CN106469489A - Object verification method, apparatus and system - Google Patents
Object verification method, apparatus and system Download PDFInfo
- Publication number
- CN106469489A CN106469489A CN201610798569.6A CN201610798569A CN106469489A CN 106469489 A CN106469489 A CN 106469489A CN 201610798569 A CN201610798569 A CN 201610798569A CN 106469489 A CN106469489 A CN 106469489A
- Authority
- CN
- China
- Prior art keywords
- replacement order
- mobile terminal
- security door
- identifier
- article
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012795 verification Methods 0.000 title claims abstract description 155
- 238000000034 method Methods 0.000 title claims abstract description 51
- 238000007639 printing Methods 0.000 claims description 201
- 238000012546 transfer Methods 0.000 claims description 24
- 238000004891 communication Methods 0.000 claims description 23
- 238000010200 validation analysis Methods 0.000 claims description 6
- 238000005516 engineering process Methods 0.000 abstract description 51
- 230000000694 effects Effects 0.000 abstract description 14
- 230000006870 function Effects 0.000 description 22
- 238000012545 processing Methods 0.000 description 12
- 238000013500 data storage Methods 0.000 description 11
- 238000010586 diagram Methods 0.000 description 11
- 230000008569 process Effects 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 238000007726 management method Methods 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000010926 purge Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07G—REGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
- G07G1/00—Cash registers
- G07G1/0018—Constructional details, e.g. of drawer, printing means, input means
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07G—REGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
- G07G1/00—Cash registers
- G07G1/0036—Checkout procedures
- G07G1/0045—Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader
- G07G1/0081—Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader the reader being a portable scanner or data reader
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The disclosure discloses a kind of object verification method, apparatus and system, belongs to field of computer technology.Object verification method includes:Obtain the mark of mobile terminal;Obtain and identify the corresponding hyperphoric order meeting verification condition, in hyperphoric order, comprise the Item Information of each object of acquisition for mobile terminal;It is identified to by the article of antitheft door, when the article identifying are not inconsistent with the hyperphoric order obtaining, export information.Solve the problems, such as to be still required for supermarket personnel in correlation technique to examine purchase bill and article successively and cannot realize completely self-service, reached and using antitheft door, automatically object can have been carried out with antitheft checking it is achieved that the effect of complete self-help shopping.
Description
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method, an apparatus, and a system for verifying a target object.
Background
When a supermarket is used for shopping, due to the fact that a large number of shoppers are available and the number of cashiers is limited, efficiency of shopping settlement is low, and a self-service shopping settlement mode is provided in the related technology aiming at the situation.
When self-service shopping settlement is carried out, a shopper draws a scanner through a supermarket membership card and scans bar codes on purchased commodities by using the scanner; when the self-service checkout is carried out at the exit, the information in the scanner is identified through the self-service checkout terminal, the total price of the purchased commodity is calculated, and the shopper is prompted to pay; the self-service checkout terminal gives out the purchase bill after the shopper pays successfully, and in order to avoid that the shopper maliciously takes the goods which are not purchased away, supermarket personnel need to sequentially verify the purchase bill and the goods which the shopper is about to take away.
In the self-service shopping settlement, since supermarket personnel are still required to check the purchase bill and the goods in turn, the self-service shopping is not completely self-service.
Disclosure of Invention
The disclosure provides a target object verification method, device and system. The technical scheme is as follows:
according to a first aspect of embodiments of the present disclosure, there is provided an object verification system, the system including a mobile terminal and a security door, wherein:
the mobile terminal is configured to acquire the article information of the target object and generate a replacement order according to the acquired article information; the security door is configured to acquire an identifier of the mobile terminal, acquire a replacement order corresponding to the identifier and meeting a verification condition, identify an article passing through the security door, and output prompt information when the identified article does not meet the acquired replacement order, wherein each target object defined in the replacement order meeting the verification condition is allowed to be taken away through the security door.
The mobile terminal generates a replacement order according to the acquired article information of the target object, when the mobile terminal and the target object pass through the security door, the security door judges whether the target object passing through the security door is in the replacement order meeting the verification condition, if the target object is not in the replacement order meeting the verification condition, prompt is given, because the security door can determine the corresponding replacement order meeting the verification condition according to the identification of the mobile terminal passing through the security door, and when the target object passing through the security door is judged not to be in accordance with the replacement order, the target object can be judged not to be added into the replacement order, prompt is given, so that the problem that complete self-service cannot be realized due to the fact that supermarket personnel still need to purchase bills and articles in sequence in the related technology is solved, and the purpose that the target object can be automatically subjected to security verification by the security door is achieved, the effect of complete self-service shopping is realized.
Optionally, the system further includes a printing device, where the printing device is configured to obtain a corresponding relationship between the identifier and the replacement order meeting the verification condition, or obtain a corresponding relationship between the identifier and the replacement order meeting the verification condition when the security door verifies that all the articles passing through the security door meet the obtained replacement order; the printing equipment is further configured to acquire an identifier of the mobile terminal, receive a printing instruction for printing a replacement order corresponding to the identifier and meeting the verification condition, print the replacement order, and clear the stored printed replacement order and the identifier corresponding to the replacement order after printing is successful.
The printing equipment in the application can acquire the replacement order, and when the identification of the mobile terminal is acquired, the replacement order which corresponds to the identification and meets the verification condition is printed, so that a user can print the replacement order at any time; or when the anti-theft verification determines that the articles passing through the anti-theft door all accord with the replacement order, printing the replacement order corresponding to the identification, so that the replacement order is allowed to be printed only when the articles passing through the anti-theft door are ensured to be in the replacement order meeting the verification condition.
In addition, after the printing equipment successfully prints the replacement order, the replacement order and the corresponding identification in the printing equipment are cleared, and the effect of saving the data storage space of the printing equipment is achieved.
Optionally, the security door is further configured to obtain a correspondence between the identifier and the replacement order meeting the verification condition; the security door is further configured to obtain an identifier of a mobile terminal, obtain a replacement order corresponding to the identifier and meeting verification conditions, identify an article passing through the security door, and output the prompt information when the identified article does not belong to the obtained replacement order or when the number of the identified article is different from the number of the articles in the obtained replacement order.
According to the anti-theft door, when the fact that the article is not in the replacement order corresponding to the identification or the article quantity does not accord with the order of the article in the replacement order is determined, the prompt information is output, the problem that complete self-service cannot be achieved due to the fact that a user mistakenly takes away the article which is not in the replacement order is solved, supermarket staff still need to check and purchase bills and articles in sequence in the related technology is solved, and anti-theft staff do not need to be arranged to verify the article which is taken away by the user, so that the effects of automatic verification of a target object and labor saving are achieved.
Optionally, the system further includes a deduction server, and the mobile terminal is further configured to send a transfer request for transferring the resource of the replaced order to the deduction server, where the transfer request includes an identifier of the mobile terminal; the deduction server is further configured to, after receiving the transfer request, obtain a resource library name bound to the identifier, transfer a total resource corresponding to the replacement order from a resource library having the resource library name, transfer the total resource to a predetermined resource library, and use the successfully transferred replacement order as the replacement order meeting the verification condition.
The deduction server deducts resources of a total resource value corresponding to the replacement order in the resource library of the mobile terminal, and completes replacement of the target object corresponding to the article information in the replacement order, so that the purpose of replacing the target object by using the resources is achieved, and the effect of self-help completion of shopping settlement is achieved.
Optionally, the security door is further configured to establish a bluetooth connection or a near field communication NFC connection with the mobile terminal, and acquire the identifier of the mobile terminal by using the established connection.
The anti-theft door in the application receives the identification of the mobile terminal through the NFC technology or the Bluetooth technology, so that the purpose of acquiring the identification of the mobile terminal in a short distance can be realized, the input process of a user to the identification of the mobile terminal is avoided, and the user can also be prevented from disguising replacement orders generated by other terminals.
According to a second aspect of the embodiments of the present disclosure, there is provided a target verification method applied to a security door, the method including: acquiring an identifier of a mobile terminal; acquiring a replacement order which corresponds to the identification and accords with a verification condition, wherein the replacement order comprises the article information of each target object acquired by the mobile terminal, and each target object limited in the replacement order which accords with the verification condition is allowed to be taken away through the security door; and identifying the article passing through the security door, and outputting prompt information when the identified article does not accord with the obtained replacement order.
According to the method and the device, the antitheft door judges that the target object passing through the antitheft door is in the replacement order meeting the verification condition, if the target object is not in the replacement order, prompt is carried out, the antitheft door can determine the corresponding replacement order meeting the verification condition according to the identification of the mobile terminal passing through the antitheft door, and when the target object passing through the antitheft door is judged to be inconsistent with the replacement order, the target object can be judged not to be added into the replacement order, so that prompt is carried out, the problem that complete self-service cannot be realized due to the fact that supermarket staff still need to check and purchase bills and articles in sequence in the related technology is solved, the antitheft verification of the target object can be automatically carried out by using the antitheft door, and the effect of complete self-service shopping is achieved.
Optionally, when the identified article does not conform to the obtained replacement order, outputting a prompt message, including: and when the identified article does not belong to the acquired replacement order or the number of the identified articles is different from the number of the articles in the acquired replacement order, outputting the prompt message.
According to the anti-theft door, when the fact that the article is not in the replacement order corresponding to the identification or the article quantity does not accord with the order of the article in the replacement order is determined, the prompt information is output, the problem that complete self-service cannot be achieved due to the fact that a user mistakenly takes away the article which is not added into the replacement order is solved, the problem that supermarket personnel are still required to sequentially verify and purchase bills and the article in the related technology is solved, and due to the fact that the anti-theft personnel are not required to be arranged to verify the article taken away by the user, the effects of automatically verifying a target object and saving manpower are achieved.
Optionally, the method further includes: and printing the replacement order after receiving a printing instruction for printing the replacement order and the identified article is consistent with the replacement order.
According to the method and the device, the security door can acquire the replacement order, and when the identification of the mobile terminal is acquired and the articles passing through the security door are confirmed to be consistent with the replacement order through the security door in the anti-theft verification, the replacement order corresponding to the identification is printed, so that the replacement order is allowed to be printed when the articles passing through the security door are ensured to be in the replacement order meeting the verification condition.
Optionally, the method further includes: when the identified article is consistent with the acquired replacement order, clearing the replacement order stored in the security door and the identification corresponding to the replacement order; or after the replacement order is printed successfully, the replacement order and the identification corresponding to the replacement order stored in the security door are cleared.
Optionally, the obtaining the identifier of the mobile terminal includes: and establishing Bluetooth connection or Near Field Communication (NFC) connection with the mobile terminal, and acquiring the identifier of the mobile terminal by utilizing the established connection.
The anti-theft door in the application receives the identification of the mobile terminal through the NFC technology or the Bluetooth technology, so that the purpose of acquiring the identification of the mobile terminal in a short distance can be realized, the input process of a user to the identification of the mobile terminal is avoided, and the user can also be prevented from disguising replacement orders generated by other terminals.
According to a third aspect of the embodiments of the present disclosure, there is provided a target authentication method applied to a printing apparatus, the method including: acquiring an identifier of a mobile terminal; receiving a printing instruction for printing a replacement order which corresponds to the identification and meets the verification condition, wherein each target object defined in the replacement order which meets the verification condition is allowed to be taken away through the security door; after the printing instruction is received and when the fact that the antitheft door verifies that the article passing through the antitheft door is in accordance with the replacement order corresponding to the identification and meeting the verification condition is obtained, the replacement order corresponding to the identification is obtained, and the replacement order comprises the article information of each target object obtained by the mobile terminal; and printing the obtained replacement order.
In this application, printing equipment acquires mobile terminal's sign, and is learning that the burglary-resisting door verifies out to pass through when the article of burglary-resisting door accords with the replacement order that the sign corresponds, print the replacement order that corresponds with this sign that acquires, because after the burglary-resisting door is successfully verified article and replacement order through the burglary-resisting door, just can print, still need supermarket personnel to verify in proper order and purchase bill and article and can't realize self-service problem completely among the correlation technique, can utilize the burglary-resisting door to carry out the theftproof verification to the target object automatically, when having realized shopping by oneself completely, can also avoid printing through printing equipment by special personnel, the manpower has been saved.
Optionally, the method further includes: and after the replacement order is printed successfully, clearing the stored printed replacement order and the identification corresponding to the replacement order.
According to a fourth aspect of the embodiments of the present disclosure, there is provided an object authentication device for use in a security door, the device comprising: a first obtaining module configured to obtain an identifier of a mobile terminal; the second acquisition module is configured to acquire a replacement order which corresponds to the identifier acquired by the first acquisition module and meets the verification condition, the replacement order comprises the article information of each target object acquired by the mobile terminal, and each target object defined in the replacement order which meets the verification condition is allowed to be taken away through the security door; and the identification module is configured to identify the article passing through the security door, and when the identified article does not accord with the replacement order acquired by the second acquisition module, prompt information is output.
Optionally, the identification module is configured to output the prompt message when the identified item does not belong to the replacement order acquired by the second acquisition module, or when the number of the identified item is different from the number of the items in the replacement order acquired by the second acquisition module.
Optionally, the apparatus further comprises: the printing module is configured to print the replacement order after receiving a printing instruction for printing the replacement order and the article identified by the identification module conforms to the replacement order.
Optionally, the apparatus further comprises: a first clearing module configured to clear the replacement order stored in the security door and the identifier corresponding to the replacement order when the item identified by the identification module matches the replacement order acquired by the second acquisition module; or/and the second clearing module is configured to clear the replacement order and the identifier corresponding to the replacement order stored in the security door after the printing module successfully prints the replacement order.
Optionally, the first obtaining module includes: a connection sub-module configured to establish a Bluetooth connection or a Near Field Communication (NFC) connection with the mobile terminal; an obtaining sub-module configured to obtain the identifier of the mobile terminal by using the connection established by the connecting sub-module.
According to a fifth aspect of the embodiments of the present disclosure, there is provided an object authentication apparatus applied to a printing device, the apparatus including: a first obtaining module configured to obtain an identifier of a mobile terminal; a receiving module configured to receive a print instruction for printing a replacement order meeting a verification condition corresponding to the identifier acquired by the first acquiring module, wherein each target object defined in the replacement order meeting the verification condition is allowed to be taken away through the security door; the second obtaining module is configured to obtain a replacement order corresponding to the identifier obtained by the first obtaining module when the security door verifies that the article passing through the security door is consistent with the replacement order corresponding to the identifier and meeting the verification condition after the receiving module receives the printing instruction, and the replacement order includes article information of each target object obtained by the mobile terminal; a printing module configured to print the replacement order acquired by the second acquisition module.
Optionally, the apparatus further comprises: and the clearing module is configured to clear the stored printed replacement order and the identification corresponding to the replacement order after the replacement order is successfully printed by the printing module.
According to a sixth aspect of embodiments of the present disclosure, there is provided a target verification apparatus, the apparatus comprising: a processor; a memory for storing the processor-executable instructions; wherein the processor is configured to: acquiring an identifier of a mobile terminal; acquiring a replacement order which corresponds to the identification and accords with a verification condition, wherein the replacement order comprises the article information of each target object acquired by the mobile terminal, and each target object limited in the replacement order which accords with the verification condition is allowed to be taken away through the security door; and identifying the article passing through the security door, and outputting prompt information when the identified article does not accord with the obtained replacement order.
According to a seventh aspect of embodiments of the present disclosure, there is provided an object authentication device, the device comprising: a processor; a memory for storing the processor-executable instructions; wherein the processor is configured to: acquiring an identifier of a mobile terminal; receiving a printing instruction for printing a replacement order which corresponds to the identification and meets the verification condition, wherein each target object defined in the replacement order which meets the verification condition is allowed to be taken away through the security door; after the printing instruction is received and when the fact that the antitheft door verifies that the article passing through the antitheft door is in accordance with the replacement order corresponding to the identification and meeting the verification condition is obtained, the replacement order corresponding to the identification is obtained, and the replacement order comprises the article information of each target object obtained by the mobile terminal; and printing the obtained replacement order.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is an architectural diagram illustrating an object verification system in accordance with some exemplary embodiments;
FIG. 2 is a block diagram of a server according to some exemplary embodiments;
FIG. 3 is a block diagram of a terminal according to some exemplary embodiments;
FIG. 4 is a flow diagram illustrating a method of target verification, according to an exemplary embodiment;
FIG. 5 is a flow chart illustrating a method of target verification according to another exemplary embodiment;
FIG. 6 is a block diagram illustrating a target verification device, according to an exemplary embodiment;
fig. 7 is a block diagram illustrating a target object authentication device according to another exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
System environment
FIG. 1 is an architectural diagram illustrating an object verification system according to some exemplary embodiments. The system comprises: mobile terminal 110 and security door 120.
The mobile terminal 110 typically needs to install a client that supports shopping, which may be a shopping-like client, a social-like application client, or other application-like client that provides a portal for replacing objects with resources. The mobile terminal 110 may be a smart phone, a tablet computer, an e-reader, etc.
The security door 120 may obtain information about items passing through the security door 120.
In an object authentication system, there is usually at least one security door 120, and each security door 120 can be used as an exit for providing object authentication for other mobile terminals 110 to perform object authentication.
Optionally, the system may further include a printing device 130. The printing apparatus 130 generally has a function of collectively printing objects that meet the authentication condition, such as a common receipt printer.
Alternatively, the printing device 130 and the security door 120 of the system may be integrated or separated.
Optionally, the system may also include a withholding server 140. The deduction server 140 is a server computer system for performing resource deduction, and may be a server dedicated for performing resource deduction, or a server provided in a place where a target object is replaced with a resource (e.g., a consuming place such as a supermarket, a mall, a sports hall, etc.) for performing resource deduction. The deduction server 140 may be one server or a cluster of multiple servers, and each server is used for implementing one or more functional modules. Withholding server 140 may be a cluster of background server systems that provide resource withholding services. The background server system providing the resource deduction service may be a background server system of a shopping client, a background server system of an instant chat program, a background server system of a voice chat program, or a background server system of a social application, and the like.
Alternatively, the client installed on mobile terminal 110 may be an application (APP for short) provided by withholding server 140.
Alternatively, the deduction server 140 may spontaneously provide information related to the target object meeting the verification condition to the security door 120.
In addition, the mobile terminal 110 may be connected to the withholding server 140 through a wired network or a wireless network; the security door 120 can also be connected to the withholding server 140 through a wired network or a wireless network; the printing device 130 may also be connected to the withholding server 140 via a wired network or a wireless network.
Optionally, the security door 120, the printing device 130 and the deduction server 140 may all belong to a replacement system of a resource replacement target object. Taking a supermarket as an example, the security door 120, the printing device 130 and the withholding server 140 may all belong to a shopping system of the supermarket.
Computer framework
FIG. 2 is a block diagram illustrating a server in accordance with some exemplary embodiments. The server 200 may be the withholding server 140 in the system of fig. 1.
Referring to FIG. 2, server 200 includes a processing component 202 that further includes one or more processors and memory resources, represented by memory 204, for storing instructions, such as applications, that are executable by processing component 202. The application programs stored in memory 204 may include one or more modules that each correspond to a set of instructions. Further, the processing component 202 is configured to execute instructions to perform the above-described target verification method.
The server 200 may also include a power component 206 configured to perform power management of the server 200, a wired or wireless network interface 208 configured to connect the server 200 to a network, and an input/output (I/O) interface 210. The server 200 may operate based on an operating system stored in memory 204, such as Windows Server, MacOS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
Fig. 3 is a block diagram of a terminal according to some exemplary embodiments.
Terminal 300 may include one or more of the following components: a processing component 302, a memory 304, a power component 306, a multimedia component 308, an audio component 310, an input/output (I/O) interface 312, a sensor component 314, and a communication component 316.
The processing component 302 generally controls overall operation of the terminal 300, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 302 may include one or more processors 318 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 302 can include one or more modules that facilitate interaction between the processing component 302 and other components. For example, the processing component 302 may include a multimedia module to facilitate interaction between the multimedia component 308 and the processing component 302.
The memory 304 is configured to store various types of data to support operations at the terminal 300. Examples of such data include instructions for any application or method operating on the terminal 300, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 304 may be implemented by any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power supply component 306 provides power to the various components of the terminal 300. The power components 306 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the terminal 300.
The multimedia component 308 includes a screen that provides an output interface between the terminal 300 and the user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 308 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the terminal 300 is in an operation mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 310 is configured to output and/or input audio signals. For example, the audio component 310 includes a Microphone (MIC) configured to receive an external audio signal when the terminal 300 is in an operation mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 304 or transmitted via the communication component 316. In some embodiments, audio component 310 also includes a speaker for outputting audio signals.
The I/O interface 312 provides an interface between the processing component 302 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 314 includes one or more sensors for providing various aspects of status assessment for the terminal 300. For example, sensor assembly 314 may detect an open/closed state of terminal 300, the relative positioning of components, such as a display and keypad of terminal 300, the change in position of terminal 300 or a component of terminal 300, the presence or absence of user contact with terminal 300, the orientation or acceleration/deceleration of terminal 300, and the change in temperature of terminal 300. Sensor assembly 314 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 314 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 314 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 316 is configured to facilitate communications between the terminal 300 and other devices in a wired or wireless manner. The terminal 300 may access a wireless network based on a communication standard, such as Wi-Fi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 316 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 316 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the terminal 300 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described object authentication methods.
In an exemplary embodiment, a non-transitory computer readable storage medium comprising instructions, such as the memory 304 comprising instructions, executable by the processor 318 of the terminal 300 to perform the object verification method described above is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
The terminal 300 may be the mobile terminal 110 in the system of fig. 1, the security door 120 in the system of fig. 1, or the printing device 130 in the system of fig. 1.
It should be noted that when the terminal 300 is the printing device 130, the terminal 300 should further include a printing component configured to print data. For example, the printing assembly includes a transferor that is configured to rotate when the apparatus is in an operational mode, such as when a print command is executed. The printed data may further be stored in memory 304 or transmitted via communications component 316. In some embodiments, the printing assembly further comprises a connector and gears to assist in the rotation of the transferor.
Exemplary architecture
In practical application, in order to realize self-service shopping and self-service verification, the mobile terminal generates a replacement order according to the object information of a target object, the security door verifies the object passing through the security door by using the replacement order, and when the verification fails, the security door prompts to realize self-service verification. In an exemplary embodiment:
and the mobile terminal 110 is configured to acquire the item information of the target object and generate a replacement order according to the acquired item information.
In one possible implementation, the mobile terminal 110 may have a scanning function, such as scanning a graphic code on a target object. Generally speaking, a camera on the mobile terminal 110 may be used to scan the graphic code. Obviously, in practical applications, the mobile terminal 110 may also be provided with a scanner for scanning graphic codes.
The graphic code may be a barcode or an object including article information displayed in an image form such as a two-dimensional code.
The packaging of the object is typically printed with a graphic code, which is typically printed on the object when it leaves the factory, or alternatively, the object is affixed or printed on when it is provided for replacement.
Generally speaking, in order to reduce the types of graphic codes, the same type of article is usually provided with the same graphic code, the graphic code generally has a unique code number, and the code number of the graphic code can be used for identifying a target object of the same type of article. For example, napkins of a certain type have the same code number, and blisters of a certain type have the same code number. Obviously, different articles of the same type may also have different code numbers.
Taking a bar code as an example, the code number may be a series of numbers below the bar code.
In another possible implementation manner, when acquiring the code number of the target object, the mobile terminal 110 may also directly acquire the numeric string input by the user according to the numeric string below the barcode on the target object, in addition to the manner of obtaining the code number by scanning the graphic code on the target object, where the input numeric string is the code number of the target object.
After the user scans the graphic code on the target object by using the mobile terminal 110, the mobile terminal 110 displays the scanned object information. In practical implementation, the mobile terminal 110 may read the item information corresponding to the code number of the graphic code from a system of the supermarket (such as a system for providing the item information by the supermarket).
Item information for an object as referred to herein may generally include the name, quantity, resource (i.e., price or other equivalent replacement unit, such as points, virtual items, etc.), color, style, item picture, etc. of the object.
When the mobile terminal 110 displays the acquired article information of the target object, an adding control may also be displayed on the interface of the mobile terminal 110, and after the adding control is triggered, the mobile terminal 110 combines the article information of each added target object into a replacement order.
Optionally, when the item information of the added target object is displayed, the mobile terminal 110 may further display a subtraction control and a deletion control at the position of the item information. When a user triggers a subtracting control at a certain article information position, the user indicates that the number of the target objects corresponding to the article information needs to be subtracted, and at the moment, the number of the article information is correspondingly subtracted by 1; when the user triggers the deletion control at a certain article information position, the user indicates that the target object corresponding to the article information is no longer selected as the replaced article, and the displayed article information is cleared at the moment.
Alternatively, mobile terminal 110 may provide the identity of mobile terminal 110 and the corresponding replacement order to the order validation server.
The security door 120 is configured to obtain an identifier of the mobile terminal 110, obtain a replacement order corresponding to the identifier and meeting a verification condition, identify an article passing through the security door 120, and output prompt information when the identified article does not match the obtained replacement order.
Each object defined in the replacement order meeting the validation criteria as described herein is allowed to be removed through the security door 120.
After the user finishes shopping, the user needs to pass the verification of the security door 120, at this time, after the security door 120 obtains the identifier of the mobile terminal 110 held by the user, the security door 120 can obtain a replacement order corresponding to the identifier, the security door can identify the article information of the article passing through the security door 120, and when the article information does not conform to the replacement order, prompt information is output.
The security door 120 may obtain, for example, a replacement order meeting the verification condition corresponding to the identifier of the mobile terminal 110 from an order verification server. Here, the order verification server may verify whether the replacement order corresponding to the identification of the mobile terminal 110 meets the verification condition, and the order verification server may provide the replacement order corresponding to the identification of the mobile terminal 110 to the security door 120 when the replacement order meets the verification condition.
Optionally, each article is provided with an electronic tag, and the electronic tag includes article information. The security door can identify the electronic tag of the article passing through the security door so as to acquire the article information contained in the electronic tag. For example, the electronic tag may be a bluetooth low energy tag.
To sum up, in the target object verification system provided in the embodiment of the present invention, the mobile terminal generates the replacement order according to the obtained object information of the target object, when the mobile terminal and the target object pass through the security door, the security door determines whether the target object passing through the security door is in the replacement order meeting the verification conditions, if the target object is not in the replacement order meeting the verification conditions, the security door prompts, because the security door can determine the corresponding replacement order meeting the verification conditions according to the identifier of the mobile terminal passing through the security door, and when the target object passing through the security door is determined to be not in accordance with the replacement order, it can be determined that the target object is not added to the replacement order, so as to prompt, therefore, the problem that in the related art, a supermarket still needs to sequentially verify a bill and an object and cannot realize complete self-service is solved, and the security door can be used to automatically perform security verification on the target object, the effect of complete self-service shopping is realized.
In practical application, after the user selects an article, the user may want to check information of the selected article, and at this time, the printing device may be used to print a replacement order of the user, that is, the printing device obtains the replacement order of the mobile terminal according to an identifier of the mobile terminal held by the user, and prints out the replacement order. In an exemplary embodiment:
the printing device 130 is configured to obtain a corresponding relationship between the identifier and the replacement order meeting the verification condition, or obtain a corresponding relationship between the identifier and the replacement order meeting the verification condition when the security door 120 verifies that the articles passing through the security door 120 all meet the obtained replacement order.
In one implementation, the printing device 130 may directly obtain the replacement order and the corresponding identifier meeting the verification condition without the verification result of the security door 120 on the replacement order.
In another implementation, the printing device 130 may allow the print device 130 to print only the replacement order successfully verified by the security door 120 based on the verification result of the security door 120 for the replacement order, and at this time, the printing device 130 obtains the corresponding relationship between the identifier and the replacement order when the security door 120 verifies that all the objects passing through the security door 120 are consistent with the obtained replacement order. In actual implementation, after the replacement order is successfully verified, the security door 120 sends a notification to the printing device 130, and the printing device 130 reads the successfully verified replacement order and the identifier; alternatively, the printing device 130 may first obtain the replacement order and the identifier, and after the security door 120 successfully verifies the replacement order, the printing device 130 is allowed to print the successfully verified replacement order.
Alternatively, the printing device 130 may be an add-on device installed on the security door 120 or as part of the security door 120, and the printing device 130 may directly print out the replacement order when the security door 120 verifies that the items passing through are all in compliance with the replacement order.
The printing device 130 is further configured to obtain an identifier of the mobile terminal 110, receive a print instruction for printing a replacement order corresponding to the identifier and meeting the verification condition, print the replacement order, and clear the stored printed replacement order and the identifier corresponding to the replacement order after printing is successful.
The printing device 130 needs to acquire the identifier of the mobile terminal 110 before printing the replacement order, and may receive the identifier manually input by the user when acquiring the identifier of the mobile terminal 110, or may establish an NFC connection or a bluetooth connection between the printing device 130 and the mobile terminal 110, and acquire the identifier sent by the mobile terminal 110 according to the established connection, where the acquisition manner is not specifically limited.
For example, in an application scenario, a user holds the mobile terminal 110 and walks to the printing device 130, the mobile terminal 110 serves as a bluetooth transmitter, the printing device 130 serves as a bluetooth receiver, the mobile terminal 110 broadcasts an identifier of itself through a bluetooth signal, and the printing device 130 can obtain the identifier of the mobile terminal 110.
For another example, in another application scenario, a user brings the mobile terminal 110 close to an NFC identification area on the printing device 130, and the mobile terminal 110 has an NFC function, at this time, the printing device 130 may acquire the identifier sent by the mobile terminal 110 through an NFC frequency field.
After the printing device 130 acquires the identifier of the mobile terminal 110, a replacement order and a printing control corresponding to the identifier may be displayed on the printing device 130, and after the printing control is triggered, the printing device 130 receives a printing instruction that a user requires to print the replacement order corresponding to the identifier, and at this time, the printing device 130 may print the replacement order corresponding to the identifier.
Further, since the data storage space of the printing apparatus 130 may be limited, the printing apparatus 130 may delete a replacement order for which printing was successful and an identification corresponding to the replacement order, thereby saving the data storage space of the printing apparatus 130. In addition, in order to prevent the user from maliciously repeating printing, the printing apparatus 130 also provides the replacement order with a printing function only once, and deletes the replacement order after the replacement order is successfully printed.
It should be noted that, in order to facilitate the inventory of the replaced items by the item provider, the system of the item provider stores the replacement orders, where the replacement orders that are cleared are the replacement orders that have been successfully printed and stored by the printing device 130, and are not the replacement orders that are stored by the system of the item provider that are synchronously cleared.
To sum up, in the target verification system provided in the embodiment of the present disclosure, the printing device may obtain the replacement order, and print the replacement order corresponding to the identifier and meeting the verification condition when obtaining the identifier of the mobile terminal, so that the user may print the replacement order at any time; or when the anti-theft verification determines that the articles passing through the anti-theft door all accord with the replacement order, printing the replacement order corresponding to the identification, so that the replacement order is allowed to be printed only when the articles passing through the anti-theft door are ensured to be in the replacement order meeting the verification condition.
In addition, after the printing equipment successfully prints the replacement order, the replacement order and the corresponding identification in the printing equipment are cleared, and the effect of saving the data storage space of the printing equipment is achieved.
When the security door is used for verifying the article, the identification of the mobile terminal which is being verified needs to be acquired, so that the security door can conveniently inquire out the replacement order corresponding to the identification of the mobile terminal. In an exemplary embodiment:
the security door 120 is further configured to obtain a correspondence between the identification and the replacement order meeting the verification condition.
In one possible implementation, the security door 120 may directly obtain the correspondence between the identifier and the replacement order.
In another possible implementation manner, the security door 120 may also actively request to obtain a certain replacement order and a corresponding identifier when the replacement order is needed. At this time, the security door 120 may send an acquisition request carrying an identifier, so as to receive a replacement order corresponding to the identifier.
The security door 120 is further configured to obtain an identifier of the mobile terminal 110, obtain a replacement order corresponding to the identifier, identify an item passing through the security door 120, and output the prompt message when the identified item does not belong to the queried replacement order or when the number of the identified items is different from the number of the items in the queried replacement order.
Optionally, each article is provided with an electronic tag, and the electronic tag includes article information. The security door 120 may identify the electronic tag of the item passing through the security door 120 to obtain the item information contained in the electronic tag. For example, the electronic tag may be a bluetooth low energy tag.
After the security door 120 obtains the identifier of the mobile terminal 110, if the article passing through the security door 120 is verified not to be in the replacement order corresponding to the identifier, or the quantity of a certain article is inconsistent with the quantity of the article in the replacement order, the security door 120 may send a prompt message to remind the user or the supermarket staff.
It should be noted that the manner of sending the prompt message by the security door 120 may be outputting a text message, sending a buzzer, or playing music, and is not limited herein.
To sum up, in the target object verification system provided by the embodiment of the present disclosure, when it is determined that an article is not in a replacement order corresponding to an identifier or the number of articles does not conform to the order of the article in the replacement order, a prompt message is output, so as to prevent a user from mistakenly taking away the article that is not in the replacement order, and solve the problem that in the related art, a supermarket person still needs to sequentially verify a purchase bill and the article, and thus complete self-service cannot be realized.
Before the security door is subjected to article verification, the target object may need to be replaced, and in the replacement process, the mobile terminal needs to initiate a resource transfer request to the deduction server to trigger the deduction server to transfer resources to a replacement order submitted by the mobile terminal, so that the replacement of the target object is completed. In an exemplary embodiment:
the mobile terminal 110 is further configured to send a transfer request for transferring the resource of the replacement order to the withholding server 140, where the transfer request includes an identifier of the mobile terminal 110. When the mobile terminal 110 replaces the target object, the article information of the target object selected by the user as the replacement object is combined into a replacement order, and after the total resource value corresponding to the replacement order is calculated, the deduction server 140 may be given the authority that the deduction server 140 may transfer the resource in the resource library of the mobile terminal 110 by sending a resource transfer request to the deduction server 140.
The resource transfer request includes the identifier of the mobile terminal, the order number generated for the replacement order, and the total resource value corresponding to the replacement order, and is used to request the deduction server 140 to transfer the resource with the total resource value from the resource pool of the mobile terminal 110 for the order number. Generally, the resource transfer request also includes an identification of the mobile terminal 110.
The total resource value is used for indicating the total sum of the resource values corresponding to the item information in the replacement order. The resource value referred to herein may be the amount of money, credits, game pieces, buy-in pieces, virtual gifts, and the like. That is, the resource may be money, credits, game chips, buy-in chips, virtual gifts, and the like. The present embodiment does not limit the specific indication of the resource.
The deduction server 140 is further configured to, after receiving the transfer request, obtain the resource library name bound to the identifier, transfer the total resource corresponding to the replacement order from the resource library having the resource library name, transfer the total resource to a predetermined resource library, and take the successfully transferred replacement order as the replacement order meeting the verification condition.
The deduction server 140 obtains the corresponding resource transfer privilege by receiving the resource transfer request sent by the mobile terminal 110, so that the deduction server 140 can query the resource pool name bound with the identifier of the mobile terminal, thereby entering the resource pool, transferring the resource of the total resource value corresponding to the replacement order, and the transferred resource is usually stored in a certain pre-specified resource pool of the supermarket.
The resource pool includes resources, which may be bank debit card, bank credit card or payment application.
To sum up, in the target verification system provided in the embodiment of the present disclosure, the deduction server deducts the resource of the total resource value corresponding to the replacement order in the resource library of the mobile terminal, and completes the replacement of the target corresponding to the item information in the replacement order, so as to achieve the purpose of replacing the target by using the resource, and achieve the effect of self-service completion of shopping settlement.
In practical application, before verifying the article of the passing user, the security door needs to acquire the identifier of the mobile terminal held by the passing user, and then the replacement order corresponding to the identifier can be inquired, so that the article of the passing user is identified and verified. In an exemplary embodiment:
the security door 120 is further configured to establish a bluetooth connection or a Near Field Communication (NFC) connection with the mobile terminal 110, and acquire the identity of the mobile terminal 110 by using the established connection.
In general, the mobile terminal 110 may support NFC technology or bluetooth technology.
Generally, a transmitting end which needs to transmit information by using NFC is usually configured in a passive mode, and provides a radio frequency field in the passive mode, and transmits information to a receiving end which is in the active mode and receives information by using NFC, and after the receiving end enters the radio frequency field, the receiving end can identify the information transmitted by the transmitting end. Therefore, the mobile terminal 110 as the transmitting end provides the radio frequency field in the passive mode, and transmits the identification of the mobile terminal 110 to the security door 120 as the receiving end through the radio frequency field.
The bluetooth is a short-distance wireless communication technology, and devices for bluetooth communication are also generally divided into an active mode and a passive mode, generally speaking, a transmitting end which needs to transmit information by using bluetooth and a receiving end which needs to receive information by using bluetooth are not allocated in a so-called master-slave mode, but a terminal in the active mode needs to actively search for a terminal in the passive mode and initiate bluetooth pairing to the terminal in the passive mode to complete bluetooth connection, and the transmitting end and the receiving end can transmit information to each other by using bluetooth on the basis of establishing bluetooth connection. Therefore, on the premise that the receiving-side security door 120 and the transmitting-side mobile terminal 110 do not have a so-called master-slave mode, after the two parties complete bluetooth pairing and establish bluetooth connection, the security door 120 receives the identifier of the mobile terminal 110, which is sent by the mobile terminal 110 through bluetooth.
Optionally, the user may also input the identifier of the mobile terminal 110 held by the user at the information input port of the security door 120, and the security door may directly obtain the identifier.
The identifier of the mobile terminal 110 may be a communication number of the mobile terminal, or information that serves as a identifier, such as a Media Access Control (MAC) address of the mobile terminal 110, and is not particularly limited herein.
To sum up, in the target verification system provided in the embodiment of the present disclosure, the security door receives the identifier of the mobile terminal through the NFC technology or the bluetooth technology, so that the purpose of obtaining the identifier of the mobile terminal in a short distance can be achieved, an input process of the identifier of the mobile terminal by the user is avoided, and the user can also avoid pretending a replacement order that has been generated by another terminal.
Fig. 4 is a flowchart illustrating an object authentication method according to an exemplary embodiment, and the object authentication method is applied to the security door 120 in the system shown in fig. 1, as shown in fig. 4, and includes the following steps.
In step 401, a bluetooth connection or a Near Field Communication (NFC) connection is established with the mobile terminal, and the identifier of the mobile terminal is obtained by using the established connection.
Conventionally, the mobile terminal may support bluetooth technology or NFC technology, and accordingly, the security door may also support bluetooth technology or NFC technology.
When the mobile terminal starts the Bluetooth function, correspondingly, the security door also needs to start the Bluetooth function, and after the mobile terminal establishes connection with the security door through the Bluetooth technology, the mobile terminal serving as a sender sends the identification of the mobile terminal to the security door serving as a receiver.
Optionally, when the mobile terminal starts the NFC function, the security door also needs to support the NFC function, and at this time, the security door may acquire the identifier sent by the mobile terminal through the NFC frequency field only by the mobile terminal needing to be close to the NFC identification area of the security door.
Optionally, when the user passes through the security door, the identity of the mobile terminal held by the user can be obtained by the security door through the identity of the mobile terminal manually input on the information input port of the security door.
In step 402, a replacement order corresponding to the identifier is obtained, the replacement order includes the item information of each target object obtained by the mobile terminal, and each target object defined in the replacement order meeting the verification condition is allowed to be taken away through the security door.
In practical application, a plurality of mobile terminals participating in verification are provided, and each mobile terminal has a corresponding replacement order, so that after the security door acquires the identifier of the mobile terminal, the security door can acquire the replacement order corresponding to the identifier according to the identifier.
Optionally, the security door acquires a replacement order corresponding to the identifier and meeting the verification condition according to the acquired identifier.
The replacement order mentioned here includes the item information of each item that meets the verification condition, and the item information at least includes the resource value, code number, quantity, etc. corresponding to the target item. Obviously, in order to facilitate the user to identify the selected target object, the article information of the target object may further include a picture of the target object, and the like.
In step 403, the items passing through the security door are identified, and when the identified items do not belong to the acquired replacement order or when the number of the identified items is different from the number of the items in the acquired replacement order, a prompt message is output.
In actual implementation, the security door identifies the article information of the article passing through the security door according to the obtained replacement order, so that whether the article held by the user exists in the replacement order can be checked one by one.
When the article information of the scanned article exists in the replacement order and the article quantity is larger than the quantity corresponding to the article in the replacement order, outputting prompt information, wherein the prompt information can be used for prompting a user to replace the redundant quantity of the article.
When the item information of the scanned item exists in the replacement order and the quantity of the item is smaller than the quantity corresponding to the item in the replacement order, prompt information is output, and the prompt information at the moment can be used for prompting the user to extract the insufficient quantity of the item.
When the article information of the scanned article does not exist in the replacement order, the prompt information is output, and the prompt information at the moment can be used for prompting the user to replace the article.
Optionally, the prompting mode of the security door may be outputting text information, sending a buzzer, or playing music, and the prompting mode is not specifically limited herein.
In step 404a, when the identified item matches the obtained replacement order, the replacement order and the identifier corresponding to the replacement order stored in the security door are cleared.
When the item information of the scanned item exists in the replacement order and the quantity of the item is the same as the quantity corresponding to the item in the replacement order, the security door may delete the replacement order currently participating in the verification and the identifier corresponding to the replacement order at this time because the data storage space of the security door may be limited.
In step 404b, after a print instruction for printing the replacement order is received and the identified article matches the replacement order, the replacement order is printed, and then the replacement order and the identifier corresponding to the replacement order stored in the security door are cleared.
Optionally, the security door may further have a print function of a replacement order, and when it is verified that the item information of the scanned item exists in the replacement order and the number of the item is the same as the number corresponding to the item in the replacement order, the security door may determine whether to print the replacement order according to a selection of the user. After the security door is printed and replaced, the replacement order and the identification corresponding to the replacement order stored in the security door can be cleared.
Optionally, if the security door does not receive the print instruction for the replacement order within the predetermined time period, the replacement order and the identifier corresponding to the replacement order stored in the security door may still be cleared.
In summary, in the target object verification method provided in the embodiment of the present disclosure, the security door determines that the target object passing through the security door is in the replacement order meeting the verification condition, and if the target object is not in the replacement order, a prompt is performed, because the security door can determine the corresponding replacement order meeting the verification condition according to the identifier of the mobile terminal passing through the security door, and when it is determined that the target object passing through the security door does not meet the replacement order, it can be determined that the target object is not added to the replacement order, so as to perform the prompt, thereby solving the problem that in the related art, a supermarket person still needs to sequentially verify purchase and goods, and thus a complete self-service bill cannot be realized, achieving the effect of automatically performing the security verification on the target object by using the security door, and realizing a complete self-service shopping bill. In addition, when the security door in the application determines that the article is not in the replacement order corresponding to the identification or the number of the articles does not conform to the order of the article in the replacement order, prompt information is output, so that the problem that complete self-service cannot be realized due to the fact that supermarket personnel still need to check and purchase bills and articles in sequence in the related technology is solved, and the security personnel do not need to be arranged to verify the articles taken away by the user any more, so that the effects of automatically verifying the target object and saving manpower are achieved.
Meanwhile, the security door in the application can acquire the replacement order, and when the identification of the mobile terminal is acquired and the articles passing through the security door are determined to be consistent with the replacement order through the anti-theft verification, the replacement order corresponding to the identification is printed, so that the replacement order is allowed to be printed when the articles passing through the security door are ensured to be in the replacement order meeting the verification condition.
Finally, the anti-theft door in the application receives the identification of the mobile terminal through the NFC technology or the Bluetooth technology, so that the purpose of acquiring the identification of the mobile terminal in a short distance can be realized, the input process of the user to the identification of the mobile terminal is avoided, and the user can also be prevented from disguising the replacement orders generated by other terminals.
It should be added that the security door is not limited to the steps in fig. 4 when the target object authentication is implemented, and some of the steps in fig. 4 may also be implemented separately as an embodiment. For example, step 401, step 402, and step 403 may be implemented separately as one embodiment; for example, step 401, step 402, step 403 and step 404a may be implemented separately as one embodiment; as another example, step 401, step 402, step 403, and step 404b may be implemented separately as one embodiment. In other embodiments, steps in fig. 4 may be deleted or replaced, such as deleting step 401, or replacing step 401 with: the identification of the mobile terminal is obtained by means of input of a user on the security door.
Fig. 5 is a flowchart illustrating an object authentication method according to another exemplary embodiment, which is applied to the printing apparatus 130 of the system illustrated in fig. 1, as illustrated in fig. 5, and includes the following steps.
In step 501, the identity of the mobile terminal is obtained.
Conventionally, a mobile terminal may support bluetooth technology or NFC technology, and accordingly, a printing device may also support bluetooth technology or NFC technology.
When the mobile terminal starts the bluetooth function, the printing device needs to start the bluetooth function accordingly, and after the mobile terminal establishes a connection with the printing device through the bluetooth technology, the mobile terminal as the sender sends its identifier to the printing device as the receiver.
Optionally, when the mobile terminal starts the NFC function, the printing device needs to support the NFC function, and at this time, the mobile terminal only needs to be close to the NFC identification area of the printing device, and the printing device may acquire the identifier sent by the mobile terminal through the NFC frequency field.
Optionally, when the user uses the printing device, the printing device may also obtain the identifier of the mobile terminal held by the user through an identifier manner of the mobile terminal manually input on the information input port of the printing device.
In step 502, a print instruction to print a replacement order corresponding to the identification that meets a validation condition is received, each object defined in the replacement order that meets the validation condition being allowed to be removed through the security door.
When the printing device prints the replacement order, it needs to receive a printing instruction sent by a user on the printing device, and then execute the printing step.
The printing instruction may also be sent to the printing device by a mobile terminal, where the mobile terminal may send the printing instruction through a network or through bluetooth technology, and the sending manner is not specifically limited here.
In step 503, after receiving the print instruction, when the security door verifies that the article passing through the security door matches the replacement order corresponding to the identifier and meeting the verification condition, the replacement order corresponding to the identifier is obtained, and the replacement order includes the article information of each target object obtained by the mobile terminal.
In practical application, a plurality of mobile terminals participating in verification are provided, and each mobile terminal corresponds to a replacement order, so that after the printing device acquires the identifier of the mobile terminal, the printing device can acquire the replacement order corresponding to the identifier from the deduction server according to the identifier.
Optionally, the printing device acquires, according to the acquired identifier, a replacement order corresponding to the identifier and meeting the verification condition.
The replacement order includes article information of each article that has been replaced, and the article information at least includes a resource value, a code number, a quantity, and the like corresponding to the target article. Obviously, in order to facilitate the user to identify the selected target object, the article information of the target object may further include a picture of the target object, and the like.
In step 504, the replacement order obtained is printed.
And after the printing equipment acquires the replacement order corresponding to the identifier, printing the replacement order in real time.
Optionally, the replacement order printed by the printing device may be in a paper form or an electronic form, the replacement order in the electronic form may be sent to the mobile terminal by the printing device, and the printing device may send the replacement order through a network or a bluetooth technology, where the sending method is not specifically limited.
In step 505, after the replacement order is printed successfully, the stored printed replacement order and the identifier corresponding to the replacement order are cleared.
Because the data storage space of the printing device may be limited, after the printing device prints the replacement order, the printing device may delete the replacement order that was successfully printed and the identifier corresponding to the replacement order, thereby saving the data storage space of the printing device.
In summary, in the target object verification method provided in the embodiment of the present disclosure, the printing device obtains the identifier of the mobile terminal, and prints the obtained replacement order corresponding to the identifier when it is known that the security door verifies that the article passing through the security door matches the replacement order corresponding to the identifier, because the security door can print the article passing through the security door and the replacement order after successfully verifying the article and the replacement order, the problem that complete self-service cannot be realized because supermarket personnel still need to sequentially verify purchase bills and articles in the related art is solved, the security door can be used to automatically perform security verification on the target object, complete self-service shopping is realized, printing by a special person through the printing device can also be avoided, and manpower is saved.
It should be added that the printing device is not limited to the steps in fig. 5 when implementing the target object verification and the replacement order printing, and some of the steps in fig. 5 may be separately implemented as an embodiment. For example, step 501 to step 504 may be implemented separately as one embodiment. In other embodiments, the steps in fig. 5 may be replaced, for example, step 503 is replaced by: and after receiving the printing instruction, acquiring a replacement order corresponding to the identifier from the withholding server.
The following are embodiments of the disclosed apparatus that may be used to perform embodiments of the disclosed methods. For details not disclosed in the embodiments of the apparatus of the present disclosure, refer to the embodiments of the method of the present disclosure.
Fig. 6 is a block diagram illustrating an object authentication device according to an exemplary embodiment, as shown in fig. 6, applied to a security door 120 in the system shown in fig. 1, the object authentication device including, but not limited to: a first obtaining module 601, a second obtaining module 602, and a recognition module 603.
The first obtaining module 601 may be configured to obtain an identifier of the mobile terminal.
Conventionally, the mobile terminal may support bluetooth technology or NFC technology, and accordingly, the security door may also support bluetooth technology or NFC technology.
When the mobile terminal starts the Bluetooth function, correspondingly, the security door also needs to start the Bluetooth function, and after the mobile terminal establishes connection with the security door through the Bluetooth technology, the mobile terminal serving as a sender sends the identification of the mobile terminal to the security door serving as a receiver.
Optionally, when the mobile terminal starts the NFC function, the security door also needs to support the NFC function, and at this time, the security door may acquire the identifier sent by the mobile terminal through the NFC frequency field only by the mobile terminal needing to be close to the NFC identification area of the security door.
Optionally, when the user passes through the security door, the identity of the mobile terminal held by the user can be obtained by the security door through the identity of the mobile terminal manually input on the information input port of the security door.
The second obtaining module 602 may be configured to obtain a replacement order meeting the verification condition corresponding to the identifier obtained by the first obtaining module 601, where the replacement order includes the item information of each target object scanned by the mobile terminal, and each target object defined in the replacement order meeting the verification condition is allowed to be taken away through the security door.
In practical application, a plurality of mobile terminals participating in verification are provided, and each mobile terminal is provided with a replacement order, so that after the anti-theft door acquires the identifier of the mobile terminal, the replacement order corresponding to the identifier can be acquired from the deduction server according to the identifier.
Optionally, the security door acquires a replacement order corresponding to the identifier and meeting the verification condition according to the acquired identifier.
The replacement order includes article information of each article that has been replaced, and the article information at least includes a resource value, a code number, a quantity, and the like corresponding to the target article. Obviously, in order to facilitate the user to identify the selected target object, the article information of the target object may further include a picture of the target object, and the like.
The identification module 603 may be configured to identify the article passing through the security door, and output a prompt message when the identified article does not match the replacement order acquired by the second acquisition module 602.
In a possible implementation manner, the identifying module 603 may be configured to output the prompt message when the identified item does not belong to the replacement order acquired by the second acquiring module 602, or when the number of the identified item is different from the number of the items in the replacement order acquired by the second acquiring module 602.
In actual implementation, the security door identifies the article information of the article passing through the security door according to the obtained replacement order, so that whether the article held by the user exists in the replacement order can be checked one by one.
When the article information of the scanned article exists in the replacement order and the article quantity is larger than the quantity corresponding to the article in the replacement order, outputting prompt information, wherein the prompt information can be used for prompting a user to replace the redundant quantity of the article.
When the item information of the scanned item exists in the replacement order and the quantity of the item is smaller than the quantity corresponding to the item in the replacement order, prompt information is output, and the prompt information at the moment can be used for prompting the user to extract the insufficient quantity of the item.
When the article information of the scanned article does not exist in the replacement order, the prompt information is output, and the prompt information at the moment can be used for prompting the user to replace the article.
Optionally, the prompting mode of the security door may be outputting text information, sending a buzzer, or playing music, and the prompting mode is not specifically limited herein.
In another possible implementation, the target object verification apparatus may further include a printing module 604.
The printing module 604 can be configured to print the replacement order after receiving a printing instruction for printing the replacement order and the item identified by the identifying module 603 matches the replacement order.
Optionally, the security door may further have a print function of a replacement order, and when it is verified that the item information of the scanned item exists in the replacement order and the number of the item is the same as the number corresponding to the item in the replacement order, the security door may determine whether to print the replacement order according to a selection of the user.
In yet another possible implementation, the target verification device may further include a first clearing module 605, or/and a second clearing module 606.
The first clearing module 605 can be configured to clear the replacement order and the identifier corresponding to the replacement order stored in the security door when the item identified by the identification module 603 matches the replacement order acquired by the second acquisition module 602.
When the item information of the scanned item exists in the replacement order and the quantity of the item is the same as the quantity corresponding to the item in the replacement order, the security door may delete the replacement order currently participating in the verification and the identifier corresponding to the replacement order at this time because the data storage space of the security door may be limited.
The second clearing module 606 can be configured to clear the replacement order and the identifier corresponding to the replacement order stored in the security door after the printing module 604 successfully prints the replacement order.
After the printing module 604 prints the replacement, the replacement order and the identifier corresponding to the replacement order stored in the security door may be cleared.
Optionally, if the security door does not receive the print instruction for the replacement order within the predetermined time period, the replacement order and the identifier corresponding to the replacement order stored in the security door may still be cleared.
In yet another possible implementation, the first obtaining module 601 may include a connection sub-module 601a and an obtaining sub-module 601 b.
The connection sub-module 601a may be configured to establish a bluetooth connection or a Near Field Communication (NFC) connection with the mobile terminal.
The obtaining sub-module 601b may be configured to obtain the identifier of the mobile terminal by using the connection established by the connecting sub-module 601 a.
In summary, in the target object verification apparatus provided in the embodiment of the present disclosure, the security door determines that the target object passing through the security door is in the replacement order meeting the verification condition, and if the target object is not in the replacement order, a prompt is performed, because the security door can determine the corresponding replacement order meeting the verification condition according to the identifier of the mobile terminal passing through the security door, and when it is determined that the target object passing through the security door does not meet the replacement order, it can be determined that the target object is not added to the replacement order, so as to perform the prompt, thereby solving the problem that in the related art, a supermarket person still needs to sequentially verify purchase and goods, and thus a complete self-service bill cannot be realized, achieving the effect of automatically performing the security verification on the target object by using the security door, and realizing a complete self-service shopping bill.
In addition, when the security door in the application determines that the article is not in the replacement order corresponding to the identification or the number of the articles does not conform to the order of the article in the replacement order, prompt information is output, so that the problem that complete self-service cannot be realized due to the fact that supermarket personnel still need to check and purchase bills and articles in sequence in the related technology is solved, and the security personnel do not need to be arranged to verify the articles taken away by the user any more, so that the effects of automatically verifying the target object and saving manpower are achieved.
Meanwhile, the security door in the application can acquire the replacement order, and when the identification of the mobile terminal is acquired and the articles passing through the security door are determined to be consistent with the replacement order through the anti-theft verification, the replacement order corresponding to the identification is printed, so that the replacement order is allowed to be printed when the articles passing through the security door are ensured to be in the replacement order meeting the verification condition.
Finally, the anti-theft door in the application receives the identification of the mobile terminal through the NFC technology or the Bluetooth technology, so that the purpose of acquiring the identification of the mobile terminal in a short distance can be realized, the input process of the user to the identification of the mobile terminal is avoided, and the user can also be prevented from disguising the replacement orders generated by other terminals.
Fig. 7 is a block diagram illustrating an object authentication device according to another exemplary embodiment, as shown in fig. 7, which is applied to the printing apparatus 130 in the system shown in fig. 1, and includes, but is not limited to: a first acquisition module 701, a receiving module 702, a second acquisition module 703, and a printing module 704.
The first obtaining module 701 may be configured to obtain an identifier of the mobile terminal.
Conventionally, a mobile terminal may support bluetooth technology or NFC technology, and accordingly, a printing device may also support bluetooth technology or NFC technology.
When the mobile terminal starts the bluetooth function, the printing device needs to start the bluetooth function accordingly, and after the mobile terminal establishes a connection with the printing device through the bluetooth technology, the mobile terminal as the sender sends its identifier to the printing device as the receiver.
Optionally, when the mobile terminal starts the NFC function, the printing device needs to support the NFC function, and at this time, the mobile terminal only needs to be close to the NFC identification area of the printing device, and the printing device may acquire the identifier sent by the mobile terminal through the NFC frequency field.
Optionally, when the user uses the printing device, the printing device may also obtain the identifier of the mobile terminal held by the user through an identifier manner of the mobile terminal manually input on the information input port of the printing device.
The receiving module 702 may be configured to receive a print instruction for printing a replacement order meeting the verification condition corresponding to the identifier acquired by the first acquiring module 701, where each target object defined in the replacement order meeting the verification condition is allowed to be taken away through the security door.
When the printing device prints the replacement order, it needs to receive a printing instruction sent by a user on the printing device, and then execute the printing step.
The printing instruction may also be sent to the printing device by a mobile terminal, where the mobile terminal may send the printing instruction through a network or through bluetooth technology, and the sending manner is not specifically limited here.
The second obtaining module 703 may be configured to, after the receiving module 702 receives the print instruction and it is known that the article passing through the security door is verified to be in accordance with the replacement order corresponding to the identifier and meeting the verification condition, obtain the replacement order corresponding to the identifier obtained by the first obtaining module 701, where the replacement order includes the article information of each target object obtained by the mobile terminal.
In practical application, a plurality of mobile terminals participating in verification are provided, and each mobile terminal corresponds to a replacement order, so that after the printing device acquires the identifier of the mobile terminal, the printing device can acquire the replacement order corresponding to the identifier from the deduction server according to the identifier.
Optionally, the printing device acquires, according to the acquired identifier, a replacement order corresponding to the identifier and meeting the verification condition.
The replacement order includes article information of each article that has been replaced, and the article information at least includes a resource value, a code number, a quantity, and the like corresponding to the target article. Obviously, in order to facilitate the user to identify the selected target object, the article information of the target object may further include a picture of the target object, and the like.
The printing module 704 may be configured to print the replacement order acquired by the second acquiring module 703.
And after the printing equipment acquires the replacement order corresponding to the identifier, printing the replacement order in real time.
Optionally, the replacement order printed by the printing device may be in a paper form or an electronic form, the replacement order in the electronic form may be sent to the mobile terminal by the printing device, and the printing device may send the replacement order through a network or a bluetooth technology, where the sending method is not specifically limited.
In one possible implementation, the target verification apparatus may further include: a purge module 705.
The clearing module 705 may be configured to clear the stored printed replacement order and the identifier corresponding to the replacement order after the replacement order is successfully printed by the printing module 704.
Because the data storage space of the printing device may be limited, after the printing device prints the replacement order, the printing device may delete the replacement order that was successfully printed and the identifier corresponding to the replacement order, thereby saving the data storage space of the printing device.
In summary, in the target object verification apparatus provided in the embodiment of the present disclosure, the printing device obtains the identifier of the mobile terminal, and prints the obtained replacement order corresponding to the identifier when it is known that the security door verifies that the article passing through the security door matches the replacement order corresponding to the identifier, because the security door can print the article passing through the security door and the replacement order after successfully verifying the article and the replacement order, the problem that complete self-service cannot be realized because supermarket personnel still need to sequentially verify purchase bills and articles in the related art is solved, the security door can be used to automatically perform security verification on the target object, complete self-service shopping is realized, printing by a special person through the printing device can also be avoided, and manpower is saved.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
An exemplary embodiment of the present disclosure provides an object verification apparatus, which can implement an object verification method using an anti-theft gate as an execution subject provided by the present disclosure, and the object verification apparatus includes: a processor, a memory for storing processor-executable instructions;
wherein the processor is configured to:
acquiring an identifier of a mobile terminal;
acquiring a replacement order corresponding to the identification and meeting the verification condition, wherein the replacement order comprises the article information of each target object acquired by the mobile terminal;
and identifying the article passing through the security door, and outputting prompt information when the identified article does not accord with the obtained replacement order.
An exemplary embodiment of the present disclosure provides an object verification apparatus capable of implementing an object verification method that uses a printing device as an execution subject, the object verification apparatus including: a processor, a memory for storing processor-executable instructions;
wherein the processor is configured to:
acquiring an identifier of a mobile terminal;
receiving a printing instruction for printing a replacement order which corresponds to the identification and meets the verification condition, wherein each target object defined in the replacement order which meets the verification condition is allowed to be taken away through the security door;
after the printing instruction is received and when the fact that the antitheft door verifies that the article passing through the antitheft door is consistent with the replacement order corresponding to the identification and meeting the verification condition is obtained, the replacement order corresponding to the identification is obtained, and the replacement order comprises article information of each target object obtained by the mobile terminal;
the obtained replacement order is printed.
Unless defined otherwise, technical or scientific terms used herein shall have the ordinary meaning as understood by one of ordinary skill in the art to which this invention belongs. The use of "first," "second," and similar terms in the description and claims of the present application do not denote any order, quantity, or importance, but rather the terms are used to distinguish one element from another. Also, the use of the terms "a" or "an" and the like do not denote a limitation of quantity, but rather denote the presence of at least one. "at least two" means "two or more". The terms "connected" or "coupled" and the like are not restricted to physical or mechanical connections, but may include electrical connections, whether direct or indirect.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.
Claims (21)
1. An object authentication system, characterized in that the system comprises a mobile terminal and a security door, wherein:
the mobile terminal is configured to acquire the article information of the target object and generate a replacement order according to the acquired article information;
the security door is configured to acquire an identifier of the mobile terminal, acquire a replacement order corresponding to the identifier and meeting a verification condition, identify an article passing through the security door, and output prompt information when the identified article does not meet the acquired replacement order, wherein each target object defined in the replacement order meeting the verification condition is allowed to be taken away through the security door.
2. The system of claim 1, further comprising a printing device configured to obtain a correspondence between an identifier and a replacement order meeting validation criteria, or, when the security door validates that all items passing through the security door match the obtained replacement order, obtain a correspondence between an identifier and a replacement order meeting validation criteria;
the printing equipment is further configured to acquire an identifier of the mobile terminal, receive a printing instruction for printing a replacement order corresponding to the identifier and meeting the verification condition, print the replacement order, and clear the stored printed replacement order and the identifier corresponding to the replacement order after printing is successful.
3. The system of claim 1,
the security door is further configured to acquire a corresponding relation between the identification and the replacement order meeting the verification condition;
the security door is further configured to obtain an identifier of a mobile terminal, obtain a replacement order corresponding to the identifier and meeting verification conditions, identify an article passing through the security door, and output the prompt information when the identified article does not belong to the obtained replacement order or when the number of the identified article is different from the number of the articles in the obtained replacement order.
4. The system of claim 1, further comprising a withholding server,
the mobile terminal is further configured to send a transfer request for transferring the resource of the replaced order to the deduction server, wherein the transfer request includes an identifier of the mobile terminal;
the deduction server is further configured to, after receiving the transfer request, obtain a resource library name bound to the identifier, transfer a total resource corresponding to the replacement order from a resource library having the resource library name, transfer the total resource to a predetermined resource library, and use the successfully transferred replacement order as the replacement order meeting the verification condition.
5. The system according to any one of claims 1 to 4,
the security door is further configured to establish a Bluetooth connection or a Near Field Communication (NFC) connection with the mobile terminal, and acquire the identifier of the mobile terminal by using the established connection.
6. An object authentication method, applied to a security door, comprising:
acquiring an identifier of a mobile terminal;
acquiring a replacement order which corresponds to the identification and accords with a verification condition, wherein the replacement order comprises the article information of each target object acquired by the mobile terminal, and each target object limited in the replacement order which accords with the verification condition is allowed to be taken away through the security door;
and identifying the article passing through the security door, and outputting prompt information when the identified article does not accord with the obtained replacement order.
7. The method of claim 6, wherein outputting a prompt when the identified item does not correspond to the retrieved replacement order comprises:
and when the identified article does not belong to the acquired replacement order or the number of the identified articles is different from the number of the articles in the acquired replacement order, outputting the prompt message.
8. The method of claim 6, further comprising:
and printing the replacement order after receiving a printing instruction for printing the replacement order and the identified article is consistent with the replacement order.
9. The method of claim 8, further comprising:
when the identified article is consistent with the acquired replacement order, clearing the replacement order stored in the security door and the identification corresponding to the replacement order;
or,
and after the replacement order is printed successfully, clearing the replacement order stored in the security door and the identification corresponding to the replacement order.
10. The method according to any of claims 6 to 9, wherein the obtaining the identity of the mobile terminal comprises:
and establishing Bluetooth connection or Near Field Communication (NFC) connection with the mobile terminal, and acquiring the identifier of the mobile terminal by utilizing the established connection.
11. An object authentication method applied to a printing apparatus, the method comprising:
acquiring an identifier of a mobile terminal;
receiving a printing instruction for printing a replacement order which corresponds to the identification and meets the verification condition, wherein each target object defined in the replacement order which meets the verification condition is allowed to be taken away through the security door;
after the printing instruction is received and when the fact that the antitheft door verifies that the article passing through the antitheft door is in accordance with the replacement order corresponding to the identification and meeting the verification condition is obtained, the replacement order corresponding to the identification is obtained, and the replacement order comprises the article information of each target object obtained by the mobile terminal;
and printing the obtained replacement order.
12. The method of claim 11, further comprising:
and after the replacement order is printed successfully, clearing the stored printed replacement order and the identification corresponding to the replacement order.
13. An object authentication device for use in a security door, the device comprising:
a first obtaining module configured to obtain an identifier of a mobile terminal;
the second acquisition module is configured to acquire a replacement order which corresponds to the identifier acquired by the first acquisition module and meets the verification condition, the replacement order comprises the article information of each target object acquired by the mobile terminal, and each target object defined in the replacement order which meets the verification condition is allowed to be taken away through the security door;
and the identification module is configured to identify the article passing through the security door, and when the identified article does not accord with the replacement order acquired by the second acquisition module, prompt information is output.
14. The apparatus of claim 13,
the identification module is configured to output the prompt message when the identified item does not belong to the replacement order acquired by the second acquisition module, or when the number of the identified item is different from the number of the items in the replacement order acquired by the second acquisition module.
15. The apparatus of claim 13, further comprising:
the printing module is configured to print the replacement order after receiving a printing instruction for printing the replacement order and the article identified by the identification module conforms to the replacement order.
16. The apparatus of claim 15, further comprising:
a first clearing module configured to clear the replacement order stored in the security door and the identifier corresponding to the replacement order when the item identified by the identification module matches the replacement order acquired by the second acquisition module;
or/and the first and/or second light-emitting diodes are arranged in the light-emitting diode,
and the second clearing module is configured to clear the replacement order and the identification corresponding to the replacement order stored in the security door after the printing module successfully prints the replacement order.
17. The apparatus according to any one of claims 13 to 16, wherein the first obtaining module comprises:
a connection sub-module configured to establish a Bluetooth connection or a Near Field Communication (NFC) connection with the mobile terminal;
an obtaining sub-module configured to obtain the identifier of the mobile terminal by using the connection established by the connecting sub-module.
18. An object authentication apparatus, for use in a printing device, the apparatus comprising:
a first obtaining module configured to obtain an identifier of a mobile terminal;
a receiving module configured to receive a print instruction for printing a replacement order meeting a verification condition corresponding to the identifier acquired by the first acquiring module, wherein each target object defined in the replacement order meeting the verification condition is allowed to be taken away through the security door;
the second obtaining module is configured to obtain a replacement order corresponding to the identifier obtained by the first obtaining module when the security door verifies that the article passing through the security door is consistent with the replacement order corresponding to the identifier and meeting the verification condition after the receiving module receives the printing instruction, and the replacement order includes article information of each target object obtained by the mobile terminal;
a printing module configured to print the replacement order acquired by the second acquisition module.
19. The apparatus of claim 18, further comprising:
and the clearing module is configured to clear the stored printed replacement order and the identification corresponding to the replacement order after the replacement order is successfully printed by the printing module.
20. An object authentication device for use in a security door, the device comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to:
acquiring an identifier of a mobile terminal;
acquiring a replacement order which corresponds to the identification and accords with a verification condition, wherein the replacement order comprises the article information of each target object acquired by the mobile terminal, and each target object limited in the replacement order which accords with the verification condition is allowed to be taken away through the security door;
and identifying the article passing through the security door, and outputting prompt information when the identified article does not accord with the obtained replacement order.
21. An object authentication apparatus, for use in a printing device, the apparatus comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to:
acquiring an identifier of a mobile terminal;
receiving a printing instruction for printing a replacement order which corresponds to the identification and meets the verification condition, wherein each target object defined in the replacement order which meets the verification condition is allowed to be taken away through the security door;
after the printing instruction is received and when the fact that the antitheft door verifies that the article passing through the antitheft door is in accordance with the replacement order corresponding to the identification and meeting the verification condition is obtained, the replacement order corresponding to the identification is obtained, and the replacement order comprises the article information of each target object obtained by the mobile terminal;
and printing the obtained replacement order.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610798569.6A CN106469489B (en) | 2016-08-31 | 2016-08-31 | Object verification method, apparatus and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610798569.6A CN106469489B (en) | 2016-08-31 | 2016-08-31 | Object verification method, apparatus and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106469489A true CN106469489A (en) | 2017-03-01 |
CN106469489B CN106469489B (en) | 2019-07-23 |
Family
ID=58230542
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610798569.6A Active CN106469489B (en) | 2016-08-31 | 2016-08-31 | Object verification method, apparatus and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106469489B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107622606A (en) * | 2017-09-15 | 2018-01-23 | 知而行(上海)营销咨询有限公司 | A kind of self-help shopping is paid and checking information processing method |
CN108961499A (en) * | 2018-06-27 | 2018-12-07 | 努比亚技术有限公司 | Unmanned supermarket's confirmation clearance method, system and computer readable storage medium |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103077463A (en) * | 2011-10-25 | 2013-05-01 | 上海博路信息技术有限公司 | Shopping method based on terminal |
CN103262130A (en) * | 2011-03-07 | 2013-08-21 | 富士通先端科技株式会社 | Commodity payment checking device |
CN103325033A (en) * | 2012-03-23 | 2013-09-25 | Ncr公司 | Network-based self-checkout |
CN103530804A (en) * | 2013-10-11 | 2014-01-22 | 捷德(中国)信息科技有限公司 | Self-service shopping method, user terminal, merchant background and system |
CN104217324A (en) * | 2014-08-28 | 2014-12-17 | 杭州陆港科技有限公司 | Store cashing including paid bill merchandise examination |
CN104361693A (en) * | 2014-11-19 | 2015-02-18 | 肖丹 | Intelligent market automatic clearing system and implementation method thereof |
CN104463658A (en) * | 2014-12-15 | 2015-03-25 | 杭州陆港科技有限公司 | Commodity information summarizing and clearing method |
CN105094719A (en) * | 2015-08-17 | 2015-11-25 | 小米科技有限责任公司 | Printing method and device and printer |
CN105303400A (en) * | 2015-09-30 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Resource deduction method and device |
JP6214507B2 (en) * | 2014-10-02 | 2017-10-18 | 東芝テック株式会社 | Payment processing apparatus and control program therefor |
-
2016
- 2016-08-31 CN CN201610798569.6A patent/CN106469489B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103262130A (en) * | 2011-03-07 | 2013-08-21 | 富士通先端科技株式会社 | Commodity payment checking device |
CN103077463A (en) * | 2011-10-25 | 2013-05-01 | 上海博路信息技术有限公司 | Shopping method based on terminal |
CN103325033A (en) * | 2012-03-23 | 2013-09-25 | Ncr公司 | Network-based self-checkout |
CN103530804A (en) * | 2013-10-11 | 2014-01-22 | 捷德(中国)信息科技有限公司 | Self-service shopping method, user terminal, merchant background and system |
CN104217324A (en) * | 2014-08-28 | 2014-12-17 | 杭州陆港科技有限公司 | Store cashing including paid bill merchandise examination |
JP6214507B2 (en) * | 2014-10-02 | 2017-10-18 | 東芝テック株式会社 | Payment processing apparatus and control program therefor |
CN104361693A (en) * | 2014-11-19 | 2015-02-18 | 肖丹 | Intelligent market automatic clearing system and implementation method thereof |
CN104463658A (en) * | 2014-12-15 | 2015-03-25 | 杭州陆港科技有限公司 | Commodity information summarizing and clearing method |
CN105094719A (en) * | 2015-08-17 | 2015-11-25 | 小米科技有限责任公司 | Printing method and device and printer |
CN105303400A (en) * | 2015-09-30 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Resource deduction method and device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107622606A (en) * | 2017-09-15 | 2018-01-23 | 知而行(上海)营销咨询有限公司 | A kind of self-help shopping is paid and checking information processing method |
CN108961499A (en) * | 2018-06-27 | 2018-12-07 | 努比亚技术有限公司 | Unmanned supermarket's confirmation clearance method, system and computer readable storage medium |
CN108961499B (en) * | 2018-06-27 | 2021-07-23 | 努比亚技术有限公司 | Unmanned supermarket confirmation and release method and system and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN106469489B (en) | 2019-07-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10192408B2 (en) | Registry verification for a mechanized store using radio frequency tags | |
CN103632264B (en) | Method and apparatus for determining items based on interaction environment | |
KR102207251B1 (en) | Apparatus and method for determining item based on interaction environment | |
CN110868748A (en) | Intelligent equipment network access method, device, equipment, system and medium | |
CN108064373B (en) | Resource transfer method and device | |
CN108520409B (en) | Rapid checkout method and device and electronic equipment | |
CN110945552B (en) | Product sales reporting method, payment method and terminal equipment | |
CN104915114B (en) | Information recording method and device, intelligent terminal | |
US20190387125A1 (en) | Systems and methods for scanning payment and loyalty cards as a service | |
CN104281372A (en) | Information processing method and device | |
CN107230060B (en) | Account loss reporting method and device | |
CN107564196B (en) | Storage equipment control method and device | |
US20200184531A1 (en) | Mirrored display and proximal control of autonomous retail systems | |
CN103810595B (en) | Information verification method and device | |
CN111669744B (en) | Information processing method and device and electronic equipment | |
US20170068946A1 (en) | User equipment, service providing device, pos terminal, payment system including the same, control method thereof, and non-transitory computer-readable storage medium storing computer program recorded thereon | |
CN107563876B (en) | Article purchasing method and apparatus, and storage medium | |
CN106469489B (en) | Object verification method, apparatus and system | |
KR20140115861A (en) | Method of banking services using mobile device | |
CN114915923A (en) | 5G message-as-a-service triggering method and device, electronic equipment and storage medium | |
CN108171286B (en) | Unmanned selling method and system | |
CN113128983A (en) | Method for paying digital currency, electronic device and computer storage medium | |
CN107705170B (en) | Order presentation method and device | |
CN104835035A (en) | Numerical value transferring method, device, and system | |
CN106408304B (en) | Account security management method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |