CN109326017B - Unmanned storehouse anti-theft method and device, computer equipment and storage medium - Google Patents

Unmanned storehouse anti-theft method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN109326017B
CN109326017B CN201810869806.2A CN201810869806A CN109326017B CN 109326017 B CN109326017 B CN 109326017B CN 201810869806 A CN201810869806 A CN 201810869806A CN 109326017 B CN109326017 B CN 109326017B
Authority
CN
China
Prior art keywords
barrier
door
user information
electromagnetic lock
target user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810869806.2A
Other languages
Chinese (zh)
Other versions
CN109326017A (en
Inventor
李占川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201810869806.2A priority Critical patent/CN109326017B/en
Priority to PCT/CN2018/104067 priority patent/WO2020024354A1/en
Publication of CN109326017A publication Critical patent/CN109326017A/en
Application granted granted Critical
Publication of CN109326017B publication Critical patent/CN109326017B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Abstract

The invention discloses an unmanned storehouse anti-theft method, a device, computer equipment and a storage medium, wherein in a first door entrance barrier, face scanning equipment is adopted to scan the face of a first target user to obtain user information, if the first target user has door entrance authority, a second door entrance barrier is controlled to be in a closed state through an electromagnetic lock, RFID scanning equipment is adopted to scan an area between the first door entrance barrier and the second door entrance barrier, and if goods are not scanned, the first door entrance barrier is controlled to be in an open state through the electromagnetic lock; if the time length of the first door entering barrier in the opening state exceeds the time length of the door entering, the first door entering barrier is controlled to be in the closing state through the electromagnetic lock, the first door entering barrier is confirmed to be in the closing state according to a closing signal fed back by the electromagnetic lock, and the second door entering barrier is controlled to be in the opening state through the electromagnetic lock, so that the door entering process is completed. The process can effectively improve the safety of warehouse management.

Description

Unmanned storehouse anti-theft method and device, computer equipment and storage medium
Technical Field
The invention relates to the technical field of Internet of things, in particular to an unmanned storehouse anti-theft method, an unmanned storehouse anti-theft device, computer equipment and a storage medium.
Background
With the rapid development of enterprises, the enterprise scale is gradually enlarged, and the demand of the enterprises on warehouse management is increasing. At present, the management of warehouse articles is carried out offline, the manual guarding of the warehouse is needed, the labor is consumed, and the manual guarding may neglect to cause the loss of the warehouse articles due to the large mobility of the articles, so that the safety of the articles in the warehouse cannot be guaranteed.
Disclosure of Invention
The embodiment of the invention provides an unmanned storehouse anti-theft method, an unmanned storehouse anti-theft device, computer equipment and a storage medium, and aims to solve the problem that the existing offline manual management of warehouse articles needs to consume manpower.
An unmanned storehouse anti-theft method comprises the following steps:
in a first entrance barrier, adopting a face scanning device to scan a face of a first target user to obtain user information, and judging whether the first target user has entrance authority or not based on the user information;
if the first target user has the door access authority, controlling a second door access barrier to be in a closed state through an electromagnetic lock, scanning an area between the first door access barrier and the second door access barrier by using RFID scanning equipment, and if no commodity is scanned, controlling the first door access barrier to be in an open state through the electromagnetic lock;
if the time length of the first door entering barrier in the opening state exceeds the door entering time length, controlling the first door entering barrier to be in the closing state through the electromagnetic lock, and acquiring a closing signal fed back by the electromagnetic lock;
and confirming that the first door entering barrier is in a closed state according to the closing signal, and controlling that the second door entering barrier is in an open state through the electromagnetic lock to finish the door entering process.
An unmanned storehouse anti-theft device comprising:
the system comprises a user information acquisition module, a first door access barrier and a second door access barrier, wherein the user information acquisition module is used for scanning the face of a first target user by adopting face scanning equipment to acquire user information and judging whether the first target user has door access permission or not based on the user information;
the RFID scanning equipment scanning module is used for controlling a second door entering barrier to be in a closed state through an electromagnetic lock if the first target user has the door entering permission, scanning an area between the first door entering barrier and the second door entering barrier by adopting RFID scanning equipment, and controlling the first door entering barrier to be in an open state through the electromagnetic lock if commodities are not scanned;
the closing signal acquisition module is used for controlling the first door entrance barrier to be in a closing state through the electromagnetic lock and acquiring a closing signal fed back by the electromagnetic lock if the time length of the first door entrance barrier in the opening state exceeds the door entrance time length;
and the second door entering barrier control module is used for confirming that the first door entering barrier is in a closed state according to the closing signal, and controlling that the second door entering barrier is in an open state through the electromagnetic lock to finish the door entering process.
A computer device comprising a memory, a processor and a computer program stored in said memory and executable on said processor, said processor implementing the steps of the above-mentioned unmanned warehouse antitheft method when executing said computer program.
A non-volatile storage medium storing a computer program which, when executed by a processor, implements the steps of the above-described unmanned storehouse anti-theft method.
In the unmanned storehouse anti-theft method, the unmanned storehouse anti-theft device, the computer equipment and the storage medium, in the first door entrance barrier, the face scanning equipment is adopted to scan the face of the first target user, so that the server can obtain the user information, and whether the first target user has the door entrance authority is judged based on the user information, if the first target user has the door entrance authority, the second door entrance barrier is controlled to be in a closed state through the electromagnetic lock, the RFID scanning equipment is adopted to scan the area between the first door entrance barrier and the second door entrance barrier, the commodity loss of a warehouse can be effectively prevented, and if the commodity is not scanned, the first door entrance barrier is controlled to be in an open state through the electromagnetic lock, so that the automatic opening and closing of people are realized. If the duration that the first protective screen of entering a door is in the open mode exceeds the duration of entering a door, then through the closed state of the first protective screen of entering a door of electromagnetic lock control, acquire the closure signal of electromagnetic lock feedback to according to the closure signal, confirm that the first protective screen of entering a door is in the closed mode, through the open state of the second protective screen of entering a door of electromagnetic lock control, accomplish the flow of entering a door, this flow of entering a door need not artifical guard, can reach the theftproof purpose, realize unmanned warehouse intelligent management's purpose.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
FIG. 1 is a schematic diagram of an application environment of an unmanned warehouse anti-theft method according to an embodiment of the present invention;
fig. 2 is a plan view of a warehouse of the unmanned warehouse burglary prevention method according to an embodiment of the present invention;
FIG. 3 is a flowchart of an unmanned warehouse antitheft method according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating an embodiment of an unmanned warehouse antitheft method according to the present invention;
FIG. 5 is another flow chart of an unmanned warehouse antitheft method according to an embodiment of the present invention;
FIG. 6 is a flowchart illustrating an unattended warehouse antitheft method according to an embodiment of the invention;
FIG. 7 is a schematic view of an unmanned storehouse security device according to an embodiment of the present invention;
FIG. 8 is a schematic diagram of a computer device according to an embodiment of the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The unmanned warehouse anti-theft method can be applied to the application environment as shown in fig. 1, can be applied to a warehouse management system, is used for achieving the purpose of intelligent management of an unmanned warehouse, and solves the problem that management of warehouse articles of an enterprise at present needs manual guard and consumes manpower. The warehouse management system comprises a client and a server, wherein the client is communicated with the server through a network. The warehouse management system further comprises an electromagnetic lock, and the server is in communication with the electromagnetic lock through a network and is used for controlling four doors in the warehouse, wherein the four doors are arranged as shown in a warehouse floor plan in fig. 2. The door A is a first door entering barrier in the embodiment, the door B is a second door entering barrier in the embodiment, the door C is a first door exiting barrier in the embodiment, and the door D is a second door exiting barrier in the embodiment. Note that, normally, the B, C door is open and the A, D door is closed. The client is also called a client, and refers to a program corresponding to the server and providing local services for the client. The client may be installed on, but is not limited to, various personal computers, laptops, smartphones, tablets, and portable wearable devices. The servers may be implemented as individual servers or as a cluster of servers.
In an embodiment, as shown in fig. 3, an unmanned warehouse anti-theft method is provided, which is described by taking the server in fig. 1 as an example, and includes the following steps:
s10: in the first door entrance barrier, a face scanning device is adopted to scan the face of a first target user, user information is obtained, and whether the first target user has the door entrance authority or not is judged based on the user information.
The first entrance barrier is an a-door shown in fig. 2, and is a barrier for performing authorization verification on the first target user. The first target user is a user who wants to enter the warehouse through the first entrance barrier. The user information is information for identifying the user authority. Specifically, when the first target user is within the scannable range of the face scanning device, the server may invoke the face scanning device to scan the face of the first target user who wants to pass through the first entrance barrier, obtain user information, search the database according to the user information, and obtain user authority information corresponding to the user information, so as to determine whether the first target user has an entrance authority, and enhance the security of warehouse management. The user right information is information for judging whether the first target user has the right to enter the door.
S20: if the first target user has the door access authority, the second door access barrier is controlled to be in a closed state through the electromagnetic lock, the RFID scanning equipment is adopted to scan the area between the first door access barrier and the second door access barrier, and if the commodity is not scanned, the first door access barrier is controlled to be in an open state through the electromagnetic lock.
Wherein the second door access barrier is a B door shown in fig. 2. The RFID scanning apparatus is an apparatus for scanning RFID tags that is installed in advance in a warehouse. In this embodiment, the RFID scanning device is installed between the first door access barrier and the second door access barrier, and is used to scan an area between the first door access barrier and the second door access barrier, so that a user who has entered the warehouse can be effectively prevented from placing an item at the first door access barrier, and the user who has entered the warehouse can take the item out. The electromagnetic lock is used for controlling the on-off state of a door, utilizes the electromagnetic principle, and when current passes through a silicon steel sheet, the electromagnetic lock can generate strong suction and tightly adsorb an iron plate to achieve the effect of locking the door. When the server needs to control the door to be opened, the electromagnetic lock loses suction force by controlling the power supply of the electromagnetic lock to be powered off, so that the door is opened without manually pushing or pulling the door, and the door is automatically opened; correspondingly, when the server needs to control the door to be closed, the power supply of the electromagnetic lock can be controlled to be switched on, and the electromagnetic lock generates suction force, so that the door is closed, and the automatic closing of the door is realized.
Specifically, the server firstly queries a database based on a face image scanned by the face scanning device to obtain user information corresponding to a first target user, then judges the door access authority of the first target user, and sends a closing request to the electromagnetic lock if the first target user has the door access authority so that the electromagnetic lock controls the second door access barrier to be in a closed state. Before a user does not enter the warehouse, the first door entering barrier is in a closed state, the second door entering barrier can be in an open state or a closed state, at the moment, the second door entering barrier is controlled to be in the closed state through the electromagnetic lock, so that the RFID scanning equipment is adopted to scan the area between the first door entering barrier and the second door entering barrier, the user who has been in the warehouse is prevented from placing articles between the first door entering barrier and the second door entering barrier, the articles are taken out when the first door entering barrier is opened, and the safety of the articles in the warehouse is improved. If the commodity is not scanned, and the fact that no abnormal commodity exists between the first entrance barrier and the second entrance barrier is proved, the server controls the power supply of the electromagnetic lock to be powered off so as to control the first entrance barrier to be in an open state, and therefore a user can enter between the first entrance barrier and the second entrance barrier through the first entrance barrier. It can be understood that the second door barrier is still in a closed state at the moment, so that the user in the warehouse is prevented from taking out the articles, the safety of warehouse management is improved, and the anti-theft purpose is achieved.
S30: if the time length of the first door entering barrier in the opening state exceeds the time length of the door entering, the first door entering barrier is controlled to be in the closing state through the electromagnetic lock, and a closing signal fed back by the electromagnetic lock is obtained.
Wherein the door entering duration is a duration preset for controlling that the first door entering barrier can be in an open state. Specifically, if the duration of the first door entry barrier in the open state exceeds the door entry duration, it is considered that the first target user enters between the first door entry barrier and the second door entry barrier, the server may control the power of the electromagnetic lock to be turned on, and the first door entry barrier is controlled to be in the closed state by the electromagnetic lock, so that the server obtains a closing signal fed back by the electromagnetic lock, where the closing signal is a closing signal of the first door entry barrier in the closed state, and provides technical support for a subsequent door entry process.
S40: and confirming that the first door entering barrier is in a closed state according to the closing signal, and controlling the second door entering barrier to be in an open state through the electromagnetic lock to finish the door entering process.
Specifically, the server is according to the closure signal of electromagnetic lock feedback to confirm that first barrier of entering is in the closed condition after, through control electromagnetic lock power outage, with the control second barrier of entering is in the open condition, the user accessible second barrier of entering gets into the warehouse, in order to accomplish the flow of entering, should enter the flow and need not artifical guard, can reach the theftproof purpose, realize unmanned warehouse intelligent management's purpose.
In the embodiment, in the first door entering barrier, the face scanning device is used for scanning the face of the first target user, so that the server can obtain user information, whether the first target user has the door entering authority is judged based on the user information, if the first target user has the door entering authority, the second door entering barrier is controlled to be in a closed state through the electromagnetic lock, and the RFID scanning device is used for scanning an area between the first door entering barrier and the second door entering barrier, so that the warehouse commodity can be effectively prevented from being lost. If the commodity is not scanned, the first door entering barrier is controlled to be in an open state through the electromagnetic lock, automatic opening and closing of the door are achieved, and the door does not need to be opened or closed manually. If the duration that the first protective screen of entering a door is in the open mode exceeds the duration of entering a door, then through the closed state of the first protective screen of entering a door of electromagnetic lock control, acquire the closure signal of electromagnetic lock feedback to according to the closure signal, confirm that the first protective screen of entering a door is in the closed mode, through the open state of the second protective screen of entering a door of electromagnetic lock control, accomplish the flow of entering a door, this flow of entering a door need not artifical guard, can reach the theftproof purpose, realize unmanned warehouse intelligent management's purpose.
In an embodiment, as shown in fig. 4, in step S10, that is, in the first entrance barrier, a face scanning device is used to perform face scanning on the first target user to obtain user information, which specifically includes the following steps:
s11: in the first door entrance barrier, a face scanning device is adopted to scan the face of a first target user, and a face image of the first target user is obtained.
When the first target user is in the scannable range of the face scanning device, the face scanning device scans the face of the warehousing user (namely, the first target user) to obtain the face image of the first target user. Specifically, a face scanning device is arranged in the first door entrance barrier, and the face scanning device comprises a camera for scanning the face of the user and a face scanning interface for identifying a face scanning image. In this embodiment, when the first target user is located within the scannable range of the face scanning device, the server may invoke the camera of the face scanning device to scan the face of the user who wants to pass through the first entrance barrier, so as to obtain the face image of the first target user, and provide technical support for subsequent face scanning.
S12: and coding the face image to obtain a coded image, inputting the coded image into a face scanning interface for recognition, and obtaining user information.
And (3) carrying out coding processing on the face image, namely converting the face scanning image into base64 coding to obtain a coded image, so that the coded image is input into a face scanning interface to be identified, and user information corresponding to the face image of the first target user is obtained. The encoded image is a digital image obtained by base64 encoding a face image.
The process of converting the face image into base64 code is as follows: the method comprises the steps of converting a storage path of a face image into a byte array by adopting a byte [ ] method, then carrying out BASE64 coding on the obtained byte array by adopting a BASE64Encoder method to obtain a coded image, and avoiding the problem of user information leakage because the safety of converting the face image into the coded image of BASE64 coding is higher.
In this embodiment, in the first entrance barrier, the face scanning device is used to scan the face of the first target user to obtain the face image of the first target user, so that the face image is encoded to obtain the encoded image, and the problem of user information leakage can be effectively avoided. And finally, the coded image is input into a face scanning interface for recognition, and user information is obtained so as to judge whether a first target user has an entrance right, realize the door opening and closing operation of a first entrance barrier and a second entrance barrier of the unmanned warehouse, and achieve the aim of intelligent theft prevention of the unmanned warehouse.
In an embodiment, as shown in fig. 5, after step S40, the unmanned storehouse anti-theft method further includes the following steps:
s51: and in the first exit barrier, face scanning is carried out on the second target user by adopting face scanning equipment, and user information corresponding to the second target user is obtained.
Wherein the second target user is a user who wants to exit the warehouse through the first exit barrier. Specifically, a face scanning device is arranged in the first exit barrier, and the face scanning device comprises a camera for scanning the face of a user and a face scanning interface for recognizing a face image. Specifically, when the second target user is within the scannable range of the face scanning device, the server may invoke a camera of the face scanning device to scan the face of the second target user to obtain a face image, convert the face scanned image into a base64 code, obtain a coded image, so as to input the coded image into the face scanning interface for recognition, and obtain user information corresponding to the face image, that is, user information corresponding to the second target user. The step S12 of the process of converting the face image into base64 code is consistent, and is not repeated here to avoid repetition.
S52: and searching a database based on the user information, and acquiring the authority RFID label corresponding to the second target user.
Wherein, the authority RFID label is an RFID label which is stored in the database in advance and corresponds to each user information. The RFID tag is a barcode-based printed RFID tag that is a unique index for recording items in a database. The RFID (radio frequency identification) technology is a non-contact automatic identification technology, automatically identifies a target object and obtains related data through a radio frequency signal, does not need manual intervention, and is suitable for various severe environments. Specifically, the database stores a retrievable item table including user information and an RFID tag (i.e., an authority RDID tag) of a retrievable item corresponding to the user information. The server searches the database based on the user information corresponding to the second target user to obtain the authority RFID label corresponding to the second target user, so that whether the article received by the second target user is a receivable article or not is judged subsequently, and the standardization of warehouse management is improved.
S53: the first exit barrier is controlled to be in a closed state through the electromagnetic lock, and the area between the first exit barrier and the second exit barrier is scanned through the RFID scanning equipment to obtain the current RFID label.
The current RFID tag refers to an RFID tag corresponding to an article currently carried by the second target user. Specifically, before the user leaves the warehouse, the first exit barrier is in an open state, the second exit barrier is in a closed state, and when the user enters the space between the first exit barrier and the second exit barrier through the first exit barrier, the server can be opened by controlling the power supply of the electromagnetic lock, so that the electromagnetic lock controls the first exit barrier to be in the closed state, and the area between the first exit barrier and the second exit barrier is scanned through the RFID scanning device to obtain the current RFID tag, so that the subsequent current RFID tag and the right RFID tag are matched.
S54: and matching the current RFID label with the permission RFID label, if the matching is successful, controlling the second exit barrier to be in an open state through the electromagnetic lock, and updating the pickup state of the article corresponding to the current RFID label which is successfully matched to be the pickup state.
Specifically, the current RFID tags and the authority RFID tags are matched, if the matching is successful, each current RFID tag is matched with the authority RFID tag, and it is proved that the article received by the second target user is receivable, the server can control the electromagnetic lock to control the second exit barrier to be in the open state by controlling the power supply of the electromagnetic lock to be powered off, so that the second target user can leave the warehouse through the second exit barrier, and the receiving state of the article corresponding to the current RFID tag matched with the authority RFID tag is updated to be in the received state, and manual recording is not needed in the process, so that the idea of the purpose of intelligent management of the unmanned warehouse is realized, and the purpose of intelligent management of the warehouse is achieved.
S55: if the time length of the second exit barrier in the open state exceeds the exit time length, the second exit barrier is controlled to be in the closed state through the electromagnetic lock, and the exit process is completed.
And the exit time length is preset time length for controlling the second exit barrier to be in an open state. Specifically, if the time length of the second exit barrier in the open state exceeds the time length of the entrance, the second target user is considered to leave the warehouse, and the server controls the power supply of the electromagnetic lock to be opened, so that the electromagnetic lock controls the first entrance barrier to be in the closed state, and the exit process is completed. Further, the server obtains a closing signal that a first barrier of entering that the electromagnetic lock feedbacks is in the closed condition to the server is based on the closing signal that the electromagnetic lock feedbacks, through controlling the outage of electromagnetic lock power, makes the first barrier of leaving that the electromagnetic lock control is in the open condition, with the power consumption that reduces the electromagnetic lock.
In the embodiment, in the first exit barrier, the face scanning device is adopted to scan the face of the second target user, so that the server acquires the user information corresponding to the second target user, searches the database based on the user information, acquires the authority RFID tag corresponding to the second target user, and controls the first exit barrier to be in a closed state through the electromagnetic lock, scanning an area between the first exit barrier and the second exit barrier by an RFID scanning device to obtain a current RFID tag, so as to match the current RFID label with the authority RFID label, if the matching is successful, the second exit barrier is controlled to be in an open state through the electromagnetic lock, the picking state of the article corresponding to the current RFID label which is successfully matched is updated to be the picking state, manual recording is not needed, the intelligent management method achieves the idea of achieving the purpose of intelligent management of an unmanned warehouse. If the second barrier of going out is in when the time length of open mode is more than when going out, is in the closed condition through electromagnetic lock control second barrier of going out to accomplish the flow of going out, this flow of going out can effectively record user's warehouse entry and exit information, need not artifical guard, in order to realize the purpose theftproof of unmanned warehouse intelligent management's purpose.
In an embodiment, as shown in the figure, after the step S20 of scanning the area between the first entrance barrier and the second entrance barrier by using the RFID scanning device, the unmanned storehouse anti-theft method further includes: and if the goods are scanned, acquiring an initial RFID label.
Wherein the initial RFID tag is an RFID tag of an item carried by the first target user. The second target user corresponds to the first target user. Specifically, the RFID scanning device is adopted to scan the area between the first entrance barrier and the second entrance barrier, if a commodity is scanned, an initial RFID tag returned by the RFID scanning device is obtained, the initial RFID tag is stored in a server cache, so that a first target user corresponding to a second target user can be directly searched during use, the initial RFID tag is obtained based on user information corresponding to the first target user, the initial RFID tag can be directly obtained from the server cache, the number of times of accessing a database is reduced, and the performance of the database is improved.
Step S53, namely, after the RFID scanning device scans the area between the first exit barrier and the second exit barrier and acquires the current RFID tag, the unmanned warehouse anti-theft method further includes: and if each initial RFID label does not correspond to one current RFID label, returning the article corresponding to the initial RFID label, and updating the pick-up state of the article corresponding to the initial RFID label to be the returned state.
Specifically, if each initial RFID tag does not correspond to a current RFID tag, it is verified that the first target user puts the articles carried when entering the warehouse into the warehouse, and determines that the articles corresponding to the initial RFID tags are returned, and updates the pickup state of the articles corresponding to the initial RFID tags to the returned state.
In an embodiment, since it is possible that another person returns the article when returning the article, and the article that is not in the warehouse is returned to the warehouse when returning the article, the embodiment further includes a step of judging and recording whether to return the article himself or herself, so that when the article that is not in the warehouse is returned to the warehouse, the user who returns the article at that time is notified to take out the article that is not in the warehouse. Specifically, as shown in fig. 6, after the pick-up state of the article corresponding to the initial RFID tag is updated to the returned state, the unmanned warehouse anti-theft method further includes the following steps:
s61: querying a warehouse database based on the initial RFID tag to obtain original user information corresponding to the initial RFID tag.
The original user information is user information recorded in a database by the original RFID tag. Specifically, after the pickup state of the article corresponding to the initial RFID tag is updated to the returned state, the database is queried based on the initial RFID tag, and the original user information corresponding to the initial RFID tag is acquired, so that whether the returning operation is performed by the user is determined.
S62: and if the original user information corresponds to the user information corresponding to the second target user, returning the article corresponding to the initial RFID tag to the user, and recording the article corresponding to the initial RFID tag as the user self returning.
Specifically, if the original user information corresponds to the user information corresponding to the second target user, since the second target user corresponds to the first target user in this embodiment, the article corresponding to the initial RFID tag is returned to the user himself, and the article corresponding to the initial RFID tag is recorded as the person return.
S63: and if the original user information does not correspond to the user information corresponding to the second target user, returning the article corresponding to the initial RFID tag to the other person, and recording the article corresponding to the initial RFID tag as the other person to be returned.
Specifically, if the original user information does not correspond to the user information corresponding to the second target user, the article corresponding to the initial RFID tag is returned for another person, and the article corresponding to the initial RFID tag is recorded as another person for returning.
In this embodiment, the server queries the warehouse database based on the initial RFID tag, acquires original user information corresponding to the initial RFID tag, returns an article corresponding to the initial RFID tag to the user himself if the original user information corresponds to user information corresponding to the second target user, and records the article corresponding to the initial RFID tag as the person's own return; if the original user information does not correspond to the user information corresponding to the second target user, returning the article corresponding to the initial RFID tag to other people, and recording the article corresponding to the initial RFID tag as other people to return so that when the article which is not in the warehouse is returned to the warehouse, the user who returns the article at that time is informed to take out the article which is not in the warehouse, and the recording process can record the in-out information of each user in detail without manual intervention, so that the labor is saved.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
In one embodiment, an unmanned warehouse anti-theft device is provided, which corresponds to the unmanned warehouse anti-theft method in the above embodiments one to one. As shown in fig. 7, the unmanned storehouse anti-theft device includes a user information acquisition module 10, an RFID scanning device scanning module 20, a closing signal acquisition module 30, and a second door barrier control module 40. The functional modules are explained in detail as follows:
the user information obtaining module 10 is configured to perform face scanning on a first target user by using a face scanning device in the first entrance barrier, obtain user information, and determine whether the first target user has an entrance right based on the user information.
And the RFID scanning device scanning module 20 is configured to control the second door entry barrier to be in a closed state through the electromagnetic lock if the first target user has a door entry right, scan an area between the first door entry barrier and the second door entry barrier by using the RFID scanning device, and control the first door entry barrier to be in an open state through the electromagnetic lock if no commodity is scanned.
The closing signal obtaining module 30 is configured to, if the duration that the first door entering barrier is in the open state exceeds the door entering duration, control the first door entering barrier to be in the closed state through the electromagnetic lock, and obtain a closing signal fed back by the electromagnetic lock.
And the second door entering barrier control module 40 is used for confirming that the first door entering barrier is in a closed state according to the closing signal, and controlling the second door entering barrier to be in an open state through the electromagnetic lock to complete the door entering process.
Specifically, the user information acquisition module 10 includes a face image acquisition unit 11 and a user information acquisition unit 12.
The face image obtaining unit 11 is configured to perform face scanning on a first target user by using a face scanning device in the first entrance barrier, so as to obtain a face image of the first target user.
And the user information acquiring unit 12 is configured to perform encoding processing on the face image, acquire an encoded image, input the encoded image into the face scanning interface for recognition, and acquire user information.
Specifically, the unmanned storehouse anti-theft device further includes a user information acquisition unit 51, an authority RFID tag acquisition unit 52, a current RFID tag acquisition unit 53, a pickup state update unit 54, and a second exit barrier control unit.
The user information obtaining unit 51 is configured to perform face scanning on the second target user by using a face scanning device in the first exit barrier, and obtain user information corresponding to the second target user.
And an authority RFID tag obtaining unit 52, configured to search the database based on the user information, and obtain an authority RFID tag corresponding to the second target user.
And the current RFID tag obtaining unit 53 is configured to control the second exit barrier to be in a closed state through the electromagnetic lock, and scan an area between the first exit barrier and the second exit barrier through the RFID scanning device to obtain a current RFID tag.
And the picking state updating unit 54 is configured to match the current RFID tag with the right RFID tag, and if the matching is successful, control the first exit barrier to be in an open state through the electromagnetic lock, and update the picking state of the article corresponding to the current RFID tag which is successfully matched to be the picked state.
And the second exit barrier control unit 55 is configured to control the second exit barrier to be in a closed state through the electromagnetic lock to complete the exit process if the duration that the second exit barrier is in the open state exceeds the exit duration.
Specifically, the unmanned storehouse anti-theft device further comprises an initial RFID tag unit, and the initial RFID tag unit is used for acquiring an initial RFID tag if the commodity is scanned.
Then the unmanned storehouse anti-theft device further comprises: and the initial RFID tag state updating unit is used for returning the articles corresponding to the initial RFID tags and updating the picking state of the articles corresponding to the initial RFID tags to be the returned state if each initial RFID tag does not correspond to a current RFID tag.
Specifically, the unmanned storehouse anti-theft device further includes an original user information acquisition unit 61, a first processing unit 62, and a second processing unit 63.
An original user information obtaining unit 61, configured to query the warehouse database based on the initial RFID tag, and obtain original user information corresponding to the initial RFID tag.
And the first processing unit 62 is configured to, if the original user information corresponds to the user information corresponding to the second target user, return the item corresponding to the initial RFID tag to the user himself, and mark the item corresponding to the initial RFID tag as the person himself.
And a second processing unit 63, configured to, if the original user information does not correspond to the user information corresponding to the second target user, return the item corresponding to the initial RFID tag to another person, and mark the item corresponding to the initial RFID tag as another person to return.
Specific limitations on the unmanned warehouse anti-theft device can be referred to the above limitations on the unmanned warehouse anti-theft method, and are not described in detail here. All or part of each module in the unmanned storehouse anti-theft device can be realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 8. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing data, such as original user information, used in executing the unmanned storehouse anti-theft method. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement an unmanned storehouse security method.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program: in the first door entrance barrier, adopting a face scanning device to scan the face of a first target user to obtain user information, and judging whether the first target user has door entrance authority or not based on the user information; if the first target user has the door access authority, the second door access barrier is controlled to be in a closed state through the electromagnetic lock, the RFID scanning equipment is adopted to scan the area between the first door access barrier and the second door access barrier, and if the commodity is not scanned, the first door access barrier is controlled to be in an open state through the electromagnetic lock; if the time length of the first door entering barrier in the opening state exceeds the door entering time length, the electromagnetic lock controls the first door entering barrier to be in the closing state, and a closing signal fed back by the electromagnetic lock is obtained; and confirming that the first door entering barrier is in a closed state according to the closing signal, and controlling the second door entering barrier to be in an open state through the electromagnetic lock to finish the door entering process.
In one embodiment, the processor, when executing the computer program, further performs the steps of: in the first door entrance barrier, adopting a face scanning device to scan the face of a first target user to obtain a face image of the first target user; and coding the face image to obtain a coded image, inputting the coded image into a face scanning interface for recognition, and obtaining user information.
In one embodiment, the processor, when executing the computer program, further performs the steps of: in the first exit barrier, face scanning is carried out on a second target user by adopting face scanning equipment, and user information corresponding to the second target user is obtained; searching a database based on the user information, and acquiring an authority RFID label corresponding to a second target user; controlling the second exit barrier to be in a closed state through the electromagnetic lock, and scanning an area between the first exit barrier and the second exit barrier through the RFID scanning equipment to obtain a current RFID label; and matching the current RFID label with the permission RFID label, if the matching is successful, controlling the first exit barrier to be in an open state through the electromagnetic lock, and updating the pickup state of the article corresponding to the current RFID label which is successfully matched to be the pickup state. If the time length of the second exit barrier in the open state exceeds the exit time length, the second exit barrier is controlled to be in the closed state through the electromagnetic lock, and the exit process is completed.
In one embodiment, the processor, when executing the computer program, further performs the steps of: if the commodity is scanned, acquiring an initial RFID label; the processor when executing the computer program further realizes the following steps: and if each initial RFID label does not correspond to one current RFID label, returning the article corresponding to the initial RFID label, and updating the pick-up state of the article corresponding to the initial RFID label to be the returned state.
In one embodiment, the processor, when executing the computer program, further performs the steps of: inquiring a warehouse database based on the initial RFID label to acquire original user information corresponding to the initial RFID label; if the original user information corresponds to the user information corresponding to the second target user, the article corresponding to the initial RFID tag is returned for the user, and the article corresponding to the initial RFID tag is recorded as the user return; and if the original user information does not correspond to the user information corresponding to the second target user, returning the article corresponding to the initial RFID tag to the other person, and recording the article corresponding to the initial RFID tag as the other person to be returned.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: in the first door entrance barrier, adopting a face scanning device to scan the face of a first target user to obtain user information, and judging whether the first target user has door entrance authority or not based on the user information; if the first target user has the door access authority, the second door access barrier is controlled to be in a closed state through the electromagnetic lock, the RFID scanning equipment is adopted to scan the area between the first door access barrier and the second door access barrier, and if the commodity is not scanned, the first door access barrier is controlled to be in an open state through the electromagnetic lock; if the time length of the first door entering barrier in the opening state exceeds the door entering time length, the electromagnetic lock controls the first door entering barrier to be in the closing state, and a closing signal fed back by the electromagnetic lock is obtained; and confirming that the first door entering barrier is in a closed state according to the closing signal, and controlling the second door entering barrier to be in an open state through the electromagnetic lock to finish the door entering process.
In one embodiment, the computer program when executed by the processor further performs the steps of: in the first door entrance barrier, adopting a face scanning device to scan the face of a first target user to obtain a face image of the first target user; and coding the face image to obtain a coded image, inputting the coded image into a face scanning interface for recognition, and obtaining user information.
In one embodiment, the computer program when executed by the processor further performs the steps of: in the first exit barrier, face scanning is carried out on a second target user by adopting face scanning equipment, and user information corresponding to the second target user is obtained; searching a database based on the user information, and acquiring an authority RFID label corresponding to a second target user; controlling the second exit barrier to be in a closed state through the electromagnetic lock, and scanning an area between the first exit barrier and the second exit barrier through the RFID scanning equipment to obtain a current RFID label; and matching the current RFID label with the permission RFID label, if the matching is successful, controlling the first exit barrier to be in an open state through the electromagnetic lock, and updating the pickup state of the article corresponding to the current RFID label which is successfully matched to be the pickup state. If the time length of the second exit barrier in the open state exceeds the exit time length, the second exit barrier is controlled to be in the closed state through the electromagnetic lock, and the exit process is completed.
In one embodiment, the computer program when executed by the processor further performs the steps of: if the commodity is scanned, acquiring an initial RFID label; the computer program when executed by the processor further realizes the steps of: and if each initial RFID label does not correspond to one current RFID label, returning the article corresponding to the initial RFID label, and updating the pick-up state of the article corresponding to the initial RFID label to be the returned state.
In one embodiment, the computer program when executed by the processor further performs the steps of: inquiring a warehouse database based on the initial RFID label to acquire original user information corresponding to the initial RFID label; if the original user information corresponds to the user information corresponding to the second target user, the article corresponding to the initial RFID tag is returned for the user, and the article corresponding to the initial RFID tag is recorded as the user return; and if the original user information does not correspond to the user information corresponding to the second target user, returning the article corresponding to the initial RFID tag to the other person, and recording the article corresponding to the initial RFID tag as the other person to be returned.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (7)

1. An unmanned storehouse anti-theft method is characterized by comprising the following steps:
in a first entrance barrier, adopting a face scanning device to scan a face of a first target user to obtain user information, and judging whether the first target user has entrance authority or not based on the user information;
if the first target user has the door access authority, controlling a second door access barrier to be in a closed state through an electromagnetic lock, and scanning an area between the first door access barrier and the second door access barrier by using RFID scanning equipment; if the commodity is scanned, acquiring an initial RFID label; if the commodity is not scanned, the electromagnetic lock is used for controlling the first door barrier to be in an open state;
if the time length of the first door entering barrier in the opening state exceeds the door entering time length, controlling the first door entering barrier to be in the closing state through the electromagnetic lock, and acquiring a closing signal fed back by the electromagnetic lock;
confirming that the first door entering barrier is in a closed state according to the closing signal, and controlling the second door entering barrier to be in an open state through the electromagnetic lock to finish the door entering process;
in a first exit barrier, adopting face scanning equipment to scan the face of a second target user to acquire user information corresponding to the second target user;
searching a database based on the user information, and acquiring an authority RFID label corresponding to the second target user;
controlling the second exit barrier to be in a closed state through the electromagnetic lock, and scanning an area between the first exit barrier and the second exit barrier through RFID scanning equipment to obtain a current RFID label;
matching the current RFID label with the permission RFID label, if the matching is successful, controlling the first exit barrier to be in an open state through an electromagnetic lock, and updating the pickup state of the article corresponding to the current RFID label which is successfully matched to be the pickup state; if each initial RFID label is not corresponding to one current RFID label, returning the article corresponding to the initial RFID label, and updating the pick-up state of the article corresponding to the initial RFID label to be the returned state;
and if the time length of the second exit barrier in the open state exceeds the time length of the exit, controlling the second exit barrier in the closed state through the electromagnetic lock, and completing the exit process.
2. The unmanned storehouse anti-theft method according to claim 1, wherein in the first entrance barrier, the face scanning device is used for face scanning of the first target user to obtain user information, and the method comprises the following steps:
in a first entrance barrier, adopting a face scanning device to scan the face of a first target user to obtain a face image of the first target user;
and coding the face image to obtain a coded image, inputting the coded image into a face scanning interface for recognition, and obtaining user information.
3. The unmanned storehouse anti-theft method according to claim 2, wherein after the step of updating the pickup state of the item corresponding to the initial RFID tag to the returned state, the unmanned storehouse anti-theft method further comprises:
querying a warehouse database based on the initial RFID tag to obtain original user information corresponding to the initial RFID tag;
if the original user information corresponds to the user information corresponding to the second target user, returning the article corresponding to the initial RFID tag to the user himself, and recording the article corresponding to the initial RFID tag as the owner to be returned;
and if the original user information does not correspond to the user information corresponding to the second target user, returning the article corresponding to the initial RFID tag to other people, and recording the article corresponding to the initial RFID tag as other people to be returned.
4. An unmanned storehouse anti-theft device, comprising:
the system comprises a user information acquisition module, a first door access barrier and a second door access barrier, wherein the user information acquisition module is used for scanning the face of a first target user by adopting face scanning equipment to acquire user information and judging whether the first target user has door access permission or not based on the user information;
the RFID scanning equipment scanning module is used for controlling a second door entering barrier to be in a closed state through an electromagnetic lock if the first target user has the door entering permission, and scanning an area between the first door entering barrier and the second door entering barrier by adopting RFID scanning equipment; if the commodity is scanned, acquiring an initial RFID label; if the commodity is not scanned, the electromagnetic lock is used for controlling the first door barrier to be in an open state;
the closing signal acquisition module is used for controlling the first door entrance barrier to be in a closing state through the electromagnetic lock and acquiring a closing signal fed back by the electromagnetic lock if the time length of the first door entrance barrier in the opening state exceeds the door entrance time length;
the second door entering barrier control module is used for confirming that the first door entering barrier is in a closed state according to the closing signal, controlling the second door entering barrier to be in an open state through the electromagnetic lock and completing a door entering process;
the user information acquisition unit is used for scanning the face of a second target user by adopting face scanning equipment in a first exit barrier to acquire user information corresponding to the second target user;
the permission RFID tag obtaining unit is used for searching a database based on the user information and obtaining a permission RFID tag corresponding to the second target user;
the current RFID tag obtaining unit is used for controlling a second exit barrier to be in a closed state through the electromagnetic lock, and scanning an area between the first exit barrier and the second exit barrier through RFID scanning equipment to obtain a current RFID tag;
the picking state updating unit is used for matching the current RFID label with the permission RFID label, controlling the first exit barrier to be in an open state through an electromagnetic lock if the matching is successful, and updating the picking state of the object corresponding to the current RFID label which is successfully matched to be the picked state; if each initial RFID label is not corresponding to one current RFID label, returning the article corresponding to the initial RFID label, and updating the pick-up state of the article corresponding to the initial RFID label to be the returned state;
and the second exit barrier control unit is used for controlling the second exit barrier to be in a closed state through the electromagnetic lock if the time length of the second exit barrier in the open state exceeds the time length of the exit, so that the exit process is completed.
5. The unmanned storehouse anti-theft device according to claim 4, wherein the user information acquisition module includes:
the system comprises a face image acquisition unit, a first door access barrier and a second door access barrier, wherein the face image acquisition unit is used for scanning the face of a first target user by adopting face scanning equipment to acquire a face image of the first target user;
and the user information acquisition unit is used for coding the face image to acquire a coded image, inputting the coded image into a face scanning interface for recognition and acquiring user information.
6. A computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the unmanned library surveillance method according to any of claims 1 to 3 when executing the computer program.
7. A non-volatile storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the steps of the unmanned storehouse surveillance method according to any one of claims 1 to 3.
CN201810869806.2A 2018-08-02 2018-08-02 Unmanned storehouse anti-theft method and device, computer equipment and storage medium Active CN109326017B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810869806.2A CN109326017B (en) 2018-08-02 2018-08-02 Unmanned storehouse anti-theft method and device, computer equipment and storage medium
PCT/CN2018/104067 WO2020024354A1 (en) 2018-08-02 2018-09-05 Unmanned warehouse theft prevention method, device, computer device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810869806.2A CN109326017B (en) 2018-08-02 2018-08-02 Unmanned storehouse anti-theft method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109326017A CN109326017A (en) 2019-02-12
CN109326017B true CN109326017B (en) 2021-08-17

Family

ID=65263534

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810869806.2A Active CN109326017B (en) 2018-08-02 2018-08-02 Unmanned storehouse anti-theft method and device, computer equipment and storage medium

Country Status (2)

Country Link
CN (1) CN109326017B (en)
WO (1) WO2020024354A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110458983B (en) * 2019-06-25 2020-08-18 珠海格力电器股份有限公司 Article picking method, device and computer readable storage medium
CN110555932B (en) * 2019-10-12 2024-03-22 江苏阿贝罗智能家居有限公司 Intelligent burglary-resisting door and working method thereof
CN113435344B (en) * 2021-06-29 2022-07-15 上海贝通电子科技有限公司 Method for automatically positioning indoor mobile scanning equipment and scanning evidence-obtaining video

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012169878A1 (en) * 2011-06-10 2012-12-13 Cross Point B.V. Electronic article surveillance system and method for detecting metal
CN103577945A (en) * 2012-07-23 2014-02-12 无锡扬晟科技有限公司 Intelligent warehouse management system
CN205845127U (en) * 2016-06-07 2016-12-28 上海英内物联网科技股份有限公司 Self-service store based on RFID technique gate control system
CN106570371A (en) * 2016-10-08 2017-04-19 珠海格力电器股份有限公司 Unlocking method and device
WO2017086613A1 (en) * 2015-11-17 2017-05-26 주식회사 아이디어스튜디오 Anti-theft apparatus for smart device
CN106781211A (en) * 2016-12-30 2017-05-31 珠海兆泓科技有限公司 For the video camera and warehouse managing and control system of warehouse monitoring
CN107067621A (en) * 2017-04-21 2017-08-18 湖南孚利购科技有限公司 A kind of theft preventing method and system
CN107730189A (en) * 2017-11-23 2018-02-23 北京德鑫泉物联网科技股份有限公司 RFID intelligent warehouse management systems and management method
CN108039010A (en) * 2018-01-08 2018-05-15 深圳正品创想科技有限公司 A kind of theft preventing method, device and unmanned shop

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102654013A (en) * 2012-04-21 2012-09-05 宣建民 Safe-deposit box
CN204650628U (en) * 2015-05-25 2015-09-16 深圳市中阳通讯有限公司 A kind of recognition of face access control AB door system
CN108269333A (en) * 2018-01-08 2018-07-10 平安科技(深圳)有限公司 Face identification method, application server and computer readable storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012169878A1 (en) * 2011-06-10 2012-12-13 Cross Point B.V. Electronic article surveillance system and method for detecting metal
CN103577945A (en) * 2012-07-23 2014-02-12 无锡扬晟科技有限公司 Intelligent warehouse management system
WO2017086613A1 (en) * 2015-11-17 2017-05-26 주식회사 아이디어스튜디오 Anti-theft apparatus for smart device
CN205845127U (en) * 2016-06-07 2016-12-28 上海英内物联网科技股份有限公司 Self-service store based on RFID technique gate control system
CN106570371A (en) * 2016-10-08 2017-04-19 珠海格力电器股份有限公司 Unlocking method and device
CN106781211A (en) * 2016-12-30 2017-05-31 珠海兆泓科技有限公司 For the video camera and warehouse managing and control system of warehouse monitoring
CN107067621A (en) * 2017-04-21 2017-08-18 湖南孚利购科技有限公司 A kind of theft preventing method and system
CN107730189A (en) * 2017-11-23 2018-02-23 北京德鑫泉物联网科技股份有限公司 RFID intelligent warehouse management systems and management method
CN108039010A (en) * 2018-01-08 2018-05-15 深圳正品创想科技有限公司 A kind of theft preventing method, device and unmanned shop

Also Published As

Publication number Publication date
WO2020024354A1 (en) 2020-02-06
CN109326017A (en) 2019-02-12

Similar Documents

Publication Publication Date Title
CN109326017B (en) Unmanned storehouse anti-theft method and device, computer equipment and storage medium
JP2004512245A5 (en)
US8738918B2 (en) Document evidence and article retrieval and identification system
US20070200662A1 (en) Actuating a security system using a wireless device
US20050088280A1 (en) System and method for controlling a vehicle security system
US11810414B2 (en) Systems and methods for determining and executing trusted user access
CN105261096A (en) Network smart lock system
US10581844B2 (en) System and method for access authentication
US11699314B2 (en) Lotte lockbox and parcel management system
US9888378B2 (en) Associating a user identity to a wireless signal
US9565519B2 (en) Framework and method for tracking lost or stolen electronic device
CN110148264B (en) Management method and equipment of storage cabinet
CN112419549A (en) Control method of intelligent door lock, intelligent door lock and storage medium
CN110610347A (en) Park visitor message notification method and device, computer equipment and storage medium
CN114117387A (en) Substation tool monitoring method and device, computer equipment and storage medium
CN110675287A (en) Real estate industry house key management system and method
CN105741394A (en) Intelligent access control system based on mobile phone control
KR20190102225A (en) Vehicle lock and method for access-controlled loading and / or unloading
CN112489258A (en) Door lock alarm processing method and device, computer equipment and storage medium
CN111784874A (en) Method for managing opening and closing of storage box by mobile phone
CN111192386A (en) Intelligent lock system and unlocking method of intelligent lock
CN111882736B (en) Intelligent money box storage cabinet management system and method
CN111382966A (en) Warehouse management method, server and terminal
CN115346300A (en) Work ticket access method, device, medium and electronic equipment
WO2020162550A1 (en) Electronic unlocking management system and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant