CN103198579B - Deposit locker with tracing and lost finding functions and use method thereof - Google Patents

Deposit locker with tracing and lost finding functions and use method thereof Download PDF

Info

Publication number
CN103198579B
CN103198579B CN201310060779.1A CN201310060779A CN103198579B CN 103198579 B CN103198579 B CN 103198579B CN 201310060779 A CN201310060779 A CN 201310060779A CN 103198579 B CN103198579 B CN 103198579B
Authority
CN
China
Prior art keywords
phone number
owner
user
article
locker
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310060779.1A
Other languages
Chinese (zh)
Other versions
CN103198579A (en
Inventor
苏海洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201310060779.1A priority Critical patent/CN103198579B/en
Publication of CN103198579A publication Critical patent/CN103198579A/en
Application granted granted Critical
Publication of CN103198579B publication Critical patent/CN103198579B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to the technical fields of internet, mobile phone communication, database operation, network security, data encryption and computer software. According to the deposit locker disclosed by the invention, firstly, the safety of the deposit locker is essentially improved by using two modes of verifying and authenticating a certificate source and tracking an article fetching relator; after the safety is ensured, the convenience of the deposit locker is improved by adopting two modes of authorizing and canceling the authorization; and on the basis that the safety and the convenience are improved, the problem of lost and found is solved by adopting the skill that an external user can see deposited articles through the internet or a deposit case door. According to the deposit locker disclosed by the invention, the safety of the deposit locker is improved, so that even if the articles are lost, search clues can be found; and the deposit locker can be generally used for logistic scenes that certain person deposits the articles and other persons fetch away the articles, so that the logistics cost is reduced, the travel times of urban population are reduced and the contribution to energy economization, environment friendliness and low-carbon life is realized. The deposit locker disclosed by the invention has the characteristics of convenience and openness, so that the problems of lost and found puzzling the cities is solved and certain contribution to urban construction can be realized.

Description

A kind of have follow the trail of and the locker of Articles found, owner please contact function and using method
[technical field]
The present invention relates to internet, mobile phone Network Communication, database manipulation, data encryption, computer software technical field.
[background technology]
Current known locker is by numerical ciphers certification, most locker is when user is stored in article, numerical ciphers be printed as little paper slip and attach bar code, then when user gets article, locker carries out certification by the mode of the little paper slip of scanning or manual input password.
Such authentication mode is widely used, but loses the case of article, also of common occurrence.Remove because losing the case that causes, the inconvenience in life also usually exists, and such as password paper is lost, even if staff is on the scene be also difficult to determine to be the article of the just in store user of which register, unless opened whole register.If password paper is by bad person's predictive authentication, so article must be lost.
Current registrar cabinet technology has several respects shortcoming:
1. the hypothesis client of mistake is on the scene in bag deposit overall process.
● the way of committing offenses of bad person: click bag deposit button, take password paper away, at this moment lock for deposit trunk is opened, deposit chamber door and open wide.
● depositor sees that depositing chamber door opens, and just stored in article, but finds do not have password paper to export, so go for staff.
● bad person uses the certification of password paper at once, takes article away.
2. recognize password paper not recognize people.
● depositor loses password paper, and bad person finds password paper, and bad person directly takes article away.
3. recognize password not recognize people.
● depositor is the elderly especially, can repeatedly see after obtaining password paper, and some can read sound, and the numerical ciphers of bad person's mobile phone or this 10 long number of mental immediate record, after depositor walks, takes article away with password.
4. password paper is lost or is rubbed cannot be recognized by machine and people by the palm of the hand.
● depositor finds a job personnel, and staff cannot determine it is the article of the just in store user of which register, needs client etc. to close the door to market, just can open allly to deposit chamber door, helps client to take article away.
5. fetcher can deny.
● if multiple people learns the password of depositor simultaneously, and depositing some items is lost, and so depositor cannot know that who is real fetcher.
The technology case having mobile phone to participate in has potential safety hazard:
● refer to number of patent application be 200610030034.0 patent document " a kind of mobile phone controls the system and method for register " this patent be conceived to solve convenience issue: with mobile phone application password, with the IE browser Modify password of computer; Password is sent with mobile phone.
in its claims, we see, and " end user opens register after obtaining the register unlatching password from register management system.”
in its instructions, we see that " when input password is correct, the register of answering with codon pair is opened and started charging.”
its shortcoming is:
√ password is unique authentication element.
System is when receiving password, and do not carry out certification to phone number, so bad person obtains password and also can open chamber door, takes article away.
The hypothesis client of √ mistake when unpacking door on register side.
If user misoperation sends password, deposit chamber door when so owner is absent from the scene and open, depositing some items is completely exposed.
● refer to the file " the intellectual access system for locker " that utility model application number is 201220122462.7.This patent is also be conceived to solve convenience issue:
in its claims, not there is " database module " or similar memory module, this system not recording status is described.
in the thing process of getting of instructions for " when needing to get article as user, ' getting ' key table in keypad module 5 shows wants pulling items; Check the note that mobile phone receives, Keysheet module 5 inputs and in note, opens cabinet password.”
its shortcoming:
√ password is unique authentication element.
Phone number is not carried out to the step of certification, if password is seen by bad person, so article will be lost.
√ is human-readable, can operate, and illustrates that Cipher Strength is not too large, is easy to be stolen by people.
This in two the feature of technical scheme be that mobile phone uses as just means of communication and storage instrument, certification is not carried out to cell-phone number code book body, once article are lost, system can not provide any following up a clue completely, such surface seems substantially possible, but to be short of safe technical scheme in practical application be that current registrar cabinet is stolen repeatedly, and lawsuit is growing on and on, public security lacks clue, the unapprehended arch-criminal of bad person.
The technical scheme emphasis that this patent is introduced is conceived to security:
√ uses the mankind cannot the Service Ticket of identification, unless manual operation, otherwise can not be stolen, even if manual operation, also have information feed back, and system tracks record.
√ unpacks the acquisition of right, and transfer the possession of, row power, has the checking of authentication module, and the tracking of database module.First authentication module refusal have no right mobile phone (station address) to system get thing operation; Again, even if the removed system of article also can know location is when which phone number (station address) takes article away, and his right comes from which phone number (station address).
About Articles found, owner please contact.Learn that current Articles found, owner please contact that technology depends on by inspection information:
Which a. need to estimate article in advance can lose.The such as patent No. is the technology of CN99231739.8 and CN201120052029.6.
● the shortcoming of this kind of technology is, needs, in advance before article are lost, to install specific device to article, but we are in life, can be perhaps mobile phone, such similar device be installed by wallet, if but the dish just bought from food market is lost, this type of technology is also helpless.
B. internet.The such as patent No. is the technology of CN200810102139.1 and CN200810015010.7.
The overall fault of this kind of technology is:
● find the people of article, need oneself keeping, or send and the keeping of local local police station, surfed the Net by local police station and give out information.Such as Articles found, owner please contact in Beijing net http://www.bjgaj.gov.cn/swzl/.This adds increased keeping, traffic and time cost.
Those article being difficult to keeping cannot use internet to find, and the bean curd such as just bought is lost.
Even if found I.D., because have traffic and the time cost of great number, the people that picks up of many article is unwilling to find the owner of lost property.
● ununified website.
Information on internet is vast as the open sea, and Articles found, owner please contact also emerges in an endless stream in website.Articles found, owner please contact online finds oneself lost objects natively as looked for a needle in a haystack many for the owner of lost property.The owner of lost property is not knowing whether to pick up people in online registration, and in which website registration, whether register information is clear, when whether oneself can recognize register information, online finds the article lost Articles found, owner please contact, extremely difficult especially.
[summary of the invention]
Because current technology exists above shortcoming, so be difficult to the dispute problem after solving depositing some items loss, such as many people know password, and fetcher denies.
Be difficult to solve the article problem of transmission in logistics, namely deposit thing people depositing some items, fetcher at the convenient time takes article away, and such as many people know password, and fetcher denies.
Locker itself has depositing some items, the feature that can extensively distribute, and is applicable to very much doing the interpersonal terminal transmitting article, be applicable to very much doing the safe deposit box that Articles found, owner please contact, but current locker solution can not play this innate advantage of locker.
The locker of the function that has that Articles found, owner please contact of a kind of traceable fetcher of the present invention solves " following the trail of fetcher " simultaneously, " authorizing flexibly ", " Articles found, owner please contact " these three problems.Solve first problem and provide security for system, it is solution second, the basis of three problems, Second Problem is that the convenience under security is protected situation embodies, 3rd problem be both comprehensive after, the excellent functions that can provide, sets forth so this instructions will be conceived to these three points the present invention comprehensively.
In order to promote from depositing the security of asking for, the security of article is transmitted in order to be hoisted through locker, follow the trail of fetcher problem to solve, in order to the problem that solves that Articles found, owner please contact, the technical scheme that the present invention " a kind of traceable fetcher have Articles found, owner please contact function locker " adopts is:
Common locker basis is improved or increases following function:
One, the mankind are adopted to be difficult to the Service Ticket of identification.
Adopt bar code, Quick Response Code, long cryptographic certificate string or long word symbol password string (general use 128,256,512 or 1024 arbitrary strings as long cryptographic certificate string or long word symbol password string) to replace password that the mankind can identify is as the voucher opening lock for deposit trunk.
Two, the authentication module of locker not only carries out certification to Service Ticket itself when client gets thing, also carries out certification to the station address in Service Ticket source.
Station address is phone number, E-mail address, QQ number, or the address with global unique identification feature that certain class hardware or computer software use, and conventional is phone number.
Three, database function is increased to common locker.
Can record be which station address stored in article to which register, (should stored in article station address we think main validated user address), this main validated user address whether by the right authorizes of unblanking of register to other station address (this authorized station address we think time validated user address), be finally the lock which station address is opened.
Four, communication function is increased to common locker.
Locker itself has a station address, and each casing in locker has uniqueness coding, by the coding on the station address of register itself and casing, can uniquely determine a register in the whole world.
Make that the station address of locker itself can to carry out question and answer mode mutual with the station address of client.Interactive mode can be note, voice, E-mail address, QQ information etc.By specification, the interaction flow of guided bone can ensure the security of depositing some items.
Locker also can use the station address of oneself to communicate with extraneous server.
Five, the transparency is increased to common locker and function is set.
This is a little skill, by rotating a disk and realize depositing chamber door or register sidewall sections being transparent, part translucent or opaque.Also be the most critical point realizing Articles found, owner please contact function.
Six, camera function is increased to common locker.
When depositing object for when Articles found, owner please contact, camera function can be taken pictures for article and send to extraneous server by communication module.
Seven, further, native system and Articles found, owner please contact a website synchronization job, Articles found, owner please contact that information is sent on website for general.
Further, native system can be provided with background server, be responsible for carrying out unified management to multiple locker system, unified certification, or unified log recording, when there being background server, user can directly and this server user's address communication, and need not communicate with the station address of concrete locker itself.
The present invention by function one, function two, function three and function four, 4 kinds of technology be combined the problem solving and follow the trail of fetcher.
In order to make reader read instructions of the present invention more easily, below only using mobile phone as station address, using note as communication mode, content of the present invention is set forth.The station address of other types; as QQ number; Emails etc. can the computer software of identification one personal identification or certain class hardware address; and the communication mode of other types is as made a phone call; QQ information; Email, the IP between mac address communicates other solutions formed, and is still protection scope of the present invention.
By being combined of above 4 kinds of technology, locker system of the present invention can be known and obtains following information, and had following information sequence, we can think the tracing problem based solved fetcher.(" following the trail of fetcher " " authorizes " beneficial effect of problem flexibly)
● be which phone number when stored in article to which register (this phone number stored in article is main effective phone number).
● when which time effective telephone-number main effective telephone-number, by sending note to communication module, licenses to, and makes this effective telephone-number have the power of unblanking of this register.
● when main effective telephone-number is, and by sending note to communication module, from secondary effective telephone-number, revocation, makes time effective address lose the power of unblanking to this register.
● be which phone number, finally unblank to take article away.
The present invention solves by function one, two, three, four, five, six, seven Articles found, owner please contact problem.
Here by way of example, three class situations of dividing illustrate the beneficial effect of the present invention in Articles found, owner please contact the problem of solution thus further illustrate the technical program.
(1), during Articles found, owner please contact, picking up people without going back on one's word, participating in without internet.
Step 1: pick up people's first, find wallet and check wallet feature, then stored in certain register in locker, and this depositing some items is set can be seen (seeing through cranberry glass) by outside is fuzzy, and the telephone number allowing oneself to bind can be queried.
Step 2: owner of lost property's second finds wallet on the road of oneself passing by.
Step 3: fuzzyly in the register of owner of lost property's second in locker see oneself wallet, learns this locker telephone number and register numbering.
Step 4: owner of lost property's second is sent short messages to the telephone number of this locker itself, inquiry numbers the corresponding telephone number picking up people's first with this register.
Step 5: phone and pick up people's first.
Step 6: pick up people's first and interrogate wallet feature.
Step 7: owner of lost property's second is answered correct.
Step 8: pick up people's first and send short messages to the telephone number of this locker itself, licenses to the phone number of owner of lost property's second as secondary effective telephone-number.
Step 9: the telephone number of locker itself regenerates Service Ticket according to the telephone number of owner of lost property's second and sends to owner of lost property's second.
Step 10: owner of lost property's second is got thing and gone away.(overall process may only complete within several hours.)
Step 11: because owner of lost property's second contacted and picks up people's first, so owner of lost property's second represents spiritual thanks and respect to picking up people's first.Pick up people's first and also obtain spirit return, two people more would like to do the people do not pocketed the money one picks up.(people that do not pocket the money one picks up obtains spirit and compensates, an important step in process that this point is that Articles found, owner please contact.)
(2), during Articles found, owner please contact, picking up people without going back on one's word, having internet to participate in.
Here based on above step, only step 1,2,3 is done and simply change and increase step 1.5, during to show internet participation to reader, process that Articles found, owner please contact.
Step 1 changes into: pick up people's first and use touch-screen and camera to the pictorial information of system typing article, further can use microphone typing voice messaging, more convenient like this.
Step 1.5: locker system sends one to the station address determined (extraneous Website server) and comprises the time, place, lost article picture, classification, the phone number of locker own, the recorded information of register numbering.
Step 2 changes into: owner of lost property's second itself knows this locker system problem that can solve that Articles found, owner please contact, logs in Articles found, owner please contact website corresponding to locker.
Step 3 changes into: owner of lost property's second inquires lost article picture, corresponding register numbering and locker telephone number.
(3), during Articles found, owner please contact, pick up people and go back on one's word.
Here based on above sequence of steps, only between step 9 and 10, some steps are increased.
Step 9.1: have the 3rd population, phones and picks up people and claim that wallet is oneself.
Step 9.2: pick up people's first to the 3rd population, interrogate wallet feature.
Step 9.3: the 3rd population, answers correct.
Step 9.4: pick up the telephone number of people's first to locker itself, sends short messages before requiring to cancel to the mandate of owner of lost property's second.
Step 9.5: locker notifications owner of lost property second, his phone number is invalid.
Step 9.6: people's police can be had to participate in, the artificially conscientious real owner of lost property really.
Step 9.7: repeat step 8 and 9, to the phone number mandate of the real owner of lost property.
Step 10 changes into: the true owner of lost property gets thing and goes away.
The change of step 11: " owner of lost property's second " is replaced with " the true owner of lost property ".
[accompanying drawing explanation]
Accompanying drawing described below is only one embodiment of the present of invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, according to other accompanying drawings that these accompanying drawings obtain, also within scope.
Accompanying drawing 1 is the structure principle chart of a kind of traceable fetcher of the present invention function locker that has that Articles found, owner please contact.
Explain 1: locker 01 of the present invention increases database module 09 and camera module 10 than common locker.
Explain 2: authentication module 08 and database module 09 are the software modules run in systems in which, and other modules are hardware module, and authentication module not only carries out certification to Service Ticket, also certification is carried out to the station address sending voucher simultaneously.
Explain 3: the concrete device of transparent setting device 05 can participate in accompanying drawing 2.
Explain 4: the concrete device depositing thing object setting device 06 can participate in accompanying drawing 3.
Accompanying drawing 2 is schematic diagrams of the present invention's transparency setting device 05.
This device profile is discoid, and center is rotation axis, and form by 3 identical diagonal angles are fan-shaped, the latter half 3 is fan-shaped is respectively transparent plastic, dark brown plastics and light tight shelter.The label that the first half 3 fan-shaped users of being use when rotating this device, the vertical label representative transparency now.
This disk is arranged on to be deposited on chamber door 03, deposits on chamber door 03 simultaneously and has segment-like transparent district, 1 diagonal angle.User can pass through depositing inside chamber door 03, the hand rotation rotating disk first half assigns to 1 of rotating disk the latter half fan-shaped clear area with depositing the latter half that diagonal angle is fan-shaped on chamber door 03 is overlapped, thus reaches whether setting allows other people to see, the fuzzy object seen, can not see interior items.
Accompanying drawing 3 is that the present invention is arranging the schematic diagram of device depositing object.
Identical with accompanying drawing 2 principle, be also mounted in and deposit on chamber door 03, realize arranging the function that display depositing some items is " depositing some items " or " Articles found, owner please contact ".
Accompanying drawing 4 is the present invention stored in behavior process flow diagram during article.
Accompanying drawing 5 is the present invention's behavior process flow diagrams when pulling items.
Here get thing phone number, comprise main validated user phone number and time effective phone number.
Accompanying drawing 6 is that the present invention is leading effective phone number to time behavior process flow diagram of effective phone number mandate.
Accompanying drawing 7 is that the present invention cancels time behavior process flow diagram of effective phone number mandate at main effective phone number.
Accompanying drawing 8 is the present invention when the problem that solves that Articles found, owner please contact, and after article, it is transparent for arranging and depositing chamber door, and uploads the behavior process flow diagram of article photo to internet.
Compared with accompanying drawing 4, this accompanying drawing only modify steps 1 is step 1.1 and 1.2., and modify steps 8 is 8.1
Accompanying drawing 9 is the present invention Articles found, owner please contact that problem is in solution, the owner of lost property find he lose article after behavior process flow diagram.
[specifically implementing]
Below in conjunction with the accompanying drawing in the present invention, the technical scheme in the embodiment of the present invention is clearly described.Embodiment described is obviously only one embodiment of the present of invention, instead of whole embodiment.Based on the embodiment in the present invention, other embodiments that those of ordinary skill in the art obtain when not departing from the present invention's essence and spirit, all belong to the scope that the present invention is open and protect.
Please refer to accompanying drawing 1, which show the structure principle chart of a kind of traceable fetcher of the present invention function locker that has that Articles found, owner please contact.
A kind of traceable fetcher of the present invention has that Articles found, owner please contact, and function locker comprises:
Locker 01: it constitute the outline all hardware of whole locker system all therein.It externally identifies the telephone number of this locker itself.
Register 02: can have one or more register in locker 01 is the space of true storing articles.
Deposit chamber door 03: close or open register, it externally identifies the numbering of this register.
Lock for deposit trunk 04: be arranged on and deposit on chamber door 03, the electronic lock controlled by central computation unit.
Transparency setting device 05: by accompanying drawing 2 and principle and the function of explaining this device known.
Deposit thing object setting device 06: by accompanying drawing 3 known this device profile and principle.
Central computation unit 07: be a computer hardware module is the computing center of system.
Authentication module 08: be computer software module, is responsible for generating corresponding " Service Ticket " according to subscriber phone number, and carries out identification certification to " Service Ticket " that user sends.
Database module 09: be computer software module, is responsible for user bound phone number and specific register is numbered.Being main effective phone number stored in the phone number used during article, be that time effective phone number is also bound by the phone number of main effective phone number mandate.Two class phone numbers all have the right to unblank to get thing to secondary register.
Camera 10: be mainly used in helping user to take lost article photo in Articles found, owner please contact process, this camera and user's load module 12 co-ordination.
Display module 11: during man-machine interaction, shows all system status informations, can be LED, or LCD display.
User's load module 12: during man-machine interaction, receiving the module of user's input, can be keyboard, mouse, touch-screen, microphone, or the combination in any between them.
Communication module 13: can access the wireline physical network interface card of internet, radio physical network interface card, maybe can access the GPRS module of mobile radio communication and fixed-line telephone network, 3G/4G module or SIM card module.This module is used for communication between locker system and user and the communication that Articles found, owner please contact between website, further communicates with background server for native system.
Supply module 14: the energy source being this locker system.
Locker wheel 15: had wheel, locker just can adjust distributing position flexibly, is the consideration based on convenience.
Thing to sit on upper surface 16: locker outside presents stool or chair shape is also the consideration based on convenience.
Please refer to accompanying drawing 2 is carry out the transparent device arranged to depositing chamber door 03.
Please refer to accompanying drawing 3 be to deposit chamber door 03 deposit thing object arrange device.
By accompanying drawing 1,2,3 we be aware of the design feature of a kind of traceable fetcher of the present invention function locker that has that Articles found, owner please contact.
Below, we will set forth behavioral characteristic of the present invention by example.It should be noted that and can only identify subject behavior flow process here, for some branch's flow processs, such as register is full up, and phone number input figure place is inadequate, waits the flow process far with the present invention of branchedness, believe the process that member of ordinary skill can be very friendly, repeat no longer one by one here.
Refer to accompanying drawing 4: here with time sequencing from top to bottom, clear see that user deposits logistics journey when depositing some items.
The feature of this flow process is:
● about step 1 and 5, when user uses " user's load module ", we can guarantee, user is at the scene.
● about step 1 to 7, even if many people operate locker simultaneously, all only know the register numbering of oneself so separately, do not interfere with each other.
● about step 6: lock for deposit trunk is opened, depositing chamber door and do not open, is dark evolution formula.The deposit thing talent corresponding with this register is only had to know this message.
● about step 8: user operation be as accompanying drawing 2, and the device shown in accompanying drawing 3.
● about step 11: system authentication module is numbered seed with bound phone number and register, produce random number " Service Ticket " (such as carrying out md5 hash) and send to user, ensureing the uniqueness of Service Ticket.This " Service Ticket " is that user performs mandate in the future, revocation, the foundation of unblanking.
Further, the authentication mode of locker of the present invention and cipher authentication mode use by actual applications simultaneously, can solve the article privacy problem after user mobile phone loss.
Referring to accompanying drawing 5 here can time sequencing from top to bottom, clearly sees that user gets logistics journey when taking article away.
This process features be:
● about step 1, user uses " user's load module " to send and gets thing request.Can guarantee that user is on the scene.
● about step 6, lock for deposit trunk is opened, and deposits chamber door and does not open, and is dark evolution formula.The deposit thing talent corresponding with this register is only had to know this message.
● about step 8, closing the door with shutting is system action, can ensure that this register is initialized to virgin state.
Refer to accompanying drawing 6: can time sequencing from top to bottom here, clearly see the flow process that main effective phone number is licensing to time effectively phone number and unblanks temporary.
This process features be:
● main effective phone number only sends a note, using key word as operational order.
● the Service Ticket of secondary validated user phone number needs to recalculate, different from the Service Ticket of main effective phone number.
● the bindings of database can be seen here.
● after success, send confirmation to major/minor two effective phone numbers simultaneously.
Refer to accompanying drawing 7: can time sequencing from top to bottom here, clearly see that main effective phone number is cancelling the behavior flow process of unblanking temporary.
This process features be:
● main effective phone number only sends a note, using key word as operational order.
● the unbind operation of database can be seen here, because database has journal function, so we also can follow the trail of this by the phone number of unbind once bound mistake.
● after success, send confirmation to two phone numbers simultaneously.
Refer to accompanying drawing 8: can time sequencing from top to bottom here, clearly to see when the problem that solves that Articles found, owner please contact, pick up people after finding article, deposit the behavior flow process as locker.
This process features be:
● the difference that accompanying drawing 4 deposits logistics journey and this accompanying drawing is only the step 1 in accompanying drawing 4, and be replaced the step 1.1 and 1.2 understood in this accompanying drawing, the step 8 in accompanying drawing 4 is replaced by 8.1 of this accompanying drawing
● about step 1.2, the shooting style of native system is, system can inquire that user uploads the need of taking pictures, user uses " user's load module 12 " to confirm to agree to, then article are positioned over before " camera 10 ", after " display module 11 " sees applicable image, take pictures in " user's load module 12 " upper click, system is taken pictures and recording photograph.After user deposits thing, database module is by this photo, register numbering, this locker telephone number, categorical attribute, when and where, as a record by communication module 13 be sent to certain specifically Articles found, owner please contact website (can background server be sent to when there being background server) extraneous (communication mode be still station address to station address, but station address commonly IP address here).
Refer to accompanying drawing 9: can time sequencing from top to bottom here, clearly see when the problem that solves that Articles found, owner please contact, the owner of lost property and locker, the owner of lost property and the behavior flow process picked up between people.
This process features be:
● be set forth the flow process that the owner of lost property sees oneself article on register here, if the owner of lost property sees the article oneself lost on the internet, this flow process is suitable for too, only need step 1 to replace with to find on the internet, oneself article, register is numbered, locker telephone number.
By above accompanying drawing, we can clearly learn, following information.
From depositing the behavior process flow diagram asked for: accompanying drawing 4 (stored in process flow diagram)+accompanying drawing 5 (getting thing process flow diagram).
Behavior process flow diagram from depositing him and getting: accompanying drawing 4 (stored in process flow diagram)+accompanying drawing 6 (authorization flow figure)+accompanying drawing 5 (getting thing process flow diagram).
The behavior process flow diagram that Articles found, owner please contact: accompanying drawing 8 (picking up people stored in process flow diagram)+accompanying drawing 5 (getting thing process flow diagram)
After having mandate arbitrarily, if main effective phone number thinks revocation, so can add (the revocation process flow diagram) of accompanying drawing 7.
It should be noted that, the present invention merely illustrates the behavior of a register, when multiple stage register works together, arranging a background server is better solution, such user can inquire about different locker telephone numbers at every turn, and only puts through a telephone number and just can deal with problems.
[attacking and defending experiment]
Fetcher denies getting thing, or keeper takes article away privately: system knows which phone number finally takes article away.Deny unsuccessfully!
Bad person opens in advance and deposits chamber door: only deposit thing people and just can know that the door of which register is secretly opened by mobile phone, and be 60 seconds (see accompanying drawing 4 and accompanying drawing 8) stored in stage chamber door uncaging time, depositing chamber door on the other hand needs manpower just can pull open, after loosing one's grip, deposit chamber door automatically to close, such energy ensures, first time pulls open the people depositing chamber door, for depositing thing people.
Bad person cannot implement.Even if after opening the door, cheat others is stored in article, and so system also knows it is which phone number opens the door.
A bad person's failure!

Claims (2)

1. a using method for the locker of the function that has that Articles found, owner please contact of traceable fetcher, it is characterized in that: in each interactive step, what locker system was all clear and definite knows which station address has the right taking depositing some items away; Validated user address can will take the right authorizes of article or revocation away to other any station addresss; People stored in article can take pictures or video upload to internet or certain external server of LAN (Local Area Network) for article; When user takes article away, system of users address is verified; Wherein, station address is mobile phone, and communication modes is note, and the using method of locker comprises:
Stored in article step:
1) user is by input through keyboard oneself phone number,
1.1) in Articles found, owner please contact situation, by system prompt, the mode that user coordinates, system is taken pictures for article to be deposited and is sent to external server,
2) " register numbering " is sent to user mobile phone by system,
3) user is manually inputted " register numbering " by keyboard,
4) system opens this lock for deposit trunk,
5) user pulls open register corresponding to this " register numbering ", stored in article,
5.1) in Articles found, owner please contact situation, user will deposit thing object and be set to " Articles found, owner please contact ",
5.2) in Articles found, owner please contact situation, user will deposit chamber door and be set to transparent or semitransparent,
6) register chamber door is closed, and door lock shuts,
7) thing people phone number is deposited in the binding of system Update Table storehouse, and thinks that the phone number that this deposits thing people is main effective phone number,
8) Service Ticket is sent to this main effective phone number,
9) user leaves;
Get thing step:
1) user gets thing request by keyboard to system transmission,
2) this user of system prompt uses effective phone number to send Service Ticket,
3) this user uses effective phone number to send out Service Ticket to system,
4) after this phone number of system validation and Service Ticket, " register numbering " is sent to user mobile phone,
5) user manually inputs " register numbering ",
6) corresponding with numbering register box door lock is opened,
7) user pulls open register chamber door, takes article away,
8) system by get contact in thing process phone number, the time is stored in database;
Authorisation step:
1) main effective phone number send Service Ticket and subsidiary " mandate " key word and target mobile phones number to system,
2) system sends to target mobile phones number, i.e. secondary effective phone number for authorized phone number regenerates Service Ticket, upgrades data-base recording and this time changes,
3) send the confirmation of Successful authorization to main effective phone number and time effective phone number;
Revocation step:
1) main effective phone number transmission Service Ticket also attaches " revocation " key word with time effective phone number to system,
2) system update database, record this time operation to secondary effective mobile phone revocation,
3) send the confirmation of successful revocation to main effective phone number and time effective phone number;
In Articles found, owner please contact process, deposit thing people and confirm owner of lost property's step:
1) owner of lost property sees oneself loss article by internet or through transparent register chamber door,
2) send note, deposit the contact method of thing people to system queries,
3) system tells that the owner of lost property deposits the contact method of thing people,
4) owner of lost property with deposit thing people and link up, determine owner of lost property's identity,
5) deposit thing people to license to the owner of lost property and unblank,
6) owner of lost property gets thing and goes away.
2., according to the using method of the locker of the function that has that Articles found, owner please contact of traceable fetcher a kind of described in claim 1, its feature is: the owner of lost property can see deposited article by internet or through depositing chamber door, thus determines whether it is the article that oneself is lost.
CN201310060779.1A 2013-02-27 2013-02-27 Deposit locker with tracing and lost finding functions and use method thereof Expired - Fee Related CN103198579B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310060779.1A CN103198579B (en) 2013-02-27 2013-02-27 Deposit locker with tracing and lost finding functions and use method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310060779.1A CN103198579B (en) 2013-02-27 2013-02-27 Deposit locker with tracing and lost finding functions and use method thereof

Publications (2)

Publication Number Publication Date
CN103198579A CN103198579A (en) 2013-07-10
CN103198579B true CN103198579B (en) 2015-04-01

Family

ID=48721069

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310060779.1A Expired - Fee Related CN103198579B (en) 2013-02-27 2013-02-27 Deposit locker with tracing and lost finding functions and use method thereof

Country Status (1)

Country Link
CN (1) CN103198579B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104952004A (en) * 2014-03-30 2015-09-30 杨华 Convenient lost article recovering system and method
CN104898588B (en) * 2015-03-26 2017-11-21 南通大学 Materials stream informationization article access device and operating method based on Internet of Things
CN104821021A (en) * 2015-03-30 2015-08-05 无锡市崇安区科技创业服务中心 Password information automatic push-based locker control system
CN105389680A (en) * 2015-11-04 2016-03-09 杭州半米科技有限公司 Home outdoor intelligent deposit system
CN105631785A (en) * 2015-12-30 2016-06-01 河海大学 A lost campus card processing system based on identification technology
CN106067153A (en) * 2016-05-30 2016-11-02 大连工业大学 A kind of Articles found, owner please contact system
CN107680205A (en) * 2016-08-02 2018-02-09 吴明 Use SIM card certification and the safety device of Electronic Coding technology
CN106709683A (en) * 2016-12-15 2017-05-24 苏州德启智能科技有限公司 Offline goods storage method and apparatus, and offline goods receiving method and apparatus
CN107862807B (en) * 2017-12-15 2020-05-19 卓圣洁 Self-service campus lost and found method and system without contact between owner and object picker
CN110150869B (en) * 2018-03-21 2021-07-13 齐鲁师范学院 a file management system
CN110097724B (en) * 2019-04-24 2021-06-29 苏州浪潮智能科技有限公司 A method and system for automatic care of items based on FPGA

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102606002A (en) * 2012-03-14 2012-07-25 南京物联传感技术有限公司 Wireless control safety box/cabinet and application method thereof
CN102663859A (en) * 2012-04-25 2012-09-12 深圳市智莱科技有限公司 Method and system for storing and withdrawing items on locker
CN102903167A (en) * 2012-09-26 2013-01-30 广州东软科技有限公司 Management system for renting and selling houses

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110288685A1 (en) * 2010-05-24 2011-11-24 Usem Ruth B System for Storage of Articles in a Secured Area

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102606002A (en) * 2012-03-14 2012-07-25 南京物联传感技术有限公司 Wireless control safety box/cabinet and application method thereof
CN102663859A (en) * 2012-04-25 2012-09-12 深圳市智莱科技有限公司 Method and system for storing and withdrawing items on locker
CN102903167A (en) * 2012-09-26 2013-01-30 广州东软科技有限公司 Management system for renting and selling houses

Also Published As

Publication number Publication date
CN103198579A (en) 2013-07-10

Similar Documents

Publication Publication Date Title
CN103198579B (en) Deposit locker with tracing and lost finding functions and use method thereof
CN109005186B (en) Method, system, equipment and storage medium for isolating user identity information
CN101116080B (en) The method of establishment Authorized Domain, equipment, system, token
CN102750494B (en) The method of protected data
CN104751545B (en) Door lock authorization process system and method and device
CN106652135A (en) Access control method and system based on cloud technology and two-dimensional code technology
CN101902328A (en) Method for verifying user identity by using dynamic passwords
CN109559407A (en) The secure access power of having time limitation
CN116325647A (en) Authentication chain using public key infrastructure
CN106489248A (en) System and method for the electron key supply related to mobile device and Access Management Access
CN101354798A (en) System for managing hotel finger print and working method thereof
CN206522020U (en) A kind of intelligent door lock and system
Wu et al. Digital identity, privacy security, and their legal safeguards in the Metaverse
CN103902281B (en) A kind of system that virtual objects repository is provided in Virtual Space
CN109255862A (en) A kind of access control management method and system for cell visitor
Kumar et al. Blockchain and internet of things (IoT) enabled smart e-voting system
US20140281482A1 (en) Secure storage and sharing of user objects
CN110866232B (en) Multiparty data service authorization platform
CN109087418A (en) A kind of intelligent unlocking method and system
CN107391977A (en) Control, automatic switching method, device and the equipment of authority
CN207123882U (en) A kind of antitheft cloud service door-locking system of multiple intelligent
CN111353926B (en) Police information cloud platform
Khanpara et al. Blockchain-based E-voting technology: opportunities and challenges
Sanaullah et al. Information Security Challenges in the Internet of Things (IoT) Ecosystem
CN115546934A (en) Container based on block chain, unlocking method and unlocking system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150401

Termination date: 20180227