CN109544176B - Verification method, device, server and system for stolen article retrieval order - Google Patents

Verification method, device, server and system for stolen article retrieval order Download PDF

Info

Publication number
CN109544176B
CN109544176B CN201811251533.1A CN201811251533A CN109544176B CN 109544176 B CN109544176 B CN 109544176B CN 201811251533 A CN201811251533 A CN 201811251533A CN 109544176 B CN109544176 B CN 109544176B
Authority
CN
China
Prior art keywords
article
identification information
item
stolen
information set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811251533.1A
Other languages
Chinese (zh)
Other versions
CN109544176A (en
Inventor
肖晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hanhai Information Technology Shanghai Co Ltd
Original Assignee
Hanhai Information Technology Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hanhai Information Technology Shanghai Co Ltd filed Critical Hanhai Information Technology Shanghai Co Ltd
Priority to CN201811251533.1A priority Critical patent/CN109544176B/en
Publication of CN109544176A publication Critical patent/CN109544176A/en
Application granted granted Critical
Publication of CN109544176B publication Critical patent/CN109544176B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0639Item locations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The invention discloses a verification method, a device, a server and a system for a stolen article retrieval order, wherein the method comprises the following steps: acquiring the retrieved item in response to the notification of completing the stolen item retrieval order; acquiring a first article identification information set reported by a retrieved article, wherein the retrieved article is provided with a near field communication device, and the first article identification information set is acquired by the near field communication device during the communication disconnection between the retrieved article and a server; acquiring a second article identification information set consisting of article identification information of stolen articles; detecting the number of the same item identification information existing in the first item identification information set and the second item identification information set; and in the case that the quantity of the same item identification information exceeds a preset quantity, marking that the behavior of completing the stolen item retrieval order is invalid.

Description

Verification method, device, server and system for stolen article retrieval order
Technical Field
The present invention relates to the field of internet technologies, and in particular, to a method and a device for verifying a stolen article retrieval order, a server, and a system for verifying a stolen article retrieval order.
Background
Currently, an increasing number of different kinds of shared items are coming into people's lives, such as sharing a bicycle, sharing a car, sharing an umbrella, and so on.
With the increasing market release of shared goods, the offline operation of each shared goods company becomes an important link.
The offline operation work includes not only the dispatching of the articles, but also the collection of the fault articles, the retrieval of the stolen articles and the like. In these offline operations, the difficulty of retrieving stolen items is high, so that the return based on the retrieval of stolen items is high.
Because the reward for finding the stolen article is high, some offline operators can artificially make a theft behavior, for example, a batch of shared articles are intentionally hidden in a place with a poor communication signal, so that the batch of shared articles cannot communicate with the background server for a long time, the background server marks the batch of shared articles as the stolen articles, and then the offline operators turn the batch of shared articles in batches or move the batch of shared articles out at one time to cause the false phenomenon of finding the stolen articles, so that the offline operators can obtain high reward.
Therefore, it has become an urgent need to provide a verification method for retrieving orders from stolen articles.
Disclosure of Invention
One object of the present invention is to provide a new technical solution for verifying the retrieval of stolen articles.
According to a first aspect of the present invention, there is provided a method of verifying a stolen article retrieval order, comprising:
acquiring the retrieved item in response to the notification of completing the stolen item retrieval order;
acquiring a first article identification information set reported by a retrieved article, wherein the retrieved article is provided with a near field communication device, and the first article identification information set is acquired by the near field communication device during the communication disconnection between the retrieved article and a server;
acquiring a second article identification information set consisting of article identification information of stolen articles;
detecting the number of the same item identification information existing in the first item identification information set and the second item identification information set;
and in the case that the quantity of the same item identification information exceeds a preset quantity, marking that the behavior of completing the stolen item retrieval order is invalid.
Optionally, the step of obtaining the first item identification information set reported by the retrieved item includes:
sending a reporting instruction of a first article identification information set to the searched article;
and acquiring the first article identification information set reported by the searched article according to the reporting instruction.
Optionally, the step of obtaining the first item identification information set reported by the retrieved item includes:
acquiring a recently collected article identification information set reported by a searched article;
judging whether the article identification information set collected last time is collected by the searched article in the period of communication disconnection with the server to obtain a judgment result;
in the event that the last collected set of item identification information was collected by the retrieved item during a disconnection communication with a server, taking the last collected item identification information as the first set of item identification information.
Optionally, the method further comprises:
when the item identification information set which is collected last time is collected after the recovered item recovers communication with the server, a reporting instruction of a first item identification information set is sent to the recovered item;
and acquiring the first article identification information set reported by the searched article according to the reporting instruction.
Optionally, the set of most recently collected item identification information includes a generation time, wherein,
the step of judging whether the most recently collected item identification information set is collected by the retrieved item during the communication disconnection with the server to obtain a judgment result includes:
acquiring the completion time of the stolen article retrieval order;
and judging whether the item identification information set is acquired by the retrieved item during the communication disconnection with the server according to the completion time of the stolen item retrieval order and the generation time of the most recently acquired item identification information set, so as to obtain a judgment result.
Optionally, the step of obtaining a second item identification information set consisting of stolen items comprises:
acquiring current position information reported by the searched article and position information reported by all stolen articles for the last time;
determining the distance value between each stolen article and the found article according to the position information reported by the stolen article for the last time and the current position information reported by the found article;
and acquiring the article identification information of the stolen article corresponding to the distance value smaller than the preset distance value, and generating the second article identification information set.
Optionally, the method further comprises:
and providing a penalty value for an operator according to a verification result that the behavior of finding the order for the stolen object is an invalid behavior.
According to a second aspect of the present invention, there is provided a verification apparatus for a stolen article retrieval order, comprising:
a first acquisition module for acquiring a retrieved item in response to a notification of completion of the stolen item retrieval order;
the second acquisition module is used for acquiring a first article identification information set reported by a retrieved article, wherein the retrieved article is provided with a short-range communication device, and the first article identification information set is acquired by the short-range communication device during the communication disconnection between the retrieved article and a server;
the second acquisition module is also used for acquiring a second article identification information set consisting of the article identification information of the stolen article;
the detection module is used for detecting the number of the same item identification information existing in the first item identification information set and the second item identification information set;
and the marking module is used for marking that the behavior of completing the stolen article retrieval order is invalid when the quantity of the same article identification information exceeds a preset quantity.
According to a third aspect of the present invention there is provided a verification apparatus for a stolen item retrieval order, comprising a memory for storing instructions for controlling the processor to operate to perform a method according to any one of the first aspects and a processor.
According to a fourth aspect of the present invention, there is provided a server comprising the verification apparatus for a stolen item retrieval order according to the second or third aspect.
According to a fifth aspect of the present invention, there is provided a verification system for a stolen article retrieval order, comprising the server, the terminal device and the retrieved article of the fourth aspect.
According to an embodiment of the invention, after a stolen article recovery order is completed, a first article identification information set reported by a recovered article and a second article identification information set consisting of article identification information of the stolen article are obtained, wherein the first article identification information set is acquired by the recovered article through a short-range communication device during the communication disconnection with a server, the number of identical article identification information existing in the first article identification information set and the second article identification information set is detected, the effectiveness of the behavior of the stolen article recovery order can be verified according to the number of identical article identification information, the false appearance that a carrier searches for the artificially manufactured stolen article can be identified, and the loss of an operation platform is reduced.
Other features of the present invention and advantages thereof will become apparent from the following detailed description of exemplary embodiments thereof, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a schematic diagram of a verification system for a stolen item retrieval order according to an embodiment of the present invention.
Fig. 2 is a hardware configuration of a verification apparatus 1100 for a stolen item retrieval order according to an embodiment of the present invention.
Fig. 3 is a flowchart illustrating a method for verifying a stolen item retrieval order according to an embodiment of the present invention.
Fig. 4 is a flowchart illustrating a method for verifying a stolen item retrieval order according to another embodiment of the present invention.
Fig. 5 is a functional block diagram of a verification device for a stolen item retrieval order according to an embodiment of the present invention.
Detailed Description
Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the invention, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
< integral architecture of verification system for stolen article retrieval order >
Fig. 1 is a schematic diagram of a verification system for a stolen item retrieval order according to an embodiment of the present invention.
The verification system 100 for a stolen article retrieval order includes a server 1000, a terminal device 2000, and a retrieved article 3000.
The server 1000 is provided with a verification apparatus 1100 of a stolen article retrieval order according to an embodiment of the present invention.
The terminal device 2000 reports the stolen article retrieval order generated based on the operation triggered by the operator to the server 1000.
The verification apparatus 1100 for the stolen article retrieval order obtains the retrieved article in response to the notification of completing the stolen article retrieval order, and then obtains a first article identification information set reported by the retrieved article, and a second article identification information set composed of the article identification information of the stolen article, wherein the first article identification information set is acquired by the retrieved article through the short-range communication apparatus during the period of disconnecting communication with the server, detects the number of identical article identification information existing in the first article identification information set and the second article identification information set, and verifies the validity of the behavior of the stolen article retrieval order according to the number of identical article identification information.
The retrieved item 3000 is shown in fig. 1 as a shared bicycle. The retrieved item 3000 may also be any one of a shared moped, a shared car, a shared umbrella, and a shared mobile power source.
Fig. 2 is a hardware configuration of a verification apparatus 1100 for a stolen item retrieval order according to an embodiment of the present invention.
As shown in fig. 2, a verification apparatus 1100 for a stolen item retrieval order according to an embodiment of the present invention may include one or more processors 1110 and one or more memories 1120.
In an embodiment of the present invention, the memory 1120 is configured to store instructions for controlling the processor 1110 to operate to perform a method of verifying a stolen article recovery order according to an embodiment of the present invention. The skilled person can design the instructions according to the disclosed solution. How the instructions control the operation of the processor is well known in the art and will not be described in detail herein.
Processor 1100 can be a central processing unit, a Microprocessor (MCU), or the like.
The memory 1120 includes, for example, a ROM (read only memory), a RAM (random access memory), a nonvolatile memory such as a hard disk, and the like.
The wireless network that realizes the communication connection between the server 1000 and the terminal device 2000 and the wireless network that realizes the communication connection between the server 1000 and the retrieved article 3000 may be the same network or different networks.
The wireless network 4000 encompasses any suitable wireless network such as, but not limited to, 4G networks, 3G networks, GSM, GPRS, WLAN, and the like.
< method >
Fig. 3 is a flowchart illustrating a method for verifying a stolen item retrieval order according to an embodiment of the present invention.
As shown in fig. 3, the method of an embodiment of the present invention may include the following steps:
step S3100, in response to the notification of completion of the stolen article retrieval order, acquiring the retrieved article.
In the embodiment of the invention, when the difference value between the time when the position information is reported last by the article and the current time recorded by the server exceeds the preset threshold value, the server can mark the article as a stolen article and locally store the article identification information of the stolen article.
In one embodiment of the invention, the terminal device sends the stolen item retrieval order to the server after generating the stolen item retrieval order based on the operation triggered by the operator. The stolen item retrieval order includes item identification information of the stolen item.
In one example, the article identification information of the stolen article can be obtained by an operator through scanning a two-dimensional code on the stolen article by a terminal.
In another example, the article identification information of the stolen article may be obtained after the operator inputs the code on the stolen article to the terminal device.
In the embodiment of the invention, after the stolen article recovery order is completed, the communication between the server and the stolen articles in the stolen article recovery order is recovered.
Step S3200, a first item identification information set reported by a retrieved item is obtained, where the retrieved item is provided with a near field communication device, and the first item identification information set is acquired by the near field communication device during a period when the retrieved item is disconnected from the server.
In the embodiment of the invention, the near field communication device can be any one of a Bluetooth communication device, an NFC communication device and a ZigBee communication device.
Taking a bluetooth communication device as an example, the bluetooth communication device of any article can execute a bluetooth scanning operation at regular time, and the bluetooth scanning operation can collect the article identification information of the articles around the bluetooth communication device and locally store the set formed by the collected article identification information. For example, the bluetooth communication device of any article can perform bluetooth broadcast at regular time, the data of the bluetooth broadcast includes the article identification information of the article itself, and the article identification information of the article can be obtained by bluetooth scanning of other articles.
In the embodiment of the invention, any article can locally store the article identification information set acquired for the last time. Alternatively, any item may locally store its set of item identification information acquired each time.
In one embodiment of the invention, after the stolen article recovery order is completed, the server issues a reporting instruction of the first article identification information set to the recovered article. And reporting the first article identification information set to the server by the searched article according to the reporting instruction.
For example, each item identification information set saved for a retrieved item includes a generation time of the item identification information set. The report instruction sent by the server to the retrieved item comprises the completion time of the stolen item retrieval order. After the found object receives the reporting instruction, according to the completion time of the stolen object finding order and the generation time of each object identification information set, the last acquired object identification information set during the communication disconnection between the found object identification information set and the server is searched, and the searched object identification information set is used as a first object identification information set to be reported to the server.
In an embodiment of the present invention, any item may report its last collected item identification information set to the server at regular time. After the communication between the searched article and the server is recovered, the article identification information collected last time can be reported to the server.
The server judges whether the last collected article identification information set is collected by the searched article in the communication disconnection period with the server after obtaining the last collected article identification information set reported by the searched article, and obtains a judgment result.
For example, the last collected item identification information set reported by the retrieved item includes the generation time. And the server acquires the completion time of the stolen article retrieval order, and judges whether the latest acquired article identification information set is acquired by the retrieved article during the communication disconnection with the server according to the generation time of the latest acquired article identification information set and the completion time of the stolen article retrieval order.
If the generation time of the last collected item identification information set is earlier than the completion time of the stolen item retrieval order, it may be determined that the last collected item identification information set was collected by the retrieved item during the disconnection of communication with the server.
If the generation time of the last collected item identification information set is not earlier than the completion time of the stolen item recovery order, it may be determined that the last collected item identification information set is the item identification information set collected after the recovered item resumes communication with the server.
In the case where the last collected item identification information set was collected during the period of time when the retrieved item was disconnected from the server, the last collected item identification information is taken as the first item identification information set.
And under the condition that the item identification information acquired last time is acquired after the recovered item recovers communication with the server, issuing a reporting instruction of the first item identification information set to the recovered item.
For example, the reporting instruction issued by the server to the retrieved item includes the completion time of the stolen item retrieval order. After the found object receives the reporting instruction, according to the completion time of the stolen object finding order and the generation time of each stored object identification information set, the last acquired object identification information set during the communication disconnection between the found object identification information set and the server is searched, and the searched object identification information set is reported to the server as the first object identification information set.
In step S3300, a second item identification information set composed of item identification information of the stolen item is acquired.
In one embodiment of the invention, the second set of item identification information may be comprised of item identification information for all stolen items recorded by the server.
If the second item identification information set is composed of the item identification information of all stolen items recorded by the server, the server performs step S3400 with a large calculation amount, which affects the verification efficiency of the stolen item retrieval order.
To solve this technical problem, in one embodiment of the invention, the server selects, from among all stolen items, items stolen around the current location after the communication of the retrieved item with the server is restored. For example, the server obtains the current location information reported by the retrieved item and the last location information reported by all stolen items. And the server determines the distance value between each stolen article and the found article according to the position information reported by the stolen article for the last time and the position information reported by the found article. And the server acquires the article identification information of the stolen article corresponding to the distance value smaller than the preset distance value and generates a second article identification information set.
In step S3400, the number of identical item identification information existing in the first item identification information set and the second item identification information set is detected.
Step S3500, when the quantity of the same item identification information exceeds the preset quantity, the behavior of marking the stolen item retrieval order is invalid.
In the embodiment of the invention, under the condition that the quantity of the same item identification information exceeds the preset quantity, the retrieved item can be determined to be stolen manually, and then the behavior that the server marks the retrieval order of the stolen item is invalid.
In an embodiment of the invention, according to a verification result that the behavior of completing the retrieval of the stolen object order is an invalid behavior, the server issues and configures a corresponding account number corresponding to an operator and displays a penalty value to a corresponding terminal device.
According to an embodiment of the invention, after a stolen article recovery order is completed, a first article identification information set reported by a recovered article and a second article identification information set consisting of article identification information of the stolen article are obtained, wherein the first article identification information set is acquired by the recovered article through a short-range communication device during the communication disconnection with a server, the number of identical article identification information existing in the first article identification information set and the second article identification information set is detected, the effectiveness of the behavior of the stolen article recovery order can be verified according to the number of identical article identification information, the false appearance that a carrier searches for the artificially manufactured stolen article can be identified, and the loss of an operation platform is reduced.
< example >
Fig. 4 is a flowchart illustrating a method for verifying a stolen item retrieval order according to another embodiment of the present invention.
As shown in fig. 4, the method of an embodiment of the present invention may include the following steps:
in step S4010, the server acquires the retrieved item in response to the notification of completion of the stolen item retrieval order.
Step S4020, the server sends a report instruction of the first item identification information set to the searched item.
In step S4030, the server obtains the first item identification information set reported by the retrieved item according to the reporting instruction.
Step S4040, the server obtains the current position information reported by the retrieved articles and the last position information reported by all stolen articles.
Step S4050, the server determines the distance value between each stolen article and the found article according to the position information reported by the stolen article for the last time and the position information reported by the found article.
Step S4060, the server obtains the article identification information of the stolen article corresponding to the distance value smaller than the preset distance value, and generates a second article identification information set.
Step S4070, the number of identical item identification information existing in the first item identification information set and the second item identification information set is detected.
Step S4080, determine whether the number of the same item identification information exceeds a preset number.
In the case where the number of the same item identification information exceeds the preset number, the act of marking completion of the stolen item retrieval order of step S4090 is executed as an invalid act.
In the case where the number of the same item identification information does not exceed the preset number, execution of step S4100 marks that the act of completing the stolen item retrieval order is a valid act.
< apparatus >
Fig. 5 is a functional block diagram of a verification device for a stolen item retrieval order according to an embodiment of the present invention.
As shown in fig. 5, the verification apparatus for a stolen article retrieval order according to this embodiment of the present invention includes a first obtaining module 5100, a second obtaining module 5200, a detecting module 5300, and a mark 5400.
The first obtaining module 5100 is configured to obtain a retrieved item in response to a notification of completion of the stolen item retrieval order.
The second obtaining module 5200 is configured to obtain a first item identification information set reported by a retrieved item, where the retrieved item is provided with a near field communication device, and the first item identification information set is obtained by the near field communication device during the period of time when the retrieved item is disconnected from the server.
The second obtaining module 5200 is also used to obtain a second item identification information set composed of item identification information of stolen items.
The detecting module 5300 is configured to detect the number of identical item identification information existing in the first set of item identification information and the second set of item identification information.
The marking module 5400 is configured to mark that the behavior of completing the stolen article retrieval order is an invalid behavior in a case where the number of the same article identification information exceeds a preset number.
In an example of the present invention, the second obtaining module 5200 may be further configured to issue a reporting instruction of the first item identification information set to the retrieved item; and acquiring a first article identification information set reported by the searched article according to the reporting instruction.
In an example of the present invention, the second obtaining module 5200 may be further configured to obtain a latest collected item identifier information set reported by a retrieved item; judging whether the article identification information set acquired last time is acquired by the searched article in the period of communication disconnection with the server to obtain a judgment result; in the case where the last collected item identification information set was collected during the period of time when the retrieved item was disconnected from the server, the last collected item identification information is taken as the first item identification information set.
In this example, the second obtaining module 5200 is further configured to, when the item identification information set collected last time is collected after the retrieved item recovers communication with the server, send a reporting instruction of the first item identification information set to the retrieved item; and acquiring a first article identification information set reported by the searched article according to the reporting instruction.
In this example, the most recently collected set of item identification information includes the generation time. The second obtaining module 5200 is further configured to obtain a completion time of the stolen item retrieval order; and judging whether the item identification information set is acquired by the retrieved item during the communication disconnection with the server according to the completion time of the stolen item retrieval order and the generation time of the most recently acquired item identification information set, and obtaining a judgment result.
In an example of the present invention, the second obtaining module 5200 is further configured to obtain current location information reported by the retrieved item and location information reported by all stolen items for the last time; determining the distance value between each stolen article and the found article according to the position information reported by the stolen article for the last time and the current position information reported by the found article; and acquiring the article identification information of the stolen article corresponding to the distance value smaller than the preset distance value, and generating a second article identification information set.
In one example of the present invention, the stolen article retrieval order verification apparatus further includes: and a penalty value output module. The penalty value output module is used for providing a penalty value for an operator according to a verification result that the behavior of finding the order for the stolen goods is an invalid behavior.
The present invention may be a system, method and/or computer program product. The computer program product may include a computer-readable storage medium having computer-readable program instructions embodied therewith for causing a processor to implement various aspects of the present invention.
The computer readable storage medium may be a tangible device that can hold and store the instructions for use by the instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic memory device, a magnetic memory device, an optical memory device, an electromagnetic memory device, a semiconductor memory device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a Static Random Access Memory (SRAM), a portable compact disc read-only memory (CD-ROM), a Digital Versatile Disc (DVD), a memory stick, a floppy disk, a mechanical coding device, such as punch cards or in-groove projection structures having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media as used herein is not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission medium (e.g., optical pulses through a fiber optic cable), or electrical signals transmitted through electrical wires.
The computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or to an external computer or external storage device via a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. The network adapter card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in the respective computing/processing device.
The computer program instructions for carrying out operations of the present invention may be assembler instructions, Instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer-readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, aspects of the present invention are implemented by personalizing an electronic circuit, such as a programmable logic circuit, a Field Programmable Gate Array (FPGA), or a Programmable Logic Array (PLA), with state information of computer-readable program instructions, which can execute the computer-readable program instructions.
Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer-readable program instructions may also be stored in a computer-readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer-readable medium storing the instructions comprises an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. It is well known to those skilled in the art that implementation by hardware, by software, and by a combination of software and hardware are equivalent.
Having described embodiments of the present invention, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein is chosen in order to best explain the principles of the embodiments, the practical application, or improvements made to the technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein. The scope of the invention is defined by the appended claims.

Claims (11)

1. A verification method for a stolen article retrieval order is characterized by comprising the following steps:
acquiring the retrieved item in response to the notification of completing the stolen item retrieval order;
acquiring a first article identification information set reported by a retrieved article, wherein the retrieved article is provided with a near field communication device, and the first article identification information set is acquired by the near field communication device during the communication disconnection between the retrieved article and a server;
acquiring a second article identification information set consisting of article identification information of stolen articles recorded by a server;
detecting the number of the same item identification information existing in the first item identification information set and the second item identification information set;
and in the case that the quantity of the same item identification information exceeds a preset quantity, marking that the behavior of completing the stolen item retrieval order is invalid.
2. The method of claim 1, wherein the step of obtaining the first set of item identification information reported by the retrieved item comprises:
sending a reporting instruction of a first article identification information set to the searched article;
and acquiring the first article identification information set reported by the searched article according to the reporting instruction.
3. The method of claim 1, wherein the step of obtaining the first set of item identification information reported by the retrieved item comprises:
acquiring a recently collected article identification information set reported by a searched article;
judging whether the article identification information set collected last time is collected by the searched article in the period of communication disconnection with the server to obtain a judgment result;
in the event that the last collected set of item identification information was collected by the retrieved item during a disconnection communication with a server, taking the last collected item identification information as the first set of item identification information.
4. The method of claim 3, further comprising:
when the item identification information set which is collected last time is collected after the recovered item recovers communication with the server, a reporting instruction of a first item identification information set is sent to the recovered item;
and acquiring the first article identification information set reported by the searched article according to the reporting instruction.
5. The method according to claim 3 or 4, wherein the set of most recently collected item identification information comprises a generation time, wherein,
the step of judging whether the most recently collected item identification information set is collected by the retrieved item during the communication disconnection with the server to obtain a judgment result includes:
acquiring the completion time of the stolen article retrieval order;
and judging whether the item identification information set is acquired by the retrieved item during the communication disconnection with the server according to the completion time of the stolen item retrieval order and the generation time of the most recently acquired item identification information set, so as to obtain a judgment result.
6. The method of any of claims 1-4, wherein the step of obtaining a second set of item identification information consisting of stolen items comprises:
acquiring current position information reported by the searched article and position information reported by all stolen articles for the last time;
determining the distance value between each stolen article and the found article according to the position information reported by the stolen article for the last time and the current position information reported by the found article;
and acquiring the article identification information of the stolen article corresponding to the distance value smaller than the preset distance value, and generating the second article identification information set.
7. The method of claim 1, further comprising:
and providing a penalty value for an operator according to a verification result that the behavior of finding the order for the stolen object is an invalid behavior.
8. A verification apparatus for a stolen item retrieval order, comprising:
a first acquisition module for acquiring a retrieved item in response to a notification of completion of the stolen item retrieval order;
the second acquisition module is used for acquiring a first article identification information set reported by a retrieved article, wherein the retrieved article is provided with a short-range communication device, and the first article identification information set is acquired by the short-range communication device during the communication disconnection between the retrieved article and a server;
the second acquisition module is also used for acquiring a second article identification information set consisting of the article identification information of the stolen articles recorded by the server;
the detection module is used for detecting the number of the same item identification information existing in the first item identification information set and the second item identification information set;
and the marking module is used for marking that the behavior of completing the stolen article retrieval order is invalid when the quantity of the same article identification information exceeds a preset quantity.
9. A verification device for a stolen item retrieval order, comprising a memory for storing instructions for controlling the processor to operate to perform the method of any one of claims 1 to 7 and a processor.
10. A server, characterized by comprising a verification device of a stolen article retrieval order according to claim 8 or 9.
11. A verification system for a stolen article retrieval order, comprising the server according to claim 10, a terminal device, and a retrieved article.
CN201811251533.1A 2018-10-25 2018-10-25 Verification method, device, server and system for stolen article retrieval order Active CN109544176B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811251533.1A CN109544176B (en) 2018-10-25 2018-10-25 Verification method, device, server and system for stolen article retrieval order

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811251533.1A CN109544176B (en) 2018-10-25 2018-10-25 Verification method, device, server and system for stolen article retrieval order

Publications (2)

Publication Number Publication Date
CN109544176A CN109544176A (en) 2019-03-29
CN109544176B true CN109544176B (en) 2021-07-06

Family

ID=65845489

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811251533.1A Active CN109544176B (en) 2018-10-25 2018-10-25 Verification method, device, server and system for stolen article retrieval order

Country Status (1)

Country Link
CN (1) CN109544176B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116156231B (en) * 2023-02-27 2024-05-17 广东长虹电子有限公司 Method and system capable of automatically checking whether local machine is stolen or not

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20170024615A (en) * 2015-07-15 2017-03-08 고영은 Reservation method, and system of parking space for implementation of sharing economy
CN107195108A (en) * 2017-04-27 2017-09-22 安徽四创电子股份有限公司 Share bicycle intelligent terminal supervisory systems and its monitoring and managing method in a kind of city
CN107343022A (en) * 2017-05-24 2017-11-10 上海与德科技有限公司 Find method, terminal and the server of shared bicycle
CN107798781A (en) * 2017-09-20 2018-03-13 广东东为信息技术有限公司 A kind of shared bicycle management system and method based on community cloud monitoring system
CN107869994A (en) * 2017-10-11 2018-04-03 上海网罗电子科技有限公司 A kind of shared bicycle car searching method and system based on inertial navigation
CN108134840A (en) * 2017-12-29 2018-06-08 刘桂兰 A kind of sharing articles hunting system and method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107122831A (en) * 2017-03-22 2017-09-01 华南理工大学 A kind of bicycle comprehensive service platform towards college student
CN107380305A (en) * 2017-07-27 2017-11-24 上海传英信息技术有限公司 A kind of anti-theft method for bicycle and theft-proof device for bicycle based on smart machine

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20170024615A (en) * 2015-07-15 2017-03-08 고영은 Reservation method, and system of parking space for implementation of sharing economy
CN107195108A (en) * 2017-04-27 2017-09-22 安徽四创电子股份有限公司 Share bicycle intelligent terminal supervisory systems and its monitoring and managing method in a kind of city
CN107343022A (en) * 2017-05-24 2017-11-10 上海与德科技有限公司 Find method, terminal and the server of shared bicycle
CN107798781A (en) * 2017-09-20 2018-03-13 广东东为信息技术有限公司 A kind of shared bicycle management system and method based on community cloud monitoring system
CN107869994A (en) * 2017-10-11 2018-04-03 上海网罗电子科技有限公司 A kind of shared bicycle car searching method and system based on inertial navigation
CN108134840A (en) * 2017-12-29 2018-06-08 刘桂兰 A kind of sharing articles hunting system and method

Also Published As

Publication number Publication date
CN109544176A (en) 2019-03-29

Similar Documents

Publication Publication Date Title
US9467825B2 (en) Alerts based on vehicle and device telematics
CN104796275B (en) Abnormal state processing method, system and device
CN106384437A (en) Management system for charging socket of electric vehicle
CN102238026B (en) The management method of Internet of Things notification message and informing business capability device
CN114968643A (en) Link analysis method and device, electronic equipment, storage medium and vehicle
CN111126773A (en) Abnormal vehicle identification method and device and electronic equipment
JP2017097750A (en) Positioning system, wireless tag device, and positioning method thereof
CN109544176B (en) Verification method, device, server and system for stolen article retrieval order
WO2015139451A1 (en) Wireless terminal monitoring method, apparatus and system and computer storage medium
CN113830209B (en) Abnormal movement detection method and device, vehicle and server
CN113837845A (en) Returning processing method and device for shared bicycles and server
CN113673647B (en) Helmet return processing method of electric bicycle and electric bicycle
JP2011002873A (en) Answering device, answering method, and answering device control program
US10896402B2 (en) Short-range wireless determination of a vehicle&#39;s asset inventory
CN111681369A (en) Parking control method, vehicle, server and vehicle system
JP2016069180A (en) Article leaving notification system and method for notification of article leaving
KR101502739B1 (en) System and method for missing protection using messenger app.
CN113611045B (en) Helmet use control method of electric bicycle and electric bicycle
JP6875832B2 (en) Information notification device
KR101487208B1 (en) Method for providing emergency message using push method and device using the same
CN108377563B (en) Method for managing wearable equipment, server and client
KR20150129337A (en) Facility management method using customized facility management system
CN106503956B (en) Travel information prompting method and mobile terminal thereof
KR20150022280A (en) Terminal and server for providing notification service and operating method thereof and computer readable medium having computer program recorded therefor
JP2008258850A (en) Communication checker, communication-state detection system, and method for checking communication state

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201218

Address after: Room 168, building 6, 741 Hangzhou Road, Yangpu District, Shanghai 200090

Applicant after: HANHAI INFORMATION TECHNOLOGY SHANGHAI Co.,Ltd.

Address before: Room Bnan 1231, 2 bungalows, No. 5 Road, College, Haidian District, Beijing, 100191

Applicant before: BEIJING MOBIKE TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
CP02 Change in the address of a patent holder
CP02 Change in the address of a patent holder

Address after: 200090 Room 102, block D2 (Building 8), No. 221, Huangxing Road, Yangpu District, Shanghai

Patentee after: HANHAI INFORMATION TECHNOLOGY SHANGHAI Co.,Ltd.

Address before: Room 168, building 6, 741 Hangzhou Road, Yangpu District, Shanghai 200090

Patentee before: HANHAI INFORMATION TECHNOLOGY SHANGHAI Co.,Ltd.