CN109359037A - A kind of management method of shared device, storage medium and server - Google Patents
A kind of management method of shared device, storage medium and server Download PDFInfo
- Publication number
- CN109359037A CN109359037A CN201811121815.XA CN201811121815A CN109359037A CN 109359037 A CN109359037 A CN 109359037A CN 201811121815 A CN201811121815 A CN 201811121815A CN 109359037 A CN109359037 A CN 109359037A
- Authority
- CN
- China
- Prior art keywords
- equipment
- public
- borrowing
- user
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims abstract description 49
- 238000004590 computer program Methods 0.000 claims description 20
- 238000000034 method Methods 0.000 claims description 19
- 230000006399 behavior Effects 0.000 claims description 15
- 238000012544 monitoring process Methods 0.000 claims description 2
- 238000012795 verification Methods 0.000 abstract description 4
- 238000004891 communication Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 238000012360 testing method Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 2
- 230000010267 cellular communication Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3664—Environments for testing or debugging software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/76—Adapting program code to run in a different environment; Porting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0645—Rental transactions; Leasing transactions
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Finance (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention provides a kind of management method of shared device, storage medium and servers, comprising: when the equipment that background server detects that shared device is sent borrows request, acquisition request borrows the identity information of the user of the shared device;Based on the identity information, whether user described in intelligent decision has the borrow permission of the shared device;If the user has the borrow permission of the shared device, unlock instruction is sent to the shared device, unlocks the shared device;If the background server receives the equipment that the shared device is sent and gives back request, equipment incoming instruction is obtained, and sending device lock instruction locks the shared device to the shared device.Whether intelligent verification user of the present invention has a borrow permission of shared device, the lending of automatic management shared device and a possibility that give back, can avoid labor management fault, reduce management error, improves the efficiency of management of shared device.
Description
Technical Field
The present invention relates to the field of device management technologies, and in particular, to a management method, a storage medium, and a server for a public device.
Background
In the software development process, product compatibility debugging, operation testing and the like are often required to be performed on mobile devices by various project groups, so companies often provide some mobile devices as common devices for research and development personnel to use. How to manage the lending/returning of these utility devices is a problem that companies need to solve.
At present, the prior art is that the management of the public equipment by the company is mainly realized by specially equipping an administrator, and the borrowing/returning information of the public equipment is registered by the administrator. The prior art has the following problems: when the number of times of borrowing/returning of the public equipment is large, the workload of an administrator is greatly increased, manual registration is easy to make mistakes, and the management efficiency is not high.
Disclosure of Invention
The embodiment of the invention provides a management method, a storage medium and a server of public equipment, and aims to solve the problem that navigation cannot provide effective travel-related information for a user in advance so as to facilitate the user to go out in the prior art.
A first aspect of an embodiment of the present invention provides a method for managing a public device, including:
when a background server detects an equipment borrowing request sent by public equipment, acquiring identity information of a user requesting to borrow the public equipment;
judging whether the user has the borrowing authority of the public equipment or not based on the identity information;
if the user has the borrowing authority of the public equipment, an unlocking instruction is sent to the public equipment, and the public equipment is unlocked;
and if receiving a device returning request sent by the public device, the background server acquires a device access instruction, sends a device locking instruction to the public device and locks the public device.
A second aspect of an embodiment of the present invention provides a server, including a memory and a processor, where the memory stores a computer program operable on the processor, and the processor executes the computer program to implement the following steps:
when a background server detects an equipment borrowing request sent by public equipment, acquiring identity information of a user requesting to borrow the public equipment;
judging whether the user has the borrowing authority of the public equipment or not based on the identity information;
if the user has the borrowing authority of the public equipment, an unlocking instruction is sent to the public equipment, and the public equipment is unlocked;
and if receiving a device returning request sent by the public device, the background server acquires a device access instruction, sends a device locking instruction to the public device and locks the public device.
A third aspect of embodiments of the present invention provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements the steps of:
when a background server detects an equipment borrowing request sent by public equipment, acquiring identity information of a user requesting to borrow the public equipment;
judging whether the user has the borrowing authority of the public equipment or not based on the identity information;
if the user has the borrowing authority of the public equipment, an unlocking instruction is sent to the public equipment, and the public equipment is unlocked;
and if receiving a device returning request sent by the public device, the background server acquires a device access instruction, sends a device locking instruction to the public device and locks the public device.
In the embodiment of the invention, when a background server detects an equipment borrowing request sent by public equipment, identity information of a user requesting to borrow the public equipment is acquired, whether the user has the borrowing authority of the public equipment is judged based on the identity information, if the user has the borrowing authority of the public equipment, an unlocking instruction is sent to the public equipment to unlock the public equipment without manually verifying the identity information of the user borrowing the public equipment, if the background server receives an equipment returning request sent by the public equipment, an equipment access instruction is acquired, an equipment locking instruction is sent to the public equipment to lock the public equipment without manually recovering, so that the labor is saved, the borrowing/returning of the public equipment is intelligently and automatically managed, the manual management error can be avoided, and the possibility of management error is reduced, the borrowing/returning traceability of the public equipment improves the management efficiency of the public equipment and enhances the user experience.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a flowchart of an implementation of a method for managing a public device according to an embodiment of the present invention;
fig. 2 is a schematic view of an application scenario of a management method for a public device according to an embodiment of the present invention;
fig. 3 is a flowchart of a specific implementation of the method S102 for managing a public device according to an embodiment of the present invention;
fig. 4 is a schematic view of another application scenario of a management method for a public device according to an embodiment of the present invention;
FIG. 5 is a flow chart of an implementation of common device location provided by an embodiment of the present invention;
FIG. 6 is a flowchart of an implementation of a method for managing a public device including statistical loan-and-return information according to an embodiment of the present invention;
fig. 7 is a block diagram of a management apparatus of a public device according to an embodiment of the present invention;
fig. 7.1 is a block diagram of a management apparatus of a public device according to another embodiment of the present invention;
fig. 8 is a schematic diagram of a server provided in an embodiment of the present invention.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the embodiments described below are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 shows an implementation flow of a management method for a public device according to an embodiment of the present invention, where the method flow includes steps S101 to S104. The specific realization principle of each step is as follows:
s101: when the background server detects the device borrowing request sent by the public device, the identity information of the user requesting to borrow the public device is obtained.
In this embodiment, as shown in fig. 2, the public device is connected to the backend server, specifically, the public device is connected to the backend server in a communication manner, which includes a wireless connection or a cellular communication connection, and is not limited herein. The public device can be an intelligent communication terminal, such as a smart phone or a tablet computer. In the development process of the intelligent application, in order to test the compatibility of the application to various systems, the application needs to be installed in mobile terminals of different systems for testing, for example, the compatibility of the application needs to be tested on an Android system, an IOS system and a WinPhone system, so that the common device flows among project groups developed by the applications. It will be appreciated that in other embodiments of the invention, the common device may be other electronic or non-electronic devices.
Specifically, when a user needs to borrow the public device, an unlocking request is sent to the background server through the public device. The unlocking request comprises a screen touch instruction, when the public device detects the touch instruction, if the time for touching the screen reaches the preset touch duration or the touch strength reaches the preset touch strength, the public device judges that the touch instruction is an effective unlocking request sent by a user, and the public device sends the effective unlocking request to the background server. And when the background server detects an equipment borrowing request sent by the public equipment, acquiring the identity information of a user requesting to borrow the public equipment. In the implementation of the present invention, the public device is an intelligent communication device with a camera, such as a smart phone or a tablet computer, and the user identity information is face image information of the user. Alternatively, the public device is an intelligent device with a sensor, and the user identity information may be other biometric information besides face image information, such as fingerprint information and iris information. The biometric information is unique and can be used to identify the user.
S102: and judging whether the user has the borrowing authority of the public equipment or not based on the identity information.
In the embodiment of the present invention, the public device sends the unlocking request to the background server, and the background server determines whether the unlocking request is legal. Or when the public device detects an unlocking request, prompting a user to input identity information, and sending the acquired identity information to the background server, wherein the background server judges whether the user has the borrowing authority of the public device or not based on the identity information.
As an embodiment of the present invention, as shown in fig. 3, the S102 specifically includes:
a1: and the background server verifies whether the employee information matched with the identity information exists in an employee information base.
A2: and if the employee information matched with the identity information exists in the employee information base, judging that the user has the borrowing authority of the public equipment. Further, since the information is not updated timely, although the employee information matched with the identity information exists in the employee information base, the employee actually leaves, in this case, the employee does not have the borrowing authority of the public device, and specifically, if the employee information matched with the identity information exists in the employee information base, the working state corresponding to the employee information matched with the identity information is obtained. The working state comprises a waiting state (trial state), an on-duty state, an off-duty state and a retirement state. And if the working state corresponding to the employee information matched with the identity information is an on-duty state, judging that the user corresponding to the identity information has the borrowing authority of the public equipment. And if the working state corresponding to the employee information matched with the identity information is other working states except the working state, judging that the user corresponding to the identity information does not have the borrowing authority of the public equipment.
A3: and if the employee information matched with the identity information does not exist in the employee information base, judging that the user does not have the borrowing authority of the public equipment, and sending a borrowing failure prompt to the public equipment.
Specifically, when the public device detects an unlocking request, the public device prompts a user to input identity information, the obtained identity information is sent to a background server for verification, whether the user is a staff recorded in a staff information base is verified, whether the user has the borrowing authority of the public device is judged, if the staff information matched with the identity information of the user is found from the staff information base, the user has the borrowing authority, if the staff information matched with the identity information of the user is not found, the user does not have the borrowing authority, and at the moment, an alarm prompt is sent.
Further, if the employee information matched with the identity information exists in the employee information base, querying the item group to which the user belongs in the employee information, and determining whether the item group to which the user belongs has the borrowing authority of the public equipment. The employee information comprises employee face images and other biological characteristic information except the face images.
Illustratively, when the public device detects an unlocking request, a camera is started, and a user is prompted to shoot a face image aiming at the camera or is prompted to enter fingerprint information. The employee information base of the background server stores the identity information of the employee in advance, including the employee job number, name and biological characteristic information such as face image, fingerprint information, iris information and the like. The public equipment sends the acquired face image, fingerprint information or iris information to the background server for verification, the background server searches staff information matched with the face image, fingerprint information or iris information sent by the public equipment in a staff information base, and then verifies the identity of a user requesting to borrow the public equipment, so that the public equipment is prevented from being borrowed by external personnel at will, and the safety of the public equipment is improved. Illustratively, the public device sends a device borrowing request to a background server, the background server compares the face information with the face of an employee in an employee information base by using intelligent AI according to the face information in the device borrowing request, verifies whether a user corresponding to the face information in the device borrowing request is the employee, and if the user corresponding to the face information is the employee, the user is determined to have the borrowing authority of the public device.
S103: and if the user has the borrowing authority of the public equipment, sending an unlocking instruction to the public equipment, and unlocking the public equipment.
Specifically, as shown in fig. 2, when the background server verifies that the user has the borrowing right of the public device, an unlocking instruction is sent to the public device, and the public device is unlocked for the user to borrow. The unlocking instruction comprises an equipment release password and an equipment identification code, and the public equipment releases the public equipment corresponding to the equipment identification code according to the equipment release password.
Optionally, in this embodiment, as shown in fig. 4, both the public device and the background server are connected to the device access point, the public device may be connected to the device access point through a USB, the background server is connected to the device access point through a network in a communication manner, the device access point is configured to connect the public device and the background server, and the device access point may be connected to multiple public devices simultaneously. Illustratively, when the background server determines that the user has the borrowing right, an unlocking instruction is sent to the device access point, so that the device access point releases the connection with the public device, and the public device is unlocked for the user to borrow.
Optionally, in an embodiment of the present invention, the background server includes an equipment information base, and after step S103, the method includes:
b1: and acquiring the equipment identification code of the public equipment sending the equipment borrowing request.
B2: and if the user has the borrowing authority of the public equipment, marking the borrowing state of the public equipment in an equipment information base as a borrowing state based on the equipment identification code.
Specifically, in the embodiment of the present invention, the background server is provided with an equipment information base, and is configured to record an update condition of a borrowing state of the public equipment, where the borrowing state includes a borrowing state and a returning state, and the update condition of the borrowing state refers to a time marked as the borrowing state and a time marked as the returning state. When the borrowing time of the public equipment in the borrowing state reaches the preset borrowing time, if the background server does not detect a returning request sent by the public equipment or does not detect equipment access information sent by an equipment access point, sending an acceptance prompting notice to a communication account of a user borrowing the public equipment, and prompting to accept the public equipment. Further, if the return request or the device access information is not detected within the preset waiting time after the prompt receipt notification is sent, an alarm is sent out and a manager is notified.
S104: and if receiving a device returning request sent by the public device, the background server acquires a device access instruction, sends a device locking instruction to the public device and locks the public device.
Specifically, the device locking instruction includes a device locking password and a device identification code, and the public device locks the public device corresponding to the device identification code according to the device locking password. The public device is locked by remotely locking the screen of the public device, so that anyone can be prevented from unlocking and using the public device.
Optionally, the user sends a device return request to the backend server through the public device, places the public device at a specified position, and the backend server locates the public device when receiving the device return request, obtains the current position of the public device, and sends a device locking instruction to the public device if the current position is at the specified position, so as to lock the public device.
Optionally, in an embodiment of the present invention, after the step S104, the method includes:
c1: acquiring the equipment identification code of the public equipment which sends the equipment returning request;
c2: and marking the borrowing state of the public equipment in the equipment information base as a returning state based on the equipment identification code.
Optionally, as shown in fig. 4, when the user returns the device, the public device is accessed to the device access point, when the device access point detects device access information, the public device sends a device identification code to the background server, the background server compares the device identification code of the public device to be returned with the device identification code of the public device marked in the borrowing state in the device information base, if the comparison is successful, the borrowing state of the public device in the device information base is marked in the returning state, and a device locking instruction is sent to the device access point, so that the device access point locks the public device.
Further, when the user returns the public equipment, the identity information of the returning person is recorded, whether the borrower and the returning person are the same user or not is judged, and if not, the identity information of the returning person is recorded in the borrowing information of the public equipment in the equipment information base.
As an embodiment of the present invention, fig. 5 shows that after the step S104, the method for managing a public device according to the embodiment of the present invention further includes:
d1: the real-time location of the utility device whose borrowing status is marked as the borrowing status is obtained.
D2: monitoring whether the common equipment with the borrowing status marked as the borrowing status is in a designated borrowing interval or not based on the real-time position.
D3: and if the real-time position of the public equipment exceeds the appointed borrowing interval, sending an alarm prompt.
Specifically, in the embodiment of the present invention, the public device in the lending state is located in real time, the real-time location of the public device is obtained, if the real-time location of the public device exceeds the preset use interval, for example, leaves a company, information of a borrower of the public device is obtained, the use location is recorded, and an acceptance notice is immediately sent to the communication account of the borrower, so that the public device is prevented from being taken away from the preset use interval by a user, the public device is effectively prevented from being lost, and the loss is avoided.
In the embodiment of the invention, when a background server detects an equipment borrowing request sent by public equipment, identity information of a user requesting to borrow the public equipment is acquired, whether the user has the borrowing authority of the public equipment is judged based on the identity information, if the user has the borrowing authority of the public equipment, an unlocking instruction is sent to the public equipment to unlock the public equipment without manually verifying the identity information of the user borrowing the public equipment, if the background server receives an equipment returning request sent by the public equipment, an equipment access instruction is acquired, an equipment locking instruction is sent to the public equipment to lock the public equipment without manually recovering, so that the labor is saved, the borrowing/returning of the public equipment is intelligently and automatically managed, the manual management error can be avoided, and the possibility of management error is reduced, the borrowing/returning traceability of the public equipment improves the management efficiency of the public equipment and enhances the user experience.
Further, another embodiment of the present invention is proposed based on the management method of the public device provided in the embodiment of fig. 1. In this embodiment of the present invention, on the basis of steps S101 to S104 shown in fig. 1, as shown in fig. 6, the background server includes an equipment information base, and the equipment information base is used to record borrowing and returning information of equipment, and the management method for a common device further includes:
s105: and periodically counting the borrowing and returning information of the public equipment in the equipment information base.
Specifically, the borrowing and returning information of the public equipment in the equipment information base is periodically counted, for example, the borrowing and returning information of the public equipment in the equipment information base is periodically counted according to preset time, the borrowing and returning information includes borrowing time, borrowing duration, returning time and equipment model, and the borrowing and returning information further includes identity information of a user applying for borrowing. Illustratively, the borrowing frequency of each type of public equipment in a period of time is counted, and the equipment type with the highest borrowing frequency of the public equipment in the equipment information base is determined according to the borrowing frequency. And counting the lending time and the returning time of the public equipment.
S106: and generating a borrowing track of the public equipment based on the borrowing and returning information.
In the embodiment of the invention, the borrowing track is used for identifying the flow track of the public equipment, and the flow condition of the public equipment in a statistical period can be checked according to the borrowing track.
S107: and counting the borrowing behavior characteristics of the user according to the borrowing track of the public equipment, and sending the borrowing behavior characteristics to a management terminal.
The borrowing behavior characteristics comprise borrowing frequency of a certain user, borrowing frequency of a public equipment model, borrowing average duration and the like. In the embodiment of the invention, the borrowing behavior characteristics of the user are counted according to the borrowing track of the public equipment, and the borrowing behavior characteristics are sent to the management terminal, so that a manager of the management terminal can update the public equipment according to the borrowing behavior characteristics, the user can conveniently borrow the public equipment better, and the utilization rate of the public equipment is improved.
In the embodiment of the invention, when a background server detects an equipment borrowing request sent by public equipment, identity information of a user requesting to borrow the public equipment is acquired, whether the user has the borrowing authority of the public equipment is judged based on the identity information, if the user has the borrowing authority of the public equipment, an unlocking instruction is sent to the public equipment to unlock the public equipment without manually verifying the identity information of the user borrowing the public equipment, if the background server receives an equipment returning request sent by the public equipment, an equipment access instruction is acquired, an equipment locking instruction is sent to the public equipment to lock the public equipment without manually recovering, so that the labor is saved, the borrowing/returning of the public equipment is intelligently and automatically managed, the manual management error can be avoided, and the possibility of management error is reduced, the borrowing/returning traceability of the public equipment is improved, the management efficiency of the public equipment is improved, furthermore, borrowing and returning information of the public equipment in an equipment information base is regularly counted, a borrowing track of the public equipment is generated based on the borrowing and returning information, borrowing behavior characteristics of a user are counted according to the borrowing track of the public equipment, and the borrowing behavior characteristics are sent to a management terminal, so that the public equipment is updated according to the borrowing behavior characteristics of the user, the user experience is enhanced, and meanwhile, the utilization rate of the public equipment is improved.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
Fig. 7 shows a block diagram of a management apparatus of a public device according to an embodiment of the present application, and only shows portions related to the embodiment of the present application for convenience of description.
Referring to fig. 7, the management apparatus of the utility device includes: an identity information obtaining unit 71, a permission judging unit 72, a device unlocking unit 73, and a device locking unit 74, wherein:
an identity information obtaining unit 71, configured to, when the background server detects an equipment borrowing request sent by a public device, obtain identity information of a user requesting to borrow the public device;
an authority judgment unit 72 configured to judge whether the user has a borrowing authority of the common device based on the identity information;
an apparatus unlocking unit 73, configured to send an unlocking instruction to the public apparatus to unlock the public apparatus if the user has the borrowing authority of the public apparatus;
and the device locking unit 74 is configured to, if the background server receives a device return request sent by the public device, acquire a device access instruction, send a device locking instruction to the public device, and lock the public device.
Optionally, the permission judging unit 72 includes:
the information verification module is used for verifying whether the employee information matched with the identity information exists in the employee information base by the background server;
the first permission judging module is used for judging that the user has the borrowing permission of the public equipment if the employee information matched with the identity information exists in the employee information base;
and the second permission judging module is used for judging that the user does not have the borrowing permission of the public equipment if the employee information matched with the identity information does not exist in the employee information base, and sending a borrowing failure prompt to the public equipment.
Optionally, as shown in fig. 7.1, the management apparatus of the public device further includes:
an information counting unit 75 for periodically counting the borrowing and returning information of the public equipment in the equipment information base;
a track generation unit 76 for generating a borrowing track of the common device based on the borrowing and returning information;
and a management updating unit 77, configured to count the borrowing behavior characteristics of the user according to the borrowing trajectory of the public device, and send the borrowing behavior characteristics to the management terminal.
Optionally, the management apparatus of the public device further includes:
a first device information acquiring unit configured to acquire a device identification code of a common device that transmits the device borrowing request;
a first state marking unit, configured to mark the borrowing state of the public device in a device information base as a lending state based on the device identification code if the user has the borrowing authority of the public device;
a second device information acquiring unit configured to acquire a device identification code of the common device that sent the device return request;
a second status marking unit, configured to mark the borrowing status of the public device in the device information base as a returning status based on the device identification code.
Optionally, the management apparatus of the public device further includes:
the device positioning unit is used for acquiring the real-time position of the public device with the borrowing state marked as the lending state;
a location determination unit, configured to monitor whether the common device whose borrowing status is marked as a borrowing status is within a specified borrowing interval based on the real-time location;
and the warning reminding unit is used for sending warning reminding if the real-time position of the public equipment exceeds the appointed borrowing interval.
In the embodiment of the invention, when a background server detects an equipment borrowing request sent by public equipment, identity information of a user requesting to borrow the public equipment is acquired, whether the user has the borrowing authority of the public equipment is judged based on the identity information, if the user has the borrowing authority of the public equipment, an unlocking instruction is sent to the public equipment to unlock the public equipment without manually verifying the identity information of the user borrowing the public equipment, if the background server receives an equipment returning request sent by the public equipment, an equipment access instruction is acquired, an equipment locking instruction is sent to the public equipment to lock the public equipment without manually recovering, so that the labor is saved, the borrowing/returning of the public equipment is intelligently and automatically managed, the manual management error can be avoided, and the possibility of management error is reduced, the borrowing/returning traceability of the public equipment improves the management efficiency of the public equipment and enhances the user experience.
Fig. 8 is a schematic diagram of a server according to an embodiment of the present invention. As shown in fig. 8, the server 8 of this embodiment includes: a processor 80, a memory 81 and a computer program 82 stored in said memory 81 and operable on said processor 80, such as a hypervisor of a utility device. The processor 80, when executing the computer program 82, implements the steps in the above-described embodiments of the management method for each utility device, such as the steps 101 to 104 shown in fig. 1. Alternatively, the processor 80, when executing the computer program 82, implements the functions of the modules/units in the above-described device embodiments, such as the functions of the units 71 to 74 shown in fig. 7.
Illustratively, the computer program 82 may be partitioned into one or more modules/units that are stored in the memory 81 and executed by the processor 80 to implement the present invention. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program 82 in the server 8.
The server 8 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The server may include, but is not limited to, a processor 80, a memory 81. Those skilled in the art will appreciate that fig. 8 is merely an example of a server 8 and does not constitute a limitation of server 8, and may include more or fewer components than shown, or some components in combination, or different components, e.g., the server may also include input-output devices, network access devices, buses, etc.
The Processor 80 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 81 may be an internal storage unit of the server 8, such as a hard disk or a memory of the server 8. The memory 81 may also be an external storage device of the server 8, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) and the like provided on the server 8. Further, the memory 81 may also include both an internal storage unit of the server 8 and an external storage device. The memory 81 is used for storing the computer program and other programs and data required by the server. The memory 81 may also be used to temporarily store data that has been output or is to be output.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.
Claims (10)
1. A method for managing a utility device, comprising:
when a background server detects an equipment borrowing request sent by public equipment, acquiring identity information of a user requesting to borrow the public equipment;
judging whether the user has the borrowing authority of the public equipment or not based on the identity information;
if the user has the borrowing authority of the public equipment, an unlocking instruction is sent to the public equipment, and the public equipment is unlocked;
and if receiving a device returning request sent by the public device, the background server acquires a device access instruction, sends a device locking instruction to the public device and locks the public device.
2. The method for managing according to claim 1, wherein said determining whether the user has the borrowing authority of the public device based on the identity information comprises:
the background server verifies whether the employee information matched with the identity information exists in an employee information base;
if the employee information matched with the identity information exists in the employee information base, judging that the user has the borrowing authority of the public equipment;
and if the employee information matched with the identity information does not exist in the employee information base, judging that the user does not have the borrowing authority of the public equipment, and sending a borrowing failure prompt to the public equipment.
3. The management method of claim 1, wherein the backend server comprises a device information base, and the management method of the public device further comprises:
acquiring a device identification code of the public device which sends the device borrowing request;
if the user has the borrowing authority of the public equipment, the borrowing state of the public equipment in an equipment information base is marked as a borrowing state on the basis of the equipment identification code;
or,
acquiring the equipment identification code of the public equipment which sends the equipment returning request;
and marking the borrowing state of the public equipment in the equipment information base as a returning state based on the equipment identification code.
4. The method according to claim 3, wherein after the sending an unlock command to the common device to unlock the common device, the method comprises:
acquiring the real-time position of the public equipment with the borrowing state marked as the lending state;
monitoring whether the public equipment with the borrowing state marked as the borrowing state is in a specified borrowing interval or not based on the real-time position;
and if the real-time position of the public equipment exceeds the appointed borrowing interval, sending an alarm prompt.
5. The management method of claim 1, wherein the backend server comprises a device information base, and the management method of the public device further comprises:
periodically counting borrowing and returning information of the public equipment in the equipment information base;
generating a borrowing track of the public equipment based on the borrowing and returning information;
and counting the borrowing behavior characteristics of the user according to the borrowing track of the public equipment, and sending the borrowing behavior characteristics to a management terminal.
6. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of a method for managing a utility device according to any one of claims 1 to 5.
7. A server comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor when executing the computer program implements the steps of:
when a background server detects an equipment borrowing request sent by public equipment, acquiring identity information of a user requesting to borrow the public equipment;
judging whether the user has the borrowing authority of the public equipment or not based on the identity information;
if the user has the borrowing authority of the public equipment, an unlocking instruction is sent to the public equipment, and the public equipment is unlocked;
and if receiving a device returning request sent by the public device, the background server acquires a device access instruction, sends a device locking instruction to the public device and locks the public device.
8. The server according to claim 7, wherein the determining whether the user has the borrowing authority of the public device based on the identity information comprises:
the background server verifies whether the employee information matched with the identity information exists in an employee information base;
if the employee information matched with the identity information exists in the employee information base, judging that the user has the borrowing authority of the public equipment;
and if the employee information matched with the identity information does not exist in the employee information base, judging that the user does not have the borrowing authority of the public equipment, and sending a borrowing failure prompt to the public equipment.
9. The server according to claim 7, wherein the backend server comprises a device information base, and the processor executes the computer program to perform the following steps:
acquiring a device identification code of the public device which sends the device borrowing request;
if the user has the borrowing authority of the public equipment, the borrowing state of the public equipment in an equipment information base is marked as a borrowing state on the basis of the equipment identification code;
or,
acquiring the equipment identification code of the public equipment which sends the equipment returning request;
and marking the borrowing state of the public equipment in the equipment information base as a returning state based on the equipment identification code.
10. The server according to claim 7, wherein the backend server comprises a device information base, and the processor executes the computer program to perform the following steps:
periodically counting borrowing and returning information of the public equipment in the equipment information base;
generating a borrowing track of the public equipment based on the borrowing and returning information;
and counting the borrowing behavior characteristics of the user according to the borrowing track of the public equipment, and sending the borrowing behavior characteristics to a management terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811121815.XA CN109359037A (en) | 2018-09-26 | 2018-09-26 | A kind of management method of shared device, storage medium and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811121815.XA CN109359037A (en) | 2018-09-26 | 2018-09-26 | A kind of management method of shared device, storage medium and server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109359037A true CN109359037A (en) | 2019-02-19 |
Family
ID=65347793
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811121815.XA Pending CN109359037A (en) | 2018-09-26 | 2018-09-26 | A kind of management method of shared device, storage medium and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109359037A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110033224A (en) * | 2019-04-24 | 2019-07-19 | 陕西理工大学 | A kind of sports equipment management system |
CN111737664A (en) * | 2020-05-20 | 2020-10-02 | 广州市格利网络技术有限公司 | Re-authorization use control method and device of borrowing equipment |
CN112102019A (en) * | 2019-06-17 | 2020-12-18 | 北京车和家信息技术有限公司 | Method and device for processing equipment use data, public equipment and cloud server |
CN112396767A (en) * | 2020-11-17 | 2021-02-23 | 东风商用车有限公司 | Equipment management system |
CN113450520A (en) * | 2021-06-22 | 2021-09-28 | 平安壹钱包电子商务有限公司 | Equipment management method, device, server and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104732329A (en) * | 2015-02-06 | 2015-06-24 | 网易(杭州)网络有限公司 | Device tracking method and system |
CN105122267A (en) * | 2013-03-15 | 2015-12-02 | 苹果公司 | Mobile computing device with multiple access modes |
CN106846584A (en) * | 2017-02-13 | 2017-06-13 | 上海量明科技发展有限公司 | Shared bicycle and its unlocking method, lockset, terminal and system |
CN106898135A (en) * | 2017-02-20 | 2017-06-27 | 致富电子科技有限公司 | The driving regional alarm method and device of shared bicycle |
CN107239998A (en) * | 2017-06-01 | 2017-10-10 | 北京悦畅科技有限公司 | The sharing method and device of a kind of parking lot bicycle |
CN107240003A (en) * | 2017-06-07 | 2017-10-10 | 梁超 | A kind of shared bicycle method for running and system |
CN107358744A (en) * | 2017-05-23 | 2017-11-17 | 上海与德科技有限公司 | Rent method, system, portable power source and bicycle server |
CN107516384A (en) * | 2017-09-21 | 2017-12-26 | 成都宇能通能源开发有限公司 | A kind of shared bicycle control system |
CN108076213A (en) * | 2017-10-30 | 2018-05-25 | 努比亚技术有限公司 | A kind of terminal based reminding method, terminal and computer readable storage medium |
-
2018
- 2018-09-26 CN CN201811121815.XA patent/CN109359037A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105122267A (en) * | 2013-03-15 | 2015-12-02 | 苹果公司 | Mobile computing device with multiple access modes |
CN104732329A (en) * | 2015-02-06 | 2015-06-24 | 网易(杭州)网络有限公司 | Device tracking method and system |
CN106846584A (en) * | 2017-02-13 | 2017-06-13 | 上海量明科技发展有限公司 | Shared bicycle and its unlocking method, lockset, terminal and system |
CN106898135A (en) * | 2017-02-20 | 2017-06-27 | 致富电子科技有限公司 | The driving regional alarm method and device of shared bicycle |
CN107358744A (en) * | 2017-05-23 | 2017-11-17 | 上海与德科技有限公司 | Rent method, system, portable power source and bicycle server |
CN107239998A (en) * | 2017-06-01 | 2017-10-10 | 北京悦畅科技有限公司 | The sharing method and device of a kind of parking lot bicycle |
CN107240003A (en) * | 2017-06-07 | 2017-10-10 | 梁超 | A kind of shared bicycle method for running and system |
CN107516384A (en) * | 2017-09-21 | 2017-12-26 | 成都宇能通能源开发有限公司 | A kind of shared bicycle control system |
CN108076213A (en) * | 2017-10-30 | 2018-05-25 | 努比亚技术有限公司 | A kind of terminal based reminding method, terminal and computer readable storage medium |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110033224A (en) * | 2019-04-24 | 2019-07-19 | 陕西理工大学 | A kind of sports equipment management system |
CN112102019A (en) * | 2019-06-17 | 2020-12-18 | 北京车和家信息技术有限公司 | Method and device for processing equipment use data, public equipment and cloud server |
CN111737664A (en) * | 2020-05-20 | 2020-10-02 | 广州市格利网络技术有限公司 | Re-authorization use control method and device of borrowing equipment |
CN112396767A (en) * | 2020-11-17 | 2021-02-23 | 东风商用车有限公司 | Equipment management system |
CN113450520A (en) * | 2021-06-22 | 2021-09-28 | 平安壹钱包电子商务有限公司 | Equipment management method, device, server and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109359037A (en) | A kind of management method of shared device, storage medium and server | |
CN110838065B (en) | Transaction data processing method and device | |
CN108377241B (en) | Monitoring method, device and equipment based on access frequency and computer storage medium | |
CN108632089B (en) | Management method, device and equipment of test terminal and computer storage medium | |
CN112949798B (en) | Laboratory equipment management method and system based on RFID technology | |
CN110264222A (en) | Responsible investigation method, apparatus and terminal device based on data acquisition | |
CN112905437A (en) | Method and device for testing case and storage medium | |
CN105635066A (en) | Management method and device of client application program | |
CN111353176A (en) | Method and system for inquiring block chain data | |
CN110969723B (en) | Data management method, detection device, server, and computer-readable storage medium | |
CN114462796A (en) | System, method and equipment for managing battery full life cycle based on block chain | |
CN111694852A (en) | Data processing method, device, terminal and storage medium based on distributed transaction | |
CN110288731A (en) | Unlocking method and device and electronic door lock | |
CN112258197A (en) | Account management method, device, terminal and storage medium based on artificial intelligence | |
CN211015753U (en) | Face recognition security system based on Internet of things | |
CN112163009A (en) | User side data acquisition method and device, electronic equipment and storage medium | |
CN107835174B (en) | Account book anti-fraud system and method based on Internet of things | |
CN111739228A (en) | Face recognition security system based on Internet of things and operation method | |
CN113255855B (en) | Alarm system, method and terminal for preventing mistaken entering of electrified interval | |
CN113450520B (en) | Equipment management method, device, server and storage medium | |
CN114331661A (en) | Data verification method and device, electronic equipment and storage medium | |
CN112019346A (en) | Method, device and system for authenticating and processing mobile terminal user identity | |
CN103914644B (en) | Data acquisition and processing system and method | |
KR101326208B1 (en) | System for managing company's software and real assets | |
JP2004015495A5 (en) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |