CN108830957B - Intelligent article interaction system and method applied to private space entrance - Google Patents

Intelligent article interaction system and method applied to private space entrance Download PDF

Info

Publication number
CN108830957B
CN108830957B CN201810574163.9A CN201810574163A CN108830957B CN 108830957 B CN108830957 B CN 108830957B CN 201810574163 A CN201810574163 A CN 201810574163A CN 108830957 B CN108830957 B CN 108830957B
Authority
CN
China
Prior art keywords
information
module
interaction
article
decision
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201810574163.9A
Other languages
Chinese (zh)
Other versions
CN108830957A (en
Inventor
文伟平
李燈辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Peking University
Original Assignee
Peking University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University filed Critical Peking University
Priority to CN201810574163.9A priority Critical patent/CN108830957B/en
Publication of CN108830957A publication Critical patent/CN108830957A/en
Application granted granted Critical
Publication of CN108830957B publication Critical patent/CN108830957B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00733Cryptography or similar special procedures in a franking system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Health & Medical Sciences (AREA)
  • Power Engineering (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an intelligent article interaction system and method applied to a private space entrance. The system adopts a system structure with a mechanism separated from the strategy, supports the flexibility of the strategy, can serve different members, adapts to the changing environment, and can selectively sign and receive articles at the entrance of the private space for a robot instead of a human. The intelligent equipment guided by the technical scheme provided by the invention can selectively receive the articles to the private space and provide the receiving certificate, thereby meeting the requirement of credibility. The technical scheme of the invention can reduce the storage cost, the transportation cost, the communication cost and the time cost of the logistics system, improve the economic value, improve the shopping experience of users and be beneficial to the ecological construction of the intelligent furniture industry.

Description

Intelligent article interaction system and method applied to private space entrance
Technical Field
The invention relates to an article identification technology and a safety system design technology, in particular to an intelligent article interaction system and method applied to a private space entrance.
Background
Due to the continuous development of information technology, information interaction (which refers to a process of sending and receiving information) is various and convenient, but article interaction (which refers to a process of sending and receiving an article) is less developed. In recent years, with the development of the field of artificial intelligence, people expect to help people to fulfill various practical requirements more intelligently by machines, but the field of artificial intelligence focuses more on how to extract information from the real world and analyze and process the information, and the direct participation of people is almost not left for the real world article interaction. Even if the machine is smart enough to recognize that the ordered goods in the home have arrived at the door, the person must go back to the machine, and at this time, no person is in the home, which is a pain point for sending the goods offline, and some express items may be sent for a plurality of times to be taken away by the person, which wastes a lot of storage cost, transportation cost, communication cost and time cost, and causes inconvenience for the consignee. Even after various intelligent products appear in the home, if the problem of article interaction cannot be solved, each intelligent product needs to be supplemented with consumables by people, and the convenience brought by the intelligent products is greatly reduced.
In a typical item interaction scenario, there should be a receiving entity R1 and a sending entity S1, as well as a receiving responsible party R2 and a sending responsible party S2, item I, delivery channel W, interaction credential C. For convenience of description, parts in a typical item interaction scenario are denoted below by letters. The item I is an item to be interacted; s2 is the original owner of item I, i.e. the real sender; s2 consigns S1 to transport and deliver I; r2 is the true recipient; r1 is the delegate for R2, receiving I instead of R2; when the interaction parties (R1, R2, S1 and S2) confirm the interaction, a virtual transfer channel W from S1 to R1 is established; both parties can obtain the credential C when the interaction is complete.
When interacting with items in a private space, R2 is typically the owner of the private space, which requires R2 to trust R1 since R1 should have access to R2's private space when receiving I. In the case of commodity interaction in private space, W is usually small in traffic, normally closed, and needs to be frequently opened, which requires R1 to frequently access the private space of R2, and it is difficult for people to trust others to frequently access their private space, so in most cases R2 needs to act as R1 in person and directly participate in commodity interaction frequently. If a machine is used as the R1, a trusted item interaction system is required, so that R2, R1 and S2, S1 all trust that the item interaction process is trusted.
However, the existing intelligent article interaction technology applied to the entrance of the private space is difficult to meet the requirement of reliability of the article interaction process, and the purpose of selectively signing in the article at the entrance of the private space by using a machine instead of a human cannot be achieved.
Disclosure of Invention
Aiming at the above-mentioned reliability requirement, the invention provides an intelligent article interaction system and method applied to a private space entrance. The system adopts a system structure with a mechanism separated from the strategy, supports the flexibility of the strategy, can serve different members, adapts to the changing environment, and can selectively sign and receive articles at the entrance of the private space for a robot instead of a human. The intelligent device guided by the technical scheme provided by the invention can selectively receive the articles to the private space and provide the receiving certificate, thereby meeting the reliability requirement.
The technical scheme provided by the invention is as follows:
an intelligent article interaction method applied to a private space entrance ensures the credibility of interaction by controlling the security of article sources, the security of articles, the security of order logic and the security of interaction processes; by adopting a mode of separating a mechanism from a strategy and changing the strategy, the purposes of selectively signing and receiving the articles at the entrance of the private space by using a machine instead of a human, selectively receiving the articles to the private space and providing a receiving certificate are achieved;
for an item interaction scenario, the scenario includes a receiving entity R1, a sending entity S1, a receiving responsible party R2 and a sending responsible party S2, an item I, a delivery channel W, an interaction credential C. In the item interaction scene, an item I is an item to be interacted; s2 is the original owner of item I, i.e. the real sender; s2 consigns S1 to transport and deliver I; r2 is the true recipient; r1 is the delegate for R2, receiving I instead of R2; when the interaction parties (R1, R2, S1 and S2) confirm the interaction, a virtual transfer channel W from S1 to R1 is established; both sides can obtain the certificate C when the interaction is completed;
the method comprises the following steps:
1) activating the system; the entities of the system (both interacting parties, including R1, R2, S1, S2) are retrospective; the method specifically comprises the following steps:
11) at the beginning, the sending entity S1 uses its ID information (which may be a fingerprint, a human face, a barcode, etc.) to activate the system through a software and hardware interface (which may include video input/output, audio input/output) provided by the IO module; the IO module reads ID information of a sending entity S1;
the IO module may further have a video input/output component, an audio input/output component, etc. for interacting with the information of S1, for example, providing an active interrupt button, and entering an interactive interrupt processing after pressing the button, where the interactive interrupt processing may include displaying the interrupt reason, sending a report, recovering the system, etc.
12) And (3) identity authentication: and the IO module reads the ID information and sends the ID information to the decision module, and the decision module queries the verification server according to the ID information. The verification server returns the rating information of the inquired ID in a specific format, and marks the information item corresponding to the ID as 'interactive' in a certain form at the server end, waits for the decision-making module to send the final interactive result, so as to maintain the ID and the rating information of the organization represented by the ID according to a certain strategy.
The authentication server maintains a certain amount of detailed rating information of S1 and has coping strategies for S1 that has not been registered, such as: manually auditing and registering unregistered logistics organizations; for the unregistered individual S1, registration is performed according to the rating of the registered logistics organization to which the individual belongs, and for S1 which is unregistered and does not belong to any registered logistics organization, the rating class data of the individual is marked as lowest, and the non-rating class data is marked as "unknown".
13) And (4) qualification examination: and when the decision module correctly receives the S1 rating information @1 in a specific format, judging whether the @1 is inconsistent with the current strategy. If not, the system is activated successfully, and the system can acquire characteristic information such as an image of S1 to enhance the traceability; if the two types of interaction result are inconsistent, the IO module prompts activation failure and reasons, and sends the interaction result with specific format and more detailed content to the verification server.
The decision module is provided with a processor and a section of control program, and actually controls the operation of the system. The current policy includes filtering class information in the policy list of the decision module, such as rejecting interaction with entities below a certain rating and/or designated someone, or increasing a rating of someone, etc. The screening class information may allow high-level policy modules to modify to provide personalized services.
14) The mutual communication among all module devices at the inlet end of the same private space, the mutual communication among the decision module, the information acquisition module and the devices of the server module are realized, and the mutual communication between the decision module and the devices of S2 is realized; the security is ensured by a method of communication on the original internet and by applying a message authentication mechanism in cryptography;
in the implementation, the communication between the module devices at the inlet end of the same private space can be solved by using a bus. For the mutual communication between each module and the device of the server module, or the mutual communication between the decision module and the device of S2, the existing wireless network may be covered or another communication device, such as a wireless antenna, may be provided.
2) Acquiring article information, and judging the safety of the article and the safety of order logic; the following operations are performed:
21) starting information acquisition: after the decision module confirms that the system is successfully activated, a designated area is given through the hardware interface module, and an IO prompt S1 is used for placing an article I into the designated area;
22) information collection and processing: controlling related hardware of the information acquisition module through a decision module, and acquiring article information in the designated area; the collected information is temporarily stored for a certain time by the system and can be called by the decision module; the method comprises the following steps:
221) acquiring real-time image information and the like through an exception handling module, judging whether an information acquisition environment is normal or not, and sending an exception signal @6 to a decision module;
222) information such as the characteristic code or the wireless radio frequency tag is acquired through the special signal acquisition module, and is inquired and verified in a registered article database maintained by a verification server, so that detailed article information (@3) in a specific format is obtained and is directly or indirectly returned to the decision module;
the authentication server also maintains a database of registered items in which item order information is stored, and provides a registration entry, and provides an interface that can be accessed through special signals (bar codes or radio frequency tags, etc.). A sender (including S1, S2) having a security rating should be registered for each registered item, and it can be ensured that item information items are not tampered with and counterfeited; the authentication server has a coping policy for S2 that has not been registered, such as: items of rating class data of S2 that have not been registered are marked as medium, and non-rating class data are registered when items are registered at S2. And after the authentication server waits for the interaction, correspondingly adjusting the ratings of the registered S1 and S2 according to a certain strategy according to the feedback information of the decision module.
223) The safety related information is collected through a safety information collecting module and is sent to a safety detection server; the safety detection server identifies and labels safety related information to obtain identification and labeling information (@4) in a specific format, and directly or indirectly returns the identification and labeling information to the decision module;
among them, safety-related information such as X-ray transmission images and the like; the method for identifying and labeling the safety related information specifically comprises the steps of training a contraband identification model in advance by using a machine learning method based on mass X-ray safety inspection data, continuously training optimized characteristic parameters to improve accuracy and adapt to new changes, and analyzing the safety related information by using the model.
224) Acquiring multi-angle image information through an identification information acquisition module, and sending the image information to an article identification server; the article recognition server recognizes and labels the image information to obtain recognition and labeling information (@5) with a specific format and directly or indirectly returns the recognition and labeling information to the decision module;
3) after the decision module acquires information of each item (@1, @3, @4, @5, @6), acquiring @2 information through the background task module, analyzing the @ n information (@1, @2, @3, @4, @5, @6) and using the information as a decision basis to make a decision according to the strategy in the strategy list; the following operations are specifically executed:
31) analyzing the information to obtain whether the item interaction has logic security (namely whether the item I stated in the order or the item I being interacted is authorized to be received), whether the interactive item has source security, whether the item has security, whether the item identification verification is passed, and whether the interaction has interaction process security;
32) implementing the signing according to the current strategy; otherwise, interrupting the article interaction, displaying the interaction interruption reason, and performing corresponding interaction interruption processing;
the interaction interrupt handling may be: the item I can be moved out of the detected specific area through the hardware interface module, and a detailed interaction result, system recovery and the like are sent to the authentication server.
The current strategy consists of an initial strategy and a new strategy generated by iteration in use, and the method adopts a system structure with a mechanism separated from the strategy, and adjusts a strategy list maintained in a decision module by providing human/intelligent program-oriented interface support, so as to support strategy change and further support different application scenes and use members; the 'mechanism and strategy separated architecture' is to make the abstract strategy and the concrete mechanism can be flexibly combined, for example, when the technical condition is poor and/or the cost is limited, a simplified version is adopted, and when the condition is good, a better technology is adopted for realizing.
The specific method comprises the following steps: the decision module maintains a complete strategy list, the list has an initial value, the equipment design is determined, and in addition, the list is an adjustable list displayed through an interface provided by the high-level strategy module; the lower layer is an executable program, and the strategy is implemented by calling the @ n information and the analysis result thereof. The user or equipment manufacturer can adjust the strategy with limited degree by using the function provided by the system, and the system audits the operation of the user or equipment manufacturer for adjusting the strategy.
4) Signing: the decision module completes the signing operation by means of the interface provided by the hardware interface module; the following operations are specifically executed:
41) and (5) signing for the article. The decision module transfers the item I from the designated information acquisition area to the protected designated area in the private space by means of the interface provided by the hardware interface module.
42) Auditing the article interaction process; the audit result can be stored in the device at the inlet end of the private space or the cloud end of a device supplier, and the decision module can generate a detailed interaction result report with a specific format according to the audit result and send the detailed interaction result report to the server module; if the sign-in is smooth, giving an interactive certificate; and sending the interaction voucher to the interaction parties R1, R2, S1 and S2.
The invention also provides an intelligent article interaction system applied to the private space entrance, which comprises four modules: 1. the system comprises an interaction module 2, a strategy module 3, an information acquisition module 4 and a server module.
Aiming at an article interaction scene, in the four modules of the intelligent article interaction system applied to the private space entrance, the interaction module comprises: an IO sub-module (Input/Output sub-module) and a hardware interface sub-module; the policy module includes: a background task submodule, a decision submodule and an advanced strategy submodule; the information acquisition module comprises a plurality of hardware devices and can be used for acquiring multi-angle and multi-attribute image information, characteristic bar codes or radio frequency tags and the like, and can comprise a special signal acquisition sub-module, a safety information acquisition sub-module, an identification information acquisition sub-module and an exception handling sub-module, or does not comprise the special signal acquisition sub-module and/or the safety information acquisition sub-module, and the identification information acquisition sub-module acquires corresponding information; the server module comprises an authentication server, an article identification server and/or a security detection server; the modules are as follows:
1. the interaction module comprises: IO submodule and hardware interface submodule.
IO submodule: and the decision sub-module is connected with each other, and the identity information (ID information) of S1 is obtained at the beginning of interaction and is used as a basis for inquiring the detailed rating information (marked as @1) of the interaction. And acquiring operation information such as excitation or interruption from the S1 in the interaction process, sending the operation information or data to the decision submodule, and displaying other functions such as prompt information according to the command of the decision submodule.
Hardware interface submodule: the system comprises a series of hardware facilities for item interaction, and provides hardware interfaces for a decision sub-module, an exception handling sub-module and an IO sub-module. And the system is responsible for receiving and properly keeping the article I and feeding back the received information to the decision submodule.
2. The policy module includes: a background task sub-module, a decision sub-module and a high-level strategy sub-module.
A background task submodule: order and order information (@2) of maintenance R2, etc., are interconnected with the decision sub-module.
A decision submodule: and maintaining a complete strategy list, summarizing information (@ n) acquired by other modules according to a set program, and performing decision making and other processing by combining the strategy list. Other modules include: IO submodule (@1), backstage task module (@2), special signal acquisition submodule (@3), safety information acquisition submodule (@4), identification information acquisition submodule (@5), exception handling submodule (@ 6).
Wherein the policy manifest consists of an initial policy and a new policy generated iteratively in use. When designing a device applied to a specific scene, an initial policy is given in the policy list, and the initial policy describes which interval each of the @ n information is in (at this time, a combination of intervals can be recorded as a vector) to decide to sign in/reject/ask for the information, and the like. In addition, the list is an adjustable list displayed through an interface provided by the high-level policy module; the lower layer is an executable program, a user (a human/intelligent program) can adjust the strategy through a high-level strategy module, and the program of the lower layer reflects the adjustment of the combination (vector) of the intervals. In actual operation, in an interface facing a user, time setting and the like can be added for a newly added strategy of the user, and the new strategy is distinguished from the new strategy such as 'next time' and 'forever'; the corresponding underlying program needs support. The established program refers to a program which is established by controlling the whole process by a decision module in interaction; the method comprises the following steps: according to the information acquisition module information of requiring control, and the information @ n that receives, saves, handles information acquisition module and backstage task submodule and send is specifically IO submodule (@1), backstage task module (@2), special signal acquisition submodule (@3), safety information acquisition submodule (@4), identification information acquisition submodule (@5), exception handling submodule (@ 6). The processing information refers to analyzing information and making a decision according to the strategy of the strategy list, and then controlling a hardware interface sub-module and the like to implement the decision.
The high-level strategy submodule: an interface facing to the upper layer (human/intelligent program) is provided and is connected with the decision submodule, so that the upper layer can adjust the strategy list of the decision submodule and can also directly make a decision.
3. The information acquisition module includes: the hardware equipment can be used for collecting multi-angle and multi-attribute image information, characteristic bar codes or radio frequency tags and the like. The system can be subdivided into a special signal acquisition submodule, a safety information acquisition submodule, an identification information acquisition submodule and an exception handling submodule. In specific implementation, if the structure needs to be simplified or the requirement on safety is not high, the safety information acquisition submodule can be omitted, and the identification information acquisition submodule shares part of safety functions. When the special signal acquisition submodule only acquires image information, the special signal acquisition submodule can be saved, and the identification information acquisition submodule bears the functions.
A special signal acquisition submodule: special signals such as bar codes or two-dimensional codes are collected, and the item information with a certain format is further acquired by means of the verification server (@ 3).
The safety information acquisition submodule comprises: the method comprises the steps of collecting safety related information, and acquiring safety information (@4) of an article I in a certain format by means of a safety detection server module.
Identification information acquisition submodule: information such as article images is collected, and article information (@5) in a certain format is acquired by means of an article identification server module.
An exception handling submodule: the method comprises the steps of monitoring the article interaction process/hardware operation condition in real time, identifying whether abnormality occurs or not, analyzing an abnormal number when the abnormality occurs, sending the abnormal number @6 to a decision submodule according to a certain format, and having certain autonomous exception handling capacity.
4. The server module comprises an authentication server, a security detection server and an article identification server. Under certain conditions, the safety detection server can be omitted, and the article identification server bears corresponding safety functions.
The authentication server: providing an S1 identity verification interface and an item order information inquiry interface, and being capable of inquiring the detailed rating information of S1 according to the ID information of S1 and maintaining the rating information according to the feedback result; the order information of the registered goods can be inquired according to the special signal sent by the special signal acquisition module and the rating information of the sender S1, S2 can be maintained according to the feedback result.
The safety detection server: and providing a safety detection interface which can obtain an identification result according to the safety related information sent by the safety detection module.
An article identification server: and providing an article identification interface, and obtaining an identification result according to the picture information sent by the article identification module.
Compared with the prior art, the invention has the beneficial effects that:
the invention provides an intelligent article interaction system and method applied to a private space entrance. The system adopts a system structure with a mechanism separated from the strategy, supports the flexibility of the strategy, can serve different members, adapts to the changing environment, and can selectively sign and receive articles at the entrance of the private space for a robot instead of a human. The intelligent device guided by the technical scheme provided by the invention can selectively receive the articles to the private space and provide the receiving certificate, thereby meeting the following reliability requirements:
a two parties of the interaction of the articles (R1, R2, S1, S2) believe that the interaction is exploitable. I.e. there is an explicit receiving responsible party (R2) and sending responsible party (S2), and each interaction has a credential (C) that can be checked.
B both parties of the item interaction (R1, R2, S1, S2) believe that the received item (I) is compliant.
C both parties of the item interaction (R1, R2, S1, S2) believe that the received item (I) is authorized to be received by the receiving responsible party (R2).
D, the two parties of the interaction of the items (R1, R2, S1, S2) believe that the item (I) received by the receiving entity (R1) is the item sent by the sending entity (S1), and the receiving entity (R1) keeps the item (I) properly until the receiving responsible party (R2) takes the item (I).
By adopting the technical scheme provided by the invention, a user can give the object interaction task to the intelligent equipment with great care, and the intelligent equipment selectively receives the object to the private space and provides the receiving certificate. The system adopts a system structure with a mechanism separated from a strategy, supports the flexibility of the strategy, can serve different members, adapts to the changing environment, and can enable a machine to selectively sign for articles at the entrance of a private space instead of a human. By adopting the invention, the storage cost, the transportation cost, the communication cost and the time cost of the logistics system can be reduced, the economic value is improved, the shopping experience of a user is improved, and the ecological construction of the intelligent furniture industry is facilitated.
Drawings
FIG. 1 is a diagram of a typical item interaction scenario;
the system comprises a receiving entity R1, a sending entity S1, a receiving responsible party R2, a sending responsible party S2, an article I, a delivery channel W and an interactive certificate C. In the item interaction scene, an item I is an item to be interacted; s2 is the original owner of item I, i.e. the real sender; s2 consigns S1 to transport and deliver I; r2 is the true recipient; r1 is the delegate for R2, receiving I instead of R2; when the interaction parties (R1, R2, S1 and S2) confirm the interaction, a virtual transfer channel W from S1 to R1 is established; both parties can obtain the credential C when the interaction is complete.
FIG. 2 is a block diagram of an intelligent article interaction system applied to a private space portal according to an embodiment of the present invention;
the system comprises an interaction module 1, a strategy module 2, an information acquisition module 3 and a server module 4; the interaction module 1 comprises: 11-IO submodule and 12-hardware interface submodule; the policy module 2 includes: 13-background task submodule, 14-decision submodule and 15-high-level strategy submodule; the information acquisition module 3 may include: 16-a special signal acquisition submodule, 17-a safety information acquisition submodule, 18-an identification information acquisition submodule and 19-an exception handling submodule; the server module 4 comprises 20-authentication server, 21-article identification server and 22-security detection server.
Fig. 3 is a flow chart of the intelligent article interaction method applied to the private space entrance provided by the invention.
FIG. 4 is a block flow diagram of a specific implementation of the method of the present invention.
Detailed Description
The invention will be further described by way of examples, without in any way limiting the scope of the invention, with reference to the accompanying drawings.
The invention provides an intelligent article interaction system and method applied to a private space entrance. The system adopts a system structure with a mechanism separated from the strategy, supports the flexibility of the strategy, can serve different members, adapts to the changing environment, and can selectively sign and receive articles at the entrance of the private space for a robot instead of a human. The intelligent device guided by the technical scheme provided by the invention can selectively receive the articles to the private space and provide the receiving certificate.
In a typical item interaction scenario, there should be a receiving entity R1 and a sending entity S1, as well as a receiving responsible party R2 and a sending responsible party S2, item I, delivery channel W, interaction credential C. As shown in fig. 1, a typical item interaction scenario includes a receiving entity R1, a sending entity S1, a receiving responsible party R2 and a sending responsible party S2, an item I, a delivery channel W, an interaction credential C. In the item interaction scene, an item I is an item to be interacted; s2 is the original owner of item I, i.e. the real sender; s2 consigns S1 to transport and deliver I; r2 is the true recipient; r1 is the delegate for R2, receiving I instead of R2; when the interaction parties (R1, R2, S1 and S2) confirm the interaction, a virtual transfer channel W from S1 to R1 is established; both parties can obtain the credential C when the interaction is complete.
For convenience of description, the following will use letters to represent parts in a typical item interaction scenario. The item I is an item to be interacted; s2 is the original owner of item I, i.e. the real sender; s2 consigns S1 to transport and deliver I; r2 is the true recipient; r1 is the delegate for R2, receiving I instead of R2; when the interaction parties (R1, R2, S1 and S2) confirm the interaction, a virtual transfer channel W from S1 to R1 is established; both parties can obtain the credential C when the interaction is complete. Two sending entities S1 appear in fig. 1, two S1 may represent the same entity; or the right sending entity S1 represents a logistics organization and the left sending entity S1 is an employee thereof who performs part of the interactive service on behalf of the organization, and their roles in the interactive scenario are the same and are not distinguished herein by name.
When interacting with items in a private space, R2 is typically the owner of the private space, which requires R2 to trust R1 since R1 should have access to R2's private space when receiving I. In the case of commodity interaction in private space, W is usually small in traffic, normally closed, and needs to be frequently opened, which requires R1 to frequently access the private space of R2, and it is difficult for people to trust others to frequently access their private space, so in most cases R2 needs to act as R1 in person and directly participate in commodity interaction frequently. If a machine is used as the R1, a trusted item interaction system is required, so that R2, R1 and S2, S1 all trust that the item interaction process is trusted. The invention considers that the intelligent article interactive system applied to the private space entrance can meet the following reliability requirements:
a two parties of the interaction of the articles (R1, R2, S1, S2) believe that the interaction is exploitable. I.e. there is an explicit receiving responsible party (R2) and sending responsible party (S2), and each interaction has a credential (C) that can be checked.
B both parties of the item interaction (R1, R2, S1, S2) believe that the received item (I) is compliant.
C both parties of the item interaction (R1, R2, S1, S2) believe that the received item (I) is authorized to be received by the receiving responsible party (R2).
D, the two parties of the interaction of the items (R1, R2, S1, S2) believe that the item (I) received by the receiving entity (R1) is the item sent by the sending entity (S1), and the receiving entity (R1) keeps the item (I) properly until the receiving responsible party (R2) takes the item (I).
Fig. 2 is a block diagram of an intelligent article interaction system applied to a private space entrance according to an embodiment of the present invention. The system comprises an interaction module, a strategy module, an information acquisition module and a server module, wherein the interaction module comprises: an IO sub-module and a hardware interface sub-module; the policy module includes: a background task submodule, a decision submodule and an advanced strategy submodule; the information acquisition module comprises a plurality of hardware devices and can be used for acquiring multi-angle and multi-attribute image information, characteristic bar codes or radio frequency tags and the like, and can comprise a special signal acquisition sub-module, a safety information acquisition sub-module, an identification information acquisition sub-module and an exception handling sub-module, or does not comprise the special signal acquisition sub-module and/or the safety information acquisition sub-module, and the identification information acquisition sub-module acquires corresponding information; the server module comprises an authentication server, an article identification server and/or a security detection server;
the IO module is an interface for interaction between equipment and a person (the person can only interact with a machine through the IO module, and a component directly facing the person belongs to an IO sub-module); the hardware interface sub-module provides interfaces for other modules of the equipment, and the IO sub-module, the decision-making module and the exception handling sub-module all call the interfaces of the hardware interface sub-module to control some hardware.
The system controls the credibility of interaction by controlling the security of the source of the article, the security of order logic and the security of the interaction process. One feature of the system is that it provides a system solution for trustworthiness in the context described, using an architecture with mechanisms separate from policies. The system thus supports multiple implementations of dynamic policy modules and mechanisms, and as used throughout this application, the word "may" is used in a permissive sense (i.e., meaning having the potential to), rather than the mandatory sense (i.e., meaning must). Similarly, the words "include", "including", and "includes" mean including, but not limited to.
The intelligent article interaction method applied to the private space entrance controls the credibility of interaction by controlling the security of article sources, the security of articles, the security of order logic and the security of interaction flow; by adopting a mode of separating a mechanism from a strategy and changing the strategy, the purposes of selectively signing and receiving the articles at the entrance of the private space by using a machine instead of a human, selectively receiving the articles to the private space and providing a receiving certificate are achieved;
FIG. 3 is a block flow diagram of a method provided by the present invention. As shown in fig. 4, the method of the present invention is embodied as follows:
and S30, activating the system. To ensure that the interaction is exploitable, the entity that can successfully activate the system must be exploitable.
S301. initially, S1 uses its ID information (which may be a fingerprint, a human face, a barcode, etc.) to attempt to activate the system through the IO module 12, and the IO module 12 provides a corresponding software and hardware interface. The IO module 12 may also have video input/output, audio input/output, etc. components for interacting with information of S1, such as providing an active interrupt button, pressing the button to enter into an interaction interrupt processing, which may include displaying the interrupt reason, sending a report, recovering the system, etc.
S302, identity authentication. The IO module 12 reads the ID information and sends it to the decision module 14, and the decision module 14 queries the authentication server 20 accordingly. The verification server 20 returns the rating information of the queried ID in a specific format, and marks the information item corresponding to the ID as "interacting" in a certain form at the server side, and waits for the decision module 14 to send the final interaction result, so as to maintain the ID and the rating information of the organization represented by the ID according to a certain policy. The authentication server 20 maintains a certain amount of detailed rating information of S1 and has a coping policy for S1 that has not been registered, such as: manually auditing and registering unregistered logistics organizations; for the unregistered individual S1, registration is performed according to the rating of the registered logistics organization to which the individual belongs, and for S1 which is unregistered and does not belong to any registered logistics organization, the rating class data of the individual is marked as lowest, and the non-rating class data is marked as "unknown".
And S303, qualification checking. The decision block 14 has a processor and a control program to actually control the operation of the system. When the decision module 14 correctly receives the rating information @1 of S1 in a specific format, it is determined whether @1 contradicts the current policy. If not, the system is activated successfully, and the system can acquire characteristic information such as an image of S1 to enhance the traceability; if the two types of interaction are inconsistent, the IO module 12 prompts the activation failure and reason, and sends the interaction result with the specific format and the more detailed content to the authentication server 20. The current policy includes filtering class information in the policy manifest of the decision module 14, such as rejecting interactions with entities below a certain rating and/or a specified person, or increasing a rating of a person, etc. This screening class information may allow the high-level policy module 15 to modify to provide personalized services.
S304, communication problem. Communication between modular devices at the ingress side of the same private space can be solved using a bus. For the mutual communication between the decision module 14 and the devices of the server module, or the mutual communication between the decision module 14 and the devices of S2, the existing wireless network may be covered or another communication device, such as a wireless antenna, may be provided. This example provides a method for communication over the original internet, which uses a message authentication mechanism in cryptography to ensure security, such as: before transmission, a sender (such as a server A) attaches a device number (with a certain length) of the sender (the server A) and a string of random codes (the length is required to be certain, but the random codes generated each time are different in a long time) to information m to be transmitted, extracts an abstract of the information m to be transmitted through a sha256(Secure Hash Algorithm) Algorithm, encrypts the abstract by using an RSA private key of the sender (the server A) to form a ciphertext c, attaches the ciphertext c to the m, and then sends the ciphertext c to a receiver (such as a module B with a number x); after receiving the message, the receiver (module B number x) first obtains the random code through the received m, checks whether the same random code has been received in the last period of time, if so, the message is outdated or copied by a malicious party to attempt cheating, if not, obtains the device number of the sender (server a) from m, so as to obtain the public key of the sender (server a), decrypts c with the public key to obtain a message a, processes the received m with the sha256 algorithm to obtain B, compares a and B to see whether the a and B are the same, if the a and B are the same, confirms that the received message really comes from the sender (server a), and the message is not modified, otherwise (i.e., a and B are different) possibly from being unsafe or tampered, and at this time, the exception processing module 16 can be started to process or nothing is done. Otherwise, the system module serves as a sender, and the server serves as a receiver. A device manufacturer or service provider (or a professional third party organization) needs to maintain a table of public device numbers and their corresponding public keys. The communication problem between each information acquisition module and the server equipment in the system can also be solved by adopting the method, or the communication problem can be solved independently, or the communication problem and the decision module 14 at the inlet end of the same private space share a set of communication device through a bus.
And S40, acquiring article information. After the system is successfully activated, the article information starts to be acquired, and the exception handling module 16 ensures the safety of the interaction process.
S401, information acquisition is started. After the decision module 14 confirms that the system activation is successful, the specified area is given through the hardware interface module 11, and the IO system prompts S1 to place the item I in the specified area. The designated area given by the hardware interface module 11 may be various, such as a closed box, and the system detects S1 that the article I is put into the closed box, and after being identified, the article I is transferred to the designated protected area in the private space through the conveyor belt; or a movable tray for carrying the article I, and when receiving the article, the movable tray can conveniently transfer the article I to a designated protected area in a private space.
S402, information collection and processing. After the decision module 14 starts information collection, the related hardware of the information collection module, such as a camera, a video camera, a scanner, an X-ray security check instrument, a radio frequency receiver, a telescopic bracket, an infrared distance measurement sensor, and the like, is controlled to collect the article information in the designated area, including multi-angle and multi-attribute image information, a characteristic bar code or a radio frequency label, and the collected information is temporarily stored by the system for a certain time and can be called by the decision module 14. The exception handling module 16 collects real-time image information and judges whether the information collection environment is normal. The information collection environment normally includes before collection starts: each hardware device operates normally, and the articles are correctly placed in a designated area; the collection is carried out: the operation condition of each hardware device is normal, the interaction is carried out according to a normal flow, and active interruption is not caused, or malicious packet dropping or article increasing/reducing and the like in the identification process are not caused. The TPM technology can be used for realizing supervision of the running conditions of each hardware device, the image recognition technology is used for judging whether an object or other objects pass in and out of the designated area, and the infrared distance measuring sensor is used for assisting in detecting whether the interactive flow is damaged or not. A heartbeat mechanism can be adopted to ensure the self safety of the exception handling module 16, so that the exception handling module 16 sends an exception signal @6 to the decision module 14 periodically (for example, every 20ms), if an exception occurs, a corresponding exception number is sent, and the decision module 14 interrupts the current command to perform corresponding exception handling; if no exception occurs, the number is a specific value (e.g., NULL).
And S403, the special signal acquisition module 17 acquires information such as a feature code or a radio frequency tag and the like, and queries the verification server 20 according to the information. The authentication server 20 maintains a database of registered items in which item order information is stored, and provides a registration entry, and provides an interface that can be accessed by a special signal (bar code or radio frequency tag, etc.). A sender (including S1, S2) having a security rating should be registered for each registered item, and it can be ensured that item information items are not tampered with and counterfeited; the authentication server 20 has a coping policy for S2 that has never been registered, such as: items of rating class data of S2 that have not been registered are marked as medium, and non-rating class data are registered when items are registered at S2. After correctly receiving the special signal sent by the special signal acquisition module 17, the verification server 20 finds the item order information corresponding to the special signal, marks the item order information as "interactive" in a certain manner, and returns the item order information in a specific format. In this way, the special signal acquisition module 17 acquires detailed item order information (@ 3). When the interaction is finished, the decision module 14 still sends an interaction result feedback of a specific format to the verification server 20 by means of the special signal, and if the sending of the interaction is successful, the identification server marks the corresponding order as "successful interaction" in a certain way and deletes the order after the storage for a certain time; if the order information is wrong, an error number may be given, for example, the attribute of the item claimed by the order does not conform to the actual condition, or the sender S1 does not conform to the S1 information acquired by the IO module 12, and the verification server 20 adjusts the ratings of the registered S1 and S2 accordingly according to a certain policy.
S404, the safety information collecting module 19 collects safety related information, such as X-ray transmission images and the like, and sends the safety related information to the safety detection server 22. The security detection server 22 provides the functions of identification and labeling, and can use a machine learning method to train a contraband identification model in advance based on massive X-ray security inspection data, and continuously train and optimize characteristic parameters to improve accuracy and adapt to new changes, and use the above model to analyze the X-ray transmission image collected by the security information collection module 19, so as to obtain identification and labeling information (@4) with a specific format and directly or indirectly return the identification and labeling information to the decision module 14.
S405, the identification information acquisition module 18 acquires multi-angle image information and sends the image information to the article identification server 21. The article identification server 21 provides the functions of identification and labeling, is similar to the method for establishing the forbidden article identification model, establishes and continuously trains and optimizes an article identification model, analyzes the image information sent by the identification information acquisition module 18, obtains the identification and labeling information (@5) with a specific format, and directly or indirectly returns the identification and labeling information to the decision module 14. It can be seen that the security detection server 22 and the item identification server 21 described above have great similarities. The method can be integrated in the same equipment in physical realization, and only one synthesized model can be trained, but the training difficulty and the analysis accuracy of the model are influenced correspondingly.
And S50, making a decision. In the system activation phase and the phase of acquiring the item information, after the decision module 14 acquires the item information (@1, @3, @4, @5, @6), the background task module 13 acquires @2 information, and the @ n information (@1, @2, @3, @4, @5, @6) is used as a decision basis. The decision module 14 analyzes the obtained @ n information, and then implements the @ n information according to the policy in the policy list according to the @ n information and the analysis result thereof. The background task module 13 maintains the order and order information of R2, the order of R2 is the detailed information of placing an order of R2, the order information may include receiving/rejecting an event that someone will reach something in a certain time period, a white list or a black list of someone something, etc., the order and order information of R2 may be added or deleted directly by R2, or indirectly added or deleted by R2 for interfacing with other order services of R2. The decision module 14 queries the background task module 13 according to the acquired item order information @3 or in combination with the @1 and @5 information, the background task module 13 determines whether R2 has an R2 order or order information corresponding to the item interaction, and the determination result in a specific format is @2 information.
And S501, analyzing information. When some order information is consistent with the @3 information corresponding to the item I in the background task module 13, or some instruction information is consistent with the @1 and @5 information corresponding to the item I and is ordered to be positive (order reception is not rejection), we consider that the item interaction has certain logic security, that is, the purported item I in the order or the item I in the interaction is authorized to be received; when sender S1 information in the @1 and @3 information is consistent and both S1 and S2 have high ratings, the item I of the interaction is considered to have certain item source security, the interaction can be researched, and when the ratings of S1 and S2 are higher, the item source security is also higher; when the item identification and marking information in @4 indicates that the item I is safe, we consider that the item I of the interaction has certain safety, that is, the item I is compliant and has the possibility of being received. If the interaction at a certain time is judged to have logic security through the analysis, the interacted article I has security of an article source, and the article I has security, whether further analysis of @4 and @6 is received or not is judged, whether the article I which is interacted is the article I claimed by the order can be verified through the analysis of @4, and if the verification result is positive, the article identification verification is considered to be passed; the @6 analysis can verify whether the process of the item interaction is carried out according to the process safety preset by the system, and if the verification result is positive, the interaction is considered to have the interaction process safety. In a specific implementation, the results of the analysis can be digitized to facilitate recall, and for a certain security, such as the security of the article itself, a grade can be subdivided, the grade being represented by a numerical difference.
S502, strategy implementation. According to the assumptions in the above information analysis phase, a strategy can be formulated: in a certain interaction, if and only if the interaction has logic security, the interacted article I has security of article source, the article I has security, the article identification passes verification, the interaction has security of interaction process, and the security of each aspect reaches a certain threshold value, implementing the signing; otherwise, interrupting the article interaction, showing the interaction interruption reason, and carrying out corresponding interaction interruption processing. In the interactive interrupt processing, the decision module 14 may send a report to R2, and if the decision result is modified to sign-in by the interface provided by the advanced policy module 15 within a certain time, the R2 goes to sign-in operation; otherwise, the item I may be moved out of the detected specific area through the hardware interface module 11, a detailed interaction result is transmitted to the authentication server 20, the system is restored, and the like. However, in practical applications, if the above-mentioned safety conditions are required to be met, the user can sign in, which inevitably reduces the usage scenarios or increases the complexity of one-time object interaction. Example 1: it is determined that item I has item source security, itself security, and process security, but item I of this interaction does not find the order or order information of R2 in the background task module 13, in which case item I may be a surprise from a friend who is not in the white list of the background task module 13, and in some application scenarios, R2 is happy to receive item I, and direct rejection will result in such interaction not being performed normally; example 2: the object I is determined to have object source safety, safety per se and logic safety and process safety in the interaction, but the interacted object I has complete package and cannot pass object identification and verification.
S503, changing the strategy. In view of the above, the system adopts an architecture with a mechanism separated from the policy, and supports policy change of the decision module 14, thereby supporting different application scenarios and use members. The specific method is that a complete policy list is maintained in the decision module 14, and the policy list consists of an initial policy and a new policy generated by iteration in use. When designing a device applied to a specific scene, an initial policy is given in the policy list, and the initial policy describes which interval each of the @ n information is in (at this time, a combination of intervals can be recorded as a vector) to decide to sign in/reject/ask for the information, and the like. In addition, the list is an adjustable list displayed through an interface provided by the high-level policy module; at the lower level is the executable program. The user (human/intelligent program) can adjust the strategy through the high-level strategy module, and the adjustment of the above section combination (vector) is reflected through the program of the lower layer. In actual operation, in an interface facing a user, time setting and the like can be added for a newly added strategy of the user, and the new strategy is distinguished from the new strategy such as 'next time' and 'forever'; the corresponding underlying program needs support. And implementing the strategy by calling the @ n information and the analysis result thereof. The user or equipment manufacturer can adjust the strategy with limited degree by using the function provided by the system, and the system audits the operation of the user or equipment manufacturer for adjusting the strategy. For example: in the scenario of example 1, R2 may add "query" in the corresponding situation in the policy, that is, add the vector corresponding to the corresponding interval combination, and the decision module 14 queries R2 when each @ n message falls in the interval combination, and is personally determined by R2, or may directly cancel the judgment of the logical security, that is, expand the corresponding interval @2 to include all value ranges. In the example 2 scenario above, the following adjustments may be made to the policy: if the item identification verification cannot pass and the @5 message indicates that the item I being interacted has complete package, the rating information of S1 and S2 is checked, if the rating of S1 is high and the rating of S2 is over medium, the item identification verification can be avoided, otherwise, if an abnormality occurs, the abnormality processing module 16 breaks the package of the item I and then acquires the identification information again; or prompting S1 to remove the package of the article I according to the requirement and collecting the identification information again, and when the processing mode is adopted, detecting whether other operations of damaging/losing the article I exist in the process of removing the package through the exception processing module 16S 1. The adjustment can be accomplished by modifying or adding a vector with each interval meeting specific requirements, or by adding a plurality of vectors and a logic judgment statement if necessary.
And S60, signing. After the decision module 14 makes the sign-in decision, the sign-in operation is completed by the interface provided by the hardware interface module 11. In the signing process, foreign objects should be prevented from illegally entering the private space by using the channel of the article I under the unauthorized condition as much as possible, that is, the security of the signing process should be ensured, which can still be realized by the exception processing module 16.
S601, signing for an article. The decision module 14 transfers the item I from the designated information gathering area to the protected designated area within the private space via the interface provided by the hardware interface module 11. Synchronous transfer of the article I and the designated information acquisition area can be realized through a conveyor belt or a mechanical arm, real-time image information is continuously acquired by the exception handling module 16, and whether the signing environment is normal or not is judged. Similar to the normal information collection environment, the normal sign-on environment may include: each hardware device operates normally, the articles are in the designated area, the signing is carried out according to the normal flow, and the active interruption is avoided, or the articles are not maliciously dropped or added/reduced in the signing process. The exception handling module 16 may add several exception numbers and corresponding exception handlers accordingly. In addition, a double-layer door body can be used in a passage before articles enter a private space, after the articles enter a first door and are confirmed again by an abnormality detection module to be abnormal, a second door is opened, and therefore even if the articles are abnormal, harm is reduced as far as possible. If the article I successfully reaches the protected designated area and no abnormity occurs in the process, the article I is signed successfully. If an exception occurs during the sign-in process, the private space entrance can be immediately cut off, and the article I can be properly arranged, such as transferred out of the device or placed in a specific area.
S602, auditing and producing the voucher. In the process of one-time article interaction, regardless of the final interaction result, the system needs to audit, and if the receipt is smooth, an interaction certificate is required to be given. From the start of the activation system to the check-in or due to exception handling, the operations of S1 and R2, the policy list, the analysis information result and each command of the decision module 14 may be audited, the audit result may be stored in the cloud of the device or device provider at the entrance end of the private space, and the decision module 14 may generate a detailed interaction result report in a specific format according to the audit result and send the report to the server module. If the sign-in is successful, the system should also give an interaction certificate C with a specific format to prove that the interaction is successfully completed, and the interaction certificate C is sent to both interaction parties R1, R2, S1 and S2, wherein R1 can be an equipment provider at the entrance end of the private space.
It is noted that the disclosed embodiments are intended to aid in further understanding of the invention, but those skilled in the art will appreciate that: various substitutions and modifications are possible without departing from the spirit and scope of the invention and appended claims. Therefore, the invention should not be limited to the embodiments disclosed, but the scope of the invention is defined by the appended claims.

Claims (10)

1. An intelligent article interaction method applied to a private space entrance ensures the credibility of interaction by controlling the security of an interactive article source, the security of an article, the security of order logic and the security of an interaction flow; by adopting a mode of separating a mechanism from a strategy and by changing the strategy, the method realizes that a robot replaces a person to selectively sign in an entrance of a private space, selectively receives the item to the private space and provides a receiving certificate;
setting the interaction parties of an article interaction system comprises: a receiving entity R1, a sending entity S1, a receiving responsible party R2 and a sending responsible party S2; the article interaction scene also comprises an article I, a transmission channel W and an interaction certificate C; in the item interaction scene, an item I is an item to be interacted; the sending responsible party S2 is the original owner of item I, i.e. the real sender; the sending responsible party S2 commissions the sending entity S1 to transport and deliver item I; the reception responsible party R2 is the real receiver; the receiving entity R1 is a consignor of the receiving responsible party R2, and receives the item I instead of the receiving responsible party R2; when the interactive two-party receiving entity R1, the receiving responsible party R2, the sending entity S1 and the sending responsible party S2 confirm the interaction, a virtual transfer channel W from the sending entity S1 to the receiving entity R1 is established; both sides can obtain the certificate C when the interaction is completed;
the intelligent article interaction method applied to the private space entrance aims at the article interaction scene and executes the following steps:
1) activating the system; the receiving entity R1, the receiving responsible party R2, the sending entity S1 and the sending responsible party S2 of the interaction of the system can be researched; specifically performing steps 11) -14):
11) the sending entity S1 activates the system through the software and hardware interface provided by the IO module by using the ID information, and the IO module reads the ID information of the sending entity S1;
12) and (4) carrying out identity authentication: the IO module reads the ID information and sends the ID information to the decision module, and the decision module queries the verification server; the verification server returns the rating information of the inquired ID, and marks the information item corresponding to the ID as 'interactive' at the server side, and waits for the decision-making module to send a final interactive result;
13) and (5) performing qualification audit: when the decision module correctly receives the S1 rating information @1 in a specific format, judging whether the S1 rating information @1 is contradictory to the current strategy; if not, the system is activated successfully, and the system collects the image characteristic information of the sending entity S1 to enhance the traceability; if the two types of the interaction result are inconsistent, prompting activation failure and reasons through an IO module, and sending the interaction result with more detailed content to a verification server; the current strategy comprises screening information in a strategy list of the decision module, and the screening information allows the high-level strategy module to modify so as to provide personalized service;
14) realize intercommunication, guarantee communication security includes: all module devices at the inlet end of the same private space are communicated with each other, the decision module and the information acquisition module are communicated with the devices of the server module, and the decision module is communicated with the device of a sending responsible party S2;
2) the decision module controls the information acquisition module to acquire article information and returns the information to the decision module; the following operations are specifically executed:
21) starting information acquisition: after the decision module confirms that the system is successfully activated, giving out a designated area through a hardware interface module, and prompting a sending entity S1 to place an article I into the designated area through an IO module;
22) information collection and processing: controlling related hardware of the information acquisition module through a decision module, and acquiring article information in the designated area; the collected information is temporarily stored by the system and can be called by the decision module; the method comprises the following steps:
221) acquiring real-time image information through an exception handling module, judging whether an information acquisition environment is normal or not, and sending an exception signal @6 to a decision module;
222) the characteristic code or the wireless radio frequency label information is collected through a special signal collection module, and is inquired and verified in a registered article database maintained by a verification server, so that detailed article information @3 in a specific format is obtained and is directly or indirectly returned to a decision module;
223) the safety related information is collected through a safety information collecting module and is sent to a safety detection server; the safety detection server identifies and labels safety related information to obtain identification and labeling information @4, and directly or indirectly returns the identification and labeling information @4 to the decision module;
224) acquiring multi-angle image information through an identification information acquisition module, and sending the image information to an article identification server; the article identification server identifies and labels the image information to obtain identification and labeling information @5, and directly or indirectly returns the identification and labeling information @5 to the decision module;
3) the method comprises the steps that a decision module obtains information of various items, including S1 rating information @1, detailed item information @3, identification and labeling information @4, identification and labeling information @5 and an exception signal @6, then obtains information of an order information @2 through a background task module, analyzes the S1 rating information @1, the order information @2, the detailed item information @3, the identification and labeling information @4, the identification and labeling information @5 and the exception signal @6, and is used as a decision basis to make decisions according to strategies in a strategy list; the following operations are specifically executed:
31) analyzing S1 rating information @1, ordering information @2, detailed article information @3, identification and labeling information @4, identification and labeling information @5 and an abnormal signal @6 to obtain whether the article interaction has logic safety, whether the interactive article has source safety, whether the article itself has safety, whether the article identification verification passes and whether the interaction has interactive process safety;
32) implementing the signing according to the current strategy; otherwise, interrupting the article interaction, displaying the interaction interruption reason, and performing corresponding interaction interruption processing;
4) signing: the decision module completes the signing operation by means of the interface provided by the hardware interface module; the following operations are specifically executed:
41) signing for an article: the decision-making module transfers the article I from the designated information acquisition area to the protected designated area in the private space by means of the interface provided by the hardware interface module;
42) auditing the article interaction process; the audit result is stored in the cloud end of equipment or equipment suppliers at the inlet end of the private space, and the decision module generates a detailed interaction result report in a specific format according to the audit result and sends the detailed interaction result report to the server module; if the sign-in is smooth, giving an interactive certificate; sending the interactive certificate to a receiving entity R1, a receiving responsible party R2, a sending entity S1 and a sending responsible party S2 of the interactive parties;
through the steps, intelligent article interaction applied to the private space entrance is achieved.
2. The smart item interaction method applied to the entrance of the private space as claimed in claim 1, wherein step 14) is implemented by using a message authentication mechanism in cryptography to a communication method of the original internet to ensure security.
3. The intelligent object interaction method applied to the private space entrance as claimed in claim 2, wherein said message authentication mechanism specifically comprises:
before transmission, a sender server A attaches the equipment number of the server A and a string of random codes to the information to form information m to be transmitted;
extracting an abstract of the information m to be transmitted by a secure hash algorithm, and encrypting the abstract by using an RSA private key of the server A to form a ciphertext c;
the ciphertext c is attached to the information m and is sent to a receiving party;
the equipment manufacturer or the service provider maintains a public equipment number and a corresponding public key table;
after receiving the information, the receiver firstly obtains the random code through the received information m and checks whether the same random code is received in the latest period of time; if received, the information is outdated and/or copied by a malicious party in an attempt to spoof; if the message is not received, acquiring the equipment number of the sender server A from the message m, searching the public key of the sender server A, decrypting the ciphertext c by using the public key to obtain a message a, and processing the received message m by using a secure hash algorithm to obtain a message b;
comparing whether the message a and the message b are the same; if the message is the same as the message, the received message is confirmed to be from the sender, and the message is not modified; otherwise it may be from insecurity or tampered with;
through the above operation, message authentication is realized.
4. The intelligent object interaction method applied to the entrance of the private space as claimed in claim 1, wherein in step 14), the communication between the devices at the entrance end of the same private space is preferably realized by using a bus; the decision module, the information acquisition module and the equipment of the server module are communicated with each other or the decision module and the equipment of S2 are communicated with each other through the existing wireless network coverage or an additional communication device; the additional communication device comprises a wireless antenna.
5. The smart item interaction method as claimed in claim 1, wherein the security information of step 223) comprises X-ray transmission images; the method for identifying and labeling the safety related information specifically comprises the following steps: based on mass data of X-ray security inspection, a contraband identification model is trained in advance through a machine learning method, characteristic parameters are trained continuously to optimize so as to improve accuracy and adapt to new changes, the trained contraband identification model is obtained, and then the trained model is used for analyzing security information.
6. The intelligent article interaction method applied to the private space entrance as claimed in claim 1, wherein in step 32), the current policy is composed of an initial policy and a new policy iteratively generated in use, specifically an architecture with a mechanism separated from the policy is adopted, and a policy list maintained in a decision module is adjusted by providing an interface support facing a human/intelligent program so as to support policy change, thereby supporting different application scenarios and use members;
the interactive interrupt processing method specifically comprises the following steps: and moving the article I out of the detected specific area through the hardware interface module, and sending a detailed interaction result to the verification server, so that the system is recovered.
7. The smart item interaction method as claimed in claim 1, wherein when the sending entity S1 is a logistics organization, the detailed rating information of the logistics organization S1 is maintained by the authentication server and a coping strategy is provided to the logistics organization S1 that has not registered; the coping strategy comprises the following steps: manually auditing and registering unregistered logistics organizations S1; registering unregistered logistics organization S1 according to the rating of the registered logistics organization to which the logistics organization belongs; for S1 that has not been registered and does not belong to any registered logistics organization, marking its respective class data as lowest, etc., and non-class data as "unknown"; the verification server also maintains a registered article database, stores article order information in the database, gives a registration entrance and provides an interface which can be accessed through a special signal; registering a sender with a security rating for each registered item, including a sending entity S1, a sending responsible party S2; and ensure that the item information item is not tampered and counterfeited; the authentication server has a coping strategy for the sending responsible party S2 that has never been registered; after the authentication server waits for the interaction, the ratings of the registered sending entity S1 and the sending responsible party S2 are correspondingly adjusted and updated according to the feedback information of the decision module and the strategy.
8. An intelligent article interaction system applied to a private space entrance comprises an interaction module, a strategy module, an information acquisition module and a server module;
the interaction module comprises an IO sub-module and a hardware interface sub-module;
the strategy module comprises a background task submodule, a decision submodule and a high-level strategy submodule;
the information acquisition module comprises a plurality of hardware devices and can be used for acquiring multi-angle and multi-attribute image information, characteristic bar codes or wireless radio frequency tags, and comprises a special signal acquisition sub-module, a safety information acquisition sub-module, an identification information acquisition sub-module and an exception handling sub-module;
the server module comprises an authentication server, an article identification server and/or a security detection server;
the IO submodule and the decision submodule are connected with each other; the hardware interface sub-module comprises hardware facilities for article interaction and provides hardware interfaces for the decision sub-module and the exception handling sub-module; the background task submodule is connected with the decision submodule; the high-level strategy submodule is connected with the decision submodule;
the IO sub-module is used for acquiring identity information of a sending entity S1 as a basis for inquiring detailed rating information @1 of the sending entity S1 when interaction starts, acquiring operation information from the sending entity S1 in the interaction process, sending the operation information or data to the decision sub-module, and displaying prompt information according to a command of the decision sub-module;
the hardware interface sub-module is used for receiving and properly keeping the article I, providing hardware interfaces for the decision sub-module, the exception handling sub-module and the IO sub-module, and feeding back received information to the decision sub-module;
the background task submodule is used for maintaining order and order information @2 of a receiving responsible party R2;
the decision submodule is used for maintaining a complete strategy list, summarizing information obtained by other modules, and then performing decision and processing by combining the strategy list;
the high-level strategy submodule is used for providing an interface facing to the upper layer, so that the upper layer can adjust a strategy list of the decision submodule or make a decision directly;
the special signal acquisition submodule is used for acquiring special signals including bar codes or two-dimensional codes and further acquiring article information @3 by means of a verification server;
the safety information acquisition submodule is used for acquiring safety related information and acquiring safety information @4 of the article I by means of a safety detection server;
the identification information acquisition submodule is used for acquiring article image information and acquiring article information @5 by means of an article identification server;
the exception handling submodule is used for monitoring the article interaction process and the hardware running condition in real time, identifying whether an exception occurs or not, analyzing an exception number in the exception, and sending an exception number @6 to the decision submodule;
the authentication server provides an identity authentication interface of the sending entity S1 and an item order information inquiry interface; the system comprises a sending entity S1, a special signal acquisition module, a sending entity S3526 and a sending responsible party S2, wherein the sending entity S1 is used for inquiring detailed rating information of the sending entity S1 according to ID information of the sending entity S1, maintaining the rating information according to a feedback result, inquiring order information of registered articles according to a special signal sent by the special signal acquisition module and maintaining the rating information of the sending entity S1 and the sending responsible party S2 according to the feedback;
the safety detection server provides a safety detection interface for obtaining an identification result according to safety related information sent by the safety detection server;
the article identification server is used for providing an article identification interface and obtaining an identification result according to the picture information sent by the article identification module.
9. The intelligent article interactive system applied to private space entrance of claim 8, wherein said IO submodule comprises hardware and software interfaces, and further comprises a video input/output module and an audio input/output module.
10. The intelligent article interactive system applied to the entrance of the private space as claimed in claim 8, wherein the hardware for controlling the information collecting module comprises a camera, a video camera, a scanner, an X-ray security check instrument, a radio frequency receiver, a telescopic bracket, an infrared distance measuring sensor; the article information comprises multi-angle and multi-attribute image information, a characteristic bar code and a wireless radio frequency tag.
CN201810574163.9A 2018-06-06 2018-06-06 Intelligent article interaction system and method applied to private space entrance Expired - Fee Related CN108830957B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810574163.9A CN108830957B (en) 2018-06-06 2018-06-06 Intelligent article interaction system and method applied to private space entrance

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810574163.9A CN108830957B (en) 2018-06-06 2018-06-06 Intelligent article interaction system and method applied to private space entrance

Publications (2)

Publication Number Publication Date
CN108830957A CN108830957A (en) 2018-11-16
CN108830957B true CN108830957B (en) 2020-06-02

Family

ID=64144143

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810574163.9A Expired - Fee Related CN108830957B (en) 2018-06-06 2018-06-06 Intelligent article interaction system and method applied to private space entrance

Country Status (1)

Country Link
CN (1) CN108830957B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110097724B (en) * 2019-04-24 2021-06-29 苏州浪潮智能科技有限公司 Automatic article nursing method and system based on FPGA

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103456050A (en) * 2013-07-22 2013-12-18 金硕澳门离岸商业服务有限公司 Electronic confirmation method and system
CN106682852A (en) * 2015-11-05 2017-05-17 德国邮政股份公司 Early initiation of a payment process for cash-on-delivery shipments
CN107767584A (en) * 2017-10-28 2018-03-06 河南传通电子科技有限公司 A kind of shared storing compartment
CN108053236A (en) * 2017-12-08 2018-05-18 广州原码信息科技有限公司 A kind of method that credit card credit pattern combination advertising subsidy realizes free express delivery

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003146437A (en) * 2001-11-07 2003-05-21 Hitachi Ltd Distribution management method and system
CN102982585B (en) * 2012-11-09 2014-08-27 成都三泰电子实业股份有限公司 Express self-service system
US20160086113A1 (en) * 2014-09-24 2016-03-24 Jeffrey Scott McBroom Method and apparatus for crowd sourced business opportunity realization
CN204440559U (en) * 2015-02-27 2015-07-01 潘雄辉 Intelligent logistics device and intelligent logistics system
CN106570944B (en) * 2016-11-02 2019-08-02 中通服咨询设计研究院有限公司 A kind of receive applied to express mail posts the System and method for for testing view

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103456050A (en) * 2013-07-22 2013-12-18 金硕澳门离岸商业服务有限公司 Electronic confirmation method and system
CN106682852A (en) * 2015-11-05 2017-05-17 德国邮政股份公司 Early initiation of a payment process for cash-on-delivery shipments
CN107767584A (en) * 2017-10-28 2018-03-06 河南传通电子科技有限公司 A kind of shared storing compartment
CN108053236A (en) * 2017-12-08 2018-05-18 广州原码信息科技有限公司 A kind of method that credit card credit pattern combination advertising subsidy realizes free express delivery

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
安检设备中多信息融合技术的数据重构;宋云峰;《价值工程》;20141231;全文 *

Also Published As

Publication number Publication date
CN108830957A (en) 2018-11-16

Similar Documents

Publication Publication Date Title
US11488455B1 (en) Registry verification with authentication using a mobile device
US7519558B2 (en) Biometrically enabled private secure information repository
US20230401524A1 (en) Enforcing data consistency in a transportation network
US20180108024A1 (en) Open registry for provenance and tracking of goods in the supply chain
CN109829726B (en) Block chain-based drug information management method and system
CN110633805A (en) Longitudinal federated learning system optimization method, device, equipment and readable storage medium
EP3662635A1 (en) A secure and confidential custodial transaction system, method and device using zero-knowledge protocol
WO2018094554A1 (en) Method for improving security of unmanned aerial vehicle transportation, and unmanned aerial vehicle, terminal, server and computer program product
CN108009830A (en) Products in circulation tracking and system based on block chain
US11489679B2 (en) Methods and systems for submission and validating decentralized verifiable claims in a physical world
EP1895460A2 (en) Methods and apparatus for managing RFID and other data
US20180019872A1 (en) Open registry for internet of things including sealed materials
CN109978573A (en) A kind of information source tracing system based on block chain
CN109327469B (en) Method for managing Internet of things and intelligent gateway
US20190197562A1 (en) System and method for product authentication
CN109328348A (en) A kind of service authentication method, system and relevant device
WO2018067974A1 (en) Open registry for human identification
CN110516459A (en) A kind of product data retroactive method and system based on block chain
US10812591B2 (en) Method and system for data communication
CN113574843A (en) Distributed logging for anomaly monitoring
CN108830957B (en) Intelligent article interaction system and method applied to private space entrance
CN205983679U (en) Intelligent delivery locker
CN105788095A (en) Fresh food express system and method for opening box doors of fresh food express system
WO2021137753A1 (en) Electronic authentication system and process using the same
KR20210048124A (en) Apparatus for unmanned delivery box and control method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200602