CN110910055B - Data processing method, device, logistics object processing system and machine readable medium - Google Patents

Data processing method, device, logistics object processing system and machine readable medium Download PDF

Info

Publication number
CN110910055B
CN110910055B CN201811082602.0A CN201811082602A CN110910055B CN 110910055 B CN110910055 B CN 110910055B CN 201811082602 A CN201811082602 A CN 201811082602A CN 110910055 B CN110910055 B CN 110910055B
Authority
CN
China
Prior art keywords
image
authentication
logistics
storage area
person
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811082602.0A
Other languages
Chinese (zh)
Other versions
CN110910055A (en
Inventor
朱亮
刘光辉
吕伟
李夏驰
郑石磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cainiao Smart Logistics Holding Ltd
Original Assignee
Cainiao Smart Logistics Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cainiao Smart Logistics Holding Ltd filed Critical Cainiao Smart Logistics Holding Ltd
Priority to CN201811082602.0A priority Critical patent/CN110910055B/en
Priority to TW108122540A priority patent/TW202030660A/en
Priority to PCT/CN2019/104849 priority patent/WO2020057386A1/en
Publication of CN110910055A publication Critical patent/CN110910055A/en
Application granted granted Critical
Publication of CN110910055B publication Critical patent/CN110910055B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/10Image acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/20Image preprocessing
    • G06V10/22Image preprocessing by selection of a specific region containing or referencing a pattern; Locating or processing of specific regions to guide the detection or recognition

Abstract

The embodiment of the application discloses a data processing method, a data processing device, a logistics object processing system and a machine-readable medium, wherein the method specifically comprises the following steps: detecting a first image of an object in a target area; the target area includes: a storage area, and/or a vicinity of the storage area; the storage area is used for storing the object of the logistics; and authenticating the first image to obtain an authentication result. According to the embodiment of the application, the constraint and interference of the on-the-surface delivery logistics object to the two users can be reduced, the cost of the two users in the logistics is saved, the timeliness and convenience of the logistics are improved, and the logistics experience of the two users can be improved; and the security of the logistics objects in the storage area can be improved.

Description

Data processing method, device, logistics object processing system and machine readable medium
Technical Field
The present disclosure relates to the field of logistics technology, and in particular, to a data processing method, a data processing device, a logistics object processing system, and a machine readable medium.
Background
With the development of electronic commerce technology, logistics distribution has become a key ring for supporting the development of the industry.
A logistics distribution mode requires a distributor and a receiver to deliver goods according to the appointed time and place. For example, the dispatcher may deliver the shipment to a delivery location designated by the recipient, the delivery location typically being the recipient's home address, and the delivery job is completed when the recipient confirms the receipt.
However, the above-described logistics distribution method has the following problems: in the event that the consignee fails to appear at the delivery location at the delivery time as a result of processing other transactions, the dispatcher typically can only contact the consignee by telephone, and after the delivery time is redetermined, the consignee is sent his or her hands. Thus, the workload of the distributor and the timeliness of the distribution are increased, and inconvenience is brought to both the distributor and the receiver.
Disclosure of Invention
In view of the foregoing, an embodiment of the present application proposes a data processing method, a data processing apparatus, and a device, so as to solve the problems of the related art.
To solve the above problems, an embodiment of the present application discloses a data processing method, including:
detecting a first image of an object in a target area; the target area includes: a storage area, and/or a vicinity of the storage area; the storage area is used for storing the object of the logistics;
And authenticating the first image to obtain an authentication result.
In order to solve the above problem, an embodiment of the present application further discloses a logistic object processing system, including: a storage area determining device, an image acquisition device and a processing device;
wherein the processing device is coupled with the image acquisition device;
the storage area determining device is used for determining a storage area; the storage area is used for storing the object of the logistics;
the image acquisition device is used for acquiring a first image of an object in the target area; the target area includes: the storage area and/or a vicinity of the storage area;
the processing device is used for authenticating the first image and sending an instruction corresponding to the authentication result to the prompting device.
To solve the above problem, an embodiment of the present application further discloses a data processing apparatus, including:
the detection module is used for detecting a first image of an object in the target area; the target area includes: a storage area, and/or a vicinity of the storage area; the storage area is used for storing the object of the logistics; and
and the authentication module is used for authenticating the first image to obtain an authentication result.
To solve the above problem, an embodiment of the present application further discloses an apparatus, including:
one or more processors; and
one or more machine-readable media having instructions stored thereon, which when executed by the one or more processors, cause the apparatus to perform one or more of the methods described previously.
To address the above issues, an embodiment of the present application also discloses one or more machine readable media having instructions stored thereon that, when executed by one or more processors, cause an apparatus to perform one or more of the methods described previously.
As can be seen from the foregoing, the data processing method, apparatus and machine readable medium according to the embodiments of the present application have at least the following advantages:
according to the embodiment of the application, the logistics objects are stored in the storage area, so that one user in logistics can place the logistics objects in the storage area, and the other user in logistics can take away the logistics objects from the storage area, so that logistics can be realized under the condition that the logistics objects are not handed over on the surface, a series of defects caused by the fact that the two users are handed over the logistics objects on the surface can be overcome, for example, the constraint and interference of the logistics objects on the surface to the two users can be reduced, the cost of the two users in logistics is saved, the timeliness and convenience of logistics are improved, and further the logistics experience of the two users can be improved.
In addition, the embodiment of the application authenticates the first image of the object in the target area; the authentication may verify the identity of the object corresponding to the first image, for example, it may verify whether the object corresponding to the first image is a target party, if so, the authentication is successful, otherwise, the authentication is failed. According to the authentication of the embodiment of the application, the situation that the non-target party takes the logistics object away from the storage area can be avoided to a certain extent, and then the security of the logistics object in the storage area can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, a brief description will be given below of the drawings that are needed in the embodiments or the prior art descriptions, and it is obvious that the drawings in the following description are some embodiments of the present application, and that other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic structural diagram of a logistic object processing system according to an embodiment of the present application;
FIG. 2 is a flow chart of steps of an embodiment of a data processing method of the present application;
FIG. 3 is a block diagram of an embodiment of a data processing apparatus of the present application; and
Fig. 4 is a schematic structural diagram of an apparatus according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application are within the scope of the protection of the present application.
The concepts of the present application are susceptible to various modifications and alternative forms, specific embodiments thereof have been shown by way of example in the drawings and will herein be described in detail. It should be understood, however, that the description herein of specific embodiments is not intended to limit the concepts of the present application to the particular forms disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the scope of the present application.
Reference in the specification to "one embodiment," "an embodiment," "one particular embodiment," etc., means that a particular feature, structure, or characteristic may be included in the described embodiments, but every embodiment may or may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, where a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the purview of one skilled in the art to effect such feature, structure, or characteristic in connection with other ones of the embodiments whether or not explicitly described. In addition, it should be understood that the items in the list included in this form of "at least one of A, B and C" may include the following possible items: (A); (B); (C); (A and B); (A and C); (B and C); or (A, B and C). Likewise, an item listed in this form of "at least one of A, B or C" may mean (A); (B); (C); (A and B); (A and C); (B and C); or (A, B and C).
In some cases, the disclosed embodiments may be implemented as hardware, firmware, software, or any combination thereof. The disclosed embodiments may also be implemented as instructions carried on or stored on one or more transitory or non-transitory machine-readable (e.g., computer-readable) storage media, which may be executed by one or more processors. A machine-readable storage medium may be implemented as a storage device, mechanism, or other physical structure (e.g., volatile or non-volatile memory, a media disc, or other media other physical structure device) for storing or transmitting information in a form readable by a machine.
In the drawings, some structural or methodological features may be shown in a particular arrangement and/or ordering. Preferably, however, such specific arrangement and/or ordering is not necessary. Rather, in some embodiments, such features may be arranged in a different manner and/or order than as shown in the drawings. Furthermore, inclusion of a feature in a particular figure that is not necessarily meant to imply that such feature is required in all embodiments and that, in some embodiments, may not be included or may be combined with other features.
An embodiment of the present application provides a physical distribution object processing system, referring to fig. 1, which shows a schematic structural diagram of the physical distribution object processing system in the embodiment of the present application, and may specifically include: a storage area determining device 101, an image acquisition device 102, and a processing device 103.
Wherein the processing means 103 is coupled to the image acquisition means 102.
Storage area determining means 101 for determining a storage area R; the storage area R is used for storing the logistics objects.
An image acquisition device 102 for acquiring a first image of an object in a target area; the target area may specifically include: storage region R, and/or a vicinity of storage region R.
Processing means 103 for authenticating said first image.
According to the embodiment of the application, the logistics objects are stored in the storage area, so that one of the logistics objects can be placed in the storage area, and the other of the logistics objects is taken away from the storage area, so that logistics can be realized under the condition that the logistics objects are not delivered on the same plane, a series of defects caused by the fact that the logistics objects are delivered on the same plane by two sides can be overcome, for example, the constraint and interference of the logistics objects on the same plane to the two sides can be reduced, the cost of the two sides in the logistics is saved, and the timeliness and convenience of the logistics are improved.
In addition, the embodiment of the application authenticates the first image of the object in the target area; the authentication may verify the identity of the object corresponding to the first image, for example, it may verify whether the object corresponding to the first image is a target party, if so, the authentication is successful, otherwise, the authentication is failed. The authentication of the embodiment of the application can prevent the non-target party from taking the logistics object away from the storage area to a certain extent, and further can improve the security of the logistics object in the storage area.
The target party may refer to a party having a mapping relationship with the logistics object processing system. The target party may have all the rights and/or usage rights of the logistics object processing system.
According to one embodiment, the target party may be a first target party to which the logistics object handling system or the storage area belongs, in other words, the first target party may have possession of the logistics object handling system or the storage area. In one embodiment, the first target party may apply for installation of the logistics object processing system at a target location (e.g., a location of a doorway of a residence, a location of a doorway of an office, etc.), and after installation of the logistics object processing system, a client or server running on the processing apparatus 103 may bind the logistics object processing system or storage area with the first target party. For example, the server may establish a mapping relationship between the identity of the logistics object processing system or the identity of the deposit area and the information of the first target party. As another example, the processing device 103 may save information of the first target party. The information of the first target may include, but is not limited to: name, contact (e.g., cell phone number, instant messaging number, etc.), location information, etc.
According to another embodiment, the target party may be a second target party, which may not possess the logistics object handling system, but may possess the usage rights of the logistics object handling system. For example, the second target party may be a courier or the like in the area where the logistic object processing system is located. The processing device 103 or server may bind the logistics object processing system or the holding area with the second target. For example, the server may establish a mapping relationship between the identifier of the logistic object processing system or the identifier of the storage area and the information of the second target party, and send the mapping relationship to the corresponding processing device 103, so that the processing device 103 stores the information of the second target party. The server can detect the change of the second target party in the area where the logistics object processing system is located, and update the information of the second target party according to the change so as to improve the reliability of the information of the second target party.
In addition, the storage space in the embodiment of the application can be a light area determined by the storage area determining device through an optical technology, and the storage area determining device, the image acquisition device, the processing device and the prompting device can be arranged on a wall or a wall top, so that the embodiment of the application can occupy a smaller space, the influence on the user environment can be reduced, and the installation convenience and the position flexibility of the logistic object processing system can be improved.
In summary, this embodiment of the application can support one party in the commodity circulation to place the commodity circulation object in this deposit area and support another party in the commodity circulation to take away this commodity circulation object from this deposit area, can overcome the both sides and face a series of drawbacks that the commodity circulation object brought like handing over, can overcome to a certain extent that the delivery is untimely, not face the problem of pain such as signing in, commodity circulation object damage, can reduce and face the constraint and the interference of handing over the commodity circulation object to both sides, effectively promote the access convenience of commodity circulation object, and then can promote both sides' commodity circulation experience. And the security of the logistics object can be improved through the authentication of the first image and the output of the prompt information.
In an alternative embodiment of the present application, the installation location of the logistic object processing system may be determined according to the user's requirement. For example, the installation location may be a user-specified doorway location of a home, and for example, the installation location may be a user-specified doorway location of an office. The installation position can be corresponding to a wall or a wall top so as to realize the installation of the logistics object processing system, and the installation position can also be corresponding to a space so as to realize the storage of the logistics objects.
In this embodiment, the coupling between the devices may specifically include: contact connection or non-contact connection between devices. The contact connection may include: data line connections, etc. The non-contact connection may include: WIFI (wireless fidelity), wireless Fidelity connection, bluetooth connection, infrared connection, etc. It will be appreciated that embodiments of the present application are not limited to a particular manner of coupling between devices.
The storage area of the embodiment of the application may include: light area. The light area can prompt the existence of the storage area through light beams or light images, so that a target party can accurately place the logistics object in the storage area, or the target party can take the logistics object from the storage area.
The light beam may be, for example, a light beam projected by an optical device such as a projection lamp. For example, the light image may be a light image of a font such as "goods" or "goods storage" or a light image of a "goods" image.
The storage area determining means 101 may determine the light area using optical techniques. For example, the storage area determining device 101 may include: and a projection emission unit which can project a light band using a projection technique. Projection techniques may include: stereoscopic projection technology, holographic projection technology, etc.; among them, the stereoscopic projection technique can realize projection by the polarization principle of light, and the holographic projection technique can record and reproduce a true three-dimensional image of an object by using the interference and diffraction principles. It will be appreciated that the apparatus having the area determining function is within the scope of protection of the storage area determining apparatus 101 in the embodiment of the present application, and the embodiment of the present application is not limited to a specific projection technology.
It will be appreciated that the light areas described above are merely alternative embodiments, and that in practice, other storage areas may be employed by those skilled in the art depending on the actual application requirements. For example, the storage area may be: including areas of preset identification.
The preset identifier may be a tag according to actual application requirements by a person skilled in the art, and the tag may be a radio frequency tag, a two-dimensional code, or the like. In other words, a label may be attached to the area corresponding to the logistics object processing system, and if the label is detected, the area including the label may be used as the storage area.
As another example, the preset identifier may be: in other words, the graph can be drawn in the area corresponding to the logistic object processing system, and if the graph is detected, the area including the graph can be used as the storage area.
One skilled in the art may determine parameters (such as shape, size, etc.) of the storage area according to actual application requirements, and further determine parameters (such as performance parameters, etc.) of the storage area determining device 101 according to the parameters of the storage area. In practical applications, the number of storage area determining devices 101 may be one or more.
The image acquisition device 102 may acquire a first image of the object in the target area using a camera technique. Types of image acquisition devices 102 may include: cameras, video cameras, etc. It can be appreciated that the devices with the image capturing function are all within the protection scope of the image capturing device 102, and the embodiments of the present application do not limit the specific image capturing device 102.
The target region may characterize an image acquisition range of the image acquisition device 102. The target area may specifically include: storage area, and/or a vicinity of storage area R. The storage area may be extended or extended along at least one direction to obtain the above-mentioned vicinity area, and the embodiment of the present application does not limit a specific vicinity area.
One skilled in the art may determine parameters (e.g., performance parameters, etc.) of the image acquisition device 102 based on parameters (e.g., shape, size, etc.) of the target area. In practical applications, the number of image acquisition devices 102 may be one or more.
The processing device 103 may be a device having processing capabilities. The processing device 103 may include, but is not limited to: CPU, MPU (microprocessor, micro Processor Unit), MCU (microcontroller, micro Control Unit), SOC (System on Chip), DSP (digital signal processing ), and the like.
In practical applications, the processing device 103 may be provided separately, or may be provided integrally with other devices. For example, the processing device 103 may be integrated as a chip in the image acquisition device 102. It will be appreciated that the embodiments of the present application are not limited to a specific arrangement of the processing device 103.
Optionally, the above system may further include: a prompting device, which may be coupled with the processing device 103. Alternatively, the processing device 103 may send an instruction corresponding to the authentication result to the prompting device, and output the prompting information in response to the instruction. For example, in the case of authentication failure, the warning information may be output to avoid that the non-target user takes away the goods from the storage area, so that the security of the goods in the storage area may be improved. Optionally, the prompting device may output the prompting information in a visual manner and/or an auditory manner.
In the case of adopting the visual mode, the prompt information may be displayed by a display device, wherein the display device may be any device having a display function, such as an LED (light emitting diode ), an LCD (liquid crystal display, liquid Crystal Display for short), or the like.
In the case of auditory mode, the prompt message may be played through a speaker. Optionally, the prompt information played by the speaker may be authorization information if the authentication is successful. Optionally, the prompt information played by the speaker may be alert information when authentication fails. For example, the warning information may be played through an alarm, which may have the effect of deterring non-target parties and notifying target parties. Optionally, the alarm may be an audible and visual alarm, and the audible and visual alarm may emit an audible alarm and flash to alert.
In an alternative embodiment of the present application, the object may include: the processing device 103 is configured to determine, according to the first image, first location information of a physical distribution object corresponding to the first image, match the first location information with second location information of a storage area, so as to obtain a matching result, and obtain an authentication result according to the matching result.
In an alternative embodiment of the present application, the object may include: and the processing device 103 is configured to determine whether the face included in the first image belongs to the face of the target party, so as to obtain a determination result, and obtain an authentication result according to the determination result.
In an optional embodiment of the present application, the prompt information may include:
authorization information corresponding to successful authentication; or alternatively
And warning information corresponding to authentication failure.
In an alternative embodiment of the present application, the object may include: the processing device 103 is further configured to send an alert notification to the target party when the physical distribution object exists in the storage area R and the authentication result of the first image of the person and/or animal is authentication failure.
In an alternative embodiment of the present application, the object may include: the processing device 103 is further configured to send a pickup notification to the first target party when the authentication result of the first image of the physical distribution object is that the authentication is successful.
In an alternative embodiment of the present application, the object may include: the processing device 103 is further configured to send a delivery notification of the physical distribution object to the second target party when the authentication result of the first image of the physical distribution object is authentication failure and the authentication result of the first image of the person is authentication success.
The embodiment of the application also provides a data processing method.
Method embodiment one
Referring to fig. 2, a flowchart illustrating steps of an embodiment of a data processing method of the present application may specifically include the following steps:
step 201, detecting a first image of an object in a target area; the target area may include: a storage area, and/or a vicinity of the storage area; the storage area is used for storing the object of the logistics;
step 202, authenticating the first image to obtain an authentication result.
At least one step of the embodiment shown in fig. 2 may be performed by a server and/or a client, although embodiments of the present invention are not limited by the specific implementation of each step. Wherein the client may be running on a processing device of the logistic object processing system. The client and the server are located in a wired or wireless network through which the client and the server interact data. The network employed by the processing device may include, but is not limited to: WIFI network, bluetooth network, zigBee network, etc.
The storage area of the embodiment of the application may include: light area. The light area can prompt the existence of the storage area through light beams or light images, so that a target party can accurately place the logistics object in the storage area, or the target party can take the logistics object from the storage area.
In step 201, the processing device may receive a first image of an object in a target area acquired by the image acquisition device. The object may refer to any object that can be present in the target area, such as a person, an animal, a logistic object, etc.
Step 202 may authenticate the first image, and obtaining an authentication result may include: authentication success, or authentication failure.
The embodiment of the application can provide the following technical scheme for authenticating the first image:
technical proposal 1,
In claim 1, the object may include: the step 202 of authenticating the first image may specifically include: determining first position information of a logistics object corresponding to the first image according to the first image; matching the first position information with the second position information of the storage area to obtain a matching result; and obtaining an authentication result according to the matching result.
The first image corresponds to first position information of the logistics object and is used for representing a distribution destination of the logistics object. The determining the first position information of the first image corresponding to the physical distribution object may specifically include: and determining first position information of the logistics object according to the electronic bill information acquired from the first image. For the logistics objects in the logistics, the electronic face sheet information is stuck on the logistics objects, so that the first image can contain the electronic face sheet information; therefore, the embodiment of the application can acquire the electronic face sheet information from the first image by utilizing the image recognition technology.
Image recognition refers to a technique of processing, analyzing, and understanding an image with a machine to recognize image objects of various modes. The image objects may include: articles, characters, electronic facesheets, etc.
Optionally, the electronic menu information obtained from the first image may specifically include: and determining an image part corresponding to the electronic bill from the first image, and acquiring electronic bill information of the logistics object from the image part by utilizing a text recognition technology. The text recognition technique may include: OCR (optical character recognition ) technology, etc., the OCR technology may perform preprocessing such as noise reduction on the image portion of the electronic face sheet, and then segment the characters in the image portion to obtain a single character image, and recognize the characters corresponding to the single character image. It will be appreciated that embodiments of the present application are not limited to a particular text recognition technique.
Electronic facesheet information may include, but is not limited to: identification of electronic facesheets, consignee information, shipper information, etc.
The identification of the electronic face sheet can be unique in the logistics platform, and the identification can be a digital string, a bar code, a two-dimensional code or the like. In the technical field of logistics, a correspondence may be formed between the identification of the electronic face sheet and the position information of the logistics object, so that the first position information of the logistics object may be determined according to the correspondence and the identification of the electronic face sheet. In the logistics distribution link, the first position information of the logistics object can refer to the position information of the receiver.
The consignee information may include: location information of the recipient. Therefore, the location information of the receiver can be acquired from the first image as the first location information of the logistic object by using the text recognition technology.
The first position information of the logistic object may refer to the position information of the consignee, so that in the distribution link of the logistic, the first position information is matched with the second position information of the storage area, the obtained matching result may represent whether the storage area is matched with the logistic object, if so, it is indicated that the storage area is matched with the logistic object, that is, it is appropriate to place the logistic object in the storage area. Otherwise, if the matching result is no, it is indicated that the storage area is not matched with the logistics object, that is, it is not appropriate to place the logistics object in the storage area.
Therefore, according to the matching result, an authentication result is obtained, which may specifically include: if the matching result is yes, the authentication result is successful authentication; or if the matching result is negative, the authentication result is authentication failure.
Technical proposal 2,
In claim 2, the object includes: step 202 authenticates the first image, which may specifically include: judging whether the face contained in the first image belongs to the face of the target party or not to obtain a judging result; and obtaining an authentication result according to the judgment result.
The face detection technology can be utilized to detect the face in the first image, and the face authentication method is utilized to judge whether the face contained in the first image belongs to the face of the target party. The face authentication method can determine the similarity between the first facial feature of the face in the first image and the second facial feature of the face of the target party according to the first facial feature of the face in the first image, if the similarity exceeds a similarity threshold, the judgment result is yes, and otherwise, the judgment result is no. Optionally, the face authentication method may be implemented by using a face authentication model, and the embodiment of the present application does not limit a specific implementation process of the face authentication method.
Therefore, according to the judging result, obtaining the authentication result may specifically include: if the judgment result is yes, the authentication result is successful authentication; or if the judgment result is negative, the authentication result is authentication failure.
According to one embodiment, in the case that the logistic object exists in the storage area, the first image of the person and/or the animal in the target area can be authenticated, specifically, whether the face contained in the first image belongs to the face of the target party can be judged, so that the logistic object in the storage area is prevented from being taken away by a non-target party, and the safety of the logistic object in the storage area is improved.
According to another embodiment, in the case where there is no logistic object in the storage area, the first image of the person in the target area may be authenticated, specifically, it may be determined whether the face included in the first image belongs to the face of the target party, so as to avoid the use of the storage area by a non-target party that does not have the use authority of the storage area.
The above processes of authenticating the first image are similarly described in the foregoing embodiments 1 and 2, and it will be understood that, according to practical application requirements, one skilled in the art may adopt any one or combination of the foregoing embodiments 1 to 2, or adopt other technical solutions, and the specific process of authenticating the first image is not limited in this embodiment.
In an alternative embodiment of the present application, the method may further include: and outputting prompt information corresponding to the authentication result. The process of outputting the prompt information corresponding to the authentication result may specifically include: and sending an instruction corresponding to the authentication result to the prompting device so that the prompting device responds to the instruction and outputs prompting information.
In this embodiment of the present application, optionally, the prompt information may specifically include:
Authorization information corresponding to successful authentication; or alternatively
And warning information corresponding to authentication failure.
According to an embodiment, in the distribution link of the logistics, if the authentication result corresponding to the first image of the logistics object is authentication success, it is indicated that it is appropriate to place the logistics object in the storage area, so that authorization information may be output, for example, the authorization information may be "please place goods in the area", etc. On the contrary, if the authentication result corresponding to the first image of the logistic object is authentication failure, it is indicated that it is not appropriate to place the logistic object in the storage area, so that warning information may be output, for example, the warning information may be "you do not have the use right of the area", or "the area does not belong to you here", or the like. The authentication corresponding to the first image of the logistics object can enable the logistics object to be stored in a proper storage area, and therefore the use accuracy of the storage area is improved.
According to another embodiment, in the case that a logistic object exists in the storage area, the first image of the person and/or the animal in the target area may be authenticated, and if the authentication result is that the authentication is successful, it may be indicated that the person and/or the animal corresponding to the first image includes the target party, so that authorization information may be output, for example, the authorization information may be "please take away the goods" or the like. Otherwise, if the authentication result is that the authentication fails, it indicates that the person and/or animal corresponding to the first image does not include the target party, so that warning information can be output, for example, the warning information can be "the goods in the place do not belong to you", or even an audible and visual alarm can be sent out, so that the logistic object in the storage area is prevented from being taken away by the non-target party, and the safety of the logistic object in the storage area is improved.
According to still another embodiment, the first image of the person in the target area may be authenticated when the physical distribution object does not exist in the storage area, and if the authentication result is that the authentication is successful, it may be indicated that the person corresponding to the first image includes the target party, so that authorization information may be output, for example, the authorization information may be "please put goods into the area", or the like. Otherwise, if the authentication result is that the authentication fails, it indicates that the person corresponding to the first image does not include the target party, so that warning information can be output, for example, the warning information can be "the area is not used by you", so as to avoid the storage area from being used by a non-target party, and further improve the use accuracy of the storage area.
In an alternative embodiment of the present application, the object may include: the person and/or animal, the method may further comprise: and sending an alarm notice to a target party when a logistics object exists in the storage area and the authentication result of the first image of the person and/or the animal is authentication failure. In this case, it can be stated that the non-target party enters the storage area where the logistic objects are stored, and besides the on-site output prompt information of the storage area, the warning notification can be sent to the target party, so that the target party can view the logistic objects in the storage area in time, and therefore the security of the logistic objects in the storage area can be improved.
In practical application, the storage area and the target party may be bound in advance, that is, a mapping relationship between the identifier of the storage area and the information of the target party may be stored, where the information of the target party may include: the contact address may thus be utilized to send alert notifications to the target. For example, examples of alert notifications sent to the first target may include, but are not limited to: "others enter your storage area, please take your parcel away in time". As another example, examples of alert notifications sent to the second target may include, but are not limited to: "others enter your managed storage area, please view the package in time", etc.
In an alternative embodiment of the present application, the object may include: a logistics object, the method may further comprise: and sending a goods taking notification to the first target party under the condition that the authentication result of the first image of the logistics object is that the authentication is successful. The embodiment of the application can be applied to a distribution link of a logistics object, if the authentication result corresponding to the first image of the logistics object is authentication success, the situation that the logistics object is placed in a storage area is indicated to be proper, and therefore a goods taking notification can be sent to a first target party, so that the first target party can timely take away the logistics object in the storage area.
In an alternative embodiment of the present application, the object may include: the object includes: logistics objects and characters, the method may further include: and sending a delivery notice of the logistic object to the second target party under the condition that the authentication result of the first image of the logistic object is authentication failure and the authentication result of the first image of the person is authentication success.
The embodiment of the application can be applied to a delivery link of a logistics, and particularly can authenticate a first image of a logistics object and a first image of a person; if the authentication result of the first image of the person is successful (for example, the person corresponding to the first image is the first target party), and the authentication result of the first image of the logistic object is failed, it may be stated that the logistic object does not have electronic bill information, so that the logistic object cannot be identified, and therefore the first target party may be considered to want to deliver the logistic object, and therefore, a logistic object delivery notification may be sent to the second target party, so that the second target party may timely perform delivery processing of the logistic object.
It should be noted that, in an alternative embodiment of the present application, the embodiment of the present application may further determine, according to the first image of the logistics object, a predicted size of the logistics object, so as to determine, according to the predicted size, a predicted weight of the logistics object, and further determine, according to the predicted weight, a logistics cost of the logistics object.
Alternatively, the predicted size of the logistic object may be determined by image measurement techniques.
According to one embodiment, the process of determining a predicted size of a logistic object may include: providing a second image of the reference; according to the type of the reference object, the actual size data of the reference object is called from a database; identifying the region of the reference object from the second image, and obtaining characteristic data of the region of the reference object in the second image; calculating a scaling factor based on the actual size of the reference object in the database and the features in the second image; and obtaining characteristic data of the logistics object in the first image, and calculating to obtain the predicted size of the logistics object according to the proportionality coefficient.
According to another embodiment, the process of determining the predicted size of the logistic object may include: and determining the distance between the pixel point in the first image and the logistics object, and determining the predicted size of the logistics object according to the distance. Under the condition that the focal length of the image acquisition device is constant, the farther the physical distribution object is from the image acquisition device, the smaller the characteristics of the physical distribution object image are, and the closer the physical distribution object is from the image acquisition device, the larger the characteristics of the physical distribution object image are. Therefore, the relationship between the feature of the image of the logistic object and the predicted size of the logistic object may be embodied by a certain mapping rule, and the embodiment of the present application does not limit the specific mapping rule.
For better understanding of the embodiments of the present application, the data processing method of the embodiments of the present application will be described herein through a link of logistics.
A delivery link of logistics,
In the delivery link of the logistics, the first target party can carry the logistics object into the target area, and in this case, the embodiment of the application can authenticate the first image of the logistics object and the first image of the person in the target area; the authentication of the first image of the person may specifically include: and judging whether the face contained in the first image belongs to the face of the first target party or not.
In this case, if the authentication result of the first image of the person is successful and the authentication result of the first image of the physical distribution object is failed, it may be stated that the person corresponding to the first image is the first target party, and the physical distribution object does not have electronic face information, so that the physical distribution object cannot be identified, and therefore the first target party may be considered to want to deliver the physical distribution object, and thus authorization information may be output, for example, the authorization information may be "please place the physical distribution object in the area, and immediately contact with the acquirer to acquire the article", etc.; and, the delivery notice of the logistic object can be sent to the second target party, so that the second target party can timely perform delivery processing of the logistic object.
Further, in the case that a logistic object exists in the storage area, assuming that the second target party enters the target area in response to the logistic object delivery notification, the embodiment of the present application may authenticate the first image of the person in the target area, and the authentication of the first image of the person may specifically include: and judging whether the face contained in the first image belongs to the face of the second target party or not.
In this case, if the authentication result is that the authentication is successful, it may be indicated that the person corresponding to the first image is the second target, so that authorization information may be output, for example, the authorization information may be "please take the logistics object away". The second target party can generate an electronic bill according to the logistics information (such as the information of the consignee of the logistics object, the information of the type of the logistics object and the like) input by the first target party at the logistics client, and paste the electronic bill on the logistics object so as to carry out distribution of the logistics object.
A logistics distribution link,
After the electronic bill is generated, a distribution link of the logistics can be entered, in which case the state of the logistics object can be updated, for example, the state of the logistics object can be updated to the in-distribution state. In the delivery link of the logistics, the first position information of the logistics object can be determined according to the receiver information carried in the electronic bill information, and the logistics object is delivered to a target area matched with the first position information. The target area may include: and the second target party is responsible for distributing the logistics objects in the target area, and the target of the second target party is to place the logistics objects in the storage area corresponding to the first position information.
Assuming that the second target party carries the logistics object into the target area, in this case, the embodiment of the application can authenticate the first image of the logistics object in the target area; the authentication of the first image of the logistic object in the target area may specifically include: determining first position information of a logistics object corresponding to the first image according to the first image; matching the first position information with the second position information of the storage area to obtain a matching result; and obtaining an authentication result according to the matching result.
If the authentication result corresponding to the first image of the logistic object is successful, it may be indicated that it is appropriate to place the logistic object in the storage area, so that authorization information may be output, for example, the authorization information may be "please place goods in the area", etc. And, can send the notification of getting goods to first target side to make first target side get in time and get away in the storage area.
If the authentication result corresponding to the first image of the logistic object is that the authentication is successful, the authentication of the first image of the person is not required, but the first image of the person is saved, and a mapping relationship between the logistic object information (such as electronic bill information) and the first image of the person is established, so that when a problem (such as breakage problem) occurs in the logistic object, a distributor of the logistic object is determined according to the mapping relationship, and the problem is solved by the distributor.
A commodity circulation picking link,
After sending the goods taking notification, a logistics goods taking link can be entered.
In the picking-up link of the logistics, assuming that the first target party enters the target area, the first image of the person in the target area may be authenticated, and the process of authenticating the first image of the person in the target area may include: and judging whether the face contained in the first image belongs to the face of the first target party or not.
In this case, if the authentication result is that the authentication is successful, it may be indicated that the person corresponding to the first image includes the first target party, so that authorization information may be output, for example, the authorization information may be "please take away the goods" or the like. After detecting that the logistic object is taken away by the first target in the storage area, the state of the logistic object may be updated, for example, the state of the logistic object may be updated to the taken-away state.
In the commodity circulation get the goods link, can also monitor the commodity circulation object in depositing the district to avoid depositing the commodity circulation object in the district and get away by non-target party, improve the security of depositing the commodity circulation object in the district.
In accordance with one embodiment, assuming a non-target party (e.g., a third party user, or an animal, who is pulling the animal) enters the target area, a first image of the person and/or animal in the target area may be authenticated, and the process of authenticating the first image of the person and/or animal in the target area may include: and judging whether the face contained in the first image belongs to the face of the target party.
In this case, if the authentication result is that the authentication fails, it indicates that the person and/or animal corresponding to the first image does not include the second target party, so that warning information may be output, for example, the warning information may be "the goods do not belong to you" here, or even an audible and visual alarm may be sent out, so as to avoid that the logistics object in the storage area is taken away by a non-target party, and improve the security of the logistics object in the storage area.
In summary, according to the data processing method of the embodiment of the present application, the storage area is used to store the logistics object, so that one of the logistics objects can be placed in the storage area, and the other of the logistics objects can be taken away from the storage area, so that the logistics can be realized under the condition that the logistics object is not handed over on the same plane, and therefore, a series of drawbacks caused by the fact that the logistics object is handed over on the same plane by both sides can be overcome, for example, the constraint and interference of the logistics object on the same plane to both sides can be reduced, the cost of both sides in the logistics can be saved, and the timeliness and convenience of the logistics can be improved.
In addition, the embodiment of the application authenticates the first image of the object in the target area and outputs prompt information corresponding to the authentication result; the authentication may verify the identity of the object corresponding to the first image, for example, it may verify whether the object corresponding to the first image is a target party, if so, the authentication is successful, otherwise, the authentication is failed. The authentication can prevent the non-target party from taking the logistics object from the storage area to a certain extent, and further can improve the security of the logistics object in the storage area.
In addition, this embodiment of the application can support one party in the commodity circulation to place the commodity circulation object in this deposit area and support another party in the commodity circulation to take away this commodity circulation object from this deposit area, can overcome the both sides and cross a series of drawbacks that commodity circulation object brought like this, can overcome the delivery untimely, not sign in the face to a certain extent, the problem of pain point such as commodity circulation object damage, can reduce and cross commodity circulation object to both sides 'constraint and interference in the face, effectively promote the access convenience of commodity circulation object, and then can promote both sides' commodity circulation experience. And the security of the logistics object can be improved through the authentication of the first image and the output of the prompt information.
It should be noted that, for simplicity of description, the method embodiments are shown as a series of acts, but it should be understood by those skilled in the art that the embodiments are not limited by the order of acts, as some blocks may occur in other orders or concurrently in accordance with the embodiments. Further, those skilled in the art will appreciate that the embodiments described in the specification are all preferred embodiments and that the acts referred to are not necessarily required by the embodiments of the present application.
The embodiment of the application also provides a data processing device.
With reference to fig. 3, a block diagram of an embodiment of a data processing apparatus of the present application is shown, which may specifically include the following modules:
a detection module 301, configured to detect a first image of an object in a target area; the target area may include: a storage area, and/or a vicinity of the storage area; the storage area is used for storing the object of the logistics; and
and the authentication module 302 is configured to authenticate the first image to obtain an authentication result.
The apparatus shown in fig. 3 may be applied to a server or may be applied to a processing apparatus of the aforementioned physical distribution object processing system.
Optionally, the storage area may include:
a light region; and/or
Including areas of preset identification.
Alternatively, the object may include: the logistics object, authentication module 302 may include:
the first position determining module is used for determining first position information of the logistic object corresponding to the first image according to the first image;
the matching module is used for matching the first position information with the second position information of the storage area to obtain a matching result;
and the first authentication result determining module is used for obtaining an authentication result according to the matching result.
Alternatively, the object may include: the authentication module 302 may include:
the face judging module is used for judging whether the face contained in the first image belongs to the face of the target party or not so as to obtain a judging result;
and the second authentication result determining module is used for obtaining an authentication result according to the judging result.
Optionally, the apparatus may further include: and the output module is used for outputting prompt information corresponding to the authentication result.
Optionally, the prompt information may include:
authorization information corresponding to successful authentication; or alternatively
And warning information corresponding to authentication failure.
Alternatively, the object may include: the person and/or animal, the device may further comprise:
and the first notification module is used for sending an alarm notification to the target party when the logistics object exists in the storage area and the authentication result of the first image of the person and/or the animal is authentication failure.
Alternatively, the object may include: a logistics object, the apparatus may further comprise:
and the second notification module is used for sending a goods taking notification to the first target party when the authentication result of the first image of the logistics object is that the authentication is successful.
Alternatively, the object may include: logistics objects and figures, the apparatus may further include:
and the third notification module is used for sending a delivery notice of the logistics object to the second target party when the authentication result of the first image of the logistics object is authentication failure and the authentication result of the first image of the person is authentication success.
In summary, the data processing apparatus according to the embodiment of the present application stores a logistics object through a storage area, so that one of the logistics objects can be placed in the storage area, and the other of the logistics objects can be taken away from the storage area, so that the logistics can be realized under the condition that the logistics object is not handed over on the same plane, and therefore a series of drawbacks brought by the logistics object handed over on the same plane by both sides can be overcome, for example, the constraint and interference of the logistics object handed over on the same plane to both sides can be reduced, the cost of both sides in the logistics can be saved, and the timeliness and convenience of the logistics can be improved.
In addition, the embodiment of the application authenticates the first image of the object in the target area and outputs prompt information corresponding to the authentication result; the authentication may verify the identity of the object corresponding to the first image, for example, it may verify whether the object corresponding to the first image is a target party, if so, the authentication is successful, otherwise, the authentication is failed. The authentication can prevent the non-target party from taking the logistics object from the storage area to a certain extent, and further can improve the security of the logistics object in the storage area.
In addition, this embodiment of the application can support one party in the commodity circulation to place the commodity circulation object in this deposit area and support another party in the commodity circulation to take away this commodity circulation object from this deposit area, can overcome the both sides and cross a series of drawbacks that commodity circulation object brought like this, can overcome the delivery untimely, not sign in the face to a certain extent, the problem of pain point such as commodity circulation object damage, can reduce and cross commodity circulation object to both sides 'constraint and interference in the face, effectively promote the access convenience of commodity circulation object, and then can promote both sides' commodity circulation experience. And the security of the logistics object can be improved through the authentication of the first image and the output of the prompt information.
For the device embodiment, since it is substantially similar to the method embodiment, the description is relatively simple, and similar references are made to each other.
Embodiments of the present application may be implemented as a system or apparatus configured as desired using any suitable hardware and/or software. Fig. 4 schematically illustrates an example apparatus 1100 that may be used to implement various embodiments described herein.
For one embodiment, fig. 4 illustrates an exemplary apparatus 1100, the apparatus 1100 may include: one or more processors 1102, a system control module (chipset) 1104 coupled to at least one of the processors 1102, a system memory 1106 coupled to the system control module 1104, a non-volatile memory (NVM)/storage 1108 coupled to the system control module 1104, one or more input/output devices 1110 coupled to the system control module 1104, and a network interface 1112 coupled to the system control module 1106. The system memory 1106 may include: instructions 1162, the instructions 1162 being executable by the one or more processors 1102.
The processor 1102 may include one or more single-core or multi-core processors, and the processor 1102 may include any combination of general-purpose or special-purpose processors (e.g., graphics processors, application processors, baseband processors, etc.). In some embodiments, the apparatus 1100 can function as a server, a target device, a wireless device, etc., as described in embodiments of the present application.
In some embodiments, the apparatus 1100 may include one or more machine-readable media (e.g., system memory 1106 or NVM/storage 1108) having instructions and one or more processors 1102, in combination with the one or more machine-readable media, configured to execute the instructions to implement the modules included in the foregoing apparatus to perform the actions described in the embodiments of the present application.
The system control module 1104 of an embodiment may include any suitable interface controller for providing any suitable interface to at least one of the processors 1102 and/or any suitable device or component in communication with the system control module 1104.
The system control module 1104 for one embodiment may include one or more memory controllers to provide interfaces to the system memory 1106. The memory controller may be a hardware module, a software module, and/or a firmware module.
The system memory 1106 for one embodiment may be used for loading and storing data and/or instructions 1162. For one embodiment, the system memory 1106 may include any suitable volatile memory, such as, for example, a suitable DRAM (dynamic random Access memory). In some embodiments, system memory 1106 may comprise: double data rate type four synchronous dynamic random access memory (DDR 4 SDRAM).
The system control module 1104 for one embodiment may include one or more input/output controllers to provide interfaces to the NVM/storage 1108 and the input/output device(s) 1110.
NVM/storage 1108 of one embodiment may be used to store data and/or instructions 1182. NVM/storage 1108 may include any suitable nonvolatile memory (e.g., flash memory, etc.) and/or may include any suitable nonvolatile storage device(s), such as one or more Hard Disk Drives (HDDs), one or more Compact Disc (CD) drives, and/or one or more Digital Versatile Disc (DVD) drives, etc.
NVM/storage 1108 may include storage resources that are physically part of the device on which device 1100 is installed or which may be accessed by the device without being part of the device. For example, NVM/storage 1108 may be accessed over a network via network interface 1112 and/or through input/output devices 1110.
Input/output device(s) 1110 for one embodiment may provide an interface for apparatus 1100 to communicate with any other suitable device, input/output device 1110 may include a communication component, an audio component, a sensor component, and the like.
The network interface 1112 of an embodiment may provide an interface for the device 1100 to communicate over one or more networks and/or with any other suitable device, and the device 1100 may communicate wirelessly with one or more components of a wireless network in accordance with any of one or more wireless network standards and/or protocols, such as accessing a wireless network based on a communication standard, such as WiFi,2G, or 3G, or a combination thereof.
For one embodiment, at least one of the processors 1102 may be packaged together with logic of one or more controllers (e.g., memory controllers) of the system control module 1104. For one embodiment, at least one of the processors 1102 may be packaged together with logic of one or more controllers of the system control module 1104 to form a System In Package (SiP). For one embodiment, at least one of the processors 1102 may be integrated on the same new product as the logic of one or more controllers of the system control module 1104. For one embodiment, at least one of the processors 1102 may be integrated on the same chip as logic of one or more controllers of the system control module 1104 to form a system on a chip (SoC).
In various embodiments, apparatus 1100 may include, but is not limited to: a desktop computing device or a mobile computing device (e.g., a laptop computing device, a handheld computing device, a tablet, a netbook, etc.), among others. In various embodiments, device 1100 may have more or fewer components and/or different architectures. For example, in some embodiments, the apparatus 1100 may include one or more cameras, keyboards, liquid Crystal Display (LCD) screens (including touch screen displays), non-volatile memory ports, multiple antennas, graphics chips, application Specific Integrated Circuits (ASICs), and speakers.
Wherein if the display comprises a touch panel, the display screen may be implemented as a touch screen display to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of a touch or slide action, but also the duration and pressure associated with the touch or slide operation.
The embodiment of the application also provides a non-volatile readable storage medium, where one or more modules (programs) are stored, where the one or more modules are applied to an apparatus, and the apparatus may be caused to execute instructions (instructions) of each method in the embodiment of the application.
In one example, an apparatus is provided, comprising: one or more processors; and instructions in one or more machine-readable media stored thereon, which when executed by the one or more processors, cause the apparatus to perform a method as in an embodiment of the present application, the method may comprise: the method shown in fig. 2.
One or more machine-readable media are also provided in one example, having instructions stored thereon that, when executed by one or more processors, cause an apparatus to perform a method as in an embodiment of the present application, the method may comprise: the method shown in fig. 2.
The foregoing has outlined a data processing method, a data processing device and a device in detail, wherein specific examples are provided herein to illustrate the principles and embodiments of the present application, and the above examples are only for the purpose of aiding in the understanding of the method and core ideas of the present application; meanwhile, as those skilled in the art will have modifications in the specific embodiments and application scope in accordance with the ideas of the present application, the present description should not be construed as limiting the present application in view of the above.

Claims (19)

1. A method of data processing, comprising:
detecting a first image of an object in a target area; the target area includes: a storage area, and/or a vicinity of the storage area; the storage area is used for storing the object of the logistics; the storage area includes: a light zone that uses a light beam, or a light image, to indicate the presence of a storage zone;
authenticating the first image to obtain an authentication result;
wherein the object comprises: a logistic object, the authenticating the first image, comprising: determining first position information of a logistics object corresponding to the first image according to the first image of the logistics object; the first position information is used for representing a distribution destination of the logistics object; matching the first position information with the second position information of the storage area to obtain a matching result; obtaining an authentication result according to the matching result; the first image of the logistics object comprises electronic face sheet information;
outputting prompt information corresponding to the authentication result; the prompt message comprises: authorization information corresponding to successful authentication; or, warning information corresponding to authentication failure;
In the delivery link of the logistics, the object comprises: the logistics object and the person do not have electronic face bill information, so that the logistics object cannot be identified, and the authentication result of the first image of the logistics is authentication failure; the method further comprises the steps of: sending a logistics object delivery notice to a second target party under the condition that the authentication result of the first image of the logistics object is authentication failure and the authentication result of the first image of the person is authentication success; the person is a first target; the first target party owns the storage area; the second target party is an express delivery person; the authentication process of the person comprises the following steps: judging whether the face contained in the first image of the person belongs to the face of the target party or not to obtain a judging result; and obtaining an authentication result according to the judgment result.
2. The method of claim 1, wherein the storage area further comprises:
including areas of preset identification.
3. The method of claim 1, wherein the object comprises: a person and/or animal, said authenticating said first image comprising:
judging whether the face contained in the first image belongs to the face of the target party or not to obtain a judging result;
And obtaining an authentication result according to the judgment result.
4. A method according to any one of claims 1 to 3, wherein the object comprises: a person and/or animal, the method further comprising:
and sending an alarm notice to a target party when a logistics object exists in the storage area and the authentication result of the first image of the person and/or the animal is authentication failure.
5. A method according to any one of claims 1 to 3, wherein the object comprises: a logistic object, the method further comprising:
and sending a goods taking notification to the first target party under the condition that the authentication result of the first image of the logistics object is that the authentication is successful.
6. A logistic object processing system, comprising: a storage area determining device, an image acquisition device and a processing device;
wherein the processing device is coupled with the image acquisition device;
the storage area determining device is used for determining a storage area; the storage area is used for storing the object of the logistics; the storage area includes: a light zone that uses a light beam, or a light image, to indicate the presence of a storage zone;
the image acquisition device is used for acquiring a first image of an object in the target area; the target area includes: the storage area and/or a vicinity of the storage area;
The processing device is used for authenticating the first image and sending an instruction corresponding to the authentication result to the prompting device;
the object includes: the processing device is used for determining first position information of the logistic object corresponding to the first image according to the first image of the logistic object, matching the first position information with second position information of the storage area to obtain a matching result, and obtaining an authentication result according to the matching result; the first position information is used for representing a distribution destination of the logistics object; the first image of the logistics object comprises electronic face sheet information;
the prompting device is used for responding to the instruction and outputting prompting information; the prompt message comprises: authorization information corresponding to successful authentication; or, warning information corresponding to authentication failure;
in the delivery link of the logistics, the object comprises: the logistics object and the person do not have electronic face bill information, so that the logistics object cannot be identified, and the authentication result of the first image of the logistics is authentication failure; the processing device is further configured to send a delivery notification of the logistic object to the second target party when the authentication result of the first image of the logistic object is authentication failure and the authentication result of the first image of the person is authentication success; the person is a first target; the first target party owns the storage area; the second target party is an express delivery person; the authentication process of the person comprises the following steps: judging whether the face contained in the first image of the person belongs to the face of the target party or not to obtain a judging result; and obtaining an authentication result according to the judgment result.
7. The system of claim 6, wherein the storage area further comprises:
light area.
8. The system of claim 6, wherein the storage area determining means comprises:
and the projection emission unit is used for projecting the light band by using a projection technology.
9. The system of claim 6, wherein the prompting device comprises: an alarm.
10. The system according to any one of claims 6 to 9, wherein the object comprises: the processing device is used for judging whether the face contained in the first image belongs to the face of the target party or not so as to obtain a judging result, and obtaining an authentication result according to the judging result.
11. The system according to any one of claims 6 to 9, wherein the object comprises: and the processing device is also used for sending an alarm notice to the target party when the physical distribution object exists in the storage area and the authentication result of the first image of the person and/or the animal is authentication failure.
12. The system according to any one of claims 6 to 9, wherein the object comprises: and the processing device is also used for sending a goods taking notification to the first target party when the authentication result of the first image of the logistics object is that the authentication is successful.
13. A data processing apparatus, comprising:
the detection module is used for detecting a first image of an object in the target area; the target area includes: a storage area, and/or a vicinity of the storage area; the storage area is used for storing the object of the logistics; the storage area includes: a light zone that uses a light beam, or a light image, to indicate the presence of a storage zone; and
the authentication module is used for authenticating the first image to obtain an authentication result;
the object includes: a logistics object, the authentication module comprising:
the first position determining module is used for determining first position information of the logistic object corresponding to the first image according to the first image of the logistic object; the first position information is used for representing a distribution destination of the logistics object; the first image of the logistics object comprises electronic face sheet information;
the matching module is used for matching the first position information with the second position information of the storage area to obtain a matching result;
the first authentication result determining module is used for obtaining an authentication result according to the matching result;
the output module is used for outputting prompt information corresponding to the authentication result; the prompt message comprises: authorization information corresponding to successful authentication; or, warning information corresponding to authentication failure;
In the delivery link of the logistics, the object comprises: the logistics object and the person do not have electronic face bill information, so that the logistics object cannot be identified, and the authentication result of the first image of the logistics is authentication failure; the apparatus further comprises:
a third notification module, configured to send a delivery notification of the logistic object to a second target party when the authentication result of the first image of the logistic object is authentication failure and the authentication result of the first image of the person is authentication success; the person is a first target; the first target party owns the storage area; the second target party is an express delivery person; the authentication process of the person comprises the following steps: judging whether the face contained in the first image of the person belongs to the face of the target party or not to obtain a judging result; and obtaining an authentication result according to the judgment result.
14. The apparatus of claim 13, wherein the storage area further comprises:
including areas of preset identification.
15. The apparatus of claim 13, wherein the object comprises: a person and/or animal, the authentication module comprising:
the face judging module is used for judging whether the face contained in the first image belongs to the face of the target party or not so as to obtain a judging result;
And the second authentication result determining module is used for obtaining an authentication result according to the judging result.
16. The apparatus according to any one of claims 13 to 15, wherein the object comprises: a person and/or animal, the device further comprising:
and the first notification module is used for sending an alarm notification to the target party when the logistics object exists in the storage area and the authentication result of the first image of the person and/or the animal is authentication failure.
17. The apparatus according to any one of claims 13 to 15, wherein the object comprises: a logistic object, the apparatus further comprising:
and the second notification module is used for sending a goods taking notification to the first target party when the authentication result of the first image of the logistics object is that the authentication is successful.
18. An apparatus, comprising:
one or more processors; and
one or more machine readable media having instructions stored thereon, which when executed by the one or more processors, cause the apparatus to perform the method of one or more of claims 1-5.
19. One or more machine readable media having instructions stored thereon, which when executed by one or more processors, cause an apparatus to perform the method of one or more of claims 1-5.
CN201811082602.0A 2018-09-17 2018-09-17 Data processing method, device, logistics object processing system and machine readable medium Active CN110910055B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201811082602.0A CN110910055B (en) 2018-09-17 2018-09-17 Data processing method, device, logistics object processing system and machine readable medium
TW108122540A TW202030660A (en) 2018-09-17 2019-06-27 Data processing method and device, logistics object processing system, and machine-readable medium
PCT/CN2019/104849 WO2020057386A1 (en) 2018-09-17 2019-09-09 Data processing method and device, logistics object processing system, and machine-readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811082602.0A CN110910055B (en) 2018-09-17 2018-09-17 Data processing method, device, logistics object processing system and machine readable medium

Publications (2)

Publication Number Publication Date
CN110910055A CN110910055A (en) 2020-03-24
CN110910055B true CN110910055B (en) 2024-04-12

Family

ID=69813745

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811082602.0A Active CN110910055B (en) 2018-09-17 2018-09-17 Data processing method, device, logistics object processing system and machine readable medium

Country Status (3)

Country Link
CN (1) CN110910055B (en)
TW (1) TW202030660A (en)
WO (1) WO2020057386A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113592592B (en) * 2021-07-28 2023-11-07 严沛熙 Method for generating glasses frame fitting effect diagram and glasses frame virtual fitting system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010183216A (en) * 2009-02-04 2010-08-19 Fujifilm Corp Photographing device, image reproducing device, and photographing result notifying method
CN104732668A (en) * 2015-04-14 2015-06-24 胥达 Delivering-collecting device and delivering-collecting method for express
CN107176095A (en) * 2016-03-10 2017-09-19 松下电器(美国)知识产权公司 Recognition result suggestion device and its method, identification object suggestion device and its method
CN107886032A (en) * 2016-09-30 2018-04-06 阿里巴巴集团控股有限公司 Terminal device, smart mobile phone, authentication method and system based on face recognition
US9984579B1 (en) * 2016-06-28 2018-05-29 Amazon Technologies, Inc. Unmanned aerial vehicle approach notification

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013018614A1 (en) * 2011-07-29 2013-02-07 日本電気株式会社 Comparison/search system, comparison/search server, image characteristic extraction device, comparison/search method, and program
US20150120596A1 (en) * 2012-09-21 2015-04-30 Google Inc. Routing optimization for package delivery to a smart-home
US20140351163A1 (en) * 2013-05-21 2014-11-27 Kevin Alan Tussy System and method for personalized delivery verification
US10657483B2 (en) * 2014-04-29 2020-05-19 Vivint, Inc. Systems and methods for secure package delivery
CN104102988A (en) * 2014-07-04 2014-10-15 王振鹏 Express distribution system
CN204155311U (en) * 2014-09-23 2015-02-11 邱胜顺 A kind of intellectual access express mail case with checking function
CN106156967A (en) * 2015-04-08 2016-11-23 阿里巴巴集团控股有限公司 Express delivery information association, the method and device of offer logistics content information
US10339690B2 (en) * 2015-12-18 2019-07-02 Ricoh Co., Ltd. Image recognition scoring visualization
CN105938587A (en) * 2016-06-20 2016-09-14 于江涛 Intelligent express mail sending access system and solution scheme based on Internet of things and two-dimensional code technology
WO2018081327A1 (en) * 2016-10-26 2018-05-03 Ring Inc. Parcel delivery assistance and parcel theft deterrence for audio/video recording and communication devices
US20180197139A1 (en) * 2017-01-06 2018-07-12 Position Imaging, Inc. Package delivery sharing systems and methods
US10664788B2 (en) * 2017-01-30 2020-05-26 International Business Machines Corporation Ad-hoc parcel delivery drop zone and hotspot

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010183216A (en) * 2009-02-04 2010-08-19 Fujifilm Corp Photographing device, image reproducing device, and photographing result notifying method
CN104732668A (en) * 2015-04-14 2015-06-24 胥达 Delivering-collecting device and delivering-collecting method for express
CN107176095A (en) * 2016-03-10 2017-09-19 松下电器(美国)知识产权公司 Recognition result suggestion device and its method, identification object suggestion device and its method
US9984579B1 (en) * 2016-06-28 2018-05-29 Amazon Technologies, Inc. Unmanned aerial vehicle approach notification
CN107886032A (en) * 2016-09-30 2018-04-06 阿里巴巴集团控股有限公司 Terminal device, smart mobile phone, authentication method and system based on face recognition

Also Published As

Publication number Publication date
CN110910055A (en) 2020-03-24
TW202030660A (en) 2020-08-16
WO2020057386A1 (en) 2020-03-26

Similar Documents

Publication Publication Date Title
TWI669659B (en) Method and terminal device for displaying information safely
US10977611B2 (en) Product tags, systems, and methods for crowdsourcing and electronic article surveillance in retail inventory management
US9858523B2 (en) Pallet mesh network
US10078830B2 (en) Modulating mobile-device displays based on ambient signals to reduce the likelihood of fraud
US20180365641A1 (en) Locker-Based Logistics Management System
US20190373432A1 (en) Use of gesture-based nfc interaction to trigger device functionality
JP2020522069A (en) Unattended sales method and device, sales terminal, and unattended sales system
US10229406B2 (en) Systems and methods for autonomous item identification
US20190337549A1 (en) Systems and methods for transactions at a shopping cart
US20160314635A1 (en) Dynamic authentication adaptor systems and methods
JP6249579B1 (en) Warehouse management method and warehouse management system
CN110910055B (en) Data processing method, device, logistics object processing system and machine readable medium
US20180108072A1 (en) Systems, Devices and Methods for Monitoring Objects in a Cart
WO2018223585A1 (en) Method and device for improving safety of quick response code consumption voucher
US20170024684A1 (en) Systems and Methods for Worksite Safety Management and Tracking
CN109801018B (en) Control method of express cabinet, express cabinet and computer readable medium
US11934990B2 (en) Apparatus and method for outputting a continuously changed QR code by reflecting a monitored logistics status
US11030506B2 (en) Multi-tag encoding for reducing tag tampering in instant checkout
US20220335794A1 (en) Security device and system for securing physical objects
CN115880045A (en) Object verification method and device, electronic equipment and computer-readable storage medium
KR20230101781A (en) Apparatus and system for providing logistics management services based on QR code
KR20170090803A (en) Mobile communication terminal and control method thereof
KR20170029292A (en) System and method for visitor identification using wireless communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant