), the index updating unit may call and update the index information stored in the storage device 150.
In some embodiments, the indexing sub-module 322 further includes a query display unit; the query display unit is configured to perform query display based on the index information. In some embodiments, the query display unit is further configured to determine, based on the query request of the trusted user, index information corresponding to the query request, and display the index information corresponding to the query request. In some embodiments, the query display unit may be used for local query display. For example, the query display unit may acquire the query request received by the input module 210 and display index information corresponding to the query request through the display of the output module 250. In some embodiments, the query display unit may be used for remote query display. For example, the query display unit may obtain a query request issued by the user terminal 140, and the query display unit transmits index information corresponding to the query request to the user terminal 140 and displays the index information through a display of the user terminal 140.
For specific contents of creating the index information, updating the index information, and performing query display based on the index information, reference may be made to other parts of the present application, such as step 540 in fig. 5 and the description thereof, which are not described herein again.
The indexing submodule enables a user to quickly know the current trend and the historical trend of the article through index information inquiry by establishing index information of the associated user and the article, enables the user to comprehensively know the article use condition of other trusted users of the intelligent storage device, and facilitates overall management of the article.
Fig. 4 is a block diagram of another exemplary index information management system 400, shown in accordance with some embodiments of the present application. As shown in fig. 4, the system 400 includes a security module 410 and a management module 420. In some embodiments, the security module 410 and the management module 420 may be implemented on the server 110 or the smart storage device 200, such as the processor 112.
The security module 410 is configured to obtain a user request to access an item management area; and based on the access request of the user, carrying out safety verification on the identity of the user and generating access information, wherein the article management area is a closable space.
In some embodiments, the security module 410 includes a user authentication sub-module 411. For details of the user authentication sub-module, reference may be made to other parts of the present application, for example, the user authentication sub-module of the security module 310 in fig. 3 and the description thereof, which are not described herein again.
In some embodiments, the security module 410 also includes a location monitoring sub-module 412; the position monitoring sub-module is configured to determine whether the intelligent storage device 200 is located in the safe area based on the position information acquired by the positioning module 240, and issue an alarm message if the determination result is negative. As used herein, the term "secure area" refers to the permitted secure range of movement of the smart storage device 200. The safety area may be a circular, elliptical, polygonal or other irregular pattern area with a center extending outward.
In some embodiments, the security zone may be determined based on user input. For example, when the location monitoring sub-module acquires a setting request for setting a security area by a trusted user request by communicating with the input module 210 or the user terminal 140, the location monitoring sub-module determines the security area based on setting information carried by the setting request and stores the setting information of the security area in the storage device 150.
In some embodiments, the safety zone may be determined based on automatic generation of preset safety zone setting rules. For example, when the intelligent storage device 200 (e.g., the system 400) is in an initialized state, and the security module 410 obtains an access request from a user, the position monitoring sub-module obtains the current position coordinates of the intelligent storage device 200 by communicating with the positioning module 240, generates a circular area with the position coordinates as the center and a preset value (e.g., 10 meters, 20 meters, or 30 meters) as the radius, sets the circular area as a security area, and stores the setting information of the security area in the storage device 150 for calling when the subsequent position monitoring sub-module 412 performs position monitoring.
In some embodiments, an alarm message issued in response to determining that the location of the smart storage device 200 is not within a safe area may be used to alert the behavior of the over-range mobile smart storage device 200. In some embodiments, the security module 410 may terminate the alert based on a trusted user's request to disarm the set request for the alert. For details of the alarm information, reference may be made to other parts of the present application, such as the user authentication sub-module of the security module 310 in fig. 3 and the description thereof, which are not described herein again.
The position monitoring submodule monitors the position of the intelligent storage device and warns the unauthorized moving behavior, so that the use safety of the intelligent storage device can be further improved.
The management module 420 is configured to obtain item identification information of the item management area during trusted user access, the item identification information including item information and/or access information of the item; based on the item identification information, index information is determined, the index information being further determined based at least on the access information.
In some embodiments, the management module 420 further comprises an identification sub-module 421; the identification submodule 421 is configured to determine item identification information based on the detection information acquired by the detection module 220. For details of the identification submodule 421, reference may be made to other parts of the present application, such as the identification submodule 321 in fig. 3 and the description thereof, and the step 530 in fig. 5 and the description thereof, which are not described herein again.
In some embodiments, the management module 420 further includes an authentication sub-module 422; the authentication sub-module 422 is configured to determine ownership information of the item based at least on the access information and the probe information obtained by the probe module 220. As used herein, the term "ownership information" is meant to indicate an ownership relationship between an item and a user. In some embodiments, the ownership information of the item may be determined based on the access information and the item identification information of the identification submodule 421 determined based on the probe information.
In some embodiments, the authentication sub-module 422 may include a first authentication unit configured to determine the ownership information of the deposited item based on the access information and the detection information obtained by the detection module 220. In some embodiments, the ownership information of the deposited item may be determined based on the access information and the item identification information of the identification submodule 421 determined based on the probe information. Specifically, based on the access information of the article in the article identification information, it can be determined whether the article management area of the intelligent storage device 200 has the deposited article during the access. For the case that the deposited article exists, the first authentication unit may analyze a case that the article depositing time coincides with the time of the user's unlocking period based on the unlocking time and the locking time in the access information and the article depositing time in the article identification information, and determine that the user whose access period coincides with the article depositing time is an owner of the deposited article.
For details of determining ownership information of the deposited item, reference may be made to other parts of this application, such as step 620 in fig. 6 and the description thereof, which are not described herein again.
In some embodiments, the authentication sub-module 422 may include a second authentication unit configured to obtain historical ownership information of the items in the item management area of the smart storage device 200; based on the detection information and the historical ownership information acquired by the detection module 220, the ownership information of the taken-out article is determined. In some embodiments, the ownership information of the retrieved item may be determined based on the item identification information and historical ownership information determined by the identification sub-module 421. Specifically, the historical ownership information includes ownership information of all deposited items from the initialization state (e.g., the state in which the smart storage device 200 is first used, the state in which data is reset, and the state in which data is lost) of the smart storage device 200 to the last time the lock body 230 enters the lock-out state. The historical ownership information may be stored in the storage device 150, and the first authentication unit may update the historical ownership information based on the ownership information of the currently deposited item after the lock body 230 enters the locked state from the unlocked state.
In some embodiments, the second authentication unit is further configured to determine whether the user performing the article removal is a belonger to remove the article, and issue an alarm message when the determination result is negative. The alarm information issued in response to determining that the user is not the rightful person who takes out the item may be used to alert of non-rightful person item taking action.
For details of determining ownership information of the article to be taken out, determining whether the user taking out the article is an owner of the article to be taken out, and sending out the alarm information, reference may be made to other parts of the present application, such as step 630 and step 640 in fig. 6 and the description thereof, and the security module 310 in fig. 3 and the description thereof, which are not described herein again.
The authentication submodule authenticates the stored article and determines ownership information, so that the dimension of the article information can be increased, and the use scene is expanded. The authentication submodule authenticates the taken-out article and warns the article taking action of a non-right person, so that the intelligent storage device can give consideration to sharing and safety in a multi-person use scene.
In some embodiments, the management module 420 further includes an index sub-module 423; the indexing submodule 423 is configured to determine the index information based on the access information, the item identification information and the ownership information. The article identification information comprises article information and/or article access information. Specifically, the index information is used to indicate the access of the trusted user to the item within the item management area during the access, and the ownership relationship between the trusted user and the accessed item. For specific contents of creating the index information, updating the index information, and performing query display based on the index information, reference may be made to other parts of the present application, such as step 540 in fig. 5 and the description thereof, which are not described herein again.
The indexing sub-module establishes index information based on the access information, the article identification information and the ownership information, can realize information statistics, management and query of personal articles in a multi-user use scene, realizes multi-dimensional management of article information, and is suitable for application scenes with higher safety requirements.
FIG. 5 is an exemplary flow diagram illustrating index information management according to some embodiments of the present application. The process 500 may be performed by the system 100. For example, the flow 500 may be implemented as a set of instructions (e.g., an application program) stored in the storage device 150. Processor 112 and the modules in fig. 2, 3, and 4 may execute at least a portion of the set of instructions, and when executing at least a portion of the instructions, processor 112, the modules may be configured to perform flow 500. The operations of flow 500 shown below are for illustration purposes only. In some embodiments, flow 500 may be accomplished with one or more additional operations not described, and/or one or more operations not discussed herein. Additionally, the order in which the operations of flow 500 are illustrated in FIG. 5 and described below is not intended to be limiting.
Step 510, obtain a request for a user to access an item management area. Step 510 may be performed by processor 112 (e.g., security modules 310, 410).
In some embodiments, the processor 112 may obtain the user's access request by communicating with the user terminal 140. In some embodiments, the processor 112 may obtain the user's access request by communicating with the input module 210 of the smart storage device 200.
And 520, carrying out safety verification on the identity of the user based on the access request, and generating access information, wherein the article management area is a closable space. Step 520 may be performed by processor 112 (e.g., security module 310, 410).
In some embodiments, step 520 may include a user authentication step. The access request carries user information corresponding to the identity of the user, and the user authentication step can judge whether the user is a trusted user or not based on the user information of the user and send out alarm information if the judgment result is negative. The user authentication step may be performed by processor 112 (e.g., user authentication sub-module 411).
In some embodiments, the user authentication step further comprises: user information of a user and user information of a preset trusted user are obtained. Specifically, when the processor 112 obtains the access request of the user, the processor 112 may simultaneously obtain user information for user security verification, where a specific type of the obtained user information is determined by the user information of the preset trusted user pre-entered in the storage device 150. For example, the pre-entered user information of the preset trusted user includes digital password information and voiceprint information, and the processor 112 obtains at least one of the digital password information and the voiceprint information of the user through the input module 210 or the user terminal 140 for security verification.
In some embodiments, the user authentication step further comprises: and comparing the user information of the user with the user information of the preset trusted user, and judging whether the user is the trusted user or not based on the comparison result. In some embodiments, the comparison may be based on one of the user information. For example, the fingerprint information of the user is compared with the fingerprint information of a preset trusted user, the similarity between the fingerprint information of the user and the fingerprint information of the preset trusted user is determined through fingerprint spectrum similarity analysis, if the similarity is higher than a threshold (such as 95%, 98% and 99%), the user can be judged as the trusted user, and if not, the user is judged as the untrusted user. In some embodiments, the comparison may be based on a variety of information in the user information. For example, the face information and the iris information of the user and the preset trusted user are compared, the processor 112 may perform face recognition analysis based on the face information of the user and the face information of the preset trusted user to obtain a first matching degree, may perform iris recognition analysis based on the iris information of the user and the iris information of the preset trusted user to obtain a second matching degree, and the processor 112 scores the first matching degree and the second matching degree based on the scoring model and calculates a total score of the matching degrees, where the total score of the matching degrees is higher than a threshold (e.g., 90, 95, and 99), and then the user is determined as a trusted user, otherwise, the user is determined as an untrusted user.
In some embodiments, the user authentication step further comprises: and if the judgment result is negative, sending out alarm information. Wherein the alarm information comprises local alarm information and remote alarm information.
For specific contents of the access request, the access information, the user information, and the alarm information, reference may be made to other parts of the present application, such as the security module 310 of fig. 3 and the description thereof, which are not described herein again.
In some embodiments, step 520 further comprises a location monitoring step. The article management area is located in the movable storage device, the position monitoring step can monitor whether the position of the article management area is located in the safety area, and alarm information is sent out when the judgment result is negative. The location monitoring step may be performed by the processor 112 (e.g., the location monitoring sub-module 412). For details of the safety area, reference may be made to other parts of the present application, such as the position monitoring sub-module 412 of fig. 4 and the description thereof, which are not described herein again.
The processor 112 may obtain the location information through the positioning module 240 of the smart storage device 200. In some embodiments, the processor 112 may obtain the location information of the smart storage device 200 in real time through the positioning module 240. In some embodiments, the processor 112 may send the location information to the processor 112 via the location module 240 on a periodic basis, such as every 10 minutes, 15 minutes, or 30 minutes by the location device. In some embodiments, the processor 112 obtains the location information through the positioning module 240 when determining that the triggering condition is satisfied. For example, the trigger condition for obtaining the location information may be that the processor 112 receives an access request.
In some embodiments, when the processor 112 determines that the location of the smart storage device 200 is outside the safe area, the output module 250 of the smart storage device 200 may send out local alarm information, such as sending out voice information through a microphone, sending out a prompt to return to the safe area or ask a trusted user to release the alarm, and the like. In some embodiments, when determining that the location of the intelligent storage apparatus 200 is outside the safe area, the processor 112 may send a remote alarm message through the user terminal 140 of the trusted user, such as sending a text alarm through a display of the user terminal 140, prompting the trusted user of the current location of the intelligent storage apparatus 200, and prompting the user to set the intelligent storage apparatus 200 to be disarmed if the current location movement is trustworthy.
Step 530, obtaining the article identification information of the article management area during the trusted user access, wherein the article identification information comprises article information and/or article access information. Step 530 may be performed by processor 112 (e.g., management modules 320, 420).
In some embodiments, the processor 112 may obtain detection information for the item management area; based on the probe information, item identification information of the item management area during user access is determined. Wherein, the detection information can be obtained through the detection module 220 of the intelligent storage device 200. In some embodiments, the item information includes at least an attribute of the item and/or a value of the item.
In some embodiments, step 530 further comprises an access determination step. The access determining step may determine access information for items within the item management area during user access based on the probe information. The access determination step may be performed by the processor 112 (e.g., the access determination unit of the identification submodule 321, 421). In some embodiments, the access information for the item may indicate the access status of the item, including deposit, withdrawal, and intrinsic. In some embodiments, the access information for the item may indicate an access time for the item, including a deposit time and a withdrawal time.
In some embodiments, the processor 112 may determine access information for the item after the item management area is closed. For example, the processor 112 controls the lock body 230 of the intelligent storage device 200 to perform an unlocking operation to allow the trusted user to access the article management area, the trusted user stores and/or takes out articles, the article management area is closed after the lock body 230 of the intelligent storage device 200 is locked, and the processor 112 may perform image recognition analysis based on the image data of the unlocking time point and the locking time point of the intelligent storage device 200 to determine that the articles stored and/or taken out exist in the article management area of the intelligent storage device 200.
In some embodiments, the identifying step further comprises an attribute determining step. The attribute determining step may determine an attribute of the item within the item management area during the user visit based on the detection information. The attribute determining step may be performed by the processor 112 (e.g., an attribute determining unit).
In some embodiments, the processor 112 may determine attributes of the item through a machine learning model based on the probe information. The machine learning model may include, but is not limited to, a neural network model, a decision tree model, a support vector machine model, and the like, or any combination thereof. For example, the processor 112 may invoke an attribute recognition model stored in the storage device 150, the attribute recognition model generated by training a machine learning model using the tagged probe information set as a sample, the attribute recognition model may take image data or laser scan data of the item as input, identifying the type and material of the item. In some embodiments, processor 112 may determine an attribute parameter of the item via a parametric computational model based on the detection information, and determine an attribute of the item based on the attribute parameter of the item. For example, the processor 112 may call a density calculation model stored in the storage device 150, calculate the density of the object based on the pressure sensing data and the ultrasonic sensing data, and determine the material (e.g., metal, jade, etc.) of the object according to the density of the object. In some embodiments, the processor 112 may determine an item attribute of the item through the graphical recognition model based on the detection information. For example, the article may carry a graphical identifier indicating an attribute of the article (e.g., the graphical identifier indicates that the article type is a ring, the material is gold, and the specification includes a weight of 15g and a diameter of 2 cm), and the processor 112 may invoke a graphical identification model (e.g., an OCR model) stored in the storage device 150 to determine the type, material, and specification of the article by obtaining image data of the article with the graphical identifier.
In some embodiments, the identifying step further comprises a value determining step. The value determining step may determine a value of the item within the item management area during the user visit based on the probe information. The value determining step may be performed by a processor 112 (e.g., a value determining unit). In the case where it is determined by the access determination step that a deposited item exists within the item management area, the value of the deposited item can be further determined. The particular manner in which the value of the deposited item is determined may be selected based on the attributes of the deposited item.
In some embodiments, the value determining step may optionally further comprise the step of determining the value of the deposited item via a network search. For example, the processor 112 performs a network search based on the image data of the deposited items to determine one or more candidate items having a degree of matching higher than a threshold. The processor 112 displays the one or more selected items through a display of the intelligent storage device 200 or a display device of the user terminal 140 of the trusted user, and the trusted user determines a target reference item from the one or more selected items. If the trusted user does not determine the target reference item within a predetermined time (e.g., 1 minute), the processor 112 automatically determines the candidate item with the highest matching degree as the target reference item. The processor 112 may determine the value of the deposited item based on the retrieved market value of the target reference item.
In some embodiments, the value determining step may optionally further comprise the step of determining the value of the deposited item by retrieval from a local database. The local database is stored in the storage device 150. For example only, the local database may contain one or more pre-stored information for reference items, including at least image data and value for the items. Wherein the value of the reference item may be set by a trusted user. The step of determining the value of the item through local database retrieval is similar to the step of determining the value of the item through network retrieval and is not described herein again.
In some embodiments, the value determining step may optionally further comprise the step of determining the value of the item based on user input. For example, after the access determination step determines that a deposited item (e.g., a document or a certificate) exists in the item management area, the processor 112 may display a prompt message through a display of the smart storage device 200 or the user terminal 140 for prompting the user to manually set a value of the deposited item. The processor 112 determines the value of the deposited item based on the acquired setting request (the setting request carries the value information of the item) about the value setting of the trusted user.
For details of the access status, the property of the article, and the value of the article, reference may be made to other parts of the present application, such as the identification sub-module 321 in fig. 3 and the description thereof, which are not described herein again.
In some embodiments, the flow 500 may also include an authentication step. The authenticating step may determine ownership information for items within the item management area during access by the trusted user based on the access information and/or the detection information for the item management area. The authentication step may be performed by the processor 112 (e.g., authentication sub-module 422). For details of the authentication step, reference may be made to fig. 6 and the description thereof, which are not described herein again.
Step 540, determining index information based on the item identification information, the index information being determined based at least also on the access information. In some embodiments, the index information is also determined based on the ownership information determined by the authentication step. Step 540 may be performed by processor 112 (e.g., indexing sub-module 322 of management module 320, or indexing sub-module 423 of management module 420).
In some embodiments, step 540 may further comprise an index generation step. In the index generating step, index information may be created based on at least the access information, the item identification information, and a preset rule when the created index information is not detected. In some embodiments, the index information is also created based on the ownership information determined by the authentication step. The index generation step may be performed by the processor 112 (e.g., the index generation unit of the index sub-modules 322, 423). For the case where the index information is not created, and the case where data loss, data corruption, or data replacement of the storage device 150 results in the created index information being unable to be updated and/or queried, the index generation step may create or reconstruct the index information. It should be noted that the processor 112 may create the index information in the case where the article management area has no article access.
In some embodiments, the preset rule may include an extraction rule for extracting information related to the article from the information to be counted, where the information to be counted includes at least access information and article identification information; the index generating step further includes the step of extracting information from the information to be counted based on the extraction rule. For example, the extraction rule may be: the name, image, attribute, value, access state, access time of the item and the user identification (such as user ID and user name) of the user accessing the item are extracted from the information to be counted. In some embodiments, the information to be counted further includes ownership information determined in the authentication step.
In some embodiments, the preset rule may further include a statistical rule for counting information of the associated item, and the index generating step further includes a step of generating the index information by counting the extracted information based on the statistical rule. For example, the statistical rule may be: and classifying the extracted information according to different belongers, and counting the names, attributes, access states, access time and total value of the current stored articles of the belongers.
In some embodiments, the preset rules may further include a query rule for querying the index information based on the query request; the index generating step further comprises the step of determining the query mode of the index information based on the query rule. For example, the query rule may be: and taking one or more of access time, right person, attribute of the article and name of the article as a screening condition to perform index information query.
In some embodiments, the preset rules may further include a display rule for displaying the corresponding index information based on the query request; the index generating step further includes a step of determining a display mode of the index information based on the display rule. For example, the display rule may be: the index information is displayed with one of item-based name sorting, access time-based sorting, and ownership-based sorting as a display condition. Similarly, the display modes may include display modes based on item sorting, display modes based on access time sorting, and display modes based on ownership sorting.
In some embodiments, the indexing step may further include an index update step. The index updating step may update the index information based on at least the access information and the item identification information when the created index information is detected. In some embodiments, the index information is also updated based on the ownership information determined by the authentication step. The index update step may be performed by the processor 112 (e.g., the index update unit of the index sub-modules 322, 423). In the index updating step, the processor 112 may call the created index information stored in the storage device 150 and update the created index information.
In some embodiments, the index information entry associated with the currently deposited item and/or the removed item in the index information is updated by one or more of adding, modifying and deleting. For example only, the index information may include a plurality of index entries, each index entry being a collection of information associated with a particular item. Each index entry may include a plurality of index information entries such as the name, attribute, value, access status, time of deposit, time of withdrawal, user identification of the user of deposit, user identification of the user of withdrawal, etc. For the index information entry that needs to be subjected to the information accumulation calculation and the accumulation judgment analysis, the processor 112 adopts a modification operation when updating the index information entry. For example, when there is an article taken out, the index information entry including the access state associated with the article is updated in a modified operation manner, the index information entry including the taking-out time and the user identifier of the taking-out user associated with the article is updated in an added operation manner, and the index information entry including the value associated with the article is updated in a deleted operation manner.
In some embodiments, the indexing step may further comprise a query display step. The query display step may perform query display based on the index information. In some embodiments, the query display step may further determine index information corresponding to the query request based on the query request of the trusted user, and display the index information corresponding to the query request. The query display step may be performed by the processor 112 (e.g., the query display unit of the index sub-modules 322, 423).
In some embodiments, the query request carries a filter condition for querying the index information and a display condition for displaying the index information. For example, if the trusted user's query includes a gemstone with an item attribute as a filtering condition and a belonger-based ranking as a display condition, the processor 112 determines index information corresponding to the filtering condition based on the trusted user's query, where the determined index information may include index items of one or more gemstone with an item attribute associated therewith, and the index information entry of each index item may include a name, an attribute, a value, an access time, and a belonger; the processor 112 determines to display the determined index information in a manner of being sorted based on the belongings based on the query request of the trusted user, that is, all the index items are classified and arranged according to the belongings, and the names, attributes, values and access times of the articles of the jewel with attribute association under the names of the belongings are displayed.
Fig. 6 is an exemplary flow chart of authentication steps shown in accordance with some embodiments of the present application. For example only, flow 600 may include steps 610 through 630.
Step 610, confirming whether the article management area has the article stored in and taken out during the access of the trusted user based on the detection information. In some embodiments, whether an item is deposited and removed from the item management area may be confirmed based on item identification information. Wherein the item identification information is determined 530 based on the detection information obtained by the detection module 220. Step 610 may be performed by the processor 112 (e.g., the access determination unit of the identity sub-module 321, 421). In some embodiments, the processor 112 may determine whether the item is deposited and removed after determining the access information for the item in the item management area.
For the case where there is a deposited item, the process 600 proceeds to step 620. In step 620, ownership information of the deposited item is determined based on the access information and the probe information. In some embodiments, step 620 may be performed by the processor 112 (e.g., the first authentication unit of the authentication sub-module 422).
In some embodiments, ownership information for the deposited item may be determined based on the access information and item identification information determined at step 530 based on the probe information. In some embodiments, step 620 may further comprise: determining a deposit coincidence time based on the deposit time of the item and the access time of the user; and determining the ownership relationship between the user corresponding to the access coincidence time and the corresponding stored article. The access coincidence time is the coincidence time point or time period of the article access and the user access. For example, the processor 112 establishes a timeline based on the time of deposit of the item and the time of unlock and lock of the user. Wherein the logging time may be a logging time stamp determined based on a change time of the detection information (e.g., pressure sensing data). The processor 112 determines an access coincidence time during unlocking that coincides with the access time stamp, and determines that the user corresponding to the access coincidence time is the belonger of the stored item corresponding to the access coincidence time.
In some embodiments, step 620 further comprises determining a common owner of the deposited item based on the user input, wherein the user is a trusted user and the user is the owner of the deposited item. Specifically, ownership of the same item may be shared by multiple people. For example only, the processor 112 receives a user's setup request requesting that one or more other trusted users be set as co-ordinates of the deposited item; the processor 112 determines whether the user who issued the setting request is a belonger to deposit the article; when the determination is yes, the one or more other trusted users are determined to be common attorneys for the deposited item based on the setup request.
For the case where there is an item to be removed, the process 600 proceeds to step 630. In step 630, historical ownership information for the items in the item management area is obtained. In some embodiments, step 630 may be performed by processor 112 (e.g., the second authentication unit of authentication sub-module 422). In some embodiments, the processor 112 retrieves historical ownership information stored in the storage device 150. It will be appreciated that the ownership information of a particular historical deposited item in the historical ownership information may indicate the ownership information of the currently removed item.
And step 640, determining the ownership information of the taken-out article based on the detection information and the historical ownership information. In some embodiments, step 640 may be performed by the processor 112 (e.g., the second authentication unit).
In some embodiments, ownership information for a removed item may be determined based on item identification information and historical ownership information. In some embodiments, the processor 112 may determine a historically deposited item that matches the information of the currently removed item and determine ownership information for the currently removed item based on the ownership information of the historically deposited item. For example only, information matching may include name matching, category matching, image matching, etc. of the item, or any combination thereof.
In some embodiments, step 640 further comprises determining whether the user removing the article is a belonger of the article, and issuing an alarm message if the determination is negative. Specifically, there may be a case where the trusted user who has taken out the article is not the owner of the article, and when this occurs, the owner or other related persons are alerted, so that the security of article management can be improved. In some embodiments, processor 112 determines a trusted user for item retrieval based on the access information and the item identification information. The manner of determining the trusted user for item pickup is similar to that in step 332, and the details may refer to the description in step 620, which is not described herein again. In some embodiments, based on the ownership information of the removed item, it is determined whether the trusted user performing the removal of the item is the owner of the removed item. In some embodiments, the processor 112 determines that the trusted user performing the removal of the item is not the owner of the removed item and issues an alert message.
For details of the historical ownership information, reference may be made to other parts of the present application, such as the authentication sub-module 422 in fig. 4 and the description thereof, which are not described herein again.
Fig. 7 is an exemplary application scenario diagram of an index information management system according to some embodiments of the present application. As shown in fig. 7, a user wakes up the index information management system in a standby state through the input module of the intelligent storage device and issues an access request to request the lock body of the intelligent storage device to perform an unlocking operation to allow the user to access the article management area, where the access request carries user information indicating the user identity for security verification. And the security module of the index information management system confirms whether the current user is a trusted user or not based on the user information carried by the access request. If the judgment result is negative, the safety module sends out alarm information through a display of the intelligent storage device to prompt that the user fails to verify, the safety verification needs to be carried out again, and the user is waited to input user information again to carry out the next round of user verification; and when the judgment result is yes, the safety module controls the lock body of the intelligent storage device to execute unlocking operation and generate access information.
After a user manually locks a lock body of the intelligent storage device, the article management area is closed, and the management module of the index information management system calls the detection information of the articles in the article management area acquired by the detection module of the intelligent storage device and calls the access information generated by the safety module for article identification, authentication and index information update. Wherein:
the identification submodule of the management module determines article identification information (including article information and access information of the article) based on the detection information, and determines whether or not the article is stored in and/or taken out from the article management area during user access (during unlocking) based on the article identification information.
And when the identification submodule judges that the stored article does not exist or the article is taken out, the index information management system returns to a standby state to wait for the user to wake up.
When the identification submodule judges that the stored article exists, skipping to an authentication submodule of the management module to authenticate the stored article: and the authentication sub-module calls the article identification information determined by the identification sub-module and the access information generated by the security module to determine the ownership information of the stored article. After the authentication sub-module finishes authentication, skipping to the index sub-module of the management module to update the index information.
And when the identification submodule judges that the article is taken out, skipping to the index submodule of the management module to update the index information.
The index submodule of the management module calls the article identification information determined by the identification submodule, the ownership information of the stored article determined by the authentication submodule and the access information generated by the security module, and is used for updating the index information related to the stored article; the indexing submodule calls the article identification information determined by the identification submodule and the access information generated by the safety module to update the index information related to the taken article. After the index sub-module of the management module finishes the updating of the index information, the index information management system returns to a standby state to wait for the awakening of a user.
Some possible benefits of embodiments of the present application include, but are not limited to: (1) index information at least used for indicating access information of the object of the trusted user during the access period can be established, and the user can intuitively and conveniently carry out comprehensive management and query on the object information; (2) the user can conveniently inquire the use trend of the articles under the application scene of multi-user shared use, and the overall management and use distribution of the articles are convenient; (3) the storage device can send out local alarm and/or remote alarm when the storage device has untrusted access behavior and unauthorized movement behavior and when the articles have unauthorized person access behavior, so that the use safety is improved in multiple dimensions. It is to be noted that different embodiments may produce different advantages, and in different embodiments, any one or combination of the above advantages may be produced, or any other advantages may be obtained.
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing detailed disclosure is to be regarded as illustrative only and not as limiting the present specification. Various modifications, improvements and adaptations to the present description may occur to those skilled in the art, although not explicitly described herein. Such modifications, improvements and adaptations are proposed in the present specification and thus fall within the spirit and scope of the exemplary embodiments of the present specification.
Also, the description uses specific words to describe embodiments of the description. Reference throughout this specification to "one embodiment," "an embodiment," and/or "some embodiments" means that a particular feature, structure, or characteristic described in connection with at least one embodiment of the specification is included. Therefore, it is emphasized and should be appreciated that two or more references to "an embodiment" or "one embodiment" or "an alternative embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, some features, structures, or characteristics of one or more embodiments of the specification may be combined as appropriate.
Additionally, the order in which the elements and sequences of the process are recited in the specification, the use of alphanumeric characters, or other designations, is not intended to limit the order in which the processes and methods of the specification occur, unless otherwise specified in the claims. While various presently contemplated embodiments of the invention have been discussed in the foregoing disclosure by way of example, it is to be understood that such detail is solely for that purpose and that the appended claims are not limited to the disclosed embodiments, but, on the contrary, are intended to cover all modifications and equivalent arrangements that are within the spirit and scope of the embodiments herein. For example, although the system components described above may be implemented by hardware devices, they may also be implemented by software-only solutions, such as installing the described system on an existing server or mobile device.
Similarly, it should be noted that in the preceding description of embodiments of the present specification, various features are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure aiding in the understanding of one or more of the embodiments. This method of disclosure, however, is not intended to imply that more features than are expressly recited in a claim. Indeed, the embodiments may be characterized as having less than all of the features of a single embodiment disclosed above.
Numerals describing the number of components, attributes, etc. are used in some embodiments, it being understood that such numerals used in the description of the embodiments are modified in some instances by the use of the modifier "about", "approximately" or "substantially". Unless otherwise indicated, "about", "approximately" or "substantially" indicates that the number allows a variation of ± 20%. Accordingly, in some embodiments, the numerical parameters used in the specification and claims are approximations that may vary depending upon the desired properties of the individual embodiments. In some embodiments, the numerical parameter should take into account the specified significant digits and employ a general digit preserving approach. Notwithstanding that the numerical ranges and parameters setting forth the broad scope of the range are approximations, in the specific examples, such numerical values are set forth as precisely as possible within the scope of the application.
For each patent, patent application publication, and other material, such as articles, books, specifications, publications, documents, etc., cited in this specification, the entire contents of each are hereby incorporated by reference into this specification. Except where the application history document does not conform to or conflict with the contents of the present specification, it is to be understood that the application history document, as used herein in the present specification or appended claims, is intended to define the broadest scope of the present specification (whether presently or later in the specification) rather than the broadest scope of the present specification. It is to be understood that the descriptions, definitions and/or uses of terms in the accompanying materials of this specification shall control if they are inconsistent or contrary to the descriptions and/or uses of terms in this specification.
Finally, it should be understood that the embodiments described herein are merely illustrative of the principles of the embodiments of the present disclosure. Other variations are also possible within the scope of the present description. Thus, by way of example, and not limitation, alternative configurations of the embodiments of the specification can be considered consistent with the teachings of the specification. Accordingly, the embodiments of the present description are not limited to only those embodiments explicitly described and depicted herein.

Claims (16)

1.一种索引信息管理方法,其特征在于,所述方法包括:1. A method for managing index information, wherein the method comprises: 获取用户访问物品管理区域的请求;Get the user's request to access the item management area; 基于所述访问请求,对所述用户的身份进行安全验证,并生成访问信息,所述物品管理区域为可闭合空间;Based on the access request, the identity of the user is securely verified, and access information is generated, and the item management area is a closable space; 获取受信用户访问期间所述物品管理区域的物品信息和/或所述物品的存取信息;Obtain the item information of the item management area and/or the access information of the item during the visit of the trusted user; 基于所述物品信息和/或所述物品的存取信息,确定索引信息,所述索引信息至少还基于所述访问信息确定。Based on the item information and/or the access information of the item, index information is determined, and the index information is also determined based on at least the access information. 2.如权利要求1所述的方法,其特征在于,所述基于所述物品信息和/或所述物品的存取信息,确定索引信息,所述索引信息至少还基于所述访问信息确定包括:2. The method according to claim 1, wherein the index information is determined based on the item information and/or the access information of the item, and the index information is further determined based on at least the access information including: : 在未检测到已创建的索引信息时,基于所述物品信息和/或所述物品的存取信息,创建所述索引信息,所述索引信息至少还基于所述访问信息和预设规则创建。When the created index information is not detected, the index information is created based on the item information and/or the access information of the item, and the index information is also created at least based on the access information and a preset rule. 3.如权利要求2所述的方法,其特征在于,所述基于所述物品信息和/或所述物品的存取信息,确定索引信息,所述索引信息至少还基于所述访问信息确定还包括:3 . The method according to claim 2 , wherein the index information is determined based on the item information and/or the access information of the item, and the index information is further determined based on at least the access information. 4 . include: 在检测到已创建的索引信息时,基于所述物品信息和/或所述物品的存取信息,更新所述索引信息,所述索引信息至少还基于所述访问信息更新。When the created index information is detected, the index information is updated based on the item information and/or the access information of the item, and the index information is also updated at least based on the access information. 4.如权利要求1所述的方法,其特征在于,所述方法还包括:4. The method of claim 1, wherein the method further comprises: 基于所述索引信息进行查询显示。Query display is performed based on the index information. 5.如权利要求1-4中任一项所述的方法,其特征在于,所述获取所述受信用户访问期间所述物品管理区域的物品信息和/或物品的存取信息包括:5. The method according to any one of claims 1-4, wherein the acquiring the item information and/or the access information of the item in the item management area during the visit of the trusted user comprises: 获取所述物品管理区域的探测信息;obtaining the detection information of the item management area; 基于所述探测信息,确定所述物品信息和/或所述物品的存取信息。Based on the probe information, the item information and/or the access information for the item is determined. 6.如权利要求5所述的方法,其特征在于,所述物品信息至少包括物品的属性和/或物品的价值。6. The method of claim 5, wherein the item information includes at least the attributes of the item and/or the value of the item. 7.如权利要求5所述的方法,其特征在于,所述探测信息通过传感器采集获得,所述传感器包括图像传感器、激光传感器、红外传感器、超声波传感器以及压力传感器中的至少一种。7 . The method of claim 5 , wherein the detection information is acquired through sensor acquisition, and the sensor comprises at least one of an image sensor, a laser sensor, an infrared sensor, an ultrasonic sensor, and a pressure sensor. 8 . 8.如权利要求5所述的方法,其特征在于,在所述基于所述物品信息和/或所述物品的存取信息,确定索引信息之前,所述方法还包括:8. The method according to claim 5, characterized in that, before the index information is determined based on the item information and/or the access information of the item, the method further comprises: 至少基于所述访问信息和/或所述探测信息,确定物品的权属信息。Based on at least the access information and/or the detection information, ownership information of the item is determined. 9.如权利要求8所述的方法,其特征在于,所述至少基于所述访问信息和/或所述探测信息,确定物品的权属信息进一步包括:9. The method of claim 8, wherein the determining the ownership information of the item based on at least the access information and/or the detection information further comprises: 基于所述访问信息和所述探测信息,确定存入物品的权属信息。Based on the access information and the detection information, ownership information of the deposited item is determined. 10.如权利要求8所述的方法,其特征在于,所述至少基于所述访问信息和/或所述探测信息,确定物品的权属信息进一步包括:10. The method of claim 8, wherein the determining, based on at least the access information and/or the detection information, the ownership information of the item further comprises: 获取所述物品管理区域内物品的历史权属信息;Obtain the historical ownership information of the item in the item management area; 基于所述探测信息和所述历史权属信息,确定取出物品的权属信息。Based on the detection information and the historical ownership information, the ownership information of the retrieved item is determined. 11.如权利要求8-10中任一项所述的方法,其特征在于,所述索引信息还基于所述权属信息确定。11. The method of any one of claims 8-10, wherein the index information is further determined based on the ownership information. 12.如权利要求1所述的方法,其特征在于,所述访问请求携带与所述用户的身份相对应的用户信息;所述对所述用户的身份进行安全验证包括:12. The method according to claim 1, wherein the access request carries user information corresponding to the identity of the user; and the security verification of the identity of the user comprises: 基于所述用户的用户信息判断所述用户是否为受信用户,在判定结果为否时发出警报信息。Whether the user is a trusted user is determined based on the user information of the user, and an alarm message is issued when the determination result is no. 13.一种索引信息管理系统,其特征在于,所述系统包括:13. An index information management system, wherein the system comprises: 安全模块,被配置为security module, configured as 获取用户访问物品管理区域的请求;Get the user's request to access the item management area; 基于所述访问请求,对所述用户的身份进行安全验证,并生成访问信息,所述物品管理区域为可闭合空间;以及Based on the access request, the identity of the user is securely verified, and access information is generated, and the item management area is a closable space; and 管理模块,被配置为management module, configured as 获取受信用户访问期间所述物品管理区域的物品信息和/或所述物品的存取信息;Obtain the item information of the item management area and/or the access information of the item during the visit of the trusted user; 基于所述物品信息和/或所述物品的存取信息,确定索引信息,所述索引信息至少还基于所述访问信息确定。Based on the item information and/or the access information of the item, index information is determined, and the index information is also determined based on at least the access information. 14.一种计算机可读介质,其上存储有计算机程序,其中,所述程序被处理器执行时实现如权利要求1-12中任一项所述的方法。14. A computer-readable medium having stored thereon a computer program, wherein the program, when executed by a processor, implements the method of any one of claims 1-12. 15.一种处理器,所述处理器用于运行程序,其中,所述程序运行时实现如权利要求1-12中任一项所述的方法。15. A processor for running a program, wherein the program, when executed, implements the method of any one of claims 1-12. 16.一种电子设备,包括:16. An electronic device comprising: 一个或多个处理器;one or more processors; 存储装置,其上存储有一个或多个程序;a storage device on which one or more programs are stored; 当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如权利要求1-12中任一项所述的方法。The one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-12.
CN202210100036.1A 2021-06-01 2022-01-27 A kind of index information management method and system Active CN114139021B (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
CN202210100036.1A CN114139021B (en) 2022-01-27 2022-01-27 A kind of index information management method and system
CN202210575045.6A CN114861007A (en) 2022-01-27 2022-01-27 A kind of index information management method and system
CN202210575220.1A CN114861008A (en) 2022-01-27 2022-01-27 A kind of index information management method and system
PCT/CN2022/096621 WO2022253274A1 (en) 2021-06-01 2022-06-01 Closable device and index information management method and system
PCT/CN2022/104406 WO2023280273A1 (en) 2021-07-08 2022-07-07 Control method and system
CN202280048533.XA CN117730524A (en) 2021-08-13 2022-07-07 Control method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210100036.1A CN114139021B (en) 2022-01-27 2022-01-27 A kind of index information management method and system

Related Child Applications (2)

Application Number Title Priority Date Filing Date
CN202210575220.1A Division CN114861008A (en) 2022-01-27 2022-01-27 A kind of index information management method and system
CN202210575045.6A Division CN114861007A (en) 2022-01-27 2022-01-27 A kind of index information management method and system

Publications (2)

Publication Number Publication Date
CN114139021A true CN114139021A (en) 2022-03-04
CN114139021B CN114139021B (en) 2022-06-14

Family

ID=80382052

Family Applications (3)

Application Number Title Priority Date Filing Date
CN202210100036.1A Active CN114139021B (en) 2021-06-01 2022-01-27 A kind of index information management method and system
CN202210575045.6A Pending CN114861007A (en) 2022-01-27 2022-01-27 A kind of index information management method and system
CN202210575220.1A Pending CN114861008A (en) 2022-01-27 2022-01-27 A kind of index information management method and system

Family Applications After (2)

Application Number Title Priority Date Filing Date
CN202210575045.6A Pending CN114861007A (en) 2022-01-27 2022-01-27 A kind of index information management method and system
CN202210575220.1A Pending CN114861008A (en) 2022-01-27 2022-01-27 A kind of index information management method and system

Country Status (1)

Country Link
CN (3) CN114139021B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023280273A1 (en) * 2021-07-08 2023-01-12 云丁网络技术(北京)有限公司 Control method and system

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6543046B1 (en) * 1995-07-20 2003-04-01 Accenture Llp Apparatus and method for navigating objects within a computer-implemented object environment
CN1713176A (en) * 2004-06-24 2005-12-28 华夏科技股份有限公司 Dynamic object access system and method
US20110229296A1 (en) * 2010-03-20 2011-09-22 Van Ooyen Wes Apparatus, system and method for storage and dispensing of items
US8100324B1 (en) * 2004-07-27 2012-01-24 Stamps.Com Inc. Systems and methods for facilitating replacement of computer-based value-bearing items
CN108460148A (en) * 2018-03-22 2018-08-28 腾讯科技(深圳)有限公司 A kind of method and relevant device obtaining commodity additional information
CN110266805A (en) * 2019-06-28 2019-09-20 京东数字科技控股有限公司 Information-pushing method, device, electronic equipment and readable medium
CN110275864A (en) * 2019-06-11 2019-09-24 武汉深之度科技有限公司 Index establishing method, data query method and computing device
CN111292480A (en) * 2020-03-06 2020-06-16 新石器慧通(北京)科技有限公司 Container, cargo storing and taking method and unmanned distribution vehicle
CN112883036A (en) * 2021-03-05 2021-06-01 鹏城实验室 Index creation method, device, storage server and storage medium
CN113762997A (en) * 2020-07-01 2021-12-07 北京沃东天骏信息技术有限公司 Information generation method, device, system and storage medium

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104517170A (en) * 2013-09-30 2015-04-15 北大方正集团有限公司 Equipment and method for monitoring articles
CN103544562A (en) * 2013-10-12 2014-01-29 佛山市中韬信息科技有限公司 Intelligent confidential article identification management system on basis of internet of things
CN205540828U (en) * 2016-02-03 2016-08-31 许少娟 Portable storage management terminal based on thing networking
CN107767584A (en) * 2017-10-28 2018-03-06 河南传通电子科技有限公司 A kind of shared storing compartment
CN111179453A (en) * 2018-11-13 2020-05-19 菜鸟智能物流控股有限公司 Logistics object acquisition method, device, equipment and storage medium
CN110278262A (en) * 2019-06-17 2019-09-24 华北科技学院 An intelligent storage system based on the Internet of Things
CN113191466A (en) * 2020-01-10 2021-07-30 杭州共享实验科技发展有限公司 Biological sample management method for scientific research
CN111461596A (en) * 2020-03-24 2020-07-28 上海出版印刷高等专科学校 Training center management system
CN113536261B (en) * 2020-04-14 2024-09-17 三赢科技(深圳)有限公司 Rights management method, rights management device, computer device, and storage medium
CN111640258A (en) * 2020-06-12 2020-09-08 北京云迹科技有限公司 Mobile equipment control method, device and equipment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6543046B1 (en) * 1995-07-20 2003-04-01 Accenture Llp Apparatus and method for navigating objects within a computer-implemented object environment
CN1713176A (en) * 2004-06-24 2005-12-28 华夏科技股份有限公司 Dynamic object access system and method
US8100324B1 (en) * 2004-07-27 2012-01-24 Stamps.Com Inc. Systems and methods for facilitating replacement of computer-based value-bearing items
US20110229296A1 (en) * 2010-03-20 2011-09-22 Van Ooyen Wes Apparatus, system and method for storage and dispensing of items
CN108460148A (en) * 2018-03-22 2018-08-28 腾讯科技(深圳)有限公司 A kind of method and relevant device obtaining commodity additional information
CN110275864A (en) * 2019-06-11 2019-09-24 武汉深之度科技有限公司 Index establishing method, data query method and computing device
CN110266805A (en) * 2019-06-28 2019-09-20 京东数字科技控股有限公司 Information-pushing method, device, electronic equipment and readable medium
CN111292480A (en) * 2020-03-06 2020-06-16 新石器慧通(北京)科技有限公司 Container, cargo storing and taking method and unmanned distribution vehicle
CN113762997A (en) * 2020-07-01 2021-12-07 北京沃东天骏信息技术有限公司 Information generation method, device, system and storage medium
CN112883036A (en) * 2021-03-05 2021-06-01 鹏城实验室 Index creation method, device, storage server and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
贲婷婷 等: "基于语义和访问权限的室内移动对象索引", 《计算机科学》 *
陈细谦 等: "一种有效的空间数据仓库区域聚集查询索引结构", 《计算机研究与发展》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023280273A1 (en) * 2021-07-08 2023-01-12 云丁网络技术(北京)有限公司 Control method and system

Also Published As

Publication number Publication date
CN114139021B (en) 2022-06-14
CN114861008A (en) 2022-08-05
CN114861007A (en) 2022-08-05

Similar Documents

Publication Publication Date Title
KR101005411B1 (en) How to manage your authentication system
KR101723244B1 (en) Managed biometric-based notification system and method
US9372979B2 (en) Methods, devices, and systems for unobtrusive mobile device user recognition
CN110163611A (en) A kind of personal identification method, device and relevant device
CN109462691B (en) Implicit protection method and system based on multi-sensor data fusion
CN109635872A (en) Personal identification method, electronic equipment and computer program product
CN205862460U (en) A kind of intelligence handing-over storage equipment
CN107578519A (en) A kind of intelligent access control system and intelligent entrance guard method for unlocking
JP4220751B2 (en) Chemical storage system
CN201974845U (en) Comprehensive identity authentication device
US10740447B2 (en) Using biometric user-specific attributes
CN110148264B (en) Management method and equipment of storage cabinet
CN118682317B (en) Remote electrical digital control system and method for high-speed intelligent laser cutting machine
US20250117467A1 (en) Security control method and system
CN114139021B (en) A kind of index information management method and system
KR102223322B1 (en) Authentication system for HMI using mobile terminal
JP2004211538A (en) Entrance-leaving control system
Srinivas et al. Fingerprint Based Vehicle Anti-Theft Detection and Alerting System
CN114373241A (en) Point location card punching system and method
JP5681544B2 (en) Media management system
Dafer et al. Evaluation of keystroke dynamics authentication systems: Analysis of physical and touch screen keyboards
JP2011039870A (en) Management system of vending machine
More et al. Survey paper on door level security using face recognition
JP6465908B2 (en) Management system, management method
JP6762903B2 (en) Risk management system and program for risk management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100094 room 1101, 11 / F, building 1, zone 2, 81 Beiqing Road, Haidian District, Beijing

Patentee after: Yunding Network Technology (Beijing) Co.,Ltd.

Address before: 100094 room 1101, 11 / F, building 1, zone 2, 81 Beiqing Road, Haidian District, Beijing

Patentee before: YUN DING NETWORK TECHNOLOGY (BEIJING) Co.,Ltd.