CN109544176A - Stolen article recovers verification method, device, server and the system of order - Google Patents

Stolen article recovers verification method, device, server and the system of order Download PDF

Info

Publication number
CN109544176A
CN109544176A CN201811251533.1A CN201811251533A CN109544176A CN 109544176 A CN109544176 A CN 109544176A CN 201811251533 A CN201811251533 A CN 201811251533A CN 109544176 A CN109544176 A CN 109544176A
Authority
CN
China
Prior art keywords
article
identification information
recovered
information set
stolen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811251533.1A
Other languages
Chinese (zh)
Other versions
CN109544176B (en
Inventor
肖晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hanhai Information Technology Shanghai Co Ltd
Original Assignee
Beijing Mobai Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Mobai Technology Co Ltd filed Critical Beijing Mobai Technology Co Ltd
Priority to CN201811251533.1A priority Critical patent/CN109544176B/en
Publication of CN109544176A publication Critical patent/CN109544176A/en
Application granted granted Critical
Publication of CN109544176B publication Critical patent/CN109544176B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0639Item locations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The invention discloses verification method, device, server and systems that a kind of stolen article recovers order, wherein this method comprises: recovering the notice of order in response to completing stolen article, article has been recovered in acquisition;The first article identification information set that article reports has been recovered in acquisition, wherein, the article of having recovered is provided with nfc apparatus, and the first article identification information set is being collected with server disconnection communication period by the nfc apparatus by the article of having recovered;Obtain the second article identification information set being made of the article identification information of stolen article;Detect the quantity of identical items identification information present in the first article identification information set and the second article identification information set;In the case where the quantity of the identical items identification information is more than preset quantity, the behavior for marking the stolen article of completion to recover order is ineffective act.

Description

Stolen article recovers verification method, device, server and the system of order
Technical field
The present invention relates to Internet technical field, more particularly, to a kind of stolen article recover order verification method, A kind of verifying device, a kind of server and a kind of stolen article that stolen article recovers order recovers the verifying system of order.
Background technique
Currently, more and more different types of sharing articles pour in people's lives, for example, shared bicycle, shared automobile, Shared umbrella etc..
As the market injected volume of sharing articles is increasing, operation becomes one under the line of each sharing articles company Important link.
Operation not only includes the scheduling of article under line, further includes that the collection of failure article, stolen article are recovered Deng.Under these lines in operation, the difficulty of stolen article recovered is bigger, so that the report recovered based on stolen article It fulfills higher.
Since the remuneration of stolen article recovered is higher, so that operation personnel artificially manufactures stolen behavior, example under certain lines Such as, a collection of sharing articles are deliberately hidden to the place bad into signal of communication, so that this batch of sharing articles are in longer period of time It cannot be communicated with background server, so that this batch of sharing articles are labeled as stolen article by background server, later Operation personnel again moves out this batch of sharing articles in batches or disposably under line, the illusion for causing stolen article to recover, so as to To obtain higher remuneration.
Therefore it provides a kind of stolen article recovers the verification method of order, have become operation management under sharing articles line Urgent need.
Summary of the invention
It is an object of the present invention to provide a kind of new technical solutions verified stolen article and recover behavior.
According to the first aspect of the invention, the verification method that a kind of stolen article recovers order is provided, comprising:
The notice of order is recovered in response to completing stolen article, article has been recovered in acquisition;
The first article identification information set that article reports has been recovered in acquisition, wherein the article of having recovered is provided with closely Range communication device, the first article identification information set by it is described recovered article with server disconnect communication period lead to The nfc apparatus is crossed to collect;
Obtain the second article identification information set being made of the article identification information of stolen article;
Detect the first article identification information set and phase jljl present in the second article identification information set The quantity of product identification information;
In the case where the quantity of the identical items identification information is more than preset quantity, the stolen article of completion is marked The behavior for recovering order is ineffective act.
Optionally, described acquisition the step of having recovered the first article identification information set that article reports, includes:
To it is described recovered that article issues the first article identification information set report instruction;
The first article identification information set that article reports instruction to report according to has been recovered described in obtaining.
Optionally, described acquisition the step of having recovered the first article identification information set that article reports, includes:
Obtain the article identification information set for having recovered the last acquisition that article reports;
Judge the last acquisition article identification information set whether be it is described recovered article with server Communication period acquisition is disconnected, judging result is obtained;
It is the article of having recovered logical with server disconnection in the article identification information set of the last acquisition In the case where being acquired during letter, using the article identification information of the last acquisition as the first article identification information collection It closes.
Optionally, the method also includes:
It is that the article of having recovered is restoring logical with server in the article identification information set of the last acquisition In the case where acquiring after letter, what Xiang Suoshu had recovered that article issues the first article identification information set reports instruction;
The first article identification information set that article reports instruction to report according to has been recovered described in obtaining.
Optionally, the article identification information set of the last acquisition includes generating the time, wherein
The article identification information set for judging the last acquisition whether be it is described recovered article with clothes Device of being engaged in disconnects communication period acquisition, and the step of obtaining judging result includes:
Obtain the deadline that the stolen article recovers order;
The deadline of order and the article identification information collection of the last acquisition are recovered according to the stolen article The generation time of conjunction judges whether the article identification information set is that the article of having recovered disconnects communication period with server Between acquire, obtain judging result.
Optionally, described the step of obtaining the second article identification information set being made of stolen article, includes:
The current location information that article reports and the position that all stolen article last times report have been recovered described in obtaining Confidence breath;
The location information that reports according to stolen article last time and the current location information that article reports is recovered, determination Each stolen article and the distance value for having recovered article;
The article identification information that the distance value is less than the corresponding stolen article of pre-determined distance value is obtained, and generates described the Two article identification information set.
Optionally, the method also includes:
It completes stolen article to recover the behavior of order to be the verification result of ineffective act according to described, be provided to operation personnel Penalty value.
According to the second aspect of the invention, the verifying device that a kind of stolen article recovers order is provided, comprising:
First obtains module, and for recovering the notice of order in response to completing stolen article, article has been recovered in acquisition;
Second obtain module, for obtaining the first article identification information set having recovered article and having reported, wherein it is described Recover article and be provided with nfc apparatus, the first article identification information set by it is described recovered article with service Device disconnects communication period and is collected by the nfc apparatus;
Second obtains module, is also used to obtain the second article identification information being made of the article identification information of stolen article Set;
Detection module, for detecting in the first article identification information set and the second article identification information set The quantity of existing identical items identification information;
Mark module, for marking institute in the case where the quantity of the identical items identification information is more than preset quantity Stating and completing the behavior that stolen article recovers order is ineffective act.
According to the third aspect of the invention we, the verifying device that a kind of stolen article recovers order, including memory are provided And processor, for storing instruction, described instruction is operated for controlling the processor to execute basis the memory Method described in any one of first aspect.
According to the fourth aspect of the invention, a kind of server is provided, including mistake described in second aspect or the third aspect Surreptitiously article recovers the verifying device of order.
According to the fifth aspect of the invention, the verifying system that a kind of stolen article recovers order is provided, which is characterized in that Including server, terminal device described in fourth aspect and article is recovered.
According to one embodiment of present invention, after stolen article recovers order completion, acquisition has been recovered article and has been reported The first article identification information set, and the second article identification information collection being made of the article identification information of stolen article It closes, wherein the first article identification information set is to disconnect communication period by closely leading to server by having recovered article T unit collects, identical items present in the first article identification information set of detection and the second article identification information set The quantity of identification information, according to the quantity of identical items identification information can verify stolen article recover order behavior it is effective Property, it can identify that operation personnel recovers the illusion of the stolen article artificially manufactured, reduce the loss of operation platform.
By referring to the drawings to the detailed description of exemplary embodiment of the present invention, other feature of the invention and its Advantage will become apparent.
Detailed description of the invention
It is combined in the description and the attached drawing for constituting part of specification shows the embodiment of the present invention, and even With its explanation together principle for explaining the present invention.
Fig. 1 is the schematic diagram for the verifying system that stolen article according to an embodiment of the present invention recovers order.
Fig. 2 is the hardware configuration for the verifying device 1100 that stolen article according to an embodiment of the present invention recovers order.
Fig. 3 is the flow diagram for the verification method that stolen article according to an embodiment of the present invention recovers order.
Fig. 4 is the flow diagram for the verification method that stolen article according to another embodiment of the present invention recovers order.
Fig. 5 is the functional block diagram for the verifying device that stolen article according to an embodiment of the present invention recovers order.
Specific embodiment
Carry out the various exemplary embodiments of detailed description of the present invention now with reference to attached drawing.It should also be noted that unless in addition having Body explanation, the unlimited system of component and the positioned opposite of step, numerical expression and the numerical value otherwise illustrated in these embodiments is originally The range of invention.
Be to the description only actually of at least one exemplary embodiment below it is illustrative, never as to the present invention And its application or any restrictions used.
Technology, method and apparatus known to person of ordinary skill in the relevant may be not discussed in detail, but suitable In the case of, the technology, method and apparatus should be considered as part of specification.
It is shown here and discuss all examples in, any occurrence should be construed as merely illustratively, without It is as limitation.Therefore, other examples of exemplary embodiment can have different values.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, then in subsequent attached drawing does not need that it is further discussed.
<overall architecture that stolen article recovers the verifying system of order>
Fig. 1 is the schematic diagram for the verifying system that stolen article according to an embodiment of the present invention recovers order.
Stolen article recovers the verifying system 100 of order and includes server 1000, terminal device 2000 and recovered object Product 3000.
Server 1000 is provided with the verifying device 1100 that stolen article according to an embodiment of the present invention recovers order.
The stolen article generated based on the operation that operation personnel triggers is recovered order and reports to service by terminal device 2000 Device 1000.
The verifying device 1100 that stolen article recovers order recovers the notice of order in response to completing stolen article, obtains Article is recovered, obtains recovered the first article identification information set that article reports later, and the article mark by stolen article Know information composition the second article identification information set, wherein the first article identification information set be by recovered article with Server disconnects communication period and is collected by nfc apparatus, the first article identification information set of detection and the second object The quantity of identical items identification information present in product identification information set is lost according to the quantity validation of identical items identification information Surreptitiously article recovers the validity of the behavior of order.
Article 3000 shown in fig. 1 of having recovered is shared bicycle.Having recovered article 3000 can also be shared vehicle using motor, is total to Enjoy automobile, shared umbrella, any in shared mobile power source.
Fig. 2 is the hardware configuration for the verifying device 1100 that stolen article according to an embodiment of the present invention recovers order.
According to Fig.2, it may include one that the stolen article of the embodiment of the present invention, which recovers the verifying device 1100 of order, Or multiple processors 1110, one or more memory 1120.
In embodiments of the present invention, for storing instruction, which carries out memory 1120 for control processor 1110 Operation is to execute the verification method that stolen article according to an embodiment of the present invention recovers order.Technical staff can be according to the present invention Disclosed conceptual design instruction.How control processor is operated for instruction, this is it is known in the art that therefore no longer retouching in detail herein It states.
Processor 1100 can be central processing unit, microprocessor (MCU) etc..
Memory 1120 for example including ROM (read-only memory), RAM (random access memory), such as hard disk it is non-easily The property lost memory etc..
Realize the wireless network communicated to connect between server 1000 and terminal device 2000, with realize server 1000 with Having recovered the wireless network communicated to connect between article 3000 can be consolidated network, be also possible to heterogeneous networks.
The wireless network 4000 covers any suitable wireless network, such as, but not limited to 4G network, 3G network, GSM, GPRS, WLAN etc..
<method>
Fig. 3 is the flow diagram for the verification method that stolen article according to an embodiment of the present invention recovers order.
According to Fig.3, the method for the embodiment of the present invention may include steps of:
Step S3100, the notice of order is recovered in response to completing stolen article, and article has been recovered in acquisition.
In the embodiment of the present invention, the current time that is recorded from the time of article last time reporting position information to server Difference when being more than preset threshold, which can be stolen article by server, and locally save the stolen article Article identification information.
In one embodiment of the invention, terminal device is generated stolen article in the operation triggered based on operation personnel and sought After returning order, the stolen article is sent to server and recovers order.Stolen article recovers the article mark that order includes stolen article Know information.
In one example, the article identification information of stolen article can be operation personnel and scan stolen article by terminal On two dimensional code obtain.
In another example, the article identification information of stolen article can be operation personnel for the coding on stolen article It is input to and obtains after terminal device.
In the embodiment of the present invention, after the completion of stolen article recovers order, server and stolen article are recovered in order Communication recovery between stolen article.
The first article identification information set that article reports has been recovered in step S3200, acquisition, wherein has been recovered article and has been set It is equipped with nfc apparatus, the first article identification information set is passed through by having recovered article with server disconnection communication period Nfc apparatus collects.
In the embodiment of the present invention, it is logical that nfc apparatus can be Bluetooth communication device, NFC communication device, ZigBee It is any in T unit.
By taking Bluetooth communication device as an example, the Bluetooth communication device of any article can periodically execute a bluetooth scanning behaviour Make, which can acquire the article identification information of its surrounding articles, and locally save the article acquired by it The set of identification information composition.For example, the Bluetooth communication device of any article can periodically carry out Bluetooth broadcast, the Bluetooth broadcast The data of broadcast include the article identification information of article itself, other articles scan the article of the available article by bluetooth Identification information.
In the embodiment of the present invention, any article can save the article identification information that its nearest multi collect obtains in local Set.Alternatively, any article can locally save its article identification information set collected each time.
In one embodiment of the invention, after the completion of stolen article recovers order, server is to having recovered under article That sends out the first article identification information set reports instruction.It has recovered article and has reported instruction to report the first article to server according to this Identification information set.
For example, each the article identification information set for having recovered article preservation includes the generation of article identification information set Time.Server includes the deadline that stolen article recovers order to the instruction that reports that article issues has been recovered.Object is recovered Product recover deadline and each article identification information set of order according to stolen article after receiving this and reporting instruction The generation time, search its and disconnect the article identification information set that communication period last time collects with server, and will Its article identification information set found out reports to server as the first article identification information set.
In one embodiment of the invention, any article can periodically report the object of its last time acquisition to server Product identification information set.Article has been recovered after the communication recovery with server, it can be by the article mark of its last time acquisition Know information aggregate and reports to server.
Article identification information set due to having recovered the acquisition of article the last time may be that it is communicated with server disconnection The article identification information set of period acquisition, it is also possible to which it restores the article identification information collection acquired after communicating with server It closes, server judges the last time after obtaining the article identification information set for having recovered the last acquisition that article reports Whether the article identification information set of acquisition is to have recovered article to acquire with server disconnection communication period, obtains judgement knot Fruit.
For example, the article identification information set for having recovered the last acquisition that article reports includes generating the time.Service Device obtains the deadline that stolen article recovers order, and when according to the generation of the article identification information set of the last time acquisition Between and stolen article recover deadline of order, judge whether the article identification information set of the last acquisition is to have recovered Article disconnects communication period acquisition with server.
If the generation time of the article identification information set of the last time acquisition recovers the complete of order earlier than stolen article When at the time, it can determine that the article identification information set of the last acquisition is to have recovered article to communicate with server disconnection Period acquisition.
If the generation time of the article identification information set of the last time acquisition not recovers order earlier than stolen article Deadline when, can determine that the article identification information set of the last acquisition is to have recovered article to restore with server The article identification information set acquired after communication.
It is to have recovered article to adopt with server disconnection communication period in the article identification information set of the last time acquisition In the case where collection, using the article identification information of the last time acquisition as the first article identification information set.
It is the feelings having recovered article and having been acquired after restoring to communicate with server in the article identification information of the last time acquisition Under condition, instruction is reported to recovered that article issues the first article identification information set.
For example, server includes the deadline that stolen article recovers order to the instruction that reports that article issues has been recovered. Article has been recovered after receiving this and reporting instruction, according to stolen article recover order deadline and its save each The generation time of article identification information set searches it with server and disconnects the article mark that communication period last time collects Know information aggregate, and the article identification information set found out reports to service as the first article identification information set Device.
Step S3300 obtains the second article identification information set being made of the article identification information of stolen article.
In one embodiment of the invention, the second article identification information set can be being lost by server record Surreptitiously the article identification information of article forms.
If the second article identification information set is by the article identification information group of all stolen articles of server record Cheng Shi, for server when executing step S3400, calculation amount is larger, affects the verification efficiency that stolen article recovers order.
In order to solve this technical problem, in one embodiment of the invention, server is from all stolen articles, choosing Take stolen article around the current location recovered after the communication recovery of article and server.For example, server obtains Recover the current location information that article reports and the location information that all stolen article last times report.Server according to The location information and recovered the location information that article reports that stolen article last time reports, determine each stolen article and have sought Return the distance value of article.Server obtains the article identification information that distance value is less than the corresponding stolen article of pre-determined distance value, and Generate the second article identification information set.
Step S3400, the first article identification information set of detection are identical as present in the second article identification information set The quantity of article identification information.
Step S3500, in the case where the quantity of identical items identification information is more than preset quantity, label completes pilferage The behavior that product recover order is ineffective act.
In the embodiment of the present invention, in the case where the quantity of identical items identification information is more than preset quantity, it can determine Recovered article be it is artificial caused by it is stolen, and then server-tag is ineffective act at the behavior that stolen article recovers order.
It in one embodiment of the invention, is the verifying of ineffective act according to the behavior that the stolen article of completion recovers order As a result, server, which issues and configure corresponding terminal device to the corresponding account of operation personnel, shows penalty value.
According to one embodiment of present invention, after stolen article recovers order completion, acquisition has been recovered article and has been reported The first article identification information set, and the second article identification information collection being made of the article identification information of stolen article It closes, wherein the first article identification information set is to disconnect communication period by closely leading to server by having recovered article T unit collects, identical items present in the first article identification information set of detection and the second article identification information set The quantity of identification information, according to the quantity of identical items identification information can verify stolen article recover order behavior it is effective Property, it can identify that operation personnel recovers the illusion of the stolen article artificially manufactured, reduce the loss of operation platform.
<example>
Fig. 4 is the flow diagram for the verification method that stolen article according to another embodiment of the present invention recovers order.
According to Fig.4, the method for the embodiment of the present invention may include steps of:
Step S4010, server recover the notice of order in response to completing stolen article, and article has been recovered in acquisition.
Step S4020, server report instruction to recovered that article issues the first article identification information set.
Step S4030, server acquisition have recovered article according to the first article identification information collection for reporting instruction to report It closes.
Step S4040, the current location information that article reports has been recovered in server acquisition and all stolen articles are last The location information once reported.
Step S4050, the location information and recovered what article reported that server is reported according to stolen article last time Location information determines each stolen article and has recovered the distance value of article.
Step S4060, server obtain the article identification information that distance value is less than the corresponding stolen article of pre-determined distance value, And generate the second article identification information set.
Step S4070, the first article identification information set of detection are identical as present in the second article identification information set The quantity of article identification information.
Step S4080 judges whether the quantity of identical items identification information is more than preset quantity.
In the case where the quantity of identical items identification information is more than preset quantity, executes step S4090 label and complete to lose It is ineffective act that surreptitiously article, which recovers the behavior of order,.
In the case where the quantity of identical items identification information is less than preset quantity, executes step S4100 label and complete The behavior that stolen article recovers order is vaild act.
<device>
Fig. 5 is the functional block diagram for the verifying device that stolen article according to an embodiment of the present invention recovers order.
According to Fig.5, it includes the first acquisition mould that the stolen article of this embodiment of the invention, which recovers the verifying device of order, Block 5100, second obtains module 5200, detection module 5300 and label 5400.
First acquisition module 5100 is used to recover the notice of order in response to completing stolen article, and article has been recovered in acquisition.
Second acquisition module 5200 has recovered the first article identification information set that article reports for obtaining, wherein It recovers article and is provided with nfc apparatus, the first article identification information set is by having recovered article logical with server disconnection It is collected during letter by nfc apparatus.
Second acquisition module 5200 is also used to obtain the second article mark being made of the article identification information of stolen article Information aggregate.
Detection module 5300 exists for detecting in the first article identification information set and the second article identification information set Identical items identification information quantity.
Mark module 5400 is used in the case where the quantity of identical items identification information is more than preset quantity, and label is completed The behavior that stolen article recovers order is ineffective act.
In an example of the invention, the second acquisition module 5200 can be further used for issuing the to having recovered article One article identification information set reports instruction;Acquisition has recovered article according to the first article identification information for reporting instruction to report Set.
In an example of the invention, the second acquisition module 5200, which can be further used for obtaining, have been recovered article and has reported The last acquisition article identification information set;Whether the article identification information set for judging the last acquisition is to have sought It returns article and disconnects communication period acquisition with server, obtain judging result;In the article identification information of the last time acquisition Set is to have recovered article in the case where disconnecting communication period acquisition with server, and the article mark of the last time acquisition is believed Breath is used as the first article identification information set.
In this example embodiment, the second acquisition module 5200 is further used for the article identification information set in the last time acquisition It is to have recovered article in the case where acquiring after communicating with server recovery, issues the first article identification information to article has been recovered Set reports instruction;Acquisition has recovered article according to the first article identification information set for reporting instruction to report.
In this example embodiment, the article identification information set of the last acquisition includes generating the time.Second obtains module 5200 are further used for obtaining the deadline that stolen article recovers order;According to stolen article recover order deadline and The generation time of the article identification information set of the last time acquisition, judge whether article identification information set is to have recovered article Communication period acquisition is disconnected with server, is obtaining judging result.
In an example of the invention, the second acquisition module 5200 is further used for obtaining working as of having recovered that article reports The location information that front position information and all stolen article last times report;It is reported according to stolen article last time Location information and the current location information that article reports is recovered, determine each stolen article and has recovered the distance value of article;It obtains It takes distance value to be less than the article identification information of the corresponding stolen article of pre-determined distance value, and generates the second article identification information collection It closes.
In an example of the invention, stolen article recovers the verifying device of order further include: penalty value output module. The penalty value output module is used to according to the behavior that the stolen article of completion recovers order be the verification result of ineffective act, Xiang Yunying Personnel provide penalty value.
The present invention can be system, method and/or computer program product.Computer program product may include computer Readable storage medium storing program for executing, containing for making processor realize the computer-readable program instructions of various aspects of the invention.
Computer readable storage medium, which can be, can keep and store the tangible of the instruction used by instruction execution equipment Equipment.Computer readable storage medium for example can be-- but it is not limited to-- storage device electric, magnetic storage apparatus, optical storage Equipment, electric magnetic storage apparatus, semiconductor memory apparatus or above-mentioned any appropriate combination.Computer readable storage medium More specific example (non exhaustive list) includes: portable computer diskette, hard disk, random access memory (RAM), read-only deposits It is reservoir (ROM), erasable programmable read only memory (EPROM or flash memory), static random access memory (SRAM), portable Compact disk read-only memory (CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanical coding equipment, for example thereon It is stored with punch card or groove internal projection structure and the above-mentioned any appropriate combination of instruction.Calculating used herein above Machine readable storage medium storing program for executing is not interpreted that instantaneous signal itself, the electromagnetic wave of such as radio wave or other Free propagations lead to It crosses the electromagnetic wave (for example, the light pulse for passing through fiber optic cables) of waveguide or the propagation of other transmission mediums or is transmitted by electric wire Electric signal.
Computer-readable program instructions as described herein can be downloaded to from computer readable storage medium it is each calculate/ Processing equipment, or outer computer or outer is downloaded to by network, such as internet, local area network, wide area network and/or wireless network Portion stores equipment.Network may include copper transmission cable, optical fiber transmission, wireless transmission, router, firewall, interchanger, gateway Computer and/or Edge Server.Adapter or network interface in each calculating/processing equipment are received from network to be counted Calculation machine readable program instructions, and the computer-readable program instructions are forwarded, for the meter being stored in each calculating/processing equipment In calculation machine readable storage medium storing program for executing.
Computer program instructions for executing operation of the present invention can be assembly instruction, instruction set architecture (ISA) instructs, Machine instruction, machine-dependent instructions, microcode, firmware instructions, condition setup data or with one or more programming languages The source code or object code that any combination is write, the programming language include the programming language-of object-oriented such as Smalltalk, C++ etc., and conventional procedural programming languages-such as " C " language or similar programming language.Computer Readable program instructions can be executed fully on the user computer, partly execute on the user computer, be only as one Vertical software package executes, part executes on the remote computer or completely in remote computer on the user computer for part Or it is executed on server.In situations involving remote computers, remote computer can pass through network-packet of any kind It includes local area network (LAN) or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as benefit It is connected with ISP by internet).In some embodiments, by utilizing computer-readable program instructions Status information carry out personalized customization electronic circuit, such as programmable logic circuit, field programmable gate array (FPGA) or can Programmed logic array (PLA) (PLA), the electronic circuit can execute computer-readable program instructions, to realize each side of the invention Face.
Referring herein to according to the method for the embodiment of the present invention, the flow chart of device (system) and computer program product and/ Or block diagram describes various aspects of the invention.It should be appreciated that flowchart and or block diagram each box and flow chart and/ Or in block diagram each box combination, can be realized by computer-readable program instructions.
These computer-readable program instructions can be supplied to general purpose computer, special purpose computer or other programmable datas The processor of processing unit, so that a kind of machine is produced, so that these instructions are passing through computer or other programmable datas When the processor of processing unit executes, function specified in one or more boxes in implementation flow chart and/or block diagram is produced The device of energy/movement.These computer-readable program instructions can also be stored in a computer-readable storage medium, these refer to It enables so that computer, programmable data processing unit and/or other equipment work in a specific way, thus, it is stored with instruction Computer-readable medium then includes a manufacture comprising in one or more boxes in implementation flow chart and/or block diagram The instruction of the various aspects of defined function action.
Computer-readable program instructions can also be loaded into computer, other programmable data processing units or other In equipment, so that series of operation steps are executed in computer, other programmable data processing units or other equipment, to produce Raw computer implemented process, so that executed in computer, other programmable data processing units or other equipment Instruct function action specified in one or more boxes in implementation flow chart and/or block diagram.
The flow chart and block diagram in the drawings show the system of multiple embodiments according to the present invention, method and computer journeys The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation One module of table, program segment or a part of instruction, the module, program segment or a part of instruction include one or more use The executable instruction of the logic function as defined in realizing.In some implementations as replacements, function marked in the box It can occur in a different order than that indicated in the drawings.For example, two continuous boxes can actually be held substantially in parallel Row, they can also be executed in the opposite order sometimes, and this depends on the function involved.It is also noted that block diagram and/or The combination of each box in flow chart and the box in block diagram and or flow chart, can the function as defined in executing or dynamic The dedicated hardware based system made is realized, or can be realized using a combination of dedicated hardware and computer instructions.It is right For those skilled in the art it is well known that, by hardware mode realize, by software mode realize and pass through software and It is all of equal value that the mode of combination of hardware, which is realized,.
Various embodiments of the present invention are described above, above description is exemplary, and non-exclusive, and It is not limited to disclosed each embodiment.Without departing from the scope and spirit of illustrated each embodiment, for this skill Many modifications and changes are obvious for the those of ordinary skill in art field.The selection of term used herein, purport In principle, the practical application or to the technological improvement in market for best explaining each embodiment, or make the art its Its those of ordinary skill can understand each embodiment disclosed herein.The scope of the present invention is defined by the appended claims.

Claims (11)

1. the verification method that a kind of stolen article recovers order characterized by comprising
The notice of order is recovered in response to completing stolen article, article has been recovered in acquisition;
The first article identification information set that article reports has been recovered in acquisition, wherein the article of having recovered is provided with closely Communication device, the first article identification information set are passing through institute with server disconnection communication period by the article of having recovered Nfc apparatus is stated to collect;
Obtain the second article identification information set being made of the article identification information of stolen article;
Detect identical items mark present in the first article identification information set and the second article identification information set Know the quantity of information;
In the case where the quantity of the identical items identification information is more than preset quantity, the stolen article of completion is marked to recover The behavior of order is ineffective act.
2. the method according to claim 1, wherein the first article mark that article reports has been recovered in the acquisition The step of information aggregate includes:
To it is described recovered that article issues the first article identification information set report instruction;
The first article identification information set that article reports instruction to report according to has been recovered described in obtaining.
3. the method according to claim 1, wherein the first article mark that article reports has been recovered in the acquisition The step of information aggregate includes:
Obtain the article identification information set for having recovered the last acquisition that article reports;
Whether the article identification information set for judging the last acquisition is described to have recovered article and disconnect with server Communication period acquisition, obtain judging result;
It is that the article of having recovered disconnects communication period with server in the article identification information set of the last acquisition Between acquire in the case where, using the article identification information of the last acquisition as the first article identification information set.
4. according to the method described in claim 3, it is characterized in that, the method also includes:
It is the article of having recovered after being communicated with server recovery in the article identification information set of the last acquisition In the case where acquisition, what Xiang Suoshu had recovered that article issues the first article identification information set reports instruction;
The first article identification information set that article reports instruction to report according to has been recovered described in obtaining.
5. the method according to claim 3 or 4, which is characterized in that the article identification information collection of the last acquisition Close includes generating the time, wherein
The article identification information set for judging the last acquisition whether be it is described recovered article with server Communication period acquisition is disconnected, the step of obtaining judging result includes:
Obtain the deadline that the stolen article recovers order;
The deadline of order and the article identification information set of the last acquisition are recovered according to the stolen article The time is generated, judges whether the article identification information set is that the article of having recovered is adopted with server disconnection communication period Collection, obtain judging result.
6. method according to any one of claims 1-4, which is characterized in that described to obtain second be made of stolen article The step of article identification information set includes:
The current location information that article reports and the position letter that all stolen article last times report have been recovered described in obtaining Breath;
The location information that reports according to stolen article last time and the current location information that article reports is recovered, has determined each mistake Surreptitiously article and the distance value for having recovered article;
The article identification information that the distance value is less than the corresponding stolen article of pre-determined distance value is obtained, and generates second object Product identification information set.
7. the method according to claim 1, wherein the method also includes:
It completes stolen article to recover the behavior of order to be the verification result of ineffective act according to described, provides punishment to operation personnel Value.
8. the verifying device that a kind of stolen article recovers order characterized by comprising
First obtains module, and for recovering the notice of order in response to completing stolen article, article has been recovered in acquisition;
Second obtains module, for obtaining the first article identification information set having recovered article and having reported, wherein described to have recovered Article is provided with nfc apparatus, and the first article identification information set has been recovered article and broken with server by described Communication period is opened to collect by the nfc apparatus;
Second obtains module, is also used to obtain the second article identification information collection being made of the article identification information of stolen article It closes;
Detection module exists for detecting in the first article identification information set and the second article identification information set Identical items identification information quantity;
Mark module, for marking described complete in the case where the quantity of the identical items identification information is more than preset quantity It is ineffective act at the behavior that stolen article recovers order.
9. the verifying device that a kind of stolen article recovers order, which is characterized in that including memory and processor, the memory For storing instruction, described instruction is operated for controlling the processor to execute according to claim 1 any one of -7 The method.
10. a kind of server, which is characterized in that recover the verifying dress of order including stolen article described in claim 8 or 9 It sets.
11. the verifying system that a kind of stolen article recovers order, which is characterized in that including server described in any one of claim 10, Terminal device and article is recovered.
CN201811251533.1A 2018-10-25 2018-10-25 Verification method, device, server and system for stolen article retrieval order Active CN109544176B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811251533.1A CN109544176B (en) 2018-10-25 2018-10-25 Verification method, device, server and system for stolen article retrieval order

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811251533.1A CN109544176B (en) 2018-10-25 2018-10-25 Verification method, device, server and system for stolen article retrieval order

Publications (2)

Publication Number Publication Date
CN109544176A true CN109544176A (en) 2019-03-29
CN109544176B CN109544176B (en) 2021-07-06

Family

ID=65845489

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811251533.1A Active CN109544176B (en) 2018-10-25 2018-10-25 Verification method, device, server and system for stolen article retrieval order

Country Status (1)

Country Link
CN (1) CN109544176B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116156231A (en) * 2023-02-27 2023-05-23 广东长虹电子有限公司 Method and system capable of automatically checking whether local machine is stolen or not

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20170024615A (en) * 2015-07-15 2017-03-08 고영은 Reservation method, and system of parking space for implementation of sharing economy
CN107122831A (en) * 2017-03-22 2017-09-01 华南理工大学 A kind of bicycle comprehensive service platform towards college student
CN107195108A (en) * 2017-04-27 2017-09-22 安徽四创电子股份有限公司 Share bicycle intelligent terminal supervisory systems and its monitoring and managing method in a kind of city
CN107343022A (en) * 2017-05-24 2017-11-10 上海与德科技有限公司 Find method, terminal and the server of shared bicycle
CN107380305A (en) * 2017-07-27 2017-11-24 上海传英信息技术有限公司 A kind of anti-theft method for bicycle and theft-proof device for bicycle based on smart machine
CN107798781A (en) * 2017-09-20 2018-03-13 广东东为信息技术有限公司 A kind of shared bicycle management system and method based on community cloud monitoring system
CN107869994A (en) * 2017-10-11 2018-04-03 上海网罗电子科技有限公司 A kind of shared bicycle car searching method and system based on inertial navigation
CN108134840A (en) * 2017-12-29 2018-06-08 刘桂兰 A kind of sharing articles hunting system and method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20170024615A (en) * 2015-07-15 2017-03-08 고영은 Reservation method, and system of parking space for implementation of sharing economy
CN107122831A (en) * 2017-03-22 2017-09-01 华南理工大学 A kind of bicycle comprehensive service platform towards college student
CN107195108A (en) * 2017-04-27 2017-09-22 安徽四创电子股份有限公司 Share bicycle intelligent terminal supervisory systems and its monitoring and managing method in a kind of city
CN107343022A (en) * 2017-05-24 2017-11-10 上海与德科技有限公司 Find method, terminal and the server of shared bicycle
CN107380305A (en) * 2017-07-27 2017-11-24 上海传英信息技术有限公司 A kind of anti-theft method for bicycle and theft-proof device for bicycle based on smart machine
CN107798781A (en) * 2017-09-20 2018-03-13 广东东为信息技术有限公司 A kind of shared bicycle management system and method based on community cloud monitoring system
CN107869994A (en) * 2017-10-11 2018-04-03 上海网罗电子科技有限公司 A kind of shared bicycle car searching method and system based on inertial navigation
CN108134840A (en) * 2017-12-29 2018-06-08 刘桂兰 A kind of sharing articles hunting system and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116156231A (en) * 2023-02-27 2023-05-23 广东长虹电子有限公司 Method and system capable of automatically checking whether local machine is stolen or not
CN116156231B (en) * 2023-02-27 2024-05-17 广东长虹电子有限公司 Method and system capable of automatically checking whether local machine is stolen or not

Also Published As

Publication number Publication date
CN109544176B (en) 2021-07-06

Similar Documents

Publication Publication Date Title
CN106104555B (en) For protecting the behavioural analysis of peripheral equipment
CN104301896B (en) Swindle short message intelligent monitoring warning system and method
CN104170323B (en) Fault handling method and device, system based on network function virtualization
CN110400404A (en) Control method for vehicle, vehicle and Vehicular system
CN103581209B (en) Family&#39;s electricity consumption monitoring system
CN108156231A (en) The fault car and method of server communication, vehicle and server
CN109685515A (en) Personal identification method, device and server based on dynamic cascode grid management
CN107403483A (en) Intelligent automobile key system and its control method
CN108537422A (en) Security risk early warning system and method
CN107172195B (en) Method, device and system for monitoring faults of shared articles
CN102867347B (en) RFID wireless interconnected security control Intelligent door lock administration system
CN104537774A (en) Intelligent storing compartment system and object storage application method
CN109544176A (en) Stolen article recovers verification method, device, server and the system of order
CN109559218A (en) A kind of determination method, apparatus traded extremely and storage medium
CN109146386A (en) Control method, device and the electronic equipment of shopping cart
CN105894237A (en) Intelligent distributing and recycling management method with functions of voice guide and face recognition
CN105894270A (en) Payment method and device
CN111369280A (en) Abnormal account identification method and device and electronic equipment
CN106557930A (en) A kind of banking equipment based on identification code reports cut-in method and system for repairment
CN107889213B (en) Article localization method, device and server
CN103067263B (en) Instant messaging triggers method and the system of induction
CN107665428A (en) Mobile payment identity identifying method, server and system
CN103942675B (en) A kind of information processing method and electronic equipment
CN109687592A (en) Substation information display control method, device and electronic equipment
CN202720704U (en) Radio frequency identification device (RFID) wireless interconnection security control intelligent terminal management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20201218

Address after: Room 168, building 6, 741 Hangzhou Road, Yangpu District, Shanghai 200090

Applicant after: HANHAI INFORMATION TECHNOLOGY SHANGHAI Co.,Ltd.

Address before: Room Bnan 1231, 2 bungalows, No. 5 Road, College, Haidian District, Beijing, 100191

Applicant before: BEIJING MOBIKE TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
CP02 Change in the address of a patent holder

Address after: 200090 Room 102, block D2 (Building 8), No. 221, Huangxing Road, Yangpu District, Shanghai

Patentee after: HANHAI INFORMATION TECHNOLOGY SHANGHAI Co.,Ltd.

Address before: Room 168, building 6, 741 Hangzhou Road, Yangpu District, Shanghai 200090

Patentee before: HANHAI INFORMATION TECHNOLOGY SHANGHAI Co.,Ltd.

CP02 Change in the address of a patent holder