CN109272070A - Article access monitoring and managing method, system and computer equipment based on RFID - Google Patents
Article access monitoring and managing method, system and computer equipment based on RFID Download PDFInfo
- Publication number
- CN109272070A CN109272070A CN201811001243.1A CN201811001243A CN109272070A CN 109272070 A CN109272070 A CN 109272070A CN 201811001243 A CN201811001243 A CN 201811001243A CN 109272070 A CN109272070 A CN 109272070A
- Authority
- CN
- China
- Prior art keywords
- user
- information
- server
- safe cabinet
- article
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/10—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property
- G07F17/12—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property comprising lockable containers, e.g. for accepting clothes to be cleaned
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Article access monitoring and managing method, system, computer equipment and the storage medium that this application involves a kind of based on RFID, wherein this method is by obtaining the log-on message of user, according to the log-on message of the user return to the user can operation information list.Obtain the operational order of user, according to the operational order of the user, the target chest of corresponding position in safe cabinet is opened, the location information of target item in the target chest is calculated and acquires current image information simultaneously, the location information and image information are stored.The present invention is confirmed by the identity to user, and is supervised in real time to user's access procedure, and the safety of the efficiency for improving article access and article access is realized, and has reached the comprehensive supervision to article in safe cabinet.
Description
Technical field
The present invention relates to technical field of the computer network, access monitoring party more particularly to a kind of article based on RFID
Method, system, computer equipment and storage medium.
Background technique
Currently, the scene that computer networking technology is applied to is more and more extensive with the development of computer networking technology.Its
In, the relatively more extensive one kind of application is that RFID (Radio Frequency Identification) technology is also known as less radio-frequency knowledge
, be not a kind of communication technology, specific objective can be identified by radio signals and read and write related data, without identifying system with
Mechanical or optical contact is established between specific objective.Currently, RFID technique application is very wide, such as: library, access control system, food
Safety is traced to the source.
In the conventional technology, there are many kinds of classes for the safe cabinet on the market based on archives, passport, but emphasis concentrates on passing
It on the article storage of system, is stored according to Library of Congress Classification, each pickup is required to take considerable time and be looked into
It looks for.It is even more to be difficult to search when article is misplaced, is also difficult to system tracking if being moved by people.This traditional article access side
Method, the safety that will cause article access cannot ensure, in addition, the process of access requires a great deal of time, cause to deposit
The efficiency taken is lower, and the management of system can not be carried out to the article in safe cabinet.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide one kind can be improved access efficiency and simultaneously to article into
Article access monitoring and managing method, system, computer equipment and the storage medium based on RFID of the comprehensive supervision of row.
A kind of article access monitoring and managing method based on RFID, which comprises
Obtain the log-on message of user;
According to the log-on message of the user return to the user can operation information list;
Obtain the operational order of user;
According to the operational order of the user, the target chest of corresponding position in safe cabinet is opened;
It calculates the location information of target item in the target chest and acquires current image information simultaneously, by institute's rheme
Confidence breath and image information are stored.
The step of log-on message for obtaining user includes: in one of the embodiments,
Log-on message in identification user HID card simultaneously acquires the image information of active user simultaneously;
The image information of log-on message and the active user in the HID card is sent to server;
Obtain the user right and safe cabinet information that server returns;
According to the server return user right and safe cabinet information generate respectively can operation information list and
Safe cabinet information list.
In one of the embodiments, in the step of obtaining the operational order of user, the operational order packet of the user
Include: storage instruction takes out instruction and checks instruction.
In one of the embodiments, after the step of obtaining the operational order of user further include:
If the operational order of the user is storage instruction, instructed according to the storage by the target chest of corresponding position
It opens;
When detecting that the target chest is closed, believed by the label that UHF module detects target item in target chest
It ceases and acquires current image information simultaneously;
The label information of the target item and current image information are sent to server, so that the server pair
Safe cabinet information is updated.
In one of the embodiments, after the step of obtaining the operational order of user further include:
If the operational order of the user is to take out instruction, user is prompted to input pickup code;
The pickup code for obtaining user's input, according to the pickup code inquire corresponding target chest information and open it is described right
The target chest answered;
When detecting that the target chest is closed, the Item Information in the target chest is taken inventory, and be uploaded to service
Device, so that the server is updated safe cabinet information.
In one of the embodiments, after the step of obtaining the operational order of user further include:
If the operational order of the user is to check instruction, the request for obtaining target chest information is sent to server;
It receives the information for the target chest that server returns and is shown, the information of the target chest includes: ID, object
The name of an article claims and article user.
A kind of article access supervisory systems based on RFID, the system comprises:
Safe cabinet, the safe cabinet obtain the log-on message of user, the log-on message of the user are sent to server;
Server, the server according to the log-on message of the user generate user can operation information list, and will
User can operation information list be back to safe cabinet;
The safe cabinet is also used to obtain the operational order of user;It, will be in safe cabinet according to the operational order of the user
The target chest of corresponding position is opened;It calculates the location information of target item in the target chest and acquires current figure simultaneously
As information, the location information and image information are stored and are sent to the server.
In one of the embodiments, in the safe cabinet further include:
HID card reading module, the HID card reading module log-on message in user HID card for identification;
Ups power module, the ups power module are used to power for the safe cabinet.
A kind of computer equipment can be run on a memory and on a processor including memory, processor and storage
The step of computer program, the processor realizes above-mentioned any one method when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
The step of above-mentioned any one method is realized when row.
Above-mentioned article access monitoring and managing method, system, computer equipment and storage medium based on RFID, by obtaining user
Log-on message, then according to the log-on message of the user return to the user can operation information list.Then, it obtains and uses
The operational order at family is opened the target chest of corresponding position in safe cabinet, finally then according to the operational order of the user
Calculate the location information of target item in the target chest and acquire current image information simultaneously, by the location information with
And image information is stored.This programme is confirmed by the identity to user, and is carried out to user's access procedure real-time
Supervision, realize improve article access efficiency and article access safety, and reached in safe cabinet article it is complete
Orientation supervision.
Detailed description of the invention
Fig. 1 is the application scenario diagram of the article access monitoring and managing method in one embodiment based on RFID;
Fig. 2 is the flow diagram of the article access monitoring and managing method in one embodiment based on RFID;
Fig. 3 is flow diagram the step of obtaining the log-on message of user in one embodiment;
The flow diagram for the step of Fig. 4 is article storage in one embodiment;
Fig. 5 is the flow diagram for the step of article takes out in one embodiment;
Fig. 6 is the flow diagram for the step of article is checked in one embodiment;
Fig. 7 is the structural block diagram of the article access supervisory systems in one embodiment based on RFID;
Fig. 8 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, and
It is not used in restriction the application.
Article access monitoring and managing method provided by the embodiment of the present invention based on RFID may be used on application as shown in Figure 1
In environment.Safe cabinet 110 is equipped with display equipment 120, the safe cabinet 110 for saving article, the article of preservation support passport,
The contents such as archives, bullion.The display equipment 120 includes: any one the display equipment such as touch screen, the display equipment 120
It include the relative article storage information etc. in safe cabinet 110 in the interface image for showing corresponding interface image to user.
Display equipment 120 can also obtain the operation information of user, and corresponding operation information is converted according to the touch operation of user
At specified so that corresponding processor is handled.Safe cabinet also with Web service server 130 and Tomcat server
140 pass through network connection.Specifically, Web service server 130 can be located at intelligent accurate positioning safe cabinet industrial personal computer
It is interior, for providing with the combined network communication between Cloud Server or other industrial personal computers.Tomcat server 140 is if standalone version then position
In intelligent accurate positioning safe cabinet industrial personal computer;It is located in Cloud Server if networking, it is inside and outside for providing homologous ray
Communication interface between system, information, the user information, operation note of storage intelligent accurate positioning safe cabinet.Tomcat clothes
Business device 140 is also connect with file server 150, and this document server 150 is then located at intelligent accurate positioning secrecy if standalone version
In cabinet industrial personal computer;It is located in Cloud Server if networking, for saving picture, updates the contents such as file.Web service service
Device 130 and Tomcat server 140 are also connected with corresponding database 160 respectively, the database 160 support MySql and
Oracle database, for storing the data such as rack information, user's information, photo, operation note.
In one embodiment, as shown in Fig. 2, a kind of article access monitoring and managing method based on RFID is provided, with the party
Method is applied to be illustrated in the article access supervisory systems based on RFID in Fig. 1, this method comprises:
Step 202, the log-on message of user is obtained.
Step 204, according to the log-on message of user return user can operation information list.
Step 206, the operational order of user is obtained.
Step 208, it instructs depending on the user's operation, the target chest of corresponding position in safe cabinet is opened.
Step 210, it calculates the location information of target item in target chest and acquires current image information simultaneously, by position
Confidence breath and image information are stored.
Specifically, safe cabinet receives the log-on message that user is inputted by brush employee job card, while can request from server
The personal information for obtaining the user then allows user when the personal information and permission about the user got meets
Entered function interface.While logging in, the image information of user can also be acquired by picture collection device, such as: pass through
The camera or camera being arranged on safe cabinet are that individual subscriber is taken pictures.
After user logs into function interface, safe cabinet by showing equipment display interface image, the interface accordingly
In image include can operation information list, specific operability information list may include deposit operation, take out operation and
Check operation etc..User selects relevant operation type, and by the operation of user, such as touch screen operation obtains user to safe cabinet
Operational order simultaneously determines follow-up work process;And system is by the chest of user's selection operation, determine correlation open cabinet cabinet door and
Open cabinet order.
When the log-on message of server feedback user, photo and response user right and the related chest about the user
When, the control system control of intelligent accurate positioning safe cabinet automatically opens target chest.Specifically, user can be by brushing HID
Card login system.System automatic camera, by communications protocol (Webservice or Https agreement), by user information, photo etc.
It is uploaded to backstage, the details of backstage feedback user permission and corresponding chest.If user selects deposit operation, safe cabinet passes through
Display equipment shows the cabinet that active user has permission, if before without distribution chest, and currently available free chest in cabinet, then
System distributes chest automatically, selects to open for user, and the details of corresponding chest;If user selects extract operation, need defeated
Enter or select pickup code, system successively opens cabinet automatically, for user's pickup.
Intelligent accurate, which positions safe cabinet, can carry out radio frequency reading to the space in the target chest by UHF module, from
And the information such as total number of items, precise positioning in the target chest are obtained, certainly, in other examples, it can also pass through
Other modes obtain the information such as the total number of items in target chest.
It should be noted that super high frequency radio frequency identification module is UHF module.UHF typically refers to 902-928MHz frequency range
Radio-frequency technique.Principle is returned to using the transmitting of electromagnetic wave, feature is the advantages such as distance is remote, and precision is high, and multi-tag reads well.
Article identification can be pin-pointed to slot position, and error is no more than 0.5 slot position.It is accurately positioned using UHF technology, people can be reduced
Work searches cost.It is understood that in other examples, other frequencies or the identification of other frequency ranges also can be used
Device or identification module.
When safe cabinet detects that chest cabinet door is closed, automatic card reading analyzes article place elaborate position by algorithm, simultaneously
It takes pictures, photo and the data read is uploaded into backstage, and the Item Information of backstage feedback is shown in front end.If user's finding
Product number is not right, can be again turned on chest, detects article situation.Meanwhile user can check article details.In addition, user can be with
This operation note or historical record are checked in Web page, situations such as utilization rate in kind.It can control by daemon software
All front end intelligent accurate positioning safe cabinets take inventory all items in cabinet, or take inventory object in cabinet by front-end control current secret cabinet
Product.
In the present embodiment, by obtaining the log-on message of user, institute is then returned to according to the log-on message of the user
That states user can operation information list.Then, the operational order of user is obtained, it, will then according to the operational order of the user
The target chest of corresponding position is opened in safe cabinet, finally calculates in the target chest location information of target item and simultaneously
Current image information is acquired, the location information and image information are stored.This programme passes through the identity to user
Confirmed, and user's access procedure is supervised in real time, realizes the efficiency for improving article access and article access
Safety, and reached the comprehensive supervision to article in safe cabinet.
In one embodiment, a kind of article access monitoring and managing method based on RFID is provided, as shown in figure 3, this method
It is middle obtain user log-on message the step of include:
Step 302, it identifies the log-on message in user HID card and acquires the image information of active user simultaneously;
Step 304, the image information of log-on message and active user in HID card is sent to server;
Step 306, the user right and safe cabinet information that server returns are obtained;
Step 308, the user right and safe cabinet information returned according to server generates respectively can operation information list
And safe cabinet information list.
Specifically, safe cabinet identifies the log-on message in user HID card by HID identification module and acquires current use simultaneously
Then the image information of log-on message and active user in HID card is sent to server, server root by the image information at family
Inquire corresponding user right and safe cabinet information in the database according to the user login information, by the user right and
Safe cabinet information is sent to corresponding safe cabinet.Finally, user right and safe cabinet that safe cabinet is returned according to server are believed
Breath generate respectively can operation information list and safe cabinet information list, carry out relevant operation for selection by the user.
In the present embodiment, safe cabinet identifies the log-on message in user HID card by HID identification module and acquires simultaneously
The image information of active user realizes verifying and monitoring to user right, improves the reliability and safety of system
Property.
In one embodiment, a kind of article access monitoring and managing method based on RFID is provided, in the operation for obtaining user
In the step of instruction, the operational order of the user includes: storage instruction, takes out instruction and check instruction.As shown in figure 4,
Further include the steps that article storage after the step of obtaining the operational order of user, comprising:
Step 402, it if the operational order of user is storage instruction, is instructed according to storage by the target chest of corresponding position
It opens;
Step 404, when detecting that target chest is closed, the mark of target item in target chest is detected by UHF module
Label information simultaneously acquires current image information simultaneously;
Step 406, the label information of target item and current image information are sent to server, so that server pair
Safe cabinet information is updated.
Specifically, user brushes HID card login system.System automatic camera, by communications protocol (Webservice or
Http agreement) it is uploaded to backstage (Tomcat server), the details of user's permission and corresponding chest are fed back on backstage.System is aobvious
Show the relevant cabinet of permission, selects to open for user, and show the details of corresponding chest.When cabinet door is opened, system is taken pictures
And backstage, backstage record operating time, photo and operational circumstances are uploaded to by communications protocol.User stores article, and
Close cabinet.System detection is closed to chest cabinet door, and automatic card reading is taken pictures simultaneously, photo and the data read is uploaded backstage, and will
The Item Information of backstage feedback is shown in front end.If user has found storage, number of articles is not right, can be again turned on chest, detects
Article situation.User can check article details.User can check that this operation note or history are remembered in Web page
Situations such as record, utilization rate in kind.
In the present embodiment, the function that article storage is entered safe cabinet by user is realized, and article can be inquired at any time
State, place elaborate position and the state of storage, improve in kind utilization rate and turnover rate as far as possible.And by institute
In some operating process, there is data record, while having to take pictures to realize as duplicated record and reality has been carried out to the process of storage
When monitoring, improve storage article safety and reliability.
In one embodiment, a kind of article access monitoring and managing method based on RFID is provided, in the operation for obtaining user
In the step of instruction, the operational order of the user includes: storage instruction, takes out instruction and check instruction.As shown in figure 5,
Further include the steps that article takes out after the step of obtaining the operational order of user, comprising:
Step 502, if the operational order of the user is to take out instruction, user is prompted to input pickup code;
Step 504, the pickup code for obtaining user's input inquires corresponding target chest information according to pickup code and opens institute
State corresponding target chest;
Step 506, when detecting that the target chest is closed, the Item Information in target chest is taken inventory, and be uploaded to
Server, so that server is updated safe cabinet information.
Specifically, user brushes HID card login system.System automatic camera, by communications protocol (Webservice or
Http agreement) it is uploaded to backstage (Tomcat server), the details of user's permission and corresponding chest are fed back on backstage.If using
Person is administrator, and system shows the relevant cabinet of permission, selects to open for user, and show the details of corresponding chest.If making
User belongs to ordinary user, needs to input pickup code.System needs out cabinet list, successively opens cabinet according to pickup content, judgement.When
Cabinet door is opened, and system, which takes pictures and passes through communications protocol, is uploaded to backstage, backstage record operating time, photo and operation feelings
Condition.User stores article, and closes cabinet.System detection is closed to chest cabinet door, and automatic card reading is taken pictures simultaneously, by photo and reading
The data arrived upload backstage, and the Item Information of backstage feedback is shown in front end.If being opened again it was found that data are inconsistent
Cabinet, and prompt error message;If data are consistent, open next cabinet door or prompt pickup is completed.User can check article
Details.Situations such as user can check this operation note or historical record in Web page, utilization rate in kind.
In the present embodiment, the function that user takes out article from safe cabinet is realized, and by the safe cabinet after taking-up
Article storage state updated in real time, improve the utilization rate and turnover rate of article as far as possible.And due to all
Operating process in, have data record, while having to take pictures to realize as duplicated record and carry out in real time to the process of storage
Monitoring, improve storage article safety and reliability.
In one embodiment, a kind of article access monitoring and managing method based on RFID is provided, in the operation for obtaining user
In the step of instruction, the operational order of the user includes: storage instruction, takes out instruction and check instruction.As shown in fig. 6,
Further include the steps that article is checked after the step of obtaining the operational order of user, comprising:
Step 602, it if the operational order of the user is to check instruction, is sent to server and obtains target chest information
Request;
Step 604, it receives the information for the target chest that server returns and is shown, the packet of the target chest
It includes: ID, Item Title and article user.
Specifically, user checks chest article details by clicking, and safe cabinet obtains this and checks request, and the request is sent out
It send to server, for server according to the Item Information in the request-reply cabinet, Item Information includes: ID, title and user
Deng.Safe cabinet receives the Item Information of server return, and corresponding Item Information is shown in the display equipment of safe cabinet
To show user.
In the present embodiment, making for user can be improved with the article details of the current chest of real time inspection by realizing user
With convenience and satisfaction.
It should be understood that although each step in the flow chart of Fig. 2-6 is successively shown according to the instruction of arrow,
These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps
Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-6
Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps
Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively
It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately
It executes.
In one embodiment, as shown in fig. 7, providing a kind of article access supervisory systems based on RFID, the system
System includes:
Safe cabinet 702, the safe cabinet 702 obtain the log-on message of user, the log-on message of user are sent to service
Device;
Server 704, the server 704 can operation information column according to the log-on message of user generation user's
Table, and by user can operation information list be back to safe cabinet;
The safe cabinet 702 is also used to obtain the operational order of user;According to the operational order of the user, by safe cabinet
The target chest of corresponding position is opened in 702;It calculates the location information of target item in the target chest and acquisition simultaneously is worked as
The location information and image information are stored and are sent to the server 704 by preceding image information.
In a specific embodiment, with reference to Fig. 7, in safe cabinet 702 further include:
HID card reading module 702c, the HID card reading module log-on message in user HID card for identification;
Ups power module 702b, the ups power module are used to power for the safe cabinet, and it is uninterruptedly electric to provide UPS
Source can support operate normally within system three hours, with emergency situations of meeting an urgent need.
In conjunction with Fig. 1, it is to be understood that should support single safe cabinet based on the article access supervisory systems of RFID, and also prop up
Holding multiple safe cabinet joints is big system.
It specifically, include: industrial personal computer 702a in safe cabinet 702: including host, touch screen;Ups power module 702b;HID
Card reading module 702c;Electronic lock control module 702d;RFID control module 702e, the RFID control module 702e module is for real
What existing precise positioning was taken inventory, and the photographing module 702f being connect with RFID control module 702e.
Server 704 includes: network server 704a, Tomcat server 704b and file server 704c.Specifically
Ground, file server 704c is for saving picture, newest cabinet program, and it is more newly downloaded to be supplied to each cabinet.Tomcat
Server 704b is used to provide the communication interface between the inside and outside system of homologous ray, stores rack information, user information, behaviour
It notes down.In addition, the system further includes network server 704a, for providing with the communication interface between external system.
Specific restriction about the article access supervisory systems based on RFID may refer to above for based on RFID's
Article accesses the restriction of monitoring and managing method, and details are not described herein.
In one embodiment, a kind of computer equipment is provided, internal structure chart can be as shown in Figure 8.The calculating
Machine equipment includes processor, memory, network interface, display screen, input unit and the camera connected by system bus.
Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory of the computer equipment includes non-easy
The property lost storage medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and database.It should
Built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The computer equipment
Network interface be used to communicate with external terminal by network connection.To realize one when the computer program is executed by processor
Article of the kind based on RFID accesses monitoring and managing method.
It will be understood by those skilled in the art that structure shown in Fig. 8, only part relevant to application scheme is tied
The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment
It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory
And the computer program that can be run on a processor, processor are realized when executing computer program in above each embodiment of the method
The step of.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
The step in above each embodiment of the method is realized when machine program is executed by processor.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (10)
1. a kind of article based on RFID accesses monitoring and managing method, which comprises
Obtain the log-on message of user;
According to the log-on message of the user return to the user can operation information list;
Obtain the operational order of user;
According to the operational order of the user, the target chest of corresponding position in safe cabinet is opened;
It calculates the location information of target item in the target chest and acquires current image information simultaneously, the position is believed
Breath and image information are stored.
2. the article according to claim 1 based on RFID accesses monitoring and managing method, which is characterized in that described to obtain user's
The step of log-on message includes:
Log-on message in identification user HID card simultaneously acquires the image information of active user simultaneously;
The image information of log-on message and the active user in the HID card is sent to server;
Obtain the user right and safe cabinet information that server returns;
The user right and safe cabinet information returned according to the server generates respectively can operation information list and secrecy
Cabinet information list.
3. the article according to claim 2 based on RFID accesses monitoring and managing method, which is characterized in that in the behaviour for obtaining user
In the step of instructing, the operational order of the user includes: storage instruction, takes out instruction and check instruction.
4. the article according to claim 3 based on RFID accesses monitoring and managing method, which is characterized in that in the behaviour for obtaining user
After the step of instructing further include:
If the operational order of the user is storage instruction, is instructed according to the storage and play the target chest of corresponding position
It opens;
When detecting that the target chest is closed, the label information of target item in target chest is detected simultaneously by UHF module
Current image information is acquired simultaneously;
The label information of the target item and current image information are sent to server, so that the server is to secrecy
Cabinet information is updated.
5. the article according to claim 3 based on RFID accesses monitoring and managing method, which is characterized in that in the behaviour for obtaining user
After the step of instructing further include:
If the operational order of the user is to take out instruction, user is prompted to input pickup code;
The pickup code for obtaining user's input is inquired corresponding target chest information according to the pickup code and is opened described corresponding
Target chest;
When detecting that the target chest is closed, the Item Information in the target chest is taken inventory, and be uploaded to server, with
It is updated the server to safe cabinet information.
6. the article according to claim 3 based on RFID accesses monitoring and managing method, which is characterized in that in the behaviour for obtaining user
After the step of instructing further include:
If the operational order of the user is to check instruction, the request for obtaining target chest information is sent to server;
It receives the information for the target chest that server returns and is shown, the information of the target chest includes: ID, item name
Title and article user.
7. a kind of article based on RFID accesses supervisory systems, which is characterized in that the system comprises:
Safe cabinet, the safe cabinet obtain the log-on message of user, the log-on message of the user are sent to server;
Server, the server according to the log-on message of the user generate user can operation information list, and by user
Can operation information list be back to safe cabinet;
The safe cabinet is also used to obtain the operational order of user;It, will be corresponding in safe cabinet according to the operational order of the user
The target chest of position is opened;It calculates the location information of target item in the target chest and acquires current image letter simultaneously
Breath, the location information and image information are stored and are sent to the server.
8. the article according to claim 7 based on RFID accesses supervisory systems, which is characterized in that in the safe cabinet also
Include:
HID card reading module, the HID card reading module log-on message in user HID card for identification;
Ups power module, the ups power module are used to power for the safe cabinet.
9. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor
Calculation machine program, which is characterized in that the processor realizes any one of claims 1 to 6 institute when executing the computer program
The step of stating method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claims 1 to 6 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811001243.1A CN109272070A (en) | 2018-08-30 | 2018-08-30 | Article access monitoring and managing method, system and computer equipment based on RFID |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811001243.1A CN109272070A (en) | 2018-08-30 | 2018-08-30 | Article access monitoring and managing method, system and computer equipment based on RFID |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109272070A true CN109272070A (en) | 2019-01-25 |
Family
ID=65154846
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811001243.1A Pending CN109272070A (en) | 2018-08-30 | 2018-08-30 | Article access monitoring and managing method, system and computer equipment based on RFID |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109272070A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113268323A (en) * | 2021-05-17 | 2021-08-17 | 北京京东振世信息技术有限公司 | Task processing method and device, electronic equipment and storage medium |
CN116228213A (en) * | 2023-05-09 | 2023-06-06 | 青岛民航凯亚系统集成有限公司 | Airport passenger security check temporary storage article recovery system and method based on RFID |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100079240A1 (en) * | 2004-07-29 | 2010-04-01 | Omnicell, Inc. | Rfid cabinet |
CN103544562A (en) * | 2013-10-12 | 2014-01-29 | 佛山市中韬信息科技有限公司 | Intelligent confidential article identification management system on basis of internet of things |
CN104778574A (en) * | 2015-04-27 | 2015-07-15 | 苏州航瑞成自动化科技有限公司 | Intelligent management system and intelligent management cabinet thereof |
CN105006073A (en) * | 2015-07-03 | 2015-10-28 | 霍智勇 | Intelligent item management cabinet and item receiving management system |
CN107203864A (en) * | 2017-05-31 | 2017-09-26 | 江苏密斯欧智能科技有限公司 | Intelligent express delivery transmit-receive platform |
CN107507316A (en) * | 2017-09-15 | 2017-12-22 | 深圳市先施科技股份有限公司 | A kind of implementation method, the device and system of automatic identification intelligence safe cabinet |
-
2018
- 2018-08-30 CN CN201811001243.1A patent/CN109272070A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100079240A1 (en) * | 2004-07-29 | 2010-04-01 | Omnicell, Inc. | Rfid cabinet |
CN103544562A (en) * | 2013-10-12 | 2014-01-29 | 佛山市中韬信息科技有限公司 | Intelligent confidential article identification management system on basis of internet of things |
CN104778574A (en) * | 2015-04-27 | 2015-07-15 | 苏州航瑞成自动化科技有限公司 | Intelligent management system and intelligent management cabinet thereof |
CN105006073A (en) * | 2015-07-03 | 2015-10-28 | 霍智勇 | Intelligent item management cabinet and item receiving management system |
CN107203864A (en) * | 2017-05-31 | 2017-09-26 | 江苏密斯欧智能科技有限公司 | Intelligent express delivery transmit-receive platform |
CN107507316A (en) * | 2017-09-15 | 2017-12-22 | 深圳市先施科技股份有限公司 | A kind of implementation method, the device and system of automatic identification intelligence safe cabinet |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113268323A (en) * | 2021-05-17 | 2021-08-17 | 北京京东振世信息技术有限公司 | Task processing method and device, electronic equipment and storage medium |
CN116228213A (en) * | 2023-05-09 | 2023-06-06 | 青岛民航凯亚系统集成有限公司 | Airport passenger security check temporary storage article recovery system and method based on RFID |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10629035B2 (en) | Detection of unauthorized devices on ATMS | |
US9405968B2 (en) | Managed notification system | |
CN106934946A (en) | A kind of locker operating method, method for sending information, apparatus and system | |
CN104574599A (en) | Authentication method and device, and intelligent door lock | |
CN108595919A (en) | Software activation method, device, system and storage medium | |
CN114742509B (en) | Cargo access system, device and cargo access method | |
CN109743532B (en) | Doorbell control method, electronic equipment, doorbell system and storage medium | |
CN108429745A (en) | The authentication method and Verification System of login, webpage login method and system | |
CN109272070A (en) | Article access monitoring and managing method, system and computer equipment based on RFID | |
CN111260856A (en) | Intelligent bookcase and system based on Internet of things technology and control method thereof | |
CN110020262A (en) | Pushed information sending method, device, computer equipment and storage medium | |
CN115018028A (en) | Book management system and management method for self-help borrowing and returning of books | |
CN112115882A (en) | User online detection method and device, electronic equipment and storage medium | |
CN114117387A (en) | Substation tool monitoring method and device, computer equipment and storage medium | |
CN107357619A (en) | A kind of generation method, device, equipment and the storage medium of board configuration file | |
US11532152B2 (en) | Managed notification system | |
CN113065822A (en) | Article access control method, device and system and electronic device | |
CN111739228A (en) | Face recognition security system based on Internet of things and operation method | |
CN112399140A (en) | Office terminal monitoring processing method, office terminal monitoring processing device, office terminal monitoring processing equipment and storage medium | |
CN211015753U (en) | Face recognition security system based on Internet of things | |
CN108959879A (en) | Data capture method, device, electronic equipment and the server of application program | |
CN110069445A (en) | Face image processing process, server and computer readable storage medium | |
CN109635888A (en) | A kind of device management method, system and readable storage medium storing program for executing | |
CN112164157A (en) | Real-time supervision method and system for equipment with lock based on Internet of things | |
CN113012361A (en) | Intelligent cabinet, system and method for storing digital certificate |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190125 |
|
RJ01 | Rejection of invention patent application after publication |