Disclosure of Invention
One object of the present invention is to provide a new technical solution for verifying the retrieval of stolen articles.
According to a first aspect of the present invention, there is provided a method of verifying a stolen article retrieval order, comprising:
acquiring the retrieved item in response to the notification of completing the stolen item retrieval order;
acquiring a first article identification information set reported by a retrieved article, wherein the retrieved article is provided with a near field communication device, and the first article identification information set is acquired by the near field communication device during the communication disconnection between the retrieved article and a server;
acquiring a second article identification information set consisting of article identification information of stolen articles;
detecting the number of the same item identification information existing in the first item identification information set and the second item identification information set;
and in the case that the quantity of the same item identification information exceeds a preset quantity, marking that the behavior of completing the stolen item retrieval order is invalid.
Optionally, the step of obtaining the first item identification information set reported by the retrieved item includes:
sending a reporting instruction of a first article identification information set to the searched article;
and acquiring the first article identification information set reported by the searched article according to the reporting instruction.
Optionally, the step of obtaining the first item identification information set reported by the retrieved item includes:
acquiring a recently collected article identification information set reported by a searched article;
judging whether the article identification information set collected last time is collected by the searched article in the period of communication disconnection with the server to obtain a judgment result;
in the event that the last collected set of item identification information was collected by the retrieved item during a disconnection communication with a server, taking the last collected item identification information as the first set of item identification information.
Optionally, the method further comprises:
when the item identification information set which is collected last time is collected after the recovered item recovers communication with the server, a reporting instruction of a first item identification information set is sent to the recovered item;
and acquiring the first article identification information set reported by the searched article according to the reporting instruction.
Optionally, the set of most recently collected item identification information includes a generation time, wherein,
the step of judging whether the most recently collected item identification information set is collected by the retrieved item during the communication disconnection with the server to obtain a judgment result includes:
acquiring the completion time of the stolen article retrieval order;
and judging whether the item identification information set is acquired by the retrieved item during the communication disconnection with the server according to the completion time of the stolen item retrieval order and the generation time of the most recently acquired item identification information set, so as to obtain a judgment result.
Optionally, the step of obtaining a second item identification information set consisting of stolen items comprises:
acquiring current position information reported by the searched article and position information reported by all stolen articles for the last time;
determining the distance value between each stolen article and the found article according to the position information reported by the stolen article for the last time and the current position information reported by the found article;
and acquiring the article identification information of the stolen article corresponding to the distance value smaller than the preset distance value, and generating the second article identification information set.
Optionally, the method further comprises:
and providing a penalty value for an operator according to a verification result that the behavior of finding the order for the stolen object is an invalid behavior.
According to a second aspect of the present invention, there is provided a verification apparatus for a stolen article retrieval order, comprising:
a first acquisition module for acquiring a retrieved item in response to a notification of completion of the stolen item retrieval order;
the second acquisition module is used for acquiring a first article identification information set reported by a retrieved article, wherein the retrieved article is provided with a short-range communication device, and the first article identification information set is acquired by the short-range communication device during the communication disconnection between the retrieved article and a server;
the second acquisition module is also used for acquiring a second article identification information set consisting of the article identification information of the stolen article;
the detection module is used for detecting the number of the same item identification information existing in the first item identification information set and the second item identification information set;
and the marking module is used for marking that the behavior of completing the stolen article retrieval order is invalid when the quantity of the same article identification information exceeds a preset quantity.
According to a third aspect of the present invention there is provided a verification apparatus for a stolen item retrieval order, comprising a memory for storing instructions for controlling the processor to operate to perform a method according to any one of the first aspects and a processor.
According to a fourth aspect of the present invention, there is provided a server comprising the verification apparatus for a stolen item retrieval order according to the second or third aspect.
According to a fifth aspect of the present invention, there is provided a verification system for a stolen article retrieval order, comprising the server, the terminal device and the retrieved article of the fourth aspect.
According to an embodiment of the invention, after a stolen article recovery order is completed, a first article identification information set reported by a recovered article and a second article identification information set consisting of article identification information of the stolen article are obtained, wherein the first article identification information set is acquired by the recovered article through a short-range communication device during the communication disconnection with a server, the number of identical article identification information existing in the first article identification information set and the second article identification information set is detected, the effectiveness of the behavior of the stolen article recovery order can be verified according to the number of identical article identification information, the false appearance that a carrier searches for the artificially manufactured stolen article can be identified, and the loss of an operation platform is reduced.
Other features of the present invention and advantages thereof will become apparent from the following detailed description of exemplary embodiments thereof, which proceeds with reference to the accompanying drawings.
Detailed Description
Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the invention, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
< integral architecture of verification system for stolen article retrieval order >
Fig. 1 is a schematic diagram of a verification system for a stolen item retrieval order according to an embodiment of the present invention.
The verification system 100 for a stolen article retrieval order includes a server 1000, a terminal device 2000, and a retrieved article 3000.
The server 1000 is provided with a verification apparatus 1100 of a stolen article retrieval order according to an embodiment of the present invention.
The terminal device 2000 reports the stolen article retrieval order generated based on the operation triggered by the operator to the server 1000.
The verification apparatus 1100 for the stolen article retrieval order obtains the retrieved article in response to the notification of completing the stolen article retrieval order, and then obtains a first article identification information set reported by the retrieved article, and a second article identification information set composed of the article identification information of the stolen article, wherein the first article identification information set is acquired by the retrieved article through the short-range communication apparatus during the period of disconnecting communication with the server, detects the number of identical article identification information existing in the first article identification information set and the second article identification information set, and verifies the validity of the behavior of the stolen article retrieval order according to the number of identical article identification information.
The retrieved item 3000 is shown in fig. 1 as a shared bicycle. The retrieved item 3000 may also be any one of a shared moped, a shared car, a shared umbrella, and a shared mobile power source.
Fig. 2 is a hardware configuration of a verification apparatus 1100 for a stolen item retrieval order according to an embodiment of the present invention.
As shown in fig. 2, a verification apparatus 1100 for a stolen item retrieval order according to an embodiment of the present invention may include one or more processors 1110 and one or more memories 1120.
In an embodiment of the present invention, the memory 1120 is configured to store instructions for controlling the processor 1110 to operate to perform a method of verifying a stolen article recovery order according to an embodiment of the present invention. The skilled person can design the instructions according to the disclosed solution. How the instructions control the operation of the processor is well known in the art and will not be described in detail herein.
Processor 1100 can be a central processing unit, a Microprocessor (MCU), or the like.
The memory 1120 includes, for example, a ROM (read only memory), a RAM (random access memory), a nonvolatile memory such as a hard disk, and the like.
The wireless network that realizes the communication connection between the server 1000 and the terminal device 2000 and the wireless network that realizes the communication connection between the server 1000 and the retrieved article 3000 may be the same network or different networks.
The wireless network 4000 encompasses any suitable wireless network such as, but not limited to, 4G networks, 3G networks, GSM, GPRS, WLAN, and the like.
< method >
Fig. 3 is a flowchart illustrating a method for verifying a stolen item retrieval order according to an embodiment of the present invention.
As shown in fig. 3, the method of an embodiment of the present invention may include the following steps:
step S3100, in response to the notification of completion of the stolen article retrieval order, acquiring the retrieved article.
In the embodiment of the invention, when the difference value between the time when the position information is reported last by the article and the current time recorded by the server exceeds the preset threshold value, the server can mark the article as a stolen article and locally store the article identification information of the stolen article.
In one embodiment of the invention, the terminal device sends the stolen item retrieval order to the server after generating the stolen item retrieval order based on the operation triggered by the operator. The stolen item retrieval order includes item identification information of the stolen item.
In one example, the article identification information of the stolen article can be obtained by an operator through scanning a two-dimensional code on the stolen article by a terminal.
In another example, the article identification information of the stolen article may be obtained after the operator inputs the code on the stolen article to the terminal device.
In the embodiment of the invention, after the stolen article recovery order is completed, the communication between the server and the stolen articles in the stolen article recovery order is recovered.
Step S3200, a first item identification information set reported by a retrieved item is obtained, where the retrieved item is provided with a near field communication device, and the first item identification information set is acquired by the near field communication device during a period when the retrieved item is disconnected from the server.
In the embodiment of the invention, the near field communication device can be any one of a Bluetooth communication device, an NFC communication device and a ZigBee communication device.
Taking a bluetooth communication device as an example, the bluetooth communication device of any article can execute a bluetooth scanning operation at regular time, and the bluetooth scanning operation can collect the article identification information of the articles around the bluetooth communication device and locally store the set formed by the collected article identification information. For example, the bluetooth communication device of any article can perform bluetooth broadcast at regular time, the data of the bluetooth broadcast includes the article identification information of the article itself, and the article identification information of the article can be obtained by bluetooth scanning of other articles.
In the embodiment of the invention, any article can locally store the article identification information set acquired for the last time. Alternatively, any item may locally store its set of item identification information acquired each time.
In one embodiment of the invention, after the stolen article recovery order is completed, the server issues a reporting instruction of the first article identification information set to the recovered article. And reporting the first article identification information set to the server by the searched article according to the reporting instruction.
For example, each item identification information set saved for a retrieved item includes a generation time of the item identification information set. The report instruction sent by the server to the retrieved item comprises the completion time of the stolen item retrieval order. After the found object receives the reporting instruction, according to the completion time of the stolen object finding order and the generation time of each object identification information set, the last acquired object identification information set during the communication disconnection between the found object identification information set and the server is searched, and the searched object identification information set is used as a first object identification information set to be reported to the server.
In an embodiment of the present invention, any item may report its last collected item identification information set to the server at regular time. After the communication between the searched article and the server is recovered, the article identification information collected last time can be reported to the server.
The server judges whether the last collected article identification information set is collected by the searched article in the communication disconnection period with the server after obtaining the last collected article identification information set reported by the searched article, and obtains a judgment result.
For example, the last collected item identification information set reported by the retrieved item includes the generation time. And the server acquires the completion time of the stolen article retrieval order, and judges whether the latest acquired article identification information set is acquired by the retrieved article during the communication disconnection with the server according to the generation time of the latest acquired article identification information set and the completion time of the stolen article retrieval order.
If the generation time of the last collected item identification information set is earlier than the completion time of the stolen item retrieval order, it may be determined that the last collected item identification information set was collected by the retrieved item during the disconnection of communication with the server.
If the generation time of the last collected item identification information set is not earlier than the completion time of the stolen item recovery order, it may be determined that the last collected item identification information set is the item identification information set collected after the recovered item resumes communication with the server.
In the case where the last collected item identification information set was collected during the period of time when the retrieved item was disconnected from the server, the last collected item identification information is taken as the first item identification information set.
And under the condition that the item identification information acquired last time is acquired after the recovered item recovers communication with the server, issuing a reporting instruction of the first item identification information set to the recovered item.
For example, the reporting instruction issued by the server to the retrieved item includes the completion time of the stolen item retrieval order. After the found object receives the reporting instruction, according to the completion time of the stolen object finding order and the generation time of each stored object identification information set, the last acquired object identification information set during the communication disconnection between the found object identification information set and the server is searched, and the searched object identification information set is reported to the server as the first object identification information set.
In step S3300, a second item identification information set composed of item identification information of the stolen item is acquired.
In one embodiment of the invention, the second set of item identification information may be comprised of item identification information for all stolen items recorded by the server.
If the second item identification information set is composed of the item identification information of all stolen items recorded by the server, the server performs step S3400 with a large calculation amount, which affects the verification efficiency of the stolen item retrieval order.
To solve this technical problem, in one embodiment of the invention, the server selects, from among all stolen items, items stolen around the current location after the communication of the retrieved item with the server is restored. For example, the server obtains the current location information reported by the retrieved item and the last location information reported by all stolen items. And the server determines the distance value between each stolen article and the found article according to the position information reported by the stolen article for the last time and the position information reported by the found article. And the server acquires the article identification information of the stolen article corresponding to the distance value smaller than the preset distance value and generates a second article identification information set.
In step S3400, the number of identical item identification information existing in the first item identification information set and the second item identification information set is detected.
Step S3500, when the quantity of the same item identification information exceeds the preset quantity, the behavior of marking the stolen item retrieval order is invalid.
In the embodiment of the invention, under the condition that the quantity of the same item identification information exceeds the preset quantity, the retrieved item can be determined to be stolen manually, and then the behavior that the server marks the retrieval order of the stolen item is invalid.
In an embodiment of the invention, according to a verification result that the behavior of completing the retrieval of the stolen object order is an invalid behavior, the server issues and configures a corresponding account number corresponding to an operator and displays a penalty value to a corresponding terminal device.
According to an embodiment of the invention, after a stolen article recovery order is completed, a first article identification information set reported by a recovered article and a second article identification information set consisting of article identification information of the stolen article are obtained, wherein the first article identification information set is acquired by the recovered article through a short-range communication device during the communication disconnection with a server, the number of identical article identification information existing in the first article identification information set and the second article identification information set is detected, the effectiveness of the behavior of the stolen article recovery order can be verified according to the number of identical article identification information, the false appearance that a carrier searches for the artificially manufactured stolen article can be identified, and the loss of an operation platform is reduced.
< example >
Fig. 4 is a flowchart illustrating a method for verifying a stolen item retrieval order according to another embodiment of the present invention.
As shown in fig. 4, the method of an embodiment of the present invention may include the following steps:
in step S4010, the server acquires the retrieved item in response to the notification of completion of the stolen item retrieval order.
Step S4020, the server sends a report instruction of the first item identification information set to the searched item.
In step S4030, the server obtains the first item identification information set reported by the retrieved item according to the reporting instruction.
Step S4040, the server obtains the current position information reported by the retrieved articles and the last position information reported by all stolen articles.
Step S4050, the server determines the distance value between each stolen article and the found article according to the position information reported by the stolen article for the last time and the position information reported by the found article.
Step S4060, the server obtains the article identification information of the stolen article corresponding to the distance value smaller than the preset distance value, and generates a second article identification information set.
Step S4070, the number of identical item identification information existing in the first item identification information set and the second item identification information set is detected.
Step S4080, determine whether the number of the same item identification information exceeds a preset number.
In the case where the number of the same item identification information exceeds the preset number, the act of marking completion of the stolen item retrieval order of step S4090 is executed as an invalid act.
In the case where the number of the same item identification information does not exceed the preset number, execution of step S4100 marks that the act of completing the stolen item retrieval order is a valid act.
< apparatus >
Fig. 5 is a functional block diagram of a verification device for a stolen item retrieval order according to an embodiment of the present invention.
As shown in fig. 5, the verification apparatus for a stolen article retrieval order according to this embodiment of the present invention includes a first obtaining module 5100, a second obtaining module 5200, a detecting module 5300, and a mark 5400.
The first obtaining module 5100 is configured to obtain a retrieved item in response to a notification of completion of the stolen item retrieval order.
The second obtaining module 5200 is configured to obtain a first item identification information set reported by a retrieved item, where the retrieved item is provided with a near field communication device, and the first item identification information set is obtained by the near field communication device during the period of time when the retrieved item is disconnected from the server.
The second obtaining module 5200 is also used to obtain a second item identification information set composed of item identification information of stolen items.
The detecting module 5300 is configured to detect the number of identical item identification information existing in the first set of item identification information and the second set of item identification information.
The marking module 5400 is configured to mark that the behavior of completing the stolen article retrieval order is an invalid behavior in a case where the number of the same article identification information exceeds a preset number.
In an example of the present invention, the second obtaining module 5200 may be further configured to issue a reporting instruction of the first item identification information set to the retrieved item; and acquiring a first article identification information set reported by the searched article according to the reporting instruction.
In an example of the present invention, the second obtaining module 5200 may be further configured to obtain a latest collected item identifier information set reported by a retrieved item; judging whether the article identification information set acquired last time is acquired by the searched article in the period of communication disconnection with the server to obtain a judgment result; in the case where the last collected item identification information set was collected during the period of time when the retrieved item was disconnected from the server, the last collected item identification information is taken as the first item identification information set.
In this example, the second obtaining module 5200 is further configured to, when the item identification information set collected last time is collected after the retrieved item recovers communication with the server, send a reporting instruction of the first item identification information set to the retrieved item; and acquiring a first article identification information set reported by the searched article according to the reporting instruction.
In this example, the most recently collected set of item identification information includes the generation time. The second obtaining module 5200 is further configured to obtain a completion time of the stolen item retrieval order; and judging whether the item identification information set is acquired by the retrieved item during the communication disconnection with the server according to the completion time of the stolen item retrieval order and the generation time of the most recently acquired item identification information set, and obtaining a judgment result.
In an example of the present invention, the second obtaining module 5200 is further configured to obtain current location information reported by the retrieved item and location information reported by all stolen items for the last time; determining the distance value between each stolen article and the found article according to the position information reported by the stolen article for the last time and the current position information reported by the found article; and acquiring the article identification information of the stolen article corresponding to the distance value smaller than the preset distance value, and generating a second article identification information set.
In one example of the present invention, the stolen article retrieval order verification apparatus further includes: and a penalty value output module. The penalty value output module is used for providing a penalty value for an operator according to a verification result that the behavior of finding the order for the stolen goods is an invalid behavior.
The present invention may be a system, method and/or computer program product. The computer program product may include a computer-readable storage medium having computer-readable program instructions embodied therewith for causing a processor to implement various aspects of the present invention.
The computer readable storage medium may be a tangible device that can hold and store the instructions for use by the instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic memory device, a magnetic memory device, an optical memory device, an electromagnetic memory device, a semiconductor memory device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a Static Random Access Memory (SRAM), a portable compact disc read-only memory (CD-ROM), a Digital Versatile Disc (DVD), a memory stick, a floppy disk, a mechanical coding device, such as punch cards or in-groove projection structures having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media as used herein is not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission medium (e.g., optical pulses through a fiber optic cable), or electrical signals transmitted through electrical wires.
The computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or to an external computer or external storage device via a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. The network adapter card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in the respective computing/processing device.
The computer program instructions for carrying out operations of the present invention may be assembler instructions, Instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer-readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, aspects of the present invention are implemented by personalizing an electronic circuit, such as a programmable logic circuit, a Field Programmable Gate Array (FPGA), or a Programmable Logic Array (PLA), with state information of computer-readable program instructions, which can execute the computer-readable program instructions.
Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer-readable program instructions may also be stored in a computer-readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer-readable medium storing the instructions comprises an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. It is well known to those skilled in the art that implementation by hardware, by software, and by a combination of software and hardware are equivalent.
Having described embodiments of the present invention, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein is chosen in order to best explain the principles of the embodiments, the practical application, or improvements made to the technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein. The scope of the invention is defined by the appended claims.