CN109359037A - A kind of management method of shared device, storage medium and server - Google Patents

A kind of management method of shared device, storage medium and server Download PDF

Info

Publication number
CN109359037A
CN109359037A CN201811121815.XA CN201811121815A CN109359037A CN 109359037 A CN109359037 A CN 109359037A CN 201811121815 A CN201811121815 A CN 201811121815A CN 109359037 A CN109359037 A CN 109359037A
Authority
CN
China
Prior art keywords
equipment
public
borrowing
user
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811121815.XA
Other languages
Chinese (zh)
Inventor
徐国诚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201811121815.XA priority Critical patent/CN109359037A/en
Publication of CN109359037A publication Critical patent/CN109359037A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3664Environments for testing or debugging software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/76Adapting program code to run in a different environment; Porting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention provides a kind of management method of shared device, storage medium and servers, comprising: when the equipment that background server detects that shared device is sent borrows request, acquisition request borrows the identity information of the user of the shared device;Based on the identity information, whether user described in intelligent decision has the borrow permission of the shared device;If the user has the borrow permission of the shared device, unlock instruction is sent to the shared device, unlocks the shared device;If the background server receives the equipment that the shared device is sent and gives back request, equipment incoming instruction is obtained, and sending device lock instruction locks the shared device to the shared device.Whether intelligent verification user of the present invention has a borrow permission of shared device, the lending of automatic management shared device and a possibility that give back, can avoid labor management fault, reduce management error, improves the efficiency of management of shared device.

Description

Management method of public equipment, storage medium and server
Technical Field
The present invention relates to the field of device management technologies, and in particular, to a management method, a storage medium, and a server for a public device.
Background
In the software development process, product compatibility debugging, operation testing and the like are often required to be performed on mobile devices by various project groups, so companies often provide some mobile devices as common devices for research and development personnel to use. How to manage the lending/returning of these utility devices is a problem that companies need to solve.
At present, the prior art is that the management of the public equipment by the company is mainly realized by specially equipping an administrator, and the borrowing/returning information of the public equipment is registered by the administrator. The prior art has the following problems: when the number of times of borrowing/returning of the public equipment is large, the workload of an administrator is greatly increased, manual registration is easy to make mistakes, and the management efficiency is not high.
Disclosure of Invention
The embodiment of the invention provides a management method, a storage medium and a server of public equipment, and aims to solve the problem that navigation cannot provide effective travel-related information for a user in advance so as to facilitate the user to go out in the prior art.
A first aspect of an embodiment of the present invention provides a method for managing a public device, including:
when a background server detects an equipment borrowing request sent by public equipment, acquiring identity information of a user requesting to borrow the public equipment;
judging whether the user has the borrowing authority of the public equipment or not based on the identity information;
if the user has the borrowing authority of the public equipment, an unlocking instruction is sent to the public equipment, and the public equipment is unlocked;
and if receiving a device returning request sent by the public device, the background server acquires a device access instruction, sends a device locking instruction to the public device and locks the public device.
A second aspect of an embodiment of the present invention provides a server, including a memory and a processor, where the memory stores a computer program operable on the processor, and the processor executes the computer program to implement the following steps:
when a background server detects an equipment borrowing request sent by public equipment, acquiring identity information of a user requesting to borrow the public equipment;
judging whether the user has the borrowing authority of the public equipment or not based on the identity information;
if the user has the borrowing authority of the public equipment, an unlocking instruction is sent to the public equipment, and the public equipment is unlocked;
and if receiving a device returning request sent by the public device, the background server acquires a device access instruction, sends a device locking instruction to the public device and locks the public device.
A third aspect of embodiments of the present invention provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements the steps of:
when a background server detects an equipment borrowing request sent by public equipment, acquiring identity information of a user requesting to borrow the public equipment;
judging whether the user has the borrowing authority of the public equipment or not based on the identity information;
if the user has the borrowing authority of the public equipment, an unlocking instruction is sent to the public equipment, and the public equipment is unlocked;
and if receiving a device returning request sent by the public device, the background server acquires a device access instruction, sends a device locking instruction to the public device and locks the public device.
In the embodiment of the invention, when a background server detects an equipment borrowing request sent by public equipment, identity information of a user requesting to borrow the public equipment is acquired, whether the user has the borrowing authority of the public equipment is judged based on the identity information, if the user has the borrowing authority of the public equipment, an unlocking instruction is sent to the public equipment to unlock the public equipment without manually verifying the identity information of the user borrowing the public equipment, if the background server receives an equipment returning request sent by the public equipment, an equipment access instruction is acquired, an equipment locking instruction is sent to the public equipment to lock the public equipment without manually recovering, so that the labor is saved, the borrowing/returning of the public equipment is intelligently and automatically managed, the manual management error can be avoided, and the possibility of management error is reduced, the borrowing/returning traceability of the public equipment improves the management efficiency of the public equipment and enhances the user experience.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a flowchart of an implementation of a method for managing a public device according to an embodiment of the present invention;
fig. 2 is a schematic view of an application scenario of a management method for a public device according to an embodiment of the present invention;
fig. 3 is a flowchart of a specific implementation of the method S102 for managing a public device according to an embodiment of the present invention;
fig. 4 is a schematic view of another application scenario of a management method for a public device according to an embodiment of the present invention;
FIG. 5 is a flow chart of an implementation of common device location provided by an embodiment of the present invention;
FIG. 6 is a flowchart of an implementation of a method for managing a public device including statistical loan-and-return information according to an embodiment of the present invention;
fig. 7 is a block diagram of a management apparatus of a public device according to an embodiment of the present invention;
fig. 7.1 is a block diagram of a management apparatus of a public device according to another embodiment of the present invention;
fig. 8 is a schematic diagram of a server provided in an embodiment of the present invention.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the embodiments described below are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 shows an implementation flow of a management method for a public device according to an embodiment of the present invention, where the method flow includes steps S101 to S104. The specific realization principle of each step is as follows:
s101: when the background server detects the device borrowing request sent by the public device, the identity information of the user requesting to borrow the public device is obtained.
In this embodiment, as shown in fig. 2, the public device is connected to the backend server, specifically, the public device is connected to the backend server in a communication manner, which includes a wireless connection or a cellular communication connection, and is not limited herein. The public device can be an intelligent communication terminal, such as a smart phone or a tablet computer. In the development process of the intelligent application, in order to test the compatibility of the application to various systems, the application needs to be installed in mobile terminals of different systems for testing, for example, the compatibility of the application needs to be tested on an Android system, an IOS system and a WinPhone system, so that the common device flows among project groups developed by the applications. It will be appreciated that in other embodiments of the invention, the common device may be other electronic or non-electronic devices.
Specifically, when a user needs to borrow the public device, an unlocking request is sent to the background server through the public device. The unlocking request comprises a screen touch instruction, when the public device detects the touch instruction, if the time for touching the screen reaches the preset touch duration or the touch strength reaches the preset touch strength, the public device judges that the touch instruction is an effective unlocking request sent by a user, and the public device sends the effective unlocking request to the background server. And when the background server detects an equipment borrowing request sent by the public equipment, acquiring the identity information of a user requesting to borrow the public equipment. In the implementation of the present invention, the public device is an intelligent communication device with a camera, such as a smart phone or a tablet computer, and the user identity information is face image information of the user. Alternatively, the public device is an intelligent device with a sensor, and the user identity information may be other biometric information besides face image information, such as fingerprint information and iris information. The biometric information is unique and can be used to identify the user.
S102: and judging whether the user has the borrowing authority of the public equipment or not based on the identity information.
In the embodiment of the present invention, the public device sends the unlocking request to the background server, and the background server determines whether the unlocking request is legal. Or when the public device detects an unlocking request, prompting a user to input identity information, and sending the acquired identity information to the background server, wherein the background server judges whether the user has the borrowing authority of the public device or not based on the identity information.
As an embodiment of the present invention, as shown in fig. 3, the S102 specifically includes:
a1: and the background server verifies whether the employee information matched with the identity information exists in an employee information base.
A2: and if the employee information matched with the identity information exists in the employee information base, judging that the user has the borrowing authority of the public equipment. Further, since the information is not updated timely, although the employee information matched with the identity information exists in the employee information base, the employee actually leaves, in this case, the employee does not have the borrowing authority of the public device, and specifically, if the employee information matched with the identity information exists in the employee information base, the working state corresponding to the employee information matched with the identity information is obtained. The working state comprises a waiting state (trial state), an on-duty state, an off-duty state and a retirement state. And if the working state corresponding to the employee information matched with the identity information is an on-duty state, judging that the user corresponding to the identity information has the borrowing authority of the public equipment. And if the working state corresponding to the employee information matched with the identity information is other working states except the working state, judging that the user corresponding to the identity information does not have the borrowing authority of the public equipment.
A3: and if the employee information matched with the identity information does not exist in the employee information base, judging that the user does not have the borrowing authority of the public equipment, and sending a borrowing failure prompt to the public equipment.
Specifically, when the public device detects an unlocking request, the public device prompts a user to input identity information, the obtained identity information is sent to a background server for verification, whether the user is a staff recorded in a staff information base is verified, whether the user has the borrowing authority of the public device is judged, if the staff information matched with the identity information of the user is found from the staff information base, the user has the borrowing authority, if the staff information matched with the identity information of the user is not found, the user does not have the borrowing authority, and at the moment, an alarm prompt is sent.
Further, if the employee information matched with the identity information exists in the employee information base, querying the item group to which the user belongs in the employee information, and determining whether the item group to which the user belongs has the borrowing authority of the public equipment. The employee information comprises employee face images and other biological characteristic information except the face images.
Illustratively, when the public device detects an unlocking request, a camera is started, and a user is prompted to shoot a face image aiming at the camera or is prompted to enter fingerprint information. The employee information base of the background server stores the identity information of the employee in advance, including the employee job number, name and biological characteristic information such as face image, fingerprint information, iris information and the like. The public equipment sends the acquired face image, fingerprint information or iris information to the background server for verification, the background server searches staff information matched with the face image, fingerprint information or iris information sent by the public equipment in a staff information base, and then verifies the identity of a user requesting to borrow the public equipment, so that the public equipment is prevented from being borrowed by external personnel at will, and the safety of the public equipment is improved. Illustratively, the public device sends a device borrowing request to a background server, the background server compares the face information with the face of an employee in an employee information base by using intelligent AI according to the face information in the device borrowing request, verifies whether a user corresponding to the face information in the device borrowing request is the employee, and if the user corresponding to the face information is the employee, the user is determined to have the borrowing authority of the public device.
S103: and if the user has the borrowing authority of the public equipment, sending an unlocking instruction to the public equipment, and unlocking the public equipment.
Specifically, as shown in fig. 2, when the background server verifies that the user has the borrowing right of the public device, an unlocking instruction is sent to the public device, and the public device is unlocked for the user to borrow. The unlocking instruction comprises an equipment release password and an equipment identification code, and the public equipment releases the public equipment corresponding to the equipment identification code according to the equipment release password.
Optionally, in this embodiment, as shown in fig. 4, both the public device and the background server are connected to the device access point, the public device may be connected to the device access point through a USB, the background server is connected to the device access point through a network in a communication manner, the device access point is configured to connect the public device and the background server, and the device access point may be connected to multiple public devices simultaneously. Illustratively, when the background server determines that the user has the borrowing right, an unlocking instruction is sent to the device access point, so that the device access point releases the connection with the public device, and the public device is unlocked for the user to borrow.
Optionally, in an embodiment of the present invention, the background server includes an equipment information base, and after step S103, the method includes:
b1: and acquiring the equipment identification code of the public equipment sending the equipment borrowing request.
B2: and if the user has the borrowing authority of the public equipment, marking the borrowing state of the public equipment in an equipment information base as a borrowing state based on the equipment identification code.
Specifically, in the embodiment of the present invention, the background server is provided with an equipment information base, and is configured to record an update condition of a borrowing state of the public equipment, where the borrowing state includes a borrowing state and a returning state, and the update condition of the borrowing state refers to a time marked as the borrowing state and a time marked as the returning state. When the borrowing time of the public equipment in the borrowing state reaches the preset borrowing time, if the background server does not detect a returning request sent by the public equipment or does not detect equipment access information sent by an equipment access point, sending an acceptance prompting notice to a communication account of a user borrowing the public equipment, and prompting to accept the public equipment. Further, if the return request or the device access information is not detected within the preset waiting time after the prompt receipt notification is sent, an alarm is sent out and a manager is notified.
S104: and if receiving a device returning request sent by the public device, the background server acquires a device access instruction, sends a device locking instruction to the public device and locks the public device.
Specifically, the device locking instruction includes a device locking password and a device identification code, and the public device locks the public device corresponding to the device identification code according to the device locking password. The public device is locked by remotely locking the screen of the public device, so that anyone can be prevented from unlocking and using the public device.
Optionally, the user sends a device return request to the backend server through the public device, places the public device at a specified position, and the backend server locates the public device when receiving the device return request, obtains the current position of the public device, and sends a device locking instruction to the public device if the current position is at the specified position, so as to lock the public device.
Optionally, in an embodiment of the present invention, after the step S104, the method includes:
c1: acquiring the equipment identification code of the public equipment which sends the equipment returning request;
c2: and marking the borrowing state of the public equipment in the equipment information base as a returning state based on the equipment identification code.
Optionally, as shown in fig. 4, when the user returns the device, the public device is accessed to the device access point, when the device access point detects device access information, the public device sends a device identification code to the background server, the background server compares the device identification code of the public device to be returned with the device identification code of the public device marked in the borrowing state in the device information base, if the comparison is successful, the borrowing state of the public device in the device information base is marked in the returning state, and a device locking instruction is sent to the device access point, so that the device access point locks the public device.
Further, when the user returns the public equipment, the identity information of the returning person is recorded, whether the borrower and the returning person are the same user or not is judged, and if not, the identity information of the returning person is recorded in the borrowing information of the public equipment in the equipment information base.
As an embodiment of the present invention, fig. 5 shows that after the step S104, the method for managing a public device according to the embodiment of the present invention further includes:
d1: the real-time location of the utility device whose borrowing status is marked as the borrowing status is obtained.
D2: monitoring whether the common equipment with the borrowing status marked as the borrowing status is in a designated borrowing interval or not based on the real-time position.
D3: and if the real-time position of the public equipment exceeds the appointed borrowing interval, sending an alarm prompt.
Specifically, in the embodiment of the present invention, the public device in the lending state is located in real time, the real-time location of the public device is obtained, if the real-time location of the public device exceeds the preset use interval, for example, leaves a company, information of a borrower of the public device is obtained, the use location is recorded, and an acceptance notice is immediately sent to the communication account of the borrower, so that the public device is prevented from being taken away from the preset use interval by a user, the public device is effectively prevented from being lost, and the loss is avoided.
In the embodiment of the invention, when a background server detects an equipment borrowing request sent by public equipment, identity information of a user requesting to borrow the public equipment is acquired, whether the user has the borrowing authority of the public equipment is judged based on the identity information, if the user has the borrowing authority of the public equipment, an unlocking instruction is sent to the public equipment to unlock the public equipment without manually verifying the identity information of the user borrowing the public equipment, if the background server receives an equipment returning request sent by the public equipment, an equipment access instruction is acquired, an equipment locking instruction is sent to the public equipment to lock the public equipment without manually recovering, so that the labor is saved, the borrowing/returning of the public equipment is intelligently and automatically managed, the manual management error can be avoided, and the possibility of management error is reduced, the borrowing/returning traceability of the public equipment improves the management efficiency of the public equipment and enhances the user experience.
Further, another embodiment of the present invention is proposed based on the management method of the public device provided in the embodiment of fig. 1. In this embodiment of the present invention, on the basis of steps S101 to S104 shown in fig. 1, as shown in fig. 6, the background server includes an equipment information base, and the equipment information base is used to record borrowing and returning information of equipment, and the management method for a common device further includes:
s105: and periodically counting the borrowing and returning information of the public equipment in the equipment information base.
Specifically, the borrowing and returning information of the public equipment in the equipment information base is periodically counted, for example, the borrowing and returning information of the public equipment in the equipment information base is periodically counted according to preset time, the borrowing and returning information includes borrowing time, borrowing duration, returning time and equipment model, and the borrowing and returning information further includes identity information of a user applying for borrowing. Illustratively, the borrowing frequency of each type of public equipment in a period of time is counted, and the equipment type with the highest borrowing frequency of the public equipment in the equipment information base is determined according to the borrowing frequency. And counting the lending time and the returning time of the public equipment.
S106: and generating a borrowing track of the public equipment based on the borrowing and returning information.
In the embodiment of the invention, the borrowing track is used for identifying the flow track of the public equipment, and the flow condition of the public equipment in a statistical period can be checked according to the borrowing track.
S107: and counting the borrowing behavior characteristics of the user according to the borrowing track of the public equipment, and sending the borrowing behavior characteristics to a management terminal.
The borrowing behavior characteristics comprise borrowing frequency of a certain user, borrowing frequency of a public equipment model, borrowing average duration and the like. In the embodiment of the invention, the borrowing behavior characteristics of the user are counted according to the borrowing track of the public equipment, and the borrowing behavior characteristics are sent to the management terminal, so that a manager of the management terminal can update the public equipment according to the borrowing behavior characteristics, the user can conveniently borrow the public equipment better, and the utilization rate of the public equipment is improved.
In the embodiment of the invention, when a background server detects an equipment borrowing request sent by public equipment, identity information of a user requesting to borrow the public equipment is acquired, whether the user has the borrowing authority of the public equipment is judged based on the identity information, if the user has the borrowing authority of the public equipment, an unlocking instruction is sent to the public equipment to unlock the public equipment without manually verifying the identity information of the user borrowing the public equipment, if the background server receives an equipment returning request sent by the public equipment, an equipment access instruction is acquired, an equipment locking instruction is sent to the public equipment to lock the public equipment without manually recovering, so that the labor is saved, the borrowing/returning of the public equipment is intelligently and automatically managed, the manual management error can be avoided, and the possibility of management error is reduced, the borrowing/returning traceability of the public equipment is improved, the management efficiency of the public equipment is improved, furthermore, borrowing and returning information of the public equipment in an equipment information base is regularly counted, a borrowing track of the public equipment is generated based on the borrowing and returning information, borrowing behavior characteristics of a user are counted according to the borrowing track of the public equipment, and the borrowing behavior characteristics are sent to a management terminal, so that the public equipment is updated according to the borrowing behavior characteristics of the user, the user experience is enhanced, and meanwhile, the utilization rate of the public equipment is improved.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
Fig. 7 shows a block diagram of a management apparatus of a public device according to an embodiment of the present application, and only shows portions related to the embodiment of the present application for convenience of description.
Referring to fig. 7, the management apparatus of the utility device includes: an identity information obtaining unit 71, a permission judging unit 72, a device unlocking unit 73, and a device locking unit 74, wherein:
an identity information obtaining unit 71, configured to, when the background server detects an equipment borrowing request sent by a public device, obtain identity information of a user requesting to borrow the public device;
an authority judgment unit 72 configured to judge whether the user has a borrowing authority of the common device based on the identity information;
an apparatus unlocking unit 73, configured to send an unlocking instruction to the public apparatus to unlock the public apparatus if the user has the borrowing authority of the public apparatus;
and the device locking unit 74 is configured to, if the background server receives a device return request sent by the public device, acquire a device access instruction, send a device locking instruction to the public device, and lock the public device.
Optionally, the permission judging unit 72 includes:
the information verification module is used for verifying whether the employee information matched with the identity information exists in the employee information base by the background server;
the first permission judging module is used for judging that the user has the borrowing permission of the public equipment if the employee information matched with the identity information exists in the employee information base;
and the second permission judging module is used for judging that the user does not have the borrowing permission of the public equipment if the employee information matched with the identity information does not exist in the employee information base, and sending a borrowing failure prompt to the public equipment.
Optionally, as shown in fig. 7.1, the management apparatus of the public device further includes:
an information counting unit 75 for periodically counting the borrowing and returning information of the public equipment in the equipment information base;
a track generation unit 76 for generating a borrowing track of the common device based on the borrowing and returning information;
and a management updating unit 77, configured to count the borrowing behavior characteristics of the user according to the borrowing trajectory of the public device, and send the borrowing behavior characteristics to the management terminal.
Optionally, the management apparatus of the public device further includes:
a first device information acquiring unit configured to acquire a device identification code of a common device that transmits the device borrowing request;
a first state marking unit, configured to mark the borrowing state of the public device in a device information base as a lending state based on the device identification code if the user has the borrowing authority of the public device;
a second device information acquiring unit configured to acquire a device identification code of the common device that sent the device return request;
a second status marking unit, configured to mark the borrowing status of the public device in the device information base as a returning status based on the device identification code.
Optionally, the management apparatus of the public device further includes:
the device positioning unit is used for acquiring the real-time position of the public device with the borrowing state marked as the lending state;
a location determination unit, configured to monitor whether the common device whose borrowing status is marked as a borrowing status is within a specified borrowing interval based on the real-time location;
and the warning reminding unit is used for sending warning reminding if the real-time position of the public equipment exceeds the appointed borrowing interval.
In the embodiment of the invention, when a background server detects an equipment borrowing request sent by public equipment, identity information of a user requesting to borrow the public equipment is acquired, whether the user has the borrowing authority of the public equipment is judged based on the identity information, if the user has the borrowing authority of the public equipment, an unlocking instruction is sent to the public equipment to unlock the public equipment without manually verifying the identity information of the user borrowing the public equipment, if the background server receives an equipment returning request sent by the public equipment, an equipment access instruction is acquired, an equipment locking instruction is sent to the public equipment to lock the public equipment without manually recovering, so that the labor is saved, the borrowing/returning of the public equipment is intelligently and automatically managed, the manual management error can be avoided, and the possibility of management error is reduced, the borrowing/returning traceability of the public equipment improves the management efficiency of the public equipment and enhances the user experience.
Fig. 8 is a schematic diagram of a server according to an embodiment of the present invention. As shown in fig. 8, the server 8 of this embodiment includes: a processor 80, a memory 81 and a computer program 82 stored in said memory 81 and operable on said processor 80, such as a hypervisor of a utility device. The processor 80, when executing the computer program 82, implements the steps in the above-described embodiments of the management method for each utility device, such as the steps 101 to 104 shown in fig. 1. Alternatively, the processor 80, when executing the computer program 82, implements the functions of the modules/units in the above-described device embodiments, such as the functions of the units 71 to 74 shown in fig. 7.
Illustratively, the computer program 82 may be partitioned into one or more modules/units that are stored in the memory 81 and executed by the processor 80 to implement the present invention. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program 82 in the server 8.
The server 8 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The server may include, but is not limited to, a processor 80, a memory 81. Those skilled in the art will appreciate that fig. 8 is merely an example of a server 8 and does not constitute a limitation of server 8, and may include more or fewer components than shown, or some components in combination, or different components, e.g., the server may also include input-output devices, network access devices, buses, etc.
The Processor 80 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 81 may be an internal storage unit of the server 8, such as a hard disk or a memory of the server 8. The memory 81 may also be an external storage device of the server 8, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) and the like provided on the server 8. Further, the memory 81 may also include both an internal storage unit of the server 8 and an external storage device. The memory 81 is used for storing the computer program and other programs and data required by the server. The memory 81 may also be used to temporarily store data that has been output or is to be output.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (10)

1. A method for managing a utility device, comprising:
when a background server detects an equipment borrowing request sent by public equipment, acquiring identity information of a user requesting to borrow the public equipment;
judging whether the user has the borrowing authority of the public equipment or not based on the identity information;
if the user has the borrowing authority of the public equipment, an unlocking instruction is sent to the public equipment, and the public equipment is unlocked;
and if receiving a device returning request sent by the public device, the background server acquires a device access instruction, sends a device locking instruction to the public device and locks the public device.
2. The method for managing according to claim 1, wherein said determining whether the user has the borrowing authority of the public device based on the identity information comprises:
the background server verifies whether the employee information matched with the identity information exists in an employee information base;
if the employee information matched with the identity information exists in the employee information base, judging that the user has the borrowing authority of the public equipment;
and if the employee information matched with the identity information does not exist in the employee information base, judging that the user does not have the borrowing authority of the public equipment, and sending a borrowing failure prompt to the public equipment.
3. The management method of claim 1, wherein the backend server comprises a device information base, and the management method of the public device further comprises:
acquiring a device identification code of the public device which sends the device borrowing request;
if the user has the borrowing authority of the public equipment, the borrowing state of the public equipment in an equipment information base is marked as a borrowing state on the basis of the equipment identification code;
or,
acquiring the equipment identification code of the public equipment which sends the equipment returning request;
and marking the borrowing state of the public equipment in the equipment information base as a returning state based on the equipment identification code.
4. The method according to claim 3, wherein after the sending an unlock command to the common device to unlock the common device, the method comprises:
acquiring the real-time position of the public equipment with the borrowing state marked as the lending state;
monitoring whether the public equipment with the borrowing state marked as the borrowing state is in a specified borrowing interval or not based on the real-time position;
and if the real-time position of the public equipment exceeds the appointed borrowing interval, sending an alarm prompt.
5. The management method of claim 1, wherein the backend server comprises a device information base, and the management method of the public device further comprises:
periodically counting borrowing and returning information of the public equipment in the equipment information base;
generating a borrowing track of the public equipment based on the borrowing and returning information;
and counting the borrowing behavior characteristics of the user according to the borrowing track of the public equipment, and sending the borrowing behavior characteristics to a management terminal.
6. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of a method for managing a utility device according to any one of claims 1 to 5.
7. A server comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor when executing the computer program implements the steps of:
when a background server detects an equipment borrowing request sent by public equipment, acquiring identity information of a user requesting to borrow the public equipment;
judging whether the user has the borrowing authority of the public equipment or not based on the identity information;
if the user has the borrowing authority of the public equipment, an unlocking instruction is sent to the public equipment, and the public equipment is unlocked;
and if receiving a device returning request sent by the public device, the background server acquires a device access instruction, sends a device locking instruction to the public device and locks the public device.
8. The server according to claim 7, wherein the determining whether the user has the borrowing authority of the public device based on the identity information comprises:
the background server verifies whether the employee information matched with the identity information exists in an employee information base;
if the employee information matched with the identity information exists in the employee information base, judging that the user has the borrowing authority of the public equipment;
and if the employee information matched with the identity information does not exist in the employee information base, judging that the user does not have the borrowing authority of the public equipment, and sending a borrowing failure prompt to the public equipment.
9. The server according to claim 7, wherein the backend server comprises a device information base, and the processor executes the computer program to perform the following steps:
acquiring a device identification code of the public device which sends the device borrowing request;
if the user has the borrowing authority of the public equipment, the borrowing state of the public equipment in an equipment information base is marked as a borrowing state on the basis of the equipment identification code;
or,
acquiring the equipment identification code of the public equipment which sends the equipment returning request;
and marking the borrowing state of the public equipment in the equipment information base as a returning state based on the equipment identification code.
10. The server according to claim 7, wherein the backend server comprises a device information base, and the processor executes the computer program to perform the following steps:
periodically counting borrowing and returning information of the public equipment in the equipment information base;
generating a borrowing track of the public equipment based on the borrowing and returning information;
and counting the borrowing behavior characteristics of the user according to the borrowing track of the public equipment, and sending the borrowing behavior characteristics to a management terminal.
CN201811121815.XA 2018-09-26 2018-09-26 A kind of management method of shared device, storage medium and server Pending CN109359037A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811121815.XA CN109359037A (en) 2018-09-26 2018-09-26 A kind of management method of shared device, storage medium and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811121815.XA CN109359037A (en) 2018-09-26 2018-09-26 A kind of management method of shared device, storage medium and server

Publications (1)

Publication Number Publication Date
CN109359037A true CN109359037A (en) 2019-02-19

Family

ID=65347793

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811121815.XA Pending CN109359037A (en) 2018-09-26 2018-09-26 A kind of management method of shared device, storage medium and server

Country Status (1)

Country Link
CN (1) CN109359037A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110033224A (en) * 2019-04-24 2019-07-19 陕西理工大学 A kind of sports equipment management system
CN111737664A (en) * 2020-05-20 2020-10-02 广州市格利网络技术有限公司 Re-authorization use control method and device of borrowing equipment
CN112102019A (en) * 2019-06-17 2020-12-18 北京车和家信息技术有限公司 Method and device for processing equipment use data, public equipment and cloud server
CN112396767A (en) * 2020-11-17 2021-02-23 东风商用车有限公司 Equipment management system
CN113450520A (en) * 2021-06-22 2021-09-28 平安壹钱包电子商务有限公司 Equipment management method, device, server and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104732329A (en) * 2015-02-06 2015-06-24 网易(杭州)网络有限公司 Device tracking method and system
CN105122267A (en) * 2013-03-15 2015-12-02 苹果公司 Mobile computing device with multiple access modes
CN106846584A (en) * 2017-02-13 2017-06-13 上海量明科技发展有限公司 Shared bicycle and its unlocking method, lockset, terminal and system
CN106898135A (en) * 2017-02-20 2017-06-27 致富电子科技有限公司 The driving regional alarm method and device of shared bicycle
CN107239998A (en) * 2017-06-01 2017-10-10 北京悦畅科技有限公司 The sharing method and device of a kind of parking lot bicycle
CN107240003A (en) * 2017-06-07 2017-10-10 梁超 A kind of shared bicycle method for running and system
CN107358744A (en) * 2017-05-23 2017-11-17 上海与德科技有限公司 Rent method, system, portable power source and bicycle server
CN107516384A (en) * 2017-09-21 2017-12-26 成都宇能通能源开发有限公司 A kind of shared bicycle control system
CN108076213A (en) * 2017-10-30 2018-05-25 努比亚技术有限公司 A kind of terminal based reminding method, terminal and computer readable storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105122267A (en) * 2013-03-15 2015-12-02 苹果公司 Mobile computing device with multiple access modes
CN104732329A (en) * 2015-02-06 2015-06-24 网易(杭州)网络有限公司 Device tracking method and system
CN106846584A (en) * 2017-02-13 2017-06-13 上海量明科技发展有限公司 Shared bicycle and its unlocking method, lockset, terminal and system
CN106898135A (en) * 2017-02-20 2017-06-27 致富电子科技有限公司 The driving regional alarm method and device of shared bicycle
CN107358744A (en) * 2017-05-23 2017-11-17 上海与德科技有限公司 Rent method, system, portable power source and bicycle server
CN107239998A (en) * 2017-06-01 2017-10-10 北京悦畅科技有限公司 The sharing method and device of a kind of parking lot bicycle
CN107240003A (en) * 2017-06-07 2017-10-10 梁超 A kind of shared bicycle method for running and system
CN107516384A (en) * 2017-09-21 2017-12-26 成都宇能通能源开发有限公司 A kind of shared bicycle control system
CN108076213A (en) * 2017-10-30 2018-05-25 努比亚技术有限公司 A kind of terminal based reminding method, terminal and computer readable storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110033224A (en) * 2019-04-24 2019-07-19 陕西理工大学 A kind of sports equipment management system
CN112102019A (en) * 2019-06-17 2020-12-18 北京车和家信息技术有限公司 Method and device for processing equipment use data, public equipment and cloud server
CN111737664A (en) * 2020-05-20 2020-10-02 广州市格利网络技术有限公司 Re-authorization use control method and device of borrowing equipment
CN112396767A (en) * 2020-11-17 2021-02-23 东风商用车有限公司 Equipment management system
CN113450520A (en) * 2021-06-22 2021-09-28 平安壹钱包电子商务有限公司 Equipment management method, device, server and storage medium

Similar Documents

Publication Publication Date Title
CN109359037A (en) A kind of management method of shared device, storage medium and server
CN110838065B (en) Transaction data processing method and device
CN108377241B (en) Monitoring method, device and equipment based on access frequency and computer storage medium
CN108632089B (en) Management method, device and equipment of test terminal and computer storage medium
CN112949798B (en) Laboratory equipment management method and system based on RFID technology
CN110264222A (en) Responsible investigation method, apparatus and terminal device based on data acquisition
CN112905437A (en) Method and device for testing case and storage medium
CN105635066A (en) Management method and device of client application program
CN111353176A (en) Method and system for inquiring block chain data
CN110969723B (en) Data management method, detection device, server, and computer-readable storage medium
CN114462796A (en) System, method and equipment for managing battery full life cycle based on block chain
CN111694852A (en) Data processing method, device, terminal and storage medium based on distributed transaction
CN110288731A (en) Unlocking method and device and electronic door lock
CN112258197A (en) Account management method, device, terminal and storage medium based on artificial intelligence
CN211015753U (en) Face recognition security system based on Internet of things
CN112163009A (en) User side data acquisition method and device, electronic equipment and storage medium
CN107835174B (en) Account book anti-fraud system and method based on Internet of things
CN111739228A (en) Face recognition security system based on Internet of things and operation method
CN113255855B (en) Alarm system, method and terminal for preventing mistaken entering of electrified interval
CN113450520B (en) Equipment management method, device, server and storage medium
CN114331661A (en) Data verification method and device, electronic equipment and storage medium
CN112019346A (en) Method, device and system for authenticating and processing mobile terminal user identity
CN103914644B (en) Data acquisition and processing system and method
KR101326208B1 (en) System for managing company's software and real assets
JP2004015495A5 (en)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination