CN114170736A - Express cabinet unpacking method based on near field communication technology - Google Patents
Express cabinet unpacking method based on near field communication technology Download PDFInfo
- Publication number
- CN114170736A CN114170736A CN202111475775.0A CN202111475775A CN114170736A CN 114170736 A CN114170736 A CN 114170736A CN 202111475775 A CN202111475775 A CN 202111475775A CN 114170736 A CN114170736 A CN 114170736A
- Authority
- CN
- China
- Prior art keywords
- user
- express
- authentication code
- cabinet
- identity authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 238000004891 communication Methods 0.000 title claims abstract description 28
- 238000005516 engineering process Methods 0.000 title claims abstract description 20
- 238000012795 verification Methods 0.000 claims abstract description 10
- 230000006870 function Effects 0.000 description 3
- 150000003839 salts Chemical class 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/10—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property
- G07F17/12—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property comprising lockable containers, e.g. for accepting clothes to be cleaned
- G07F17/13—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property comprising lockable containers, e.g. for accepting clothes to be cleaned the containers being a postal pick-up locker
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00182—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
The application relates to the field of express delivery, and particularly discloses an express delivery cabinet unpacking method based on a near field communication technology, which comprises the steps of firstly obtaining user information and express delivery information corresponding to a user; generating an encrypted identity authentication code corresponding to the user based on the user information, and writing the encrypted identity authentication code into the user NFC equipment; receiving an express cabinet ID and an identity authentication code sent by an express cabinet, and determining the corresponding grid information for storing express corresponding to the express cabinet ID and the identity authentication code; the identity verification code is obtained by decoding an encrypted identity authentication code sent by the express cabinet based on user NFC equipment; and finally, sending the grid information to an express cabinet for the express cabinet to open the corresponding grid. Therefore, by the method, after the user NFC equipment writes the identity authentication code, when the user needs to take the express delivery, no operation is needed, and the system or the server automatically opens the express delivery cabinet door for storing the express delivery of the user, so that the express delivery efficiency is improved, and the user experience is enhanced.
Description
Technical Field
The application relates to the field of express delivery, in particular to an express delivery cabinet unpacking method based on a near field communication technology.
Background
Along with the continuous increase of express delivery quantity, the user firstly needs to find the pickup code when picking up the express delivery, then manually inputs the pickup code in the express delivery cabinet through equipment such as a mobile phone, or after binding the mobile phone with a preset system, picks up the express delivery through a two-dimensional code scanning mode.
Disclosure of Invention
The application provides an express cabinet unpacking method based on a near field communication technology, and aims to solve the problems that in the prior art, in an express delivery pickup process, a plurality of user operation steps and large operation difficulty are caused.
The above object of the present application is achieved by the following technical solutions:
the embodiment of the application provides an express cabinet unpacking method based on a near field communication technology, which comprises the following steps:
acquiring user information and express delivery information corresponding to the user;
generating an encrypted identity authentication code corresponding to the user based on the user information, and writing the encrypted identity authentication code into the user NFC equipment;
receiving an express cabinet ID and an identity authentication code sent by an express cabinet, and determining the corresponding grid information for storing express, which corresponds to the express cabinet ID and the identity authentication code; the identity verification code is obtained by decoding the encrypted identity authentication code sent by the user NFC equipment based on the express delivery cabinet;
and sending the grid information to an express cabinet for the express cabinet to open a corresponding grid.
Further, the user information includes a user mobile phone number and a user ID;
the express delivery information comprises an express delivery cabinet ID and grid information used for storing express delivery.
Further, the generating an encrypted authentication code corresponding to the user based on the user information includes:
generating an identity authentication code corresponding to the user by an SHA256 signature method based on the user information;
encrypting the identity authentication code through an RSA521 algorithm to generate an encrypted identity authentication code;
based on the encrypted authentication code sent by the user NFC equipment, decoding to obtain the authentication code comprises:
and decoding the encrypted identity authentication code through an RSA521 algorithm to obtain the identity authentication code.
Further, the determining the grid information corresponding to the express cabinet ID and the identity authentication code for storing the express includes:
determining the user information based on the express cabinet ID and the identity authentication code;
and determining the grid information corresponding to the ID of the express cabinet and the identity authentication code and used for storing the express based on the user information and the express information corresponding to the user.
Further, the writing the encrypted authentication code into the user NFC device includes:
sending the encrypted identity authentication code to a preset APP in the NFC equipment of the user;
and writing the encrypted identity authentication code into the user NFC equipment through the preset APP based on CoreNFC and/or NdefManager (android).
The technical scheme provided by the embodiment of the application can have the following beneficial effects:
according to the technical scheme provided by the embodiment of the application, user information and express information corresponding to a user are obtained firstly; generating an encrypted identity authentication code corresponding to the user based on the user information, and writing the encrypted identity authentication code into the user NFC equipment; then receiving an express cabinet ID and an identity authentication code sent by the express cabinet, and determining the grid information for storing express corresponding to the express cabinet ID and the identity authentication code; the identity verification code is obtained by decoding an encrypted identity authentication code sent by user NFC equipment based on an express delivery cabinet; and finally, sending the grid information to an express cabinet for the express cabinet to open the corresponding grid. Therefore, according to the express cabinet unpacking method based on the near field communication technology, after the user NFC equipment writes the identity authentication code in, when the user needs to take the express, no operation is needed, and the system or the server automatically opens the express cabinet door for storing the express of the user, so that the express taking efficiency is improved, and the user experience is enhanced.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
Fig. 1 is a schematic flow chart of an express cabinet unpacking method based on a near field communication technology according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an express delivery cabinet unpacking method based on a near field communication technology according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
In recent years, near field communication has become a popular vocabulary in the mobile field, but many people do not know its meaning or have only a vague idea about it. Some people just view it with mobile payment and mobile wallet solutions, etc., and think that near field communication is just shopping with a cell phone at a point of sale. And near field communication, as its name implies, refers to not only mobile payment and mobile wallets. Near field communication is a technology, also called short-range wireless communication, which is a short-range high-frequency wireless communication technology, and allows contactless point-to-point data transmission and data exchange between electronic devices.
The communication need not necessarily be between two handheld devices, but it can also work on mobile devices and some objects, such as sales terminal systems at store checkout counters, tags built in with near field communication chips, brand tags, posters, stamps or cards. For these simple purposes, the near field communication chip does not need battery support. Instead, the chip is in a passive state and can be activated by another device generating a radio frequency field.
Based on the remote communication mode, authentication information is sent to a remote server mostly through a mobile phone end or a cabinet machine end, and after the authentication information is analyzed by the server, the express cabinet is informed of unpacking through a remote pushing mode. In the authentication information acquisition stage, a two-dimensional code mode of inputting a verification code or scanning a screen of a cabinet air conditioner by hands is usually adopted, and the method has the problems that a user needs many operations and the operation difficulty is high, so that the efficiency of a pickup process is low and the user experience is poor.
In order to solve the problems, the application provides an express cabinet unpacking method and an express cabinet unpacking device based on a near field communication technology, so that the express item taking process is simplified, the user operation and operation difficulty are reduced, the item taking efficiency of a user is improved, and the item taking experience of the user is improved. Specific embodiments are illustrated in detail by the following examples.
Examples
Referring to fig. 1, fig. 1 is a schematic flow chart of an express delivery cabinet unpacking method based on a near field communication technology according to an embodiment of the present application, and as shown in fig. 1, the method at least includes the following steps:
s101, obtaining user information and express delivery information corresponding to the user.
And S102, generating an encrypted identity authentication code corresponding to the user based on the user information, and writing the encrypted identity authentication code into the NFC equipment of the user.
In the express cabinet unpacking method based on the near field communication technology, the user information comprises a user mobile phone number and a user ID, and the express information comprises an express cabinet ID and grid information for storing express. The server side can encrypt and generate the user identity authentication code based on the user information and the express delivery information. Specifically, the server may sign the mobile phone number, the user ID, and the global SALT of the user by using the SHA256 signature method to generate the identity authentication code of the user. For any length of message, SHA256 generates a 256-bit hash value, called a message digest. This digest is equivalent to an array of 32 bytes in length, usually represented by a 64-byte hexadecimal string, where 1 byte is 8 bits and a hexadecimal character is 4 bits in length.
For example, assuming that a user a with a mobile phone number of 15600000000 has a user ID of 100001, we perform SHA256 signature using global SALT as FAKE, and the result is 297386F358BDB6CDC4A3BE46E8AC10628C0C793360442188E02BA6277579B 57D. This string is the authentication code of user a.
Further, after an authentication code corresponding to the user is generated by using the SHA256 signature method based on the user information, for the sake of security, in this application, the authentication code is further encrypted by using the RSA521 algorithm to generate an encrypted authentication code. Specifically, in order to ensure that data is transmitted more safely between hardware and reduce verification requests of a server, the identity authentication code is subjected to RSA asymmetric encryption and then is used as the final identity authentication code, so that information safety is ensured.
And then, writing the authentication information and the identity authentication code into the user equipment through a preset APP. Specifically, after the App acquires the authentication information, data can be written into the NFC-enabled device through corenfc (ios) and ndefmanager (android). For the partial write operation, the method can be realized by writing Android or iOS app, and the operation can also be performed by using a hardware NFC card writer. The written authentication code is just an identity authentication code.
It should be noted that most android and apple cell phones on the market at present have writable NFC chips, and besides the cell phones, the bracelet, NFC card, NFC button, and the like that support can all be used as a carrier for writing in authentication information.
S103, receiving an express cabinet ID and an identity authentication code sent by an express cabinet, and determining the grid information corresponding to the express cabinet ID and the identity authentication code and used for storing express.
The identity verification code is obtained by decoding the encrypted identity authentication code sent by the user NFC equipment based on the express delivery cabinet.
And S104, sending the grid information to an express cabinet for the express cabinet to open a corresponding grid.
Specifically, after receiving data transmitted by the user NFC device, the NFC data receiving device connected to the cabinet system first performs an asymmetric decryption locally, and if the decryption succeeds, it is verified that the data contains valid user identity authentication information.
The decryption method and the encryption method both adopt an RSA512 method. The RSA encryption algorithm is an asymmetric encryption algorithm. RSA is widely used in public key cryptography and electronic commerce. The public key (public key) and the private key (PrivateKey) are a key pair (i.e., a public key and a private key) obtained by an algorithm, the public key is a public part of the key pair, and the private key is an unpublished part. The public key is typically used to encrypt session keys, verify digital signatures, or encrypt data that can be decrypted with a corresponding private key. In the application, the private key can be stored only in the server side, and the public key can be placed in the cabinet system.
In the specific authentication and unpacking process, after the cabinet, namely express cabinet software, obtains a valid user identity authentication code, the cabinet ID and the authentication code are sent to the server, the server finds user information according to the authentication code, performs combined query with the associated cabinet ID, and sends a notification to the express cabinet to unpack after finding the grid information of the express cabinet in which the user express is located in the cabinet.
According to the express cabinet unpacking method based on the near field communication technology, after the user NFC equipment writes the identity authentication code in, when the user needs to take the express, the system or the server automatically opens the express cabinet door for storing the express of the user until the user needs to carry equipment such as a mobile phone. In practical application, since the identity information of the user is preset in the NFC device in an encrypted manner, in the step of identity authentication, the following two manners are not required to be adopted for authentication, for example, a mobile phone is started, then a corresponding app is opened, a corresponding page is entered, and code scanning authentication is performed. Or the card cabinet machine is clicked, the verification code input page is entered, the verification code in the mobile phone is opened, the verification code is input, and the authentication is completed. And the identity authentication can be completed only by enabling the NFC equipment (mobile phone or card) to be close to the NFC card reader. Because cell-phone or card easy operation, no matter be old man or child, all very convenient to use, easy operation uses the threshold low, what improve greatly gets an efficiency and promoted and get a experience.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that, in the description of the present application, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present application, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.
Claims (5)
1. An express cabinet unpacking method based on a near field communication technology is characterized by comprising the following steps:
acquiring user information and express delivery information corresponding to the user;
generating an encrypted identity authentication code corresponding to the user based on the user information, and writing the encrypted identity authentication code into the user NFC equipment;
receiving an express cabinet ID and an identity authentication code sent by an express cabinet, and determining the corresponding grid information for storing express, which corresponds to the express cabinet ID and the identity authentication code; the identity verification code is obtained by decoding the encrypted identity authentication code sent by the user NFC equipment based on the express delivery cabinet;
and sending the grid information to an express cabinet for the express cabinet to open a corresponding grid.
2. The express delivery cabinet unpacking method based on the near field communication technology as claimed in claim 1,
the user information comprises a user mobile phone number and a user ID;
the express delivery information comprises an express delivery cabinet ID and grid information used for storing express delivery.
3. The express delivery cabinet unpacking method based on the near field communication technology, according to claim 1, wherein the generating of the encrypted authentication code corresponding to the user based on the user information includes:
generating an identity authentication code corresponding to the user by an SHA256 signature method based on the user information;
encrypting the identity authentication code through an RSA521 algorithm to generate an encrypted identity authentication code;
based on the encrypted authentication code sent by the user NFC equipment, decoding to obtain the authentication code comprises:
and decoding the encrypted identity authentication code through an RSA521 algorithm to obtain the identity authentication code.
4. The express cabinet unpacking method based on the near field communication technology, according to claim 1, wherein the determining of the grid information corresponding to the express cabinet ID and the identity authentication code and used for storing the express comprises:
determining the user information based on the express cabinet ID and the identity authentication code;
and determining the grid information corresponding to the ID of the express cabinet and the identity authentication code and used for storing the express based on the user information and the express information corresponding to the user.
5. The express delivery cabinet unpacking method based on the near field communication technology, according to claim 1, wherein the writing of the encrypted authentication code into the user NFC device includes:
sending the encrypted identity authentication code to a preset APP in the NFC equipment of the user;
and writing the encrypted identity authentication code into the user NFC equipment through the preset APP based on CoreNFC and/or NdefManager.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111475775.0A CN114170736A (en) | 2021-12-06 | 2021-12-06 | Express cabinet unpacking method based on near field communication technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111475775.0A CN114170736A (en) | 2021-12-06 | 2021-12-06 | Express cabinet unpacking method based on near field communication technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114170736A true CN114170736A (en) | 2022-03-11 |
Family
ID=80483238
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111475775.0A Pending CN114170736A (en) | 2021-12-06 | 2021-12-06 | Express cabinet unpacking method based on near field communication technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114170736A (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140289508A1 (en) * | 2013-03-21 | 2014-09-25 | Tencent Technology (Shenzhen) Company Limited | Method, client and system of identity authentication |
CN104966357A (en) * | 2015-05-28 | 2015-10-07 | 宇龙计算机通信科技(深圳)有限公司 | Automatic receive-dispatch express delivery method and system |
CN107134072A (en) * | 2017-04-27 | 2017-09-05 | 上海斐讯数据通信技术有限公司 | A kind of intelligent express delivery bin, pickup system and the implementation method of pickup |
CN107437105A (en) * | 2017-08-09 | 2017-12-05 | 哈尔滨工业大学 | The safe express system of NFC and QR codes and application method of a kind of more role's whole scenes |
CN108665644A (en) * | 2017-03-28 | 2018-10-16 | 北大方正集团有限公司 | Express mail processing method, apparatus and system |
CN109285288A (en) * | 2018-07-25 | 2019-01-29 | 顺丰科技有限公司 | A kind of passive intelligent cabinet |
CN109872465A (en) * | 2019-02-22 | 2019-06-11 | 京东方科技集团股份有限公司 | Express delivery stores equipment and its control method |
CN110532824A (en) * | 2019-08-19 | 2019-12-03 | 河海大学 | Method is signed in a kind of express delivery based on NFC technique |
CN112541990A (en) * | 2020-12-07 | 2021-03-23 | 深圳市智莱科技股份有限公司 | Door lock opening method and system of intelligent cabinet |
CN113240861A (en) * | 2021-05-17 | 2021-08-10 | 上海中通吉网络技术有限公司 | Express delivery cabinet pickup system, method and equipment based on NFC |
-
2021
- 2021-12-06 CN CN202111475775.0A patent/CN114170736A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140289508A1 (en) * | 2013-03-21 | 2014-09-25 | Tencent Technology (Shenzhen) Company Limited | Method, client and system of identity authentication |
CN104966357A (en) * | 2015-05-28 | 2015-10-07 | 宇龙计算机通信科技(深圳)有限公司 | Automatic receive-dispatch express delivery method and system |
CN108665644A (en) * | 2017-03-28 | 2018-10-16 | 北大方正集团有限公司 | Express mail processing method, apparatus and system |
CN107134072A (en) * | 2017-04-27 | 2017-09-05 | 上海斐讯数据通信技术有限公司 | A kind of intelligent express delivery bin, pickup system and the implementation method of pickup |
CN107437105A (en) * | 2017-08-09 | 2017-12-05 | 哈尔滨工业大学 | The safe express system of NFC and QR codes and application method of a kind of more role's whole scenes |
CN109285288A (en) * | 2018-07-25 | 2019-01-29 | 顺丰科技有限公司 | A kind of passive intelligent cabinet |
CN109872465A (en) * | 2019-02-22 | 2019-06-11 | 京东方科技集团股份有限公司 | Express delivery stores equipment and its control method |
CN110532824A (en) * | 2019-08-19 | 2019-12-03 | 河海大学 | Method is signed in a kind of express delivery based on NFC technique |
CN112541990A (en) * | 2020-12-07 | 2021-03-23 | 深圳市智莱科技股份有限公司 | Door lock opening method and system of intelligent cabinet |
CN113240861A (en) * | 2021-05-17 | 2021-08-10 | 上海中通吉网络技术有限公司 | Express delivery cabinet pickup system, method and equipment based on NFC |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107077670B (en) | Method and apparatus for transmitting and processing transaction message, computer readable storage medium | |
US9445262B2 (en) | Authentication server, mobile terminal and method for issuing radio frequency card key using authentication server and mobile terminal | |
US10445722B2 (en) | Systems and methods for enabling secure transactions with mobile devices | |
JP2015136121A (en) | Updating mobile devices with additional elements | |
CN106527673A (en) | Method and apparatus for binding wearable device, and electronic payment method and apparatus | |
US10643204B2 (en) | Cryptography method and system for securing data via electronic transmission | |
CN102184499A (en) | Account information binding method, financial transaction method and mobile terminal | |
CN109102291B (en) | Security control method and device for two-dimensional code payment | |
CN110598433B (en) | Block chain-based anti-fake information processing method and device | |
JP2014011762A (en) | Information processing apparatus, terminal device, information processing system, method for information processing, and computer program | |
KR101162196B1 (en) | System and Method for Assigning Dynamic ID to RFID Tag, RFID Tag, RFID Terminal and Recording Medium | |
CN105427102A (en) | Financial IC card based authentication method and corresponding device and system | |
WO2017101585A1 (en) | Smartcard reading device and method | |
CN101841806A (en) | Service card information processing method, device and system and communication terminal | |
CN107172718B (en) | Information processing method and electronic equipment | |
CN114170736A (en) | Express cabinet unpacking method based on near field communication technology | |
KR101162227B1 (en) | RFID Terminal | |
CN101887503B (en) | Seed circulation supervision system and authentication method thereof | |
CN101330685B (en) | Method for ciphering and transmitting short message | |
WO2008154872A1 (en) | A mobile terminal, a method and a system for downloading bank card information or payment application information | |
CN105472545A (en) | Bluetooth automatic connecting method, master device, slave device and system | |
KR101426223B1 (en) | Method for checking confidential information using smartcard and smart terminal, and computer-readable recording medium for the same | |
KR101077860B1 (en) | RFID tag | |
CN107231603B (en) | Intelligent terminal and method for opening intelligent Bluetooth card online | |
CN103782304B (en) | The method of pre-configured key during for manufacture |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20220311 |