CN106845584A - The recognition methods of accommodating container and device - Google Patents

The recognition methods of accommodating container and device Download PDF

Info

Publication number
CN106845584A
CN106845584A CN201710074057.XA CN201710074057A CN106845584A CN 106845584 A CN106845584 A CN 106845584A CN 201710074057 A CN201710074057 A CN 201710074057A CN 106845584 A CN106845584 A CN 106845584A
Authority
CN
China
Prior art keywords
accommodating container
identification information
found
target
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710074057.XA
Other languages
Chinese (zh)
Inventor
张霄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201710074057.XA priority Critical patent/CN106845584A/en
Publication of CN106845584A publication Critical patent/CN106845584A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/10Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property
    • G07F17/12Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property comprising lockable containers, e.g. for accepting clothes to be cleaned

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)

Abstract

Recognition methods and device the disclosure is directed to accommodating container.The method includes:Detect that whether corresponding with the target accommodating container for prestoring corresponding first identification information of accommodating container to be found second identification information be identical;When the first identification information for detecting is identical with the second identification information, accommodating container to be found is determined for target accommodating container, and export the prompting message that target accommodating container is found for prompting.Wherein, can be gone to detect the first identification information of all accommodating containers to be found according to the second identification information of target accommodating container, so that it is determined that target accommodating container, and gone to check whether accommodating container to be found is user's target accommodating container to be found with eyes one by one without staff, so as to alleviate the work load of staff, and improve the search efficiency of target accommodating container.

Description

The recognition methods of accommodating container and device
Technical field
This disclosure relates to identification technology field, more particularly to accommodating container recognition methods and device.
Background technology
At present, the mailing for carrying out goods using express delivery has become a kind of life style, in work such as school, large-scale communities The big region of amount, when user takes oneself express delivery, courier needs the express delivery list information checked one by one in express delivery to find The express delivery of user.
The content of the invention
To overcome problem present in correlation technique, the embodiment of the present disclosure to provide recognition methods and the device of accommodating container. The technical scheme is as follows:
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of recognition methods of accommodating container, including:
Detect corresponding first identification information of accommodating container to be found whether corresponding with the target accommodating container for prestoring Two identification informations are identical;
When first identification information for detecting is identical with second identification information, the storage to be found is determined Container is the target accommodating container;
Export the prompting message that the target accommodating container is found for prompting.
The technical scheme provided by this disclosed embodiment can include the following benefits:In order to improve security, when looking into After finding target accommodating container, also need by sending decryption key information, so that target accommodating container is believed according to the decruption key Whether the identity of breath checking user is legal, when that can be decrypted according to the decryption key information, it is determined that the user is legal, When that cannot be decrypted according to decryption key information, it is determined that the user is illegal.Detect that accommodating container to be found is corresponding Whether corresponding with the target accommodating container for prestoring first identification information the second identification information be identical;When the first mark for detecting When information is identical with the second identification information, accommodating container to be found is determined for target accommodating container, and export for pointing out to search To the prompting message of target accommodating container.Wherein it is possible to the second identification information according to target accommodating container goes detection to be needed The first identification information of accommodating container is searched, when the first identification information for detecting certain accommodating container to be found is received with target When second identification information of container is identical, you can the accommodating container to be found as target accommodating container is determined, so that without work Make personnel to be gone to check whether accommodating container to be found is user's target accommodating container to be found one by one with eyes, so as to alleviate The work load of staff, and improve the search efficiency of target accommodating container.
In one embodiment, it is described export for pointing out to find the prompting message of the target accommodating container after, Also include:
Decryption key information is sent to the target accommodating container, so that the target accommodating container is close according to the decryption Key information is decrypted.
The technical scheme provided by this disclosed embodiment can include the following benefits:In order to improve security, when looking into After finding target accommodating container, also need by sending decryption key information, so that target accommodating container is believed according to the decruption key Whether the identity of breath checking user is legal, when that can be decrypted according to the decryption key information, it is determined that the user is legal, When that cannot be decrypted according to decryption key information, it is determined that the user is illegal.
In one embodiment, whether corresponding first identification information of the detection accommodating container to be found is received with target Before corresponding second identification information of container is identical, also include:
First identification information is sent to the accommodating container to be found, so that the accommodating container to be found preserves institute The first identification information is stated, and first identification information is used to identify the receipts accommodating container to be found.
The technical scheme provided by this disclosed embodiment can include the following benefits:Search target accommodating container it Before, also need to send corresponding first identification information of each accommodating container to be found to all accommodating containers to be found, so that Each accommodating container to be found preserves corresponding first identification information, so that subsequently can be according to each accommodating container to be found First identification information searches target receptacle, wherein, target is searched by the first identification information of each accommodating container to be found Receptacle, so as to alleviate the work load of staff, and improves the search efficiency of target accommodating container.
In one embodiment, whether corresponding first identification information of the detection accommodating container to be found is received with target Before corresponding second identification information of container is identical, also include:
Encryption key message is sent to the target accommodating container, so that the target accommodating container is close according to the encryption Key information is encrypted.
The technical scheme provided by this disclosed embodiment can include the following benefits:In order to improve security, can make Target accommodating container is encrypted with encryption key message, after target accommodating container is found, is also needed by sending and adding The corresponding decryption key information of key information, so that target accommodating container verifies the identity of user according to the decryption key information It is whether legal.
In one embodiment, corresponding first identification information of detection accommodating container to be found whether with the mesh for prestoring Before corresponding second identification information of mark accommodating container is identical, also include:
Second identification information that other equipment sends is received, and/or, the decryption key information.
The technical scheme provided by this disclosed embodiment can include the following benefits:When user oneself cannot go to search During target accommodating container, corresponding second identification information of target accommodating container can be sent to other users by terminal device Terminal device, to realize purpose that other users are its generation neck, so as to improve Consumer's Experience.
In one embodiment, whether corresponding first identification information of the detection accommodating container to be found is received with target Corresponding second identification information of container it is identical including:
Detect whether first identification information is identical with second identification information by near-field communication NFC module.
The technical scheme provided by this disclosed embodiment can include the following benefits:Target is realized by NFC function The lookup of accommodating container, now, is gone to check whether accommodating container is user's mesh to be found with eyes one by one without staff Mark accommodating container, so as to alleviate the work load of staff, and improves the search efficiency of target accommodating container.
According to the second aspect of the embodiment of the present disclosure, there is provided a kind of identifying device of accommodating container, including:
Detection module, for detecting whether corresponding first identification information of accommodating container to be found is received with the target for prestoring Corresponding second identification information of container is identical;
Determining module, for first identification information and second identification information that are detected when the detection module When identical, determine that the accommodating container to be found is the target accommodating container;
Output module, for when the determining module determines the target accommodating container, exporting for pointing out to search To the prompting message of the target accommodating container.
In one embodiment, also include:Decryption key information sending module,
The decryption key information sending module, for finding the target for prompting when the output module is exported After the prompting message of accommodating container, decryption key information is sent to the target accommodating container, so that target storage is held Device is decrypted according to the decryption key information.
In one embodiment, also include:First identification information sending module,
The first identification information sending module, for detecting accommodating container to be found corresponding the in the detection module Before whether corresponding with the target accommodating container for prestoring one identification information the second identification information be identical, to the storage to be found Container sends first identification information, so that the accommodating container to be found preserves first identification information, and described the One identification information is used to identify the receipts accommodating container to be found.
In one embodiment, also include:Encryption key message sending module,
The encryption key message sending module, for detecting accommodating container to be found corresponding the in the detection module Before whether corresponding with the target accommodating container for prestoring one identification information the second identification information be identical, received to the target and held Device sends encryption key message, so that the target accommodating container is encrypted according to the encryption key message.
In one embodiment, also include:Receiver module,
The receiver module, for being exported for pointing out to find carrying for the target accommodating container in the output module Before the information of waking up, second identification information that other equipment sends is received, and/or, the decryption key information.
In one embodiment, the detection module includes:Near-field communication NFC detection sub-modules,
The NFC detection sub-modules, for detecting whether first identification information is marked with described second by NFC module Knowledge information is identical.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of identifying device of accommodating container, including:Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
Detect corresponding first identification information of accommodating container to be found whether corresponding with the target accommodating container for prestoring Two identification informations are identical;
When first identification information for detecting is identical with second identification information, the storage to be found is determined Container is the target accommodating container;
Export the prompting message that the target accommodating container is found for prompting.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the implementation for meeting the disclosure Example, and it is used to explain the principle of the disclosure together with specification.
Fig. 1 is the flow chart of the recognition methods of the accommodating container according to an exemplary embodiment one.
Fig. 2 is the flow chart of the recognition methods of the accommodating container according to an exemplary embodiment two.
Fig. 3 is the flow chart of the recognition methods of the accommodating container according to an exemplary embodiment three.
Fig. 4 is the flow chart of the recognition methods of the accommodating container according to an exemplary embodiment four.
Fig. 5 is the flow chart of the recognition methods of the accommodating container according to an exemplary embodiment five
Fig. 6 be the accommodating container according to an exemplary embodiment recognition methods in step S101 flow chart.
Fig. 7 is the flow chart of the recognition methods of the accommodating container according to an exemplary embodiment six.
Fig. 8 is the block diagram of the identifying device of the accommodating container according to an exemplary embodiment one.
Fig. 9 is the block diagram of the identifying device of the accommodating container according to an exemplary embodiment two.
Figure 10 is the block diagram of the identifying device of the accommodating container according to an exemplary embodiment three.
Figure 11 is the block diagram of the identifying device of the accommodating container according to an exemplary embodiment four.
Figure 12 is the block diagram of the identifying device of the accommodating container according to an exemplary embodiment five.
Figure 13 be the accommodating container according to an exemplary embodiment identifying device in detection module 11 block diagram.
Figure 14 is a kind of block diagram of the identifying device 80 for accommodating container according to an exemplary embodiment.
Specific embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in implementation method do not represent all implementation methods consistent with the disclosure.Conversely, they be only with it is such as appended The example of the consistent apparatus and method of some aspects described in detail in claims, the disclosure.
Currently, logistics business quickly grows, and the mailing for carrying out goods using express delivery has become a kind of life style, therefore The express delivery amount of express company is continuously increased, and therewith it is increased be courier workload, express delivery amount causes that greatly courier searches Express delivery slows and easily malfunctions, while also bring trouble to pickup people.
The disclosure sets identification information by for accommodating container, and the mark of target accommodating container is preserved in terminal device Information, when user requires to look up target accommodating container, only needs using terminal equipment to go in the numerous accommodating containers to be found of detection Identification information, the target accommodating container preserved in the identification information of certain accommodating container to be found and terminal device is detected When the identification information of equipment is identical, it is determined that the accommodating container to be found is user's target accommodating container to be found.Now, Gone to check whether accommodating container is user's target accommodating container to be found with eyes one by one without staff, so as to alleviate The work load of staff, and improve the search efficiency of target accommodating container.
It is worth noting that the accommodating container of the disclosure is included but is not limited to:Luggage case, receiver, containing box, express delivery box, Envelope etc..In order to more clearly illustrate the scheme of the disclosure, illustrated by taking express delivery box as an example in the disclosure.
Fig. 1 is the flow chart of the recognition methods of the accommodating container according to an exemplary embodiment one, as shown in figure 1, Accommodating container recognition methods is used in terminal device, comprises the following steps S101-S103:
In step S101, detect whether corresponding first identification information of accommodating container to be found is received with the target for prestoring Corresponding second identification information of container is identical.
In step s 102, when the first identification information for detecting is identical with the second identification information, receipts to be found are determined Container of receiving is target accommodating container.
In step s 103, the prompting message that target accommodating container is found for prompting is exported.
The disclosure can be respectively provided with identification information for each accommodating container, the identification information be for identifying accommodating container, Wherein, identification information can be bar code, can also be N digital collection etc., and the disclosure does not add to the type of identification information To limit.
When user requires to look up a target accommodating container, target accommodating container first can be set in terminal device Second identification information, and then using terminal equipment removes corresponding first identification information of detection each accommodating container to be found, when When first identification information of the accommodating container to be found for detecting is identical with the second identification information of mark accommodating container, determine to be checked It is target accommodating container to look for accommodating container.
Illustrated so that 6 bit digitals are identification information as an example.Assuming that there is 3 accommodating containers to be found, 1 target storage is held Device.Wherein:Corresponding first identification information of accommodating container to be found 1 is 456123;Accommodating container to be found 2 corresponding first is marked Knowledge information is 123457;Corresponding first identification information of accommodating container to be found 3 is 456789;And target accommodating container is corresponding Second identification information is 456789.Namely corresponding second identification information of the target accommodating container preserved in terminal device: 456789.The process of detection is:Accommodating container to be found 1 is detected, the mark letter of accommodating container to be found 1 corresponding first is detected Breath 456123 is different from corresponding second identification information 456789 of target accommodating container, determines that accommodating container to be found 1 is not Target accommodating container;Accommodating container to be found 2 is detected, corresponding first identification information of accommodating container to be found 2 is detected 123457 is different from corresponding second identification information 456789 of target accommodating container, determine accommodating container to be found 2 nor Target accommodating container;Accommodating container to be found 3 is detected, corresponding first identification information of accommodating container to be found 3 is detected 456789 is identical with corresponding second identification information 456789 of target accommodating container, then, determine that accommodating container to be found 3 is Target accommodating container.
When user requires to look up multiple target accommodating containers, in a kind of achievable mode, can be received for each target Container of receiving is respectively provided with one second identification information, now can go inspection using the second identification information of one of target accommodating container Corresponding first identification information of all accommodating containers to be found is surveyed, after the target accommodating container is determined, and then using another Second identification information of individual target accommodating container goes to detect corresponding first identification information of remaining accommodating container to be found, with true The fixed target accommodating container.
Illustrated so that 2 bit digitals are identification information as an example.Assuming that there is 4 accommodating containers to be found, 2 target storages are held Device.Wherein:Corresponding first identification information of accommodating container to be found 1 is 12;The mark letter of accommodating container to be found 2 corresponding first Cease is 13;Corresponding first identification information of accommodating container to be found 3 is 15;The mark letter of accommodating container to be found 4 corresponding first Cease is 16;And corresponding second identification information of target accommodating container 1 is 15;Corresponding second identification information of target accommodating container 2 It is 16.Namely corresponding second identification information of target accommodating container 1 preserved in terminal device is 15;Preserved in terminal device Corresponding second identification information of target accommodating container 2 is 16.The process of detection is:Target accommodating container 1 is first looked for, detection is treated Accommodating container 1 is searched, corresponding first identification information 12 of accommodating container to be found 1 is detected corresponding with target accommodating container 1 The second identification information 15 it is different, determine that accommodating container to be found 1 is not target accommodating container 1;Detect accommodating container to be found 2, detect corresponding first identification information 13 of accommodating container to be found 2 second mark letter corresponding with target accommodating container 1 Breath 15 is different, determines accommodating container to be found 2 nor target accommodating container 1;Accommodating container to be found 3 is detected, is detected and is treated Search corresponding first identification information 15 of accommodating container 3 identical with corresponding second identification information 15 of target accommodating container 1, that , determine that accommodating container to be found 3 is target accommodating container 1.And then target accommodating container 2 is searched, detect that storage to be found is held Device 1, detects corresponding first identification information 12 of accommodating container to be found 1 second mark corresponding with target accommodating container 2 Information 16 is different, determines that accommodating container to be found 1 is not target accommodating container 2;Accommodating container to be found 2 is detected, is detected and is treated Search corresponding first identification information 13 of accommodating container 2 different from corresponding second identification information 16 of target accommodating container 2, really Fixed accommodating container to be found 2 is nor target accommodating container 1;Accommodating container to be found 4 is detected, accommodating container to be found is detected 4 corresponding first identification informations 16 are identical with corresponding second identification information 16 of target accommodating container 2, then, determine to be checked It is target accommodating container 2 to look for accommodating container 4.
But, if the first identification information of each accommodating container to be found is different, now need repeatedly to go detection All of accommodating container to be found so that the lookup time is more long, and search efficiency is relatively low, at this point it is possible to be all targets of user Accommodating container is respectively provided with the identification information of identical second, so only need to detect once all of accommodating container to be found.
Illustrated so that target accommodating container is target express delivery as an example, when user needs to check and accept 2 target express deliveries simultaneously, If the second identification information of each target express delivery is different, then user is accomplished by using first aim express delivery corresponding the Two marks go to detect numerous express deliveries to be found one by one, after first aim express delivery is found;Then second is needed to use again Corresponding second identification information of target express delivery goes to detect numerous express deliveries to be found one by one, so as to increased the workload of user.
Illustrated so that 2 bit digitals are identification information as an example.Assuming that there is 4 accommodating containers to be found, 2 target storages are held Device.Wherein:Corresponding first identification information of accommodating container to be found 1 is 12;The mark letter of accommodating container to be found 2 corresponding first Cease is 13;Corresponding first identification information of accommodating container to be found 3 is 15;The mark letter of accommodating container to be found 4 corresponding first Cease is 15;And target accommodating container 1 and corresponding second identification information of target accommodating container 2 are 15.Namely in terminal device Corresponding second identification information of target accommodating container 1 of preservation is 15;The target accommodating container 2 preserved in terminal device is corresponding Second identification information is 15.The process of detection is:Accommodating container to be found 1 is detected, accommodating container to be found 1 is detected corresponding First identification information 12 is different from target accommodating container 1 and corresponding second identification information 15 of target accommodating container 2, determines to be checked It is not target accommodating container 1 or target accommodating container 2 to look for accommodating container 1;Accommodating container to be found 2 is detected, is detected to be found Corresponding first identification information 13 of accommodating container 2 second identification information corresponding with target accommodating container 1 and target accommodating container 2 15 is different, determine accommodating container to be found 2 nor target accommodating container 1 or target accommodating container 2;Detection storage to be found is held Device 3, detects corresponding first identification information 15 of accommodating container to be found 3 and target accommodating container 1 and target accommodating container 2 pairs The second identification information 15 answered is identical, then, determine that accommodating container to be found 3 is target accommodating container 1 or target accommodating container 2;Accommodating container to be found 4 is detected, corresponding first identification information 15 of accommodating container to be found 4 and target accommodating container is detected 1 and corresponding second identification information 15 of target accommodating container 2 it is identical, then, determine accommodating container to be found 4 for target receive hold Device 1 or target accommodating container 2, so far, have just found two target accommodating containers of user.
Therefore, in the disclosed embodiments, when user needs to check and accept multiple target express deliveries simultaneously, each target express delivery Second identification information all same, now, user need to only complete to detect the process of all of express delivery to be found for one time one by one, effectively carry Consumer's Experience is risen.
In the disclosed embodiments, after target accommodating container has been found, prompting message can be issued the user with, to use Learn and found target accommodating container in family, it is notable that the prompting message can be:Vibrations, jingle bell, vibrations and sound Bell.
The embodiment of the present disclosure provides a kind of recognition methods of accommodating container, including:Detect that accommodating container to be found is corresponding Whether corresponding with the target accommodating container for prestoring first identification information the second identification information be identical;When the first mark for detecting When information is identical with the second identification information, accommodating container to be found is determined for target accommodating container, and export for pointing out to search To the prompting message of target accommodating container.Wherein it is possible to the second identification information according to target accommodating container goes detection to be needed The first identification information of accommodating container is searched, when the first identification information for detecting certain accommodating container to be found is received with target When second identification information of container is identical, you can the accommodating container to be found as target accommodating container is determined, so that without work Make personnel to be gone to check whether accommodating container to be found is user's target accommodating container to be found one by one with eyes, so as to alleviate The work load of staff, and improve the search efficiency of target accommodating container.
In one embodiment, as shown in Fig. 2 the above method also includes:Step S104.
In step S104, decryption key information is sent to target accommodating container, so that target accommodating container is according to decryption Key information is decrypted.
So that target accommodating container is as luggage case as an example, user can typically use password when being carried luggage using luggage case Lock locks luggage case, it is to avoid luggage case is tampered, and now, after target accommodating container is found, namely finds target line After Lee's case, decryption key information can also be sent to luggage case, so as to target luggage case is opened according to the decryption key information go Coded lock in Lee's case.
And when target accommodating container need not be locked using coded lock etc., the decryption key information for now sending Whether the user that the target accommodating container is found for verifying is disabled user.When can be solved according to the decryption key information When close, it is determined that the user is legal, when that cannot be decrypted according to decryption key information, it is determined that the user is illegal.
The technical scheme provided by this disclosed embodiment can include the following benefits:In order to improve security, when looking into After finding target accommodating container, also need by sending decryption key information, so that target accommodating container is believed according to the decruption key Whether the identity of breath checking user is legal, when that can be decrypted according to the decryption key information, it is determined that the user is legal, When that cannot be decrypted according to decryption key information, it is determined that the user is illegal.
In one embodiment, as shown in figure 3, the above method also includes:Step S105.
In step S105, the first identification information is sent to accommodating container to be found, so that accommodating container to be found is preserved First identification information, and the first identification information is for identifying receipts accommodating container to be found.
Before target accommodating container is searched, in addition it is also necessary to hold for all of accommodating container to be found sends the storage to be found Corresponding first identification information of device.
For example:There are 3 accommodating containers to be found, corresponding first identification information of accommodating container to be found 1 is 15;It is to be found Corresponding first identification information of accommodating container 2 is 16;Corresponding first identification information of accommodating container to be found 3 is 17;Performing , it is necessary to be 15 transmissions to storage to be found by corresponding first identification information of accommodating container to be found 1 before disclosed method Container 1, by corresponding first identification information of accommodating container to be found 2 be 16 send to accommodating container to be found 2, by receipts to be found Corresponding first identification information of container 3 of receiving is 17 to send to accommodating container to be found 3, so that accommodating container to be found 1, to be found Accommodating container 2 preserves oneself corresponding first identification information respectively with accommodating container to be found 3.
The technical scheme provided by this disclosed embodiment can include the following benefits:Search target accommodating container it Before, also need to send corresponding first identification information of each accommodating container to be found to all accommodating containers to be found, so that Each accommodating container to be found preserves corresponding first identification information, so that subsequently can be according to each accommodating container to be found First identification information searches target receptacle, wherein, target is searched by the first identification information of each accommodating container to be found Receptacle, so as to alleviate the work load of staff, and improves the search efficiency of target accommodating container.
In one embodiment, as shown in figure 4, the above method also includes:Step S106.
In step s 106, encryption key message is sent to target accommodating container, so that target accommodating container is according to encryption Key information is encrypted.
In order to improve security, target accommodating container can take the mode of encryption, before target accommodating container is searched, Encryption key message can be sent to target accommodating container, so that target accommodating container is encrypted according to encryption key message.
After target accommodating container is found, can send corresponding with encryption key message to the target accommodating container for finding Decryption key information so that the target accommodating container for finding is decrypted according to the decryption key information for receiving.
The encryption key message and decryption key information can be corresponded to the electronic lock of entity, it is also possible to for verifying user Identity information, the disclosure is not any limitation as to it.
The technical scheme provided by this disclosed embodiment can include the following benefits:In order to improve security, can make Target accommodating container is encrypted with encryption key message, after target accommodating container is found, is also needed by sending and adding The corresponding decryption key information of key information, so that target accommodating container verifies the identity of user according to the decryption key information It is whether legal.
In one embodiment, as shown in figure 5, the above method also includes:Step S107.
In step s 107, the second identification information that other equipment sends is received, and/or, decryption key information.
When first user cannot remove to search the target accommodating container of oneself, can be with the mesh of preservation in the terminal device of oneself Corresponding second identification information of mark accommodating container is sent to the terminal device of other users, to realize that other users are its generation neck Purpose.
For example:Corresponding second identification information of target accommodating container of user A is 13, and user A cannot go to search in time The target accommodating container of oneself, then, user A can be marked target accommodating container corresponding second by the terminal device of oneself Knowledge information is 13 terminal devices for being sent to user B, so that user B is to lead target accommodating container in its generation.
When user A needs user B to open target accommodating container, in the corresponding second mark letter of transmission objectives accommodating container Decryption key information can also be transmitted while breath;Or can individually transmit decryption key information.
It is worth noting that, in the embodiment of the present disclosure target accommodating container corresponding second can be carried out by terminal device The transmission of identification information, it would however also be possible to employ other modes, the disclosure is not any limitation as to it;And can lead in the embodiment of the present disclosure Crossing terminal device carries out the transmission of corresponding second identification information of target accommodating container and decryption key information, it would however also be possible to employ its His mode, the disclosure is not any limitation as to it
The technical scheme provided by this disclosed embodiment can include the following benefits:When user oneself cannot go to search During target accommodating container, corresponding second identification information of target accommodating container can be sent to other users by terminal device Terminal device, to realize purpose that other users are its generation neck, so as to improve Consumer's Experience.
In one embodiment, as shown in fig. 6, above-mentioned steps S101 can also be embodied as:Step S1011.
In step S1011:Detect whether the first identification information is identical with the second identification information by NFC module.
Near-field communication technology (Near Field Communication, referred to as:NFC), it is that a kind of short-distance wireless leads to Letter technology, equipment room realizes connection by the Space Coupling of radiofrequency signal, and the transmission and friendship of data are realized in short distance Change, be to compare popular short-range communication technique in recent years.
NFC has three kinds of mode of operations:Contact-free integrated circuit (Integrated Circuit Card, referred to as: IC-card) reader/writer mode, non-contact IC card simulation model and peer-to-peer mode.
1) noncontact IC card read/write device pattern:In such a mode, NFC module is modeled to a compatible International standardization Tissue (International Organization for Standardization, referred to as:ISO) 14443A or The IC-card read write line of ISO15693 standards.Such as:Information from being read in electronic poster and downloading out poster, or inquiry electricity Remaining sum etc. in sub- mass transit card.
2) non-contact IC card simulation model:In such a mode, near-field communication module can be modeled to a bottom and Hold the non-contact IC card of ISO14443A or ISO14443B standards, alternative present non-contact IC card, in a variety of patterns Under, can be powered to card analogue means by the radio frequency domains of non-contact reader-writer, even if card analogue means does not have the electricity similarly can be with Work.
3) peer-to-peer mode:This communication pattern is similar with bluetooth, infrared communication pattern, is mainly used in data Exchange.The equipment that two have NFC function touch can be carried out data exchange.Such as exchange visiting cards information, download Song, transmission data etc..
The disclosure can also equally be realized based on NFC function.
There is the terminal device of NFC function during terminal device now, and by the first mark letter of accommodating container to be found In NEC modules in breath write-in terminal device, and a NFC module can be respectively provided with accommodating container to be found, now, allow and treat The NFC module searched in NFC module and terminal device in storage easily is operated under peer-to-peer mode, terminal device In NFC module the first identification information of accommodating container to be found is sent to be found by the NFC module in terminal device The NFC module of accommodating container, so that be stored in its corresponding first identification information in NFC module by accommodating container to be found, enters And, accommodating container to be found is operated under non-contact IC card simulation model, and mesh is searched in numerous accommodating containers to be found During mark accommodating container, the NFC module in terminal device is operated under noncontact IC card read/write device pattern, and then, use end NFC module in end equipment is read out to the NFC module in all of accommodating container to be found, when terminal device read with During the corresponding second identification information identical of the target accommodating container accommodating container to be found preserved in terminal device, terminal device Output prompting message, to remind user to find target accommodating container.
In a kind of attainable mode, terminal device can also be by accommodating container to be found correspondence encryption key message hair Target accommodating container is given, after terminal device finds target accommodating container in numerous accommodating containers to be found, by NFC Decryption key information is sent to module the NFC module in target accommodating container, so that target accommodating container is according to decruption key Information is decrypted.
The technical scheme provided by this disclosed embodiment can include the following benefits:Target is realized by NFC function The lookup of accommodating container, now, is gone to check whether accommodating container is user's mesh to be found with eyes one by one without staff Mark accommodating container, so as to alleviate the work load of staff, and improves the search efficiency of target accommodating container.
Fig. 7 is the flow chart of the recognition methods of the accommodating container according to an exemplary embodiment six, as shown in fig. 7, The method comprises the following steps S201-S209:
In the present embodiment, there are 3 accommodating containers to be found, 1 target accommodating container, each accommodating container pair to be found The first identification information answered is the id information of accommodating container to be found, and a NFC module is respectively provided with each accommodating container to be found, A lock module is respectively provided with each accommodating container to be found, wherein, NFC module, the first mark letter in accommodating container to be found 1 Breath and encryption key message are respectively:NFC module 1,11 and encryption key message 1;NFC module in accommodating container to be found 2, First identification information and encryption key message are respectively:NFC module 2,22 and encryption key message 2;In accommodating container to be found 3 NFC module, the first identification information and encryption key message be respectively:NFC module 3,33 and encryption key message 3;And first Setting NFC module 5 in NFC module 4, second terminal equipment, target accommodating container corresponding second mark are set in terminal device Information and decryption key information are respectively:33 and decryption key information 3;
In step s 201, first terminal equipment passes through read write line by corresponding first identification information of accommodating container to be found In the NFC module of encryption key message write-in terminal device.
First terminal equipment passes through read write line by corresponding first identification information 11 of accommodating container to be found 1 and encryption key In the NFC module 3 of the write-in first terminal equipment of information 1;First terminal equipment identifies accommodating container to be found 2 corresponding first In the NFC module 4 of information 22 and the write-in first terminal equipment of encryption key message 2;First terminal equipment holds storage to be found In the NFC module 4 of corresponding first identification information 33 of device 3 and the write-in first terminal equipment of encryption key message 3;
In step S202, by first terminal equipment by corresponding first identification information of each accommodating container to be found and Encryption key message is write in the corresponding NFC module of each accommodating container to be found.
First terminal equipment is believed first identification information 11 and encryption key of accommodating container to be found 1 by NFC module 4 In the NFC module 1 of the write-in of breath 1 accommodating container 1 to be found;First terminal equipment passes through NFC module 4 by accommodating container to be found 2 The first identification information 22 and during encryption key message 2 writes the NFC module 2 of accommodating container to be found 2;First terminal equipment is led to Cross NFC module 4 and first identification information 33 and encryption key message 3 of accommodating container to be found 3 are write into accommodating container to be found 3 NFC module 3 in.
In step S203, each accommodating container to be found is encrypted.
Accommodating container to be found 1 is encrypted using encryption key message 1, and accommodating container to be found 2 uses encryption key Information 2 is encrypted, and accommodating container to be found 3 is encrypted using encryption key message 3.
In step S204, corresponding second identification information of target accommodating container and decryption key information are passed through into read write line In write-in second terminal equipment.
Corresponding second identification information 33 of target accommodating container and decryption key information 3 are write second eventually by read write line In NFC module 5 in end equipment.
In step S205, using second terminal equipment detect one by one accommodating container to be found whether with second terminal equipment Corresponding second identification information of target accommodating container of middle preservation is identical, as guarantor in accommodating container to be found and second terminal equipment When corresponding second identification information of target accommodating container deposited is identical, step S206 is performed;When accommodating container to be found and second When corresponding second identification information of target accommodating container preserved in terminal device is differed, step S209 is performed;
Held with the storage to be found of noncontact IC card read/write device mode detection using the NFC module 5 in second terminal equipment The first identification information preserved in NFC module 1 in device 1, the first identification information of the accommodating container to be found 1 for now reading It is 11, it is different from corresponding second identification information 33 of target accommodating container that the NFC module 5 in second terminal equipment is preserved, then Determine that accommodating container to be found 1 is not target accommodating container;Using the NFC module 5 in second terminal equipment with non-contact IC The first identification information preserved in NFC module 2 in card reader mode detection accommodating container 2 to be found, now reads First identification information of accommodating container to be found 2 is that the target storage that the NFC module 5 in 22, with second terminal equipment is preserved is held Corresponding second identification information 33 of device is different, it is determined that accommodating container to be found 2 is not target accommodating container;Use second terminal NFC module 5 in equipment is preserved with the NFC module 3 in noncontact IC card read/write device mode detection accommodating container 3 to be found The first identification information, the first identification information of the accommodating container to be found 3 for now reading is in 33, with second terminal equipment Corresponding second identification information 33 of target accommodating container that preserves of NFC module 5 it is identical, it is determined that accommodating container to be found 3 is Target accommodating container.
In step S206, second terminal equipment sends prompting message.
In step S207, second terminal equipment sends decryption key information to the target accommodating container for detecting.
NFC module 4 in second terminal equipment sends decryption to the NFC module 3 in the accommodating container to be found 3 for detecting Key information 3.
In step S208, target accommodating container is decrypted according to decryption key information.
Accommodating container to be found 3 is decrypted according to decryption key information 3.
In step S209, continue to detect other accommodating containers to be found.
The embodiment of the present disclosure provides a kind of recognition methods of accommodating container, including:First terminal equipment will by read write line In the NFC module of corresponding first identification information of accommodating container to be found and encryption key message write-in terminal device, by the It is to be found that corresponding first identification information of each accommodating container to be found and encryption key message are write each by one terminal device In the corresponding NFC module of accommodating container, each accommodating container to be found is encrypted, by corresponding second mark of target accommodating container During knowledge information and decryption key information are by read write line write-in second terminal equipment, detect to be checked one by one using second terminal equipment Look for accommodating container whether identical with corresponding second identification information of target accommodating container preserved in second terminal equipment, when to be checked When looking for accommodating container identical with corresponding second identification information of target accommodating container preserved in second terminal equipment, second terminal Equipment sends prompting message and sends decryption key information to the target accommodating container that detects, so target accommodating container according to Decryption key information is decrypted.When accommodating container to be found is corresponding with the target accommodating container preserved in second terminal equipment When second identification information is differed, continue to detect other accommodating containers to be found.Wherein, go to search target receipts by identification information Container is received, so as to be gone to check whether accommodating container to be found is that user's target to be found is received with eyes one by one without staff Receive container, so as to alleviate the work load of staff, and improve the search efficiency of target accommodating container.
Following is disclosure device embodiment, can be used for performing method of disclosure embodiment.
Fig. 8 is the block diagram of the identifying device of the accommodating container according to an exemplary embodiment one, and the device can lead to Cross software, hardware or both be implemented in combination with turn into electronic equipment it is some or all of.As shown in figure 8, the accommodating container Identifying device include:
Detection module 11, for detecting whether corresponding first identification information of accommodating container to be found is received with the target for prestoring Corresponding second identification information of container of receiving is identical;
Determining module 12, for first identification information and the described second mark that are detected when the detection module 11 When information is identical, determine that the accommodating container to be found is the target accommodating container;
Output module 13, for when the determining module 12 determines the target accommodating container, exporting for pointing out Find the prompting message of the target accommodating container.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant the method Embodiment in be described in detail, explanation will be not set forth in detail herein.
In one embodiment, as shown in figure 9, also including:Decryption key information sending module 14,
The decryption key information sending module 14, for when the output module 13 export found for prompting it is described After the prompting message of target accommodating container, decryption key information is sent to the target accommodating container, so that the target is received Container of receiving is decrypted according to the decryption key information.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant the method Embodiment in be described in detail, explanation will be not set forth in detail herein.
In one embodiment, as shown in Figure 10, also include:First identification information sending module 15,
The first identification information sending module 15, for detecting accommodating container correspondence to be found in the detection module 11 The first identification information the second identification information whether corresponding with the target accommodating container for prestoring it is identical before, to described to be found Accommodating container sends first identification information, so that the accommodating container to be found preserves first identification information, and institute The first identification information is stated for identifying the receipts accommodating container to be found.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant the method Embodiment in be described in detail, explanation will be not set forth in detail herein.
In one embodiment, as shown in figure 11, also include:Encryption key message sending module 16,
The encryption key message sending module 16, for detecting accommodating container correspondence to be found in the detection module 11 The first identification information the second identification information whether corresponding with the target accommodating container for prestoring it is identical before, to the target receive Container of receiving sends encryption key message, so that the target accommodating container is encrypted according to the encryption key message.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant the method Embodiment in be described in detail, explanation will be not set forth in detail herein.
In one embodiment, as shown in figure 12, also include:Receiver module 17,
The receiver module 17, for detecting the corresponding first mark letter of accommodating container to be found in the detection module 11 Breath whether the second identification information corresponding with the target accommodating container for prestoring it is identical before, receive other equipment sends described the Two identification informations, and/or, the decryption key information.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant the method Embodiment in be described in detail, explanation will be not set forth in detail herein.
In one embodiment, as shown in figure 13, the detection module 11 includes:Near-field communication NFC detection sub-modules 111,
The NFC detection sub-modules 111, for detecting first identification information whether with described by NFC module Two identification informations are identical.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant the method Embodiment in be described in detail, explanation will be not set forth in detail herein.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of identifying device of accommodating container, including:Processor;
Memory for storing processor-executable instruction;
Wherein, processor is configured as:
Detect corresponding first identification information of accommodating container to be found whether corresponding with the target accommodating container for prestoring Two identification informations are identical;
When first identification information for detecting is identical with second identification information, the storage to be found is determined Container is the target accommodating container;
Export the prompting message that the target accommodating container is found for prompting.
Above-mentioned processor is also configured to:
It is described export for pointing out to find the prompting message of the target accommodating container after, also include:
Decryption key information is sent to the target accommodating container, so that the target accommodating container is close according to the decryption Key information is decrypted.
Corresponding first identification information of detection accommodating container to be found whether corresponding with target accommodating container second Before identification information is identical, also include:
First identification information is sent to the accommodating container to be found, so that the accommodating container to be found preserves institute The first identification information is stated, and first identification information is used to identify the receipts accommodating container to be found.
Corresponding first identification information of detection accommodating container to be found whether corresponding with target accommodating container second Before identification information is identical, also include:
Encryption key message is sent to the target accommodating container, so that the target accommodating container is close according to the encryption Key information is encrypted.
It is described to detect whether corresponding first identification information of accommodating container to be found is corresponding with the target accommodating container for prestoring The second identification information it is identical before, also include:
Second identification information that other equipment sends is received, and/or, the decryption key information.
Corresponding first identification information of detection accommodating container to be found whether corresponding with target accommodating container second Identification information it is identical including:
Detect whether first identification information is identical with second identification information by near-field communication NFC module.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant the method Embodiment in be described in detail, explanation will be not set forth in detail herein.
Figure 14 is a kind of block diagram of the identifying device 80 for accommodating container according to an exemplary embodiment, the dress Put suitable for terminal device.For example, device 80 can be mobile phone, and computer, digital broadcast terminal, messaging devices, Game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc..
Device 80 can include following one or more assemblies:Processing assembly 802, memory 804, power supply module 806 is more Media component 808, audio-frequency assembly 810, the interface 812 of input/output (I/O), sensor cluster 814, and communication component 816。
The integrated operation of the usual control device 80 of processing assembly 802, such as with display, call, data communication, camera Operation and the associated operation of record operation.Processing assembly 802 can carry out execute instruction including one or more processors 820, To complete all or part of step of above-mentioned method.Additionally, processing assembly 802 can include one or more modules, it is easy to Interaction between processing assembly 802 and other assemblies.For example, processing assembly 802 can include multi-media module, to facilitate many matchmakers Interaction between body component 808 and processing assembly 802.
Memory 804 is configured as storing various types of data supporting the operation in device 80.These data are shown Example includes the instruction for any application program or method operated on device 80, and contact data, telephone book data disappears Breath, picture, video etc..Memory 804 can be by any kind of volatibility or non-volatile memory device or their group Close and realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) is erasable to compile Journey read-only storage (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash Device, disk or CD.
Power supply module 806 provides electric power for the various assemblies of device 80.Power supply module 806 can include power management system System, one or more power supplys, and other generate, manage and distribute the component that electric power is associated with for device 80.
Multimedia groupware 808 is included in one screen of output interface of offer between described device 80 and user.One In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen Curtain may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch sensings Device is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or sliding action Border, but also detection and the touch or slide related duration and pressure.In certain embodiments, many matchmakers Body component 808 includes a front camera and/or rear camera.When device 80 be in operator scheme, such as screening-mode or During video mode, front camera and/or rear camera can receive outside multi-medium data.Each front camera and Rear camera can be a fixed optical lens system or with focusing and optical zoom capabilities.
Audio-frequency assembly 810 is configured as output and/or input audio signal.For example, audio-frequency assembly 810 includes a Mike Wind (MIC), when device 80 is in operator scheme, such as call model, logging mode and speech recognition mode, microphone is configured To receive external audio signal.The audio signal for being received can be further stored in memory 804 or via communication component 816 send.In certain embodiments, audio-frequency assembly 810 also includes a loudspeaker, for exports audio signal.
, to provide interface between processing assembly 802 and peripheral interface module, above-mentioned peripheral interface module can for I/O interfaces 812 To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock Determine button.
Sensor cluster 814 includes one or more sensors, the state estimation for providing various aspects for device 80. For example, sensor cluster 814 can detect the opening/closed mode of device 80, the relative positioning of component, such as described component It is the display and keypad of device 80, sensor cluster 814 can be with 80 1 positions of component of detection means 80 or device Change, user is presence or absence of with what device 80 was contacted, the temperature change of the orientation of device 80 or acceleration/deceleration and device 80. Sensor cluster 814 can include proximity transducer, be configured to when without any physical contact detect near object Presence.Sensor cluster 814 can also include optical sensor, such as CMOS or ccd image sensor, in imaging applications Use.In certain embodiments, the sensor cluster 814 can also include acceleration transducer, gyro sensor, magnetic sensing Device, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between device 80 and other equipment.Device 80 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary implementation In example, communication component 816 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel. In one exemplary embodiment, the communication component 816 also includes near-field communication (NFC) module, to promote junction service.Example Such as, NFC module can be based on radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology, Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 80 can be by one or more application specific integrated circuits (ASIC), numeral letter Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic building bricks realization, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided Such as include the memory 804 of instruction, above-mentioned instruction can be performed to complete the above method by the processor 820 of device 80.For example, institute State non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and Optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processor of device 80 During execution so that device 80 is able to carry out the recognition methods of above-mentioned accommodating container, methods described includes:
Detect corresponding first identification information of accommodating container to be found whether corresponding with the target accommodating container for prestoring Two identification informations are identical;
When first identification information for detecting is identical with second identification information, the storage to be found is determined Container is the target accommodating container;
Export the prompting message that the target accommodating container is found for prompting.
It is described export for pointing out to find the prompting message of the target accommodating container after, also include:
Decryption key information is sent to the target accommodating container, so that the target accommodating container is close according to the decryption Key information is decrypted.
Corresponding first identification information of detection accommodating container to be found whether corresponding with target accommodating container second Before identification information is identical, also include:
First identification information is sent to the accommodating container to be found, so that the accommodating container to be found preserves institute The first identification information is stated, and first identification information is used to identify the receipts accommodating container to be found.
Corresponding first identification information of detection accommodating container to be found whether corresponding with target accommodating container second Before identification information is identical, also include:
Encryption key message is sent to the target accommodating container, so that the target accommodating container is close according to the encryption Key information is encrypted.
It is described to detect whether corresponding first identification information of accommodating container to be found is corresponding with the target accommodating container for prestoring The second identification information it is identical before, also include:
Second identification information that other equipment sends is received, and/or, the decryption key information.
Corresponding first identification information of detection accommodating container to be found whether corresponding with target accommodating container second Identification information it is identical including:
Detect whether first identification information is identical with second identification information by near-field communication NFC module.This Art personnel will readily occur to other embodiment party of the disclosure after considering specification and putting into practice disclosure disclosed herein Case.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or adaptability Change follows the general principle of the disclosure and including the undocumented common knowledge or usual skill in the art of the disclosure Art means.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following claim Point out.
It should be appreciated that the disclosure is not limited to the precision architecture for being described above and being shown in the drawings, and And can without departing from the scope carry out various modifications and changes.The scope of the present disclosure is only limited by appended claim.

Claims (13)

1. a kind of recognition methods of accommodating container, it is characterised in that including:
Detect corresponding first identification information of accommodating container to be found second mark whether corresponding with the target accommodating container for prestoring Knowledge information is identical;
When first identification information for detecting is identical with second identification information, the accommodating container to be found is determined It is the target accommodating container;
Export the prompting message that the target accommodating container is found for prompting.
2. method according to claim 1, it is characterised in that the output finds the target storage and holds for prompting After the prompting message of device, also include:
Decryption key information is sent to the target accommodating container, so that the target accommodating container is believed according to the decruption key Breath is decrypted.
3. method according to claim 1, it is characterised in that corresponding first mark of the detection accommodating container to be found Before whether corresponding with target accommodating container information the second identification information be identical, also include:
First identification information is sent to the accommodating container to be found, so that the accommodating container to be found preserves described the One identification information, and first identification information is for identifying the receipts accommodating container to be found.
4. method according to claim 2, it is characterised in that corresponding first mark of the detection accommodating container to be found Before whether corresponding with target accommodating container information the second identification information be identical, also include:
Encryption key message is sent to the target accommodating container, so that the target accommodating container is believed according to the encryption key Breath is encrypted.
5. method according to claim 2, it is characterised in that corresponding first mark of the detection accommodating container to be found Before whether corresponding with the target accommodating container for prestoring information the second identification information be identical, also include:
Second identification information that other equipment sends is received, and/or, the decryption key information.
6. method according to claim 5, it is characterised in that corresponding first mark of the detection accommodating container to be found Information the second identification information whether corresponding with target accommodating container it is identical including:
Detect whether first identification information is identical with second identification information by near-field communication NFC module.
7. a kind of identifying device of accommodating container, it is characterised in that including:
Detection module, for detect corresponding first identification information of accommodating container to be found whether with the target accommodating container for prestoring Corresponding second identification information is identical;
Determining module, first identification information for being detected when the detection module is identical with second identification information When, determine that the accommodating container to be found is the target accommodating container;
Output module, for when the determining module determines the target accommodating container, exporting and finding institute for prompting State the prompting message of target accommodating container.
8. device according to claim 7, it is characterised in that also include:Decryption key information sending module,
The decryption key information sending module, for finding the target storage for prompting when the output module is exported After the prompting message of container, decryption key information is sent to the target accommodating container, so that the target accommodating container root It is decrypted according to the decryption key information.
9. device according to claim 7, it is characterised in that also include:First identification information sending module,
The first identification information sending module, for detecting corresponding first mark of accommodating container to be found in the detection module Before whether corresponding with the target accommodating container for prestoring knowledge information the second identification information be identical, to the accommodating container to be found First identification information is sent, so that the accommodating container to be found preserves first identification information, and first mark Knowledge information is used to identify the receipts accommodating container to be found.
10. device according to claim 8, it is characterised in that also include:Encryption key message sending module,
The encryption key message sending module, for detecting corresponding first mark of accommodating container to be found in the detection module Before whether corresponding with the target accommodating container for prestoring knowledge information the second identification information be identical, sent out to the target accommodating container Encryption key message is sent, so that the target accommodating container is encrypted according to the encryption key message.
11. devices according to claim 8, it is characterised in that also include:Receiver module,
The receiver module, for being exported for pointing out the prompting for finding the target accommodating container to believe in the output module Before breath, second identification information that other equipment sends is received, and/or, the decryption key information.
12. devices according to claim 11, it is characterised in that the detection module includes:Near-field communication NFC detection Module,
The NFC detection sub-modules, for detecting whether first identification information is believed with the described second mark by NFC module Manner of breathing is same.
A kind of 13. identifying devices of accommodating container, it is characterised in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
Detect corresponding first identification information of accommodating container to be found second mark whether corresponding with the target accommodating container for prestoring Knowledge information is identical;
When first identification information for detecting is identical with second identification information, the accommodating container to be found is determined It is the target accommodating container;
Export the prompting message that the target accommodating container is found for prompting.
CN201710074057.XA 2017-02-10 2017-02-10 The recognition methods of accommodating container and device Pending CN106845584A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710074057.XA CN106845584A (en) 2017-02-10 2017-02-10 The recognition methods of accommodating container and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710074057.XA CN106845584A (en) 2017-02-10 2017-02-10 The recognition methods of accommodating container and device

Publications (1)

Publication Number Publication Date
CN106845584A true CN106845584A (en) 2017-06-13

Family

ID=59127288

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710074057.XA Pending CN106845584A (en) 2017-02-10 2017-02-10 The recognition methods of accommodating container and device

Country Status (1)

Country Link
CN (1) CN106845584A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108422938A (en) * 2018-03-30 2018-08-21 斑马网络技术有限公司 Vehicle with sensing device further and application
CN111859428A (en) * 2020-07-22 2020-10-30 成都安恒信息技术有限公司 Containerization-based secret key storage method and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108422938A (en) * 2018-03-30 2018-08-21 斑马网络技术有限公司 Vehicle with sensing device further and application
CN108422938B (en) * 2018-03-30 2024-04-05 斑马网络技术有限公司 Vehicle with sensing device and application
CN111859428A (en) * 2020-07-22 2020-10-30 成都安恒信息技术有限公司 Containerization-based secret key storage method and system
CN111859428B (en) * 2020-07-22 2022-07-19 成都安恒信息技术有限公司 Containerization-based secret key storage method and system

Similar Documents

Publication Publication Date Title
US9467859B2 (en) Virtual key ring
CN103927502B (en) Method and apparatus for operating near field communication (NFC) function in portable terminal
CN105260673A (en) Short message reading method and apparatus
CN105307137A (en) Short message reading method and device
CN106713116A (en) Information processing method, apparatus and system
EP2893736A1 (en) Method, apparatus, and system for providing and using a trusted tag
CN103916233A (en) Information encryption method and device
CN105227524A (en) A kind of information security method and relevant apparatus
CN104618330A (en) Business processing method and device and terminal
CN104331668A (en) Wrong password prompting method and device
US20150186663A1 (en) Selectable display of data on a payment device
CN104484799A (en) Payment method and device
CN104660806A (en) Information reminding method and device
CN106023370A (en) Unlocking method and device for NFC equipment
CN105657158A (en) Information prompting method and device and mobile terminal
CN106296171A (en) The method and device of swiping the card of mobile terminal
CN106845584A (en) The recognition methods of accommodating container and device
CN106789070A (en) The decryption method of data, device and terminal
CN103916471A (en) Information display method and device
CN106658467A (en) Virtual SIM card management method and device
CN106534495A (en) Method of information processing, device and equipment
CN105303120A (en) Short message reading method and apparatus
CN104506710B (en) Short message management method, terminal and device
CN106778198A (en) Perform the safety certifying method and device of operation
KR101879326B1 (en) Method and device for transmitting and receiving instruction information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170613

RJ01 Rejection of invention patent application after publication