CN110363606B - Unmanned vending container, unmanned vending system and goods inventory method - Google Patents

Unmanned vending container, unmanned vending system and goods inventory method Download PDF

Info

Publication number
CN110363606B
CN110363606B CN201810319671.2A CN201810319671A CN110363606B CN 110363606 B CN110363606 B CN 110363606B CN 201810319671 A CN201810319671 A CN 201810319671A CN 110363606 B CN110363606 B CN 110363606B
Authority
CN
China
Prior art keywords
inventory data
inventory
data
difference
response
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810319671.2A
Other languages
Chinese (zh)
Other versions
CN110363606A (en
Inventor
王思琦
任国栋
杨海朝
吴永强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wormpex Technology Beijing Co Ltd
Original Assignee
Wormpex Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wormpex Technology Beijing Co Ltd filed Critical Wormpex Technology Beijing Co Ltd
Priority to CN201810319671.2A priority Critical patent/CN110363606B/en
Publication of CN110363606A publication Critical patent/CN110363606A/en
Application granted granted Critical
Publication of CN110363606B publication Critical patent/CN110363606B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F9/00Details other than those peculiar to special kinds or types of apparatus
    • G07F9/002Vending machines being part of a centrally controlled network of vending machines

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Quality & Reliability (AREA)
  • Human Resources & Organizations (AREA)
  • Tourism & Hospitality (AREA)
  • Operations Research (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
  • Cash Registers Or Receiving Machines (AREA)

Abstract

The application provides a method for checking goods in an unmanned sales counter, which comprises the steps of identifying goods labels in the counter to obtain first inventory data; detecting the opening and closing condition of the cabinet door, and obtaining second inventory data of goods in the cabinet after detecting that the cabinet door is closed; determining whether the difference between the first inventory data and the second inventory data comprises a weak tag, wherein the weak tag is a goods tag which is misread or the number of missed reads exceeds a preset threshold; and in response to the difference between the first inventory data and the second inventory data not including the weak tag, generating a user shopping order based on the difference between the first inventory data and the second inventory data and updating the current inventory data with the second inventory data; or triggering a first protected inventory in response to a difference between the first inventory data and the second inventory data comprising the weak tag. The application also introduces a corresponding unmanned vending container and an unmanned vending system.

Description

Unmanned vending container, unmanned vending system and goods inventory method
Technical Field
The application relates to the field of unmanned retail, in particular to an unmanned vending container, an unmanned vending system and a goods inventory method.
Background
The appearance of the unmanned selling mode arouses wide social attention, and the selling mode not only can save the pain of queuing and buying the order for the consumer, but also brings better shopping experience; and can reduce the cost of manpower for the merchant. However, no-one selling technology is immature at present, and a wrong bill may occur.
As one of the mainstream technical directions of current unmanned vending, the RFID technology utilizes radio frequency signals to realize contactless information transmission through spatial coupling, and achieves the purpose of identification through the transmitted information. The RFID electronic tag can send the information in the electronic tag to a corresponding processing module for identification and processing. An advantage of using RFID technology to support unattended sales is the control of the location of the goods. However, in the practical application, the unmanned vending process based on the RFID technology is prone to wrong orders, still cannot bring a convenient and fast experience of sufficient reassurance to the user, and is not beneficial to popularization and application of unmanned vending.
Disclosure of Invention
In order to overcome the above problems, the present application provides a method of checking items in an unmanned sales container, comprising identifying item tags within the container to obtain first inventory data; detecting the opening and closing condition of the cabinet door, and obtaining second inventory data of goods in the cabinet after detecting that the cabinet door is closed; determining whether the difference between the first inventory data and the second inventory data comprises a weak tag, wherein the weak tag is a goods tag which is misread or the number of missed reads exceeds a preset threshold; and in response to the difference between the first inventory data and the second inventory data not including the weak tag, generating a user shopping order based on the difference between the first inventory data and the second inventory data and updating the current inventory data with the second inventory data; or triggering a first protected inventory in response to a difference between the first inventory data and the second inventory data comprising the weak tag.
In particular, the first protective inventory includes detecting items in the cabinet to generate third inventory data; and the method further comprises determining whether the third inventory data and the second inventory data are equal; and in response to the third inventory data being equal to the second inventory data, generating a user shopping order according to the difference between the first inventory data and the second or third inventory data, and updating the current inventory data with the second or third inventory data.
In particular, the method further includes, in response to the third inventory data not being equal to the second inventory data, generating a user shopping order based on a difference between the first inventory data and the third inventory data, and updating the current inventory data with the third inventory data.
In particular, the method further comprises triggering a second protection inventory in response to the third inventory data not being equal to the second inventory data.
In particular, the method further includes, in response to the third inventory data not being equal to the second inventory data, further comparing the second and third inventory data to generate a user shopping list.
In particular, the second protection inventory includes identifying item tags within the cabinet to generate fourth inventory data; and the method further comprises determining whether the fourth inventory data and the third inventory data are equal; in response to the fourth inventory data being equal to the third inventory data, generating a user shopping order according to a difference between the first inventory data and the third or fourth inventory data, and updating current inventory data with the third or fourth inventory data; or in response to the fourth inventory data being not equal to the third inventory data, generating fifth inventory data according to a union of the second inventory data, the third inventory data and the fourth inventory data, generating a user shopping order according to a difference between the first inventory data and the fifth inventory data, and updating the current inventory data by using the fifth inventory data.
In particular, further comparing the second and third inventory data includes determining whether the second inventory data includes the third inventory data; in response to the second inventory data comprising the third inventory data, generating a user shopping order according to a difference between the first inventory data and the second inventory data, and updating current inventory data with the second inventory data; or determining whether the third inventory data includes the second inventory data; in response to the third inventory data comprising the second inventory data, generating a user shopping order according to a difference between the first inventory data and the third inventory data, and updating current inventory data with the third inventory data; otherwise, determining a union of the second inventory data and the third inventory data, generating a user shopping order according to the difference between the first inventory data and the union, and updating the current inventory data by using the union.
The application also provides an unmanned goods-selling counter which comprises a counter body and a counter door; an in-cabinet antenna configured to identify in-cabinet item tags to obtain in-cabinet item inventory data; the sensing device is configured to sense the opening and closing condition of the cabinet door; and the processor is configured to communicate with the antenna in the cabinet and the sensing device, and judge whether to perform protection inventory according to whether inventory data before and after opening and closing of the cabinet door comprises weak tags, wherein the weak tags are goods tags which are misread or have the number of missed reads exceeding a preset threshold value.
In particular, the processor is configured to determine whether the first stock data before the door is opened and the second stock data obtained after the door is opened include the weak tag; in response to the difference between the first inventory data and the second inventory data not including the weak tag, the processor generating a user shopping order based on the difference between the first inventory data and the second inventory data and updating the second inventory data to current inventory data; or triggering a first protected inventory in response to a difference between the first inventory data and the second inventory data comprising the weak tag.
In particular, the processor is configured to obtain third inventory data of in-cabinet items from the in-cabinet antenna in the first protective inventory; determining whether the third inventory data and the second inventory data are equal; and in response to the third inventory data being equal to the second inventory data, generating a user shopping order according to the difference between the first inventory data and the second or third inventory data, and updating the current inventory data with the second or third inventory data.
In particular, the processor is configured to generate a user shopping order based on a difference between the first inventory data and the third inventory data and update the current inventory data with the third inventory data in response to the third inventory data not being equal to the second inventory data.
In particular, the processor is configured to trigger a second protection inventory in response to the third inventory data not being equal to the second inventory data.
In particular, the processor is configured to further compare the second and third inventory data to generate a user shopping list in response to the third inventory data not being equal to the second inventory data.
In particular, the processor is configured to obtain fourth inventory data of the in-cabinet items from the in-cabinet antenna in the second protective inventory; determining whether the fourth inventory data and the third inventory data are equal; in response to the fourth inventory data being equal to the third inventory data, generating a user shopping order according to a difference between the first inventory data and the third or fourth inventory data, and updating current inventory data with the third or fourth inventory data; or responding to the fact that the fourth inventory data are not equal to the third inventory data, generating fifth inventory data according to a union set of the second inventory data, the third inventory data and the fourth inventory data, generating a user shopping order according to a difference between the first inventory data and the fifth inventory data, and updating the current inventory data by utilizing the fifth inventory data.
In particular, in further comparing the second and third inventory data, the processor is configured to determine whether the second inventory data includes the third inventory data; in response to the second inventory data comprising the third inventory data, generating a user shopping order according to a difference between the first inventory data and the second inventory data, and updating current inventory data with the second inventory data; or determining whether the third inventory data includes the second inventory data; in response to the third inventory data comprising the second inventory data, generating a user shopping order according to a difference between the first inventory data and the third inventory data, and updating current inventory data with the third inventory data; otherwise, determining a union of the second inventory data and the third inventory data, generating a user shopping order according to the difference between the first inventory data and the union, and updating the current inventory data by using the union.
The application also provides an unmanned vending system, which comprises an unmanned vending container and a system server; the unmanned vending container includes: a cabinet body and a cabinet door; an in-cabinet antenna configured to identify in-cabinet item tags to obtain in-cabinet item inventory data; the sensing device is configured to sense the opening and closing condition of the cabinet door; and a processor configured to communicate with the in-cabinet antenna, the sensing device, and a system server; the system server is configured to judge whether protection inventory needs to be performed according to whether stock data before and after the cabinet door is opened and closed comprise weak tags or not, wherein the weak tags are goods tags which are misread or have the misread frequency exceeding a preset threshold value.
In particular, the system server is configured to determine whether a difference between first inventory data before the door is opened and second inventory data obtained after the door is opened includes the weak tag; in response to the difference between the first inventory data and the second inventory data not including the weak tag, the processor generating a user shopping order based on the difference between the first inventory data and the second inventory data and updating the second inventory data to current inventory data; or in response to a difference between the first inventory data and the second inventory data comprising the weak tag, instructing the processor to trigger a first protection count.
In particular, the system server is configured to obtain, from the processor, third inventory data for items within the cabinet in the first protective inventory; determining whether the third inventory data and the second inventory data are equal; and in response to the third inventory data being equal to the second inventory data, generating a user shopping order according to the difference between the first inventory data and the second or third inventory data, and updating the current inventory data with the second or third inventory data.
In particular, the system server is configured to generate a user shopping order based on a difference between the first inventory data and the third inventory data in response to the third inventory data not being equal to the second inventory data, and update the current inventory data with the third inventory data.
In particular, the system server is configured to instruct the processor to trigger a second protection inventory in response to the third inventory data not being equal to the second inventory data.
In particular, the system server is configured to, in response to the third inventory data not being equal to the second inventory data, further compare the second and third inventory data to generate a user shopping list.
In particular, the system server is configured to obtain fourth inventory data of items within the cabinet from the processor in the second protective inventory; determining whether the fourth inventory data and the third inventory data are equal; in response to the fourth inventory data being equal to the third inventory data, generating a user shopping order according to a difference value between the first inventory data and the third or fourth inventory data, and updating the current inventory data by using the third or fourth inventory data; or responding to the fact that the fourth inventory data are not equal to the third inventory data, generating fifth inventory data according to a union set of the second inventory data, the third inventory data and the fourth inventory data, generating a user shopping order according to a difference value of the first inventory data and the fifth inventory data, and updating the current inventory data by utilizing the fifth inventory data.
In particular, in further comparing the second and third inventory data, the system server is configured to determine whether the second inventory data includes the third inventory data; in response to the second inventory data comprising the third inventory data, generating a user shopping order according to a difference between the first inventory data and the second inventory data, and updating the current inventory data with the second inventory data; or determining whether the third inventory data includes the second inventory data; in response to the third inventory data comprising the second inventory data, generating a user shopping order according to a difference between the first inventory data and the third inventory data, and updating the current inventory data with the third inventory data; otherwise, determining a union of the second inventory data and the third inventory data, generating a user shopping order according to the difference value of the first inventory data and the union, and updating the current inventory data by using the union.
Drawings
Preferred embodiments of the present application will now be described in further detail with reference to the accompanying drawings, in which:
FIG. 1 is a schematic view of an unmanned vending container according to one embodiment of the present application;
FIG. 2 is a diagram of an interior structure of an unmanned container according to one embodiment of the present application;
FIG. 3 is a schematic view of a drone vending system according to another embodiment of the present application; and
FIG. 4 is a flow chart of a method of inventorying items in an unmanned vending system according to one embodiment of the present application;
FIG. 5 is a flow chart of a method of inventorying items in an unmanned vending system according to another embodiment of the present application; and
FIG. 6 is a flow chart of a method of inventorying items in an unmanned vending system according to yet another embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the following detailed description, reference is made to the accompanying drawings that form a part hereof and in which is shown by way of illustration specific embodiments of the application. In the drawings, like numerals describe substantially similar components throughout the different views. Various specific embodiments of the present application are described in sufficient detail below to enable those skilled in the art to practice the teachings of the present application. It is to be understood that other embodiments may be utilized and structural, logical or electrical changes may be made to the embodiments of the present application.
At present, the unmanned vending system mainly adopts the RFID technology, and for an unmanned vending cabinet as an example, one or more RFID antennas are arranged in the cabinet and used for detecting goods in the cabinet. The existing unmanned sales counter or unmanned sales system generates a shopping list by directly using the difference between the stock amounts of goods in the counter before and after the user acquires the goods as a final shopping list. However, in practical applications, the self-service vending system adopting the inventory mode is prone to a phenomenon of shopping list errors, and shopping experience of consumers is affected.
One reason for this is that a shopping list error may be caused by an antenna reading error due to an item tag quality problem, which ultimately causes the system to generate an erroneous shopping list.
In order to overcome the above problems, the present application proposes an inventory mechanism with a self-checking or protection function. Specifically, under the condition that the shopping list comprises the weak tags, an additional checking step can be added in the traditional order generation step of simply finding the difference, so that the accuracy of the shopping list generated by the system is improved, the shopping experience of a user is greatly improved, and meanwhile, the shopping efficiency of the user is not obviously influenced.
The "weak tag" is a tag with weak signal receiving or transmitting capability or a tag that may cause antenna misreading. According to one embodiment, the weak tag may be an item tag that has been misread or missed with a number of times that exceeds a preset threshold. The preset threshold value can be selected according to the requirements of the user. Whatever method is used to screen out the weak tags, the following method may be used to make a protective check against the presence of items with weak tags in the shopping list.
As will be appreciated by those skilled in the art, other types of tags and corresponding reading techniques may be used in the vending system, i.e., the method of securing inventories is not limited to RFID technology. Based on the technical scheme of the application, no matter what kind of label is adopted and the unmanned vending system of the reading technology is adopted, the method for protecting the checking by applying the application belongs to the protection scope of the application.
The technical solution of the present application is further illustrated by a specific example. It is to be understood by those skilled in the art that the following descriptions are provided only for facilitating understanding of the technical solutions applied and should not be used to limit the scope of the present application.
FIG. 1 is a schematic view of an unmanned vending container according to one embodiment of the present application. As shown, the unmanned vending container 100 includes a container body 101 and a door 102, wherein the container body and the door together define a space for receiving goods.
Further, the unmanned vending container also includes partitions 103, 104 for carrying the goods within the container. As will be appreciated by those skilled in the art, the partitions within the unmanned vending container may be of varying numbers and locations. According to one embodiment of the present application, the unmanned vending container may not include a partition.
Further, the unmanned cargo container further includes in- container antennas 105, 106 for reading tags attached to the goods in the container, thereby obtaining the quantity of the goods. The in- cabinet antennas 105, 106 may be disposed below the in- cabinet partitions 103, 104, respectively, as shown in fig. 1. Of course, as will be understood by those skilled in the art, the antenna disposed in the cabinet below the partition is merely one embodiment, and the position relationship between the antenna and the partition may be other ways, or in a container without a partition, the antenna may be attached to the inside of the cabinet body or even the cabinet door. According to one embodiment of the present application, the number of antennas in the cabinet may be different according to the actual application.
According to one embodiment of the present application, the in-cabinet RFID antenna may have different shapes. Since the RFID antenna is generally made of a PCB board, it is generally flat in shape. As will be appreciated by those skilled in the art, the RFID antenna may have other shapes depending on different application scenarios and application needs. In addition, the in-cabinet RFID antenna may be secured to the container 100 in different ways. For example: bolting, riveting, gluing, etc. According to one embodiment of the present application, when the cabinet door 102 is closed, it forms a substantially closed space together with the cabinet body 101, and the RF signal can be reflected in the space, so as to realize accurate reading of all the goods RFID in the cabinet.
FIG. 2 is a schematic block diagram of the internal structure of an unmanned container according to one embodiment of the present application. As shown, the self-service container 100 includes a processor 201 and an in-container RFID antenna 202 coupled to the processor. The in-cabinet RFID antenna 202 detects RFID tags attached to goods in the cabinet and transmits the identification result to the processor 201, and the processor 201 controls the working state of the RFID antenna 202 and the communication with the unmanned shopping system control unit. According to one embodiment of the present application, the processor 201 may also be used to process in-cabinet item lists and shopping list generation.
According to an embodiment of the present application, the processor 201 may be a single chip. According to one embodiment of the present application, the unmanned vending container may further include a memory 203, wherein the memory 203 may store in-container inventory, user shopping inventory, and the like. The memory 203 may be separate or integrated on the same chip as the processor 201.
According to one embodiment of the application, the container may further comprise sensing means 204 for sensing the opening and closing of the container door. The sensing device 204 is coupled to the processor 201, and the processor 201 activates the in-cabinet RFID antenna 202 to read the in-cabinet item tags when the sensing device 204 detects that the cabinet door 102 is closed, thereby generating an in-cabinet item list. According to one embodiment of the present application, the sensing device 204 may be a light sensor, an infrared sensor, a pressure sensor, or the like. According to an embodiment of the present application, the sensing device 204 may be disposed on an edge of the inner surface of the cabinet door 102 contacting with the cabinet body 101, or on an edge of the opening of the cabinet body 101 contacting with the cabinet door. According to an embodiment of the present application, one or more sensing devices 204 may be disposed on the cabinet body 101 or the cabinet door 102.
According to one embodiment, the processor 201 may be configured to compare the inventory of items in the cabinet before and after the user closes the cabinet door 102, and when the difference between the two inventory includes a weak tag, the processor 201 triggers the in-cabinet antenna 202 to initiate a protection inventory. The specific steps for protecting inventory will be described in detail below when describing the inventory method of the present application. In the process of secure inventory, the processor 201 corrects the inventory of items after the user closes the door of the cabinet, thereby generating a more accurate shopping list of the user that is closer to reality.
FIG. 3 is a schematic view of a drone vending system according to one embodiment of the present application. As shown, the unmanned vending system 300 may include a server 301 and an unmanned vending container 302 and 304. The structure of the vending containers 302-304 is similar to the vending container 100 described above. According to one embodiment, the processor of container 302 and 304 is only responsible for communication with the RFID antenna, sensing devices, memory, and server 301, leaving all processing to server 301, such as sending the resulting in-container inventory to server 301, determining by server 301 whether to initiate a protection inventory and generating a final shopping list.
FIG. 4 is a flow chart of a method of inventorying items in an unmanned vending system according to one embodiment of the present application. As shown, the unmanned vending container may have a raw inventory data A, which, as will be appreciated by those skilled in the art, may be obtained by RFID antennas within the container identifying the RFID tags of the items within the container, or may be stored inventory data of the items within the container as the container is loaded.
In step 401, when the user opens the door of the container during the shopping process, no matter whether the user takes the goods in the container or not, after the shopping process is finished, the container sensing device detects that the door of the container is closed, and reports the closing to the processor.
In step 402, the processor activates the in-cabinet RFID antenna to read the RFID of the in-cabinet items for inventory based on the report from the sensing device, thereby obtaining inventory data B of the in-cabinet items. According to one embodiment of the present application, the antenna reader can read the inventory data B through the antenna in the cabinet and report to the processor of the container. The processor may store data B or upload it to a server of the automated vending system. According to one embodiment of the application, the processor of the container can be a single chip microcomputer, and the single chip microcomputer is configured to control the working states of the RFID antenna reader-writer and the induction device and communicate with the server of the system.
In step 403, the processor of the container or the server of the system compares the inventory data A with the inventory data B and determines whether a weak tag is included therein. This comparison is performed to determine whether a protection inventory is required.
In step 404, when the difference between the inventory data A and the inventory data B does not include any weak tags as determined in step 403, the processor of the container or the server of the system may calculate the difference between the inventory data A and the inventory data B, and jump to step 410 to push the difference between the inventory data A and the inventory data B to the user or store the difference in a temporary shopping cart of the user as a shopping order of the user, and store the inventory data B in the container storage or the server of the system as the current inventory data.
In step 405, when the comparison result in step 403 is that the difference between the inventory data a and the inventory data B includes a weak tag, the container processor or the system server sends an instruction to the container processor to control the antenna reader-writer to activate the RFID antenna in the container to read the RFID of the goods in the container for the first protection checking.
Further, in a first protection inventory, the in-cabinet RFID antenna of the container is configured to once again identify the RFID of the items within the container, thereby obtaining inventory data C of the items within the cabinet, at step 406. According to one embodiment of the application, the antenna reader can obtain new inventory data C from the in-cabinet antenna and report to the container processor. The container processor may store the data C or upload it to the server of the unmanned vending system. The purpose of this operation is that the first time the inventory includes a weak tag indicates that there is a possibility of misreading, so that additional reads are made for error correction purposes.
In step 407, the container processor or system server compares the inventory data C and the inventory data B for equality. If the same result as before is obtained by reading the item tags in the cabinet again via the RFID antenna, it is believed that the user has indeed purchased a relatively large amount of items. Since the probability of errors after all twice is very low.
In step 408, when the comparison result in step 407 is that the inventory data B is equal to the inventory data C, the processor of the container or the system server calculates the difference between the inventory data A and the inventory data C (or the inventory data B), and jumps to step 410 to push the difference between the inventory data A and the inventory data C (or the inventory data B) as the shopping order of the user to the user or store the difference in the inventory data A and the inventory data C (or the inventory data B) as the current inventory data in the container memory or the system server.
In step 409, when the comparison result in step 407 is that the inventory data B is not equal to the inventory data C, the processor of the container or the server of the system takes the inventory data C obtained by protection checking as correct inventory data, calculates the difference between the inventory data a and the inventory data C, and jumps to step 410 to push the difference between the inventory data a and the inventory data C as a shopping order of the user to the user or store the difference in a temporary shopping cart of the user, and store the inventory data C as current inventory data in the container memory or the server of the system.
The method described in this example is based on the belief that the results of the second protective inventorying should be better than the results of the first test, and therefore the inventory data C from the protective inventorying is credited. Of course, this determination is a possibility of some omission, and therefore, a further more precise protection inventory method will be described further below.
FIG. 5 is a flow chart of a method of inventorying items in an unmanned vending system according to another embodiment of the present application. The operation of steps 501-508 in the method of the embodiment is substantially the same as that of steps 401-408 in the method shown in FIG. 4. And will not be described in detail herein.
In step 509, when the comparison result in step 507 is that the inventory data B is not equal to the inventory data C, the processor of the unmanned sales counter or the unmanned sales system determines whether the inventory data B includes the inventory data C.
In step 510, when the judgment result in step 509 is that the inventory data B includes inventory data C, the processor of the container or the server of the system may calculate the difference between the inventory data a and the inventory data B, and go to step 515 to push the difference between the inventory data a and the inventory data B as a shopping order of the user to the user or store the difference in a temporary shopping cart of the user, and store the inventory data B as the current inventory data in the container storage or the server of the system. Since the missing inspection is common when the self-service counter check error occurs, it is considered that the missing inspection of the inventory data C exists when the inventory data B contains the inventory data C, and therefore the inventory data B is adopted as the basis to generate the user shopping list.
In step 511, when the judgment result of step 509 is that the inventory data B does not include the inventory data C, it is judged whether the inventory data C includes the inventory data B by the processor of the unmanned sales counter or the unmanned vending system.
In step 512, when the judgment result in step 511 is that the inventory data C includes inventory data B, the processor of the container or the server of the system may calculate the difference between the inventory data A and the inventory data C, and go to step 515 to push the difference between the inventory data A and the inventory data C as a shopping order of the user to the user or store the difference in a temporary shopping cart of the user, and store the inventory data C as the current inventory data in the container storage or the server of the system.
In step 513, when the determination of step 511 is that inventory data C does not contain inventory data B, the processor of the container or the server of the system may calculate the union of inventory data B and inventory data C. When the stock data obtained by twice inventory do not contain each other, the condition that the stock data obtained by twice inventory are missed is shown, and therefore, the union of the stock data and the stock data is used as a basis for calculating the order of the user.
In step 514, the difference between inventory data A and the union is calculated, and step 515 is skipped to push the difference to the user as the user's shopping order or store it in the user's temporary shopping cart, and the union of inventory data B and inventory data C is stored as the current inventory data in the container storage or system server.
FIG. 6 is a flow chart of a method of inventorying items in an unmanned vending system according to yet another embodiment of the present application. The operation of step 601-608 in the method of the embodiment is substantially the same as that of step 401-408 in the method shown in FIG. 4. And will not be described in detail herein.
In step 609, when the judgment result in step 607 is that the inventory data B is not equal to the inventory data C, the container processor or the system server sends an instruction to the container processor to control the antenna reader-writer to activate the RFID antenna in the container to read the RFID of the goods in the container for the second protection checking.
Further, at step 610, during the second protection inventory, the in-cabinet RFID antennas of the container are configured to again perform inventory via RFID that identifies items within the container, thereby obtaining inventory data D for the items within the cabinet. According to one embodiment of the application, the antenna reader can read the inventory data D from the in-cabinet antenna and report to the container processor. The container processor may store the data D or upload it to a server of the unmanned vending system.
In step 611 the container processor or system server compares the inventory data D and the inventory data C for equality.
In step 612, when the comparison result of step 611 is that inventory data C is equal to inventory data D, then inventory data B is considered to be read incorrectly, and inventory data C and inventory data D are both read correctly, then the processor of the container or the server of the system can calculate the difference between inventory data A and inventory data D (or inventory data C), and jump to step 615 to push the difference to the user as the user's shopping order or store it in the user's temporary shopping cart, and store inventory data D (or inventory data C as the current inventory data in the container memory or the server of the system.
In step 613, when the comparison result of step 611 shows that the inventory data C is not equal to the inventory data D, and at least one of the inventory data B, the inventory data C, and the inventory data D is considered to have an error in reading, the processor of the container or the system server finds a union of the inventory data B, the inventory data C, and the inventory data D. Therefore, the method of integrating the inventory data of three times of inventory can eliminate the influence of missed detection in three times as much as possible. As will be understood by those skilled in the art, if the data of the three-time stock data is read accurately once, the stock data obtained by summing is the accurate stock data. Even if three are inaccurate, the union will be closer to the exact value.
At step 614, the processor of the container or the server of the system may calculate the difference between inventory data A and the union and push the difference to the user as a shopping order for the user or store it in the user's temporary shopping cart.
Although the scheme of the application may prolong the shopping order generation time of the user to a certain extent, the probability is very low, and even if the time is prolonged, the user cannot feel the time or the shopping experience of the user is not significantly influenced. But can obtain more accurate user shopping order simultaneously, avoid bringing unnecessary economic loss for the user, bring better shopping experience.
The above-described embodiments are provided for illustrative purposes only and are not intended to be limiting, and various changes and modifications may be made by those skilled in the relevant art without departing from the scope of the present disclosure, and therefore, all equivalent technical solutions should be considered to fall within the scope of the present disclosure.

Claims (23)

1. A method of inventorying goods in an unmanned sales container, comprising:
identifying item tags within a cabinet to obtain first inventory data;
detecting the opening and closing condition of the cabinet door, and obtaining second inventory data of goods in the cabinet after detecting that the cabinet door is closed;
determining whether the difference between the first inventory data and the second inventory data comprises a weak tag, wherein the weak tag is a goods tag which is misread or the number of missed reads exceeds a preset threshold; and
in response to the difference between the first inventory data and the second inventory data not including the weak tag, generating a user shopping order based on the difference between the first inventory data and the second inventory data and updating the current inventory data with the second inventory data; or
Triggering a first protected inventory in response to a difference between the first inventory data and the second inventory data comprising the weak tag.
2. The method of claim 1, wherein the first protective inventory includes detecting items within a bin to generate third inventory data; and the method further comprises:
determining whether the third inventory data and the second inventory data are equal;
and in response to the third inventory data being equal to the second inventory data, generating a user shopping order according to the difference between the first inventory data and the second or third inventory data, and updating the current inventory data with the second or third inventory data.
3. The method of claim 2, further comprising:
and in response to the third inventory data not being equal to the second inventory data, generating a user shopping order according to the difference between the first inventory data and the third inventory data, and updating the current inventory data by using the third inventory data.
4. The method of claim 2, further comprising:
triggering a second protection inventory in response to the third inventory data not being equal to the second inventory data.
5. The method of claim 2, further comprising:
in response to the third inventory data not being equal to the second inventory data, further comparing the second and third inventory data to generate a user shopping list.
6. The method of claim 4, wherein the second protective inventorying comprises identifying item tags within the cabinet to generate fourth inventory data; and the method further comprises:
determining whether the fourth inventory data and the third inventory data are equal;
in response to the fourth inventory data being equal to the third inventory data, generating a user shopping order according to a difference between the first inventory data and the third or fourth inventory data, and updating current inventory data with the third or fourth inventory data; or
And in response to the fourth inventory data not being equal to the third inventory data, generating fifth inventory data according to a union of the second inventory data, the third inventory data and the fourth inventory data, generating a user shopping order according to a difference between the first inventory data and the fifth inventory data, and updating the current inventory data by using the fifth inventory data.
7. The method of claim 5, wherein further comparing the second and third inventory data comprises:
determining whether the second inventory data includes the third inventory data;
in response to the second inventory data comprising the third inventory data, generating a user shopping order according to a difference between the first inventory data and the second inventory data, and updating current inventory data with the second inventory data;
determining whether a second inventory data includes the second inventory data in response to the second inventory data not including the third inventory data;
in response to the third inventory data comprising the second inventory data, generating a user shopping order according to a difference between the first inventory data and the third inventory data, and updating current inventory data with the third inventory data;
in response to the third inventory data not including the second inventory data, determining a union of the second inventory data and the third inventory data, and generating a user shopping order based on a difference between the first inventory data and the union, and updating the current inventory data with the union.
8. An unmanned vending container comprising:
a cabinet body and a cabinet door;
an in-cabinet antenna configured to identify in-cabinet item tags to obtain in-cabinet item inventory data;
the sensing device is configured to sense the opening and closing condition of the cabinet door; and
and the processor is configured to communicate with the antenna in the cabinet and the sensing device, and judge whether to perform protection inventory according to whether inventory data before and after opening and closing of the cabinet door comprises weak tags, wherein the weak tags are goods tags which are misread or have the number of missed reads exceeding a preset threshold value.
9. The freight container of claim 8, where the processor is configured to,
determining whether the first stock data before the cabinet door is opened and the second stock data obtained after the cabinet door is opened comprise the weak label;
in response to the difference between the first inventory data and the second inventory data not including the weak tag, the processor generating a user shopping order based on the difference between the first inventory data and the second inventory data and updating the second inventory data to current inventory data; or
Triggering a first protected inventory in response to a difference between the first inventory data and the second inventory data comprising the weak tag.
10. The freight container of claim 9, where the processor is configured to
Obtaining third inventory data for in-cabinet items from the in-cabinet antenna in the first protection inventory;
determining whether the third inventory data and the second inventory data are equal;
and in response to the third inventory data being equal to the second inventory data, generating a user shopping order according to the difference between the first inventory data and the second or third inventory data, and updating the current inventory data with the second or third inventory data.
11. The freight container of claim 10, where the processor is configured to
And in response to the third inventory data not being equal to the second inventory data, generating a user shopping order according to the difference between the first inventory data and the third inventory data, and updating the current inventory data by using the third inventory data.
12. The freight container of claim 10, where the processor is configured to trigger a second protection inventory in response to the third inventory data not being equal to the second inventory data.
13. The container of claim 10, wherein the processor is configured to further compare the second and third inventory data to generate a user shopping list in response to the third inventory data not being equal to the second inventory data.
14. The freight container of claim 12, where the processor is configured to
Obtaining fourth inventory data for in-cabinet goods from the in-cabinet antenna in the second protection inventory;
determining whether the fourth inventory data and the third inventory data are equal;
in response to the fourth inventory data being equal to the third inventory data, generating a user shopping order according to a difference between the first inventory data and the third or fourth inventory data, and updating current inventory data with the third or fourth inventory data; or
And in response to the fourth inventory data not being equal to the third inventory data, generating fifth inventory data according to a union of the second inventory data, the third inventory data and the fourth inventory data, generating a user shopping order according to a difference between the first inventory data and the fifth inventory data, and updating the current inventory data by using the fifth inventory data.
15. The freight container of claim 13, where in the further comparison of the second and third inventory data, the processor is configured to
Determining whether the second inventory data includes the third inventory data;
in response to the second inventory data comprising the third inventory data, generating a user shopping order according to a difference between the first inventory data and the second inventory data, and updating current inventory data with the second inventory data;
determining whether a second inventory data includes the second inventory data in response to the second inventory data not including the third inventory data;
in response to the third inventory data comprising the second inventory data, generating a user shopping order according to a difference between the first inventory data and the third inventory data, and updating current inventory data with the third inventory data;
in response to the third inventory data not including the second inventory data, determining a union of the second inventory data and the third inventory data, and generating a user shopping order based on a difference between the first inventory data and the union, and updating the current inventory data with the union.
16. An unmanned vending system comprises an unmanned vending container and a system server; the unmanned vending container includes:
a cabinet body and a cabinet door;
an in-cabinet antenna configured to identify in-cabinet item tags to obtain in-cabinet item inventory data;
the sensing device is configured to sense the opening and closing condition of the cabinet door; and
a processor configured to communicate with the in-cabinet antenna, the sensing device, and a system server;
the system server is configured to judge whether protection inventory needs to be performed according to whether stock data before and after the cabinet door is opened and closed comprise weak tags or not, wherein the weak tags are goods tags which are misread or have the misread frequency exceeding a preset threshold value.
17. The unmanned vending system of claim 16, wherein the system server is configured to provide the vending system with a consumer service provider
Determining whether the difference between the first stock data before the cabinet door is opened and the second stock data obtained after the cabinet door is opened comprises the weak label;
in response to the difference between the first inventory data and the second inventory data not including the weak tag, the processor generating a user shopping order based on the difference between the first inventory data and the second inventory data and updating the second inventory data to current inventory data; or
Instructing the processor to trigger a first protection count in response to a difference between the first inventory data and the second inventory data comprising the weak tag.
18. The unmanned vending system of claim 17, wherein the system server is configured to operate as a vending machine
In the first protective inventory, obtaining, from the processor, third inventory data for items within a cabinet;
determining whether the third inventory data and the second inventory data are equal;
and in response to the third inventory data being equal to the second inventory data, generating a user shopping order according to the difference between the first inventory data and the second or third inventory data, and updating the current inventory data with the second or third inventory data.
19. The unmanned vending system of claim 18, wherein the system server is configured to operate as
And responding to the fact that the third inventory data are not equal to the second inventory data, generating a user shopping order according to the difference value of the first inventory data and the third inventory data, and updating the current inventory data by utilizing the third inventory data.
20. The unmanned vending system of claim 18, wherein the system server is configured to operate as
Instructing the processor to trigger a second protection inventory in response to the third inventory data not being equal to the second inventory data.
21. The unmanned vending system of claim 18, wherein the system server is configured to operate as
In response to the third inventory data not being equal to the second inventory data, further comparing the second and third inventory data to generate a user shopping list.
22. The unmanned vending system of claim 20, wherein the configuration at the system server is such that
Obtaining fourth inventory data for items within the cabinet from the processor in the second protective inventory;
determining whether the fourth inventory data and the third inventory data are equal;
in response to the fourth inventory data being equal to the third inventory data, generating a user shopping order according to a difference value between the first inventory data and the third or fourth inventory data, and updating the current inventory data by using the third or fourth inventory data; or
And in response to the fourth inventory data not being equal to the third inventory data, generating fifth inventory data according to a union of the second inventory data, the third inventory data and the fourth inventory data, generating a user shopping order according to a difference value of the first inventory data and the fifth inventory data, and updating the current inventory data by using the fifth inventory data.
23. The unmanned vending system of claim 21, wherein in further comparing the second and third inventory data, the system server is configured to
Determining whether the second inventory data includes the third inventory data;
in response to the second inventory data comprising the third inventory data, generating a user shopping order according to a difference between the first inventory data and the second inventory data, and updating the current inventory data with the second inventory data;
determining whether a second inventory data includes the second inventory data in response to the second inventory data not including the third inventory data;
in response to the third inventory data comprising the second inventory data, generating a user shopping order according to a difference between the first inventory data and the third inventory data, and updating the current inventory data with the third inventory data;
in response to the third inventory data not including the second inventory data, determining a union of the second inventory data and the third inventory data, and generating a user shopping order based on a difference between the first inventory data and the union, and updating the current inventory data with the union.
CN201810319671.2A 2018-04-11 2018-04-11 Unmanned vending container, unmanned vending system and goods inventory method Active CN110363606B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810319671.2A CN110363606B (en) 2018-04-11 2018-04-11 Unmanned vending container, unmanned vending system and goods inventory method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810319671.2A CN110363606B (en) 2018-04-11 2018-04-11 Unmanned vending container, unmanned vending system and goods inventory method

Publications (2)

Publication Number Publication Date
CN110363606A CN110363606A (en) 2019-10-22
CN110363606B true CN110363606B (en) 2021-03-19

Family

ID=68214411

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810319671.2A Active CN110363606B (en) 2018-04-11 2018-04-11 Unmanned vending container, unmanned vending system and goods inventory method

Country Status (1)

Country Link
CN (1) CN110363606B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111815867B (en) * 2020-07-08 2022-04-22 合肥美的智能科技有限公司 Settling processing method and device for storage cabinet and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104200245A (en) * 2014-08-10 2014-12-10 国家电网公司 Quick checking method for life cycle asset of power asset
CN106022691A (en) * 2016-05-20 2016-10-12 国网山东省电力公司泰安供电公司 Storehouse system with an automatic inventory making function
US20170011384A1 (en) * 2013-03-13 2017-01-12 Pantry Retail, Inc. Vending kit and method
CN107257985A (en) * 2015-04-15 2017-10-17 实耐宝公司 Use the automatic asset management system of multiple sensing technologies
CN107331050A (en) * 2017-07-04 2017-11-07 深圳正品创想科技有限公司 Goods checking method and its system
CN107358276A (en) * 2017-07-04 2017-11-17 深圳正品创想科技有限公司 The commodity scan method and its system of self-service cabinet
CN107621790A (en) * 2017-08-31 2018-01-23 毕泰卡文化科技(深圳)有限公司 Firm sale or lending or the method and devices of books is given back on intelligent book station

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170011384A1 (en) * 2013-03-13 2017-01-12 Pantry Retail, Inc. Vending kit and method
CN104200245A (en) * 2014-08-10 2014-12-10 国家电网公司 Quick checking method for life cycle asset of power asset
CN107257985A (en) * 2015-04-15 2017-10-17 实耐宝公司 Use the automatic asset management system of multiple sensing technologies
CN106022691A (en) * 2016-05-20 2016-10-12 国网山东省电力公司泰安供电公司 Storehouse system with an automatic inventory making function
CN107331050A (en) * 2017-07-04 2017-11-07 深圳正品创想科技有限公司 Goods checking method and its system
CN107358276A (en) * 2017-07-04 2017-11-17 深圳正品创想科技有限公司 The commodity scan method and its system of self-service cabinet
CN107621790A (en) * 2017-08-31 2018-01-23 毕泰卡文化科技(深圳)有限公司 Firm sale or lending or the method and devices of books is given back on intelligent book station

Also Published As

Publication number Publication date
CN110363606A (en) 2019-10-22

Similar Documents

Publication Publication Date Title
CN107358276B (en) Commodity scanning method and system for unmanned sales counter
CN101517594B (en) Method and system for standing wave detection for radio frequency identification marker readers
US8421627B2 (en) Method for associating and RFID tag with a known region
US7940181B2 (en) RFID based product level availability
CA2675976C (en) Multi-directional rfid reader for controlling inventory and shelf stock
KR101220581B1 (en) Using RFID and automatic sensing technology as humidity and temperature management system and method
US8988199B1 (en) RFID tag parameter estimation using read difficulty factor
US20130127596A1 (en) Method and apparatus for determining a location of an item attached to a radio frequency identification tag
CN108171876B (en) Unmanned vending container, system and vending method thereof
US11651664B2 (en) Neural network classifier trained for purchasing differentiation
KR20120113202A (en) Using rfid and automatic sensing technology as humidity and temperature management system and method
US20200097940A1 (en) Product management device, control method for product management device, and program
AU2019268406A1 (en) Method, device, computer apparatus and storage medium for verifying details of an item
CN109064629A (en) Self-service counter, self-service system and kinds of goods checking method
CN110363606B (en) Unmanned vending container, unmanned vending system and goods inventory method
US20130241700A1 (en) Device and method for the automated reading/writing of rfid tags
CN110363907A (en) Self-service counter, self-service system and kinds of goods checking method
CN101261674A (en) Method and apparatus for verifying identification of radio frequency identification tag
CN201380986Y (en) Detecting system for quantity of products inside packaging case
KR102393980B1 (en) Method and device for logging data with ultra-low power using energy harvesting
EP3716174A1 (en) A method for tracing a food package for assuring efficient recycling, and an apparatus thereof
US11064312B2 (en) Shopping trolley security system
Lozano-Nieto Radio frequency identification in the smart supply chain
US11594115B2 (en) Methods and apparatuses for determining a position of a security tag
CN116933823A (en) Method and system for identifying and recognizing article based on weight information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant