CN112447012A - Locker verification method, device and storage medium - Google Patents

Locker verification method, device and storage medium Download PDF

Info

Publication number
CN112447012A
CN112447012A CN202011343871.5A CN202011343871A CN112447012A CN 112447012 A CN112447012 A CN 112447012A CN 202011343871 A CN202011343871 A CN 202011343871A CN 112447012 A CN112447012 A CN 112447012A
Authority
CN
China
Prior art keywords
locker
target
identity
verification
opening request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011343871.5A
Other languages
Chinese (zh)
Inventor
阳时来
毛红胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhilai Science and Technology Co Ltd
Original Assignee
Shenzhen Zhilai Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhilai Science and Technology Co Ltd filed Critical Shenzhen Zhilai Science and Technology Co Ltd
Priority to CN202011343871.5A priority Critical patent/CN112447012A/en
Publication of CN112447012A publication Critical patent/CN112447012A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/10Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property

Abstract

The invention provides a verification method, equipment and a storage medium of a locker, wherein when a locker opening request is received, a target identity in the locker opening request is obtained, and identity validity verification is carried out on the target identity according to a preset identity registry stored in a current terminal; and if the target identity passes the validity verification, determining a target cabinet number corresponding to the target identity according to a preset rule, and opening a target locker corresponding to the target cabinet number to authorize the locker of the target user. Through the mode, the identity registration table is issued to each terminal for storage, so that identity authentication is completed through the terminal when identity information cannot be authenticated through the server in a disconnected network state, user experience is improved, and authentication efficiency is improved.

Description

Locker verification method, device and storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a verification method and device for a locker, and a computer-readable storage medium.
Background
With the increase of the storage demand of people, the demand of the locker is also increasing day by day. However, as the number of depositors increases, the use problem of the locker becomes more and more prominent. For example, the current locker cannot perform authentication in a disconnected state. Therefore, how to solve the problem that the locker cannot perform identity authentication in the disconnected state is a technical problem to be solved urgently at present.
Disclosure of Invention
The invention mainly aims to provide a verification method and equipment of a locker and a computer readable storage medium, and aims to solve the technical problem that the locker cannot be authenticated in a disconnected state.
In order to achieve the above object, the present invention provides a verification method for a locker, comprising the steps of:
when a cabinet opening request is received, acquiring a target identity in the cabinet opening request, and performing identity validity verification on the target identity according to a preset identity registry stored in a current terminal;
and if the target identity passes the validity verification, determining a target cabinet number corresponding to the target identity according to a preset rule, and opening a target locker corresponding to the target cabinet number to authorize the locker of the target user.
Optionally, if the target identity passes the validity verification, determining a target cabinet number corresponding to the target identity according to a preset rule, and opening a target locker corresponding to the target cabinet number, so as to perform locker authorization for the target user specifically includes:
if the target identity passes the validity verification, judging whether the opening request is a storage opening request or a fetching opening request;
and if the locker opening request is a storage locker opening request, determining a target locker number in the locker numbers corresponding to the idle lockers according to a preset distribution rule, and opening the target locker corresponding to the target locker number to authorize the storage of the target user.
Optionally, after the step of determining whether the locker opening request is a storage locker opening request or a pickup locker opening request if the target identity passes the validity verification, the method further includes:
and if the locker opening request is a fetching and locker opening request, determining a target locker number corresponding to the target identity identifier in the locker numbers corresponding to the occupied lockers according to the register data table stored in the current terminal, and opening the target locker corresponding to the target locker number to authorize the fetching of the target user.
Optionally, if the locker opening request is an article-taking locker opening request, after the step of determining a target locker number corresponding to the target identity identifier in the locker numbers corresponding to the occupied locker according to the storage data table stored in the current terminal, the method further includes:
acquiring the current fetching termination time of the target cabinet number, and acquiring the currently stored storage starting time of the target cabinet number;
and calculating the deposit time interval between the storage starting time and the fetching termination time, and adding the target identity mark to a deposit blacklist when the deposit time interval exceeds a preset time threshold value, and generating and displaying a prompt message of deposit overtime.
Optionally, after the step of obtaining the target identity in the request for opening the cabinet when the request for opening the cabinet is received and performing identity validity verification on the target identity according to a preset identity registry stored in the current terminal in the network disconnection state, the method further includes:
when the updating operation of the identity registry or the registered data table stored in the server is detected, acquiring updating part data corresponding to the identity registry or the registered data table stored in the server;
and updating the identity registry or the register data table stored in each terminal according to the updated partial data.
Optionally, the step of updating the identity registry or the registered data table stored in each terminal according to the updated partial data specifically includes:
and if the updated part data is of the newly added type, inserting the updated part data of the newly added type into the tail end of the identity registry or the registered data table of each terminal according to the preset index table of each terminal.
Optionally, the step of performing identity validity verification on the target identity according to a preset identity registry stored in the current terminal specifically includes:
acquiring an identity identification digital field in an identity registry stored in the current terminal, and establishing an index table according to the identity identification digital field;
and acquiring a target identification data field in the target identity, and judging whether the target identification data field exists in the index table so as to verify the identity validity of the target identity.
Optionally, before the step of performing identity validity verification on the target identity according to a preset identity registry stored in the current terminal, the method further includes:
and receiving the identity registration table sent by the server, updating the currently stored identity registration table into the received identity registration table, and sending the identity registration table to each terminal by the server at regular time.
In addition, in order to achieve the above object, the present invention further provides a verification apparatus for a locker, which includes a processor, a memory, and a locker verification program stored on the memory and executable by the processor, wherein when the locker verification program is executed by the processor, the steps of the locker verification method are implemented.
In addition, to achieve the above object, the present invention further provides a computer readable storage medium, on which a verification program of a locker is stored, wherein when the verification program of the locker is executed by a processor, the steps of the verification method of the locker as described above are implemented.
The invention provides a verification method of a locker, which comprises the steps of acquiring a target identity in a locker opening request when the locker opening request is received, and verifying the identity validity of the target identity according to a preset identity registry stored in a current terminal; and if the target identity passes the validity verification, determining a target cabinet number corresponding to the target identity according to a preset rule, and opening a target locker corresponding to the target cabinet number to authorize the locker of the target user. Through the mode, the identity registration table is issued to each terminal for storage, so that identity authentication is completed through the terminal when identity information cannot be authenticated through the server in a disconnected network state, user experience is improved, and authentication efficiency is improved.
Drawings
Fig. 1 is a schematic diagram of a hardware structure of a verification device of a locker according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart illustrating a verification method for a storage cabinet according to a first embodiment of the present invention;
FIG. 3 is a schematic diagram of a functional module of the storage cabinet of the present invention;
FIG. 4 is a schematic diagram of a locker management platform system according to the present invention;
FIG. 5 is a diagram of a software framework of the locker management platform according to the present invention;
FIG. 6 is a schematic diagram of a data table comparison algorithm according to the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The verification method of the register cabinet is mainly applied to verification equipment of the register cabinet, and the verification equipment of the register cabinet can be equipment with display and processing functions, such as a PC (personal computer), a portable computer, a mobile terminal and the like.
Referring to fig. 1, fig. 1 is a schematic diagram of a hardware structure of a verification device of a locker according to an embodiment of the present invention. In this embodiment of the present invention, the verification device of the locker may include a processor 1001 (e.g., a CPU), a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. The communication bus 1002 is used for realizing connection communication among the components; the user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard); the network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface); the memory 1005 may be a high-speed RAM memory, or may be a non-volatile memory (e.g., a magnetic disk memory), and optionally, the memory 1005 may be a storage device independent of the processor 1001.
Those skilled in the art will appreciate that the hardware configuration shown in FIG. 1 does not constitute a limitation of the locker validation apparatus, and may include more or fewer components than those shown, or some components in combination, or a different arrangement of components.
With continued reference to fig. 1, the memory 1005 of fig. 1, which is a computer-readable storage medium, may include an operating system, a network communication module, and a locker authentication program.
In fig. 1, the network communication module is mainly used for connecting to a server and performing data communication with the server; the processor 1001 may call the verification program of the locker stored in the memory 1005, and execute the verification method of the locker provided by the embodiment of the present invention.
At present, the identity of a locker is verified through a server, so that the existing locker cannot be connected with the server in a disconnected state, and the identity verification cannot be completed. In order to solve the above problems, the present invention provides a verification method for a locker, which is applied to a verification system for the locker. The verification system comprises a server, a verification program installed in the locker and an identity used for identifying the identity of the user. For example, the identification may be a campus card containing the user student account or a professor card containing the professor account. School's user's accessible is punched a card and is carried out the access thing operation of locker, carries out the identity of verifying fast by server or locker terminal according to the identity sign in the card to reach and carry out effectual management to student and professor bag-keeping action, conveniently carry out the article in school personnel and deposit. Based on this, the embodiment of the invention provides a verification method of a locker.
Referring to fig. 2, fig. 2 is a schematic flow chart of a verification method for a locker according to a first embodiment of the present invention.
In this embodiment, the verification method of the locker includes the following steps:
step S10, when a cabinet opening request is received, a target identity in the cabinet opening request is obtained, and identity validity verification is carried out on the target identity according to a preset identity registry stored in the current terminal;
in this embodiment, the execution subject is a verification device of the locker. As shown in fig. 3, the system (the verification device of the locker) includes a terminal device and a background management software. The background management software is deployed on the server to manage a plurality of terminals and is flexible and configurable. The terminal equipment is used for collecting data, and the background management software is used for processing the data. Specifically, the functions of the background management software include:
A. and authentication, namely, the information of the user of the bag storage cabinet is authenticated and displayed through the data pushed by the school information center.
B. Information management, namely (1) authority management, wherein system users are divided into an operator, an administrator and a super administrator; (2) managing a user; (3) a user logs in; (4) locking and unlocking a system;
C. records and reports, namely (1) personnel information: job/school number, name, department, gender, physical card number, etc. (2) Storage/fetching record: displaying card number, name, school number, college, cabinet number, box number and operation time. (3) Report on the use condition of the box: and displaying the use condition analysis of each cabinet and box, including year, month and day reports. (4) Black list: and displaying the information of the personnel who accumulated the violation three times, wherein the number of the violation times can be displayed on a terminal display screen by each storage. And automatically entering a blacklist if the user does not take the packages at intervals or continuously for three days at night, automatically removing the blacklist after freezing the package storage authority for 30 days, and manually adding and removing the blacklist. (5) Operating the log: and displaying the operations of login, exit, box opening, box cleaning and the like of the server software.
D. Deposit management, namely (1) remote unpacking: and the remote control locker is opened or unpacked. (2) Remote box cleaning: and the remote control locker is used for clearing boxes or cabinets. And the PLC is used for communication control with the locker. (3) And (3) displaying the state of the box: the method comprises the steps of displaying the idle state, the occupied state, the object state and the locking state of the box in real time, displaying the green, idle yellow, occupied oval, object, inspecting the object state in the box in real time in an infrared correlation mode, and uploading the object state to management software for displaying.
E. System management, namely (1) system parameter configuration: database parameters and communication port configuration. (2) And (3) configuring parameters of the cabinet: and (4) configuring parameters of a region and a cabinet, and setting parameters including an IP address, a port number, the number of boxes and the like of the cabinet. (3) Setting a login password: and modifying the login password of the management software. (4) Remote updating of the terminal database: the data in the server is sent and updated to the terminals at regular time, the management software keeps the database backup of each terminal, the data are sent and updated according to the difference between the data table pushed and updated by the information center and the data table of each cabinet, the data which only need to be updated (modified, deleted and added) are sent, the repeated sending of a large amount of data is reduced, and the timeliness of communication is improved. For example, after the campus card of the student is lost and subsidized, the management software is required to obtain updated data and then send the updated data to the terminal software; after the students are graduation or the professor leaves the office, the package storing qualification of the students needs to be deleted.
F interface management, namely (1) get door status interface: the door with various door opening modes is butted. (2) Remote door opening interface: and (5) remotely opening the door. (3) A data synchronization interface: data is synchronized between different systems. (4) A video monitoring interface: and interfacing with other video surveillance systems. (4) The system supports the butt joint with the short message platform, and after the students finish fetching the articles, if the articles are left, the article left reminding short message can be sent through the short message template; when the student stores articles or takes articles in the middle of the student, the student can send a box door alarm reminding short message when detecting that the box door is not closed for a long time; the students can send a receiving reminding short message when not taking articles away in the same day; and short message alarm in other special conditions. (5) The system supports the butt joint of video monitoring, calls the camera shooting in time for illegal access and determines abnormal conditions.
G. Terminal system upgrade scheme, namely (1) USB flash disk upgrade: and (5) manual upgrading. (2) And (3) timing upgrading: the network checks for updates (needs to be networked). (3) Background upgrading: and upgrading the terminal through background management software. (4) The method complies with a unified protocol, and the interface isolation is convenient to be connected with other systems.
Therefore, through the functional modules, the invention realizes the comprehensive integration of data push, electronic induction technology and Internet of things technology.
Specifically, the identity registry with the use authority can be pushed to the server from the school information center in an ODI pushing mode of the database, so that the package storage authority of the package storage user can be managed. As shown in FIG. 4, the invention adopts the existing physical card of teachers and students to identify, reduces the burden of restarting the card for users, and pushes the identity registration table with the use authority from the school information center to the server by the ODI mode, thereby improving the data synchronization efficiency. The identity information which can be synchronously updated in real time, such as the loss of a newly added card or the newly added card, provides the use authority of the locker for teachers and students who just register in real time, and cancels the original use authority of the loss-reporting user in time, thereby avoiding the use of the locker by personnel without authority. The system comprises a server, a database, a background management end and a verification system, wherein the database is used for storing data in the server and is used as the background management end for storing basic information of teachers and students, storage/fetching records, system login/logout records, administrator unpacking/clearing and other data, and the database can interact with the verification system. The server is also used for analyzing the received data, for example, responding to corresponding service logic operation and returning a processing result. The server is also used for inquiring, deleting, displaying, managing and the like basic information such as storage, fetching, black lists and the like in the database. The management is to perform information interaction with the database and provide parameter configuration for each terminal device, so that software installed on the verification terminal can run according to the environment of actual needs. The hardware in communication connection with the verification system comprises an IC card reader installed on the locker, an integrated circuit chip (a large-scale integrated circuit chip is embedded in a small plastic card by using modern advanced microelectronic technology, so that the operation is fast and convenient), and an infrared detection module (namely, the state of an article in the box is inspected in real time in an infrared correlation mode and is uploaded to management software for display). The software framework of the invention is shown in fig. 5, and the method provided by the invention is implemented based on the system and the software framework. Specifically, when a cabinet opening request triggered by a card swiping operation of a user is received, a target identity identifier in the cabinet opening request, such as a card number of an all-purpose card or a student or teacher account stored in a mobile phone, is acquired, and a pre-stored preset identity registry is called through a current terminal corresponding to a current locker to acquire corresponding registered user information. That is, when the corresponding registered user information is found in the identity registry, that is, the target identity is a legal registered user, the validity verification is passed.
In this embodiment, for the problem that the verification cannot be performed due to the network outage, the verification system adopts a manner of updating the terminal database at regular time, so that each locker stores a verification data table of all the persons. Specifically, the server sends the identity registry to each terminal at regular time, so that the terminal updates the current identity registry to the received identity registry when receiving the identity registry sent by the server. Therefore, the terminal can verify the legality through the database of the terminal under the condition of network disconnection.
Step S20, if the target identity passes the validity verification, determining a target cabinet number corresponding to the target identity according to a preset rule, and opening a target locker corresponding to the target cabinet number to authorize the target user.
In this embodiment, if the target identity passes the validity verification, the current user may be authorized to access the article. After the storage or fetching type of the user is determined, the target cabinet number can be determined according to the storage corresponding to the storage determining rule, or the target cabinet number can be determined according to the fetching corresponding to the storage determining rule. And opening a target locker corresponding to the target locker number to authorize the target user by the locker. Namely, the terminal card reader reads the physical card number of the one-card when the network is not disconnected and sends the physical card number to the management platform for identity authentication. If the management platform inquires the personnel information corresponding to the card number, the verification is passed, otherwise, the use is refused. And if the network is disconnected, the terminal software inserts and inquires the data table of the terminal software for verification. The database of the system is connected with an information center of a school, and the information center pushes data to a management platform in an ODI mode. Teachers and students can check the identity of bag storage personnel by swiping cards at the card reading position below the display screen of the locker, and after the check is passed, the teachers and students can authorize the storage and can shoot illegal conditions by combining a video monitoring system. Further, the step S20 specifically includes:
if the target identity passes the validity verification, judging whether the opening request is a storage opening request or a fetching opening request;
and if the locker opening request is a storage locker opening request, determining a target locker number in the locker numbers corresponding to the idle lockers according to a preset distribution rule, and opening the target locker corresponding to the target locker number to authorize the storage of the target user.
And if the locker opening request is a fetching and locker opening request, determining a target locker number corresponding to the target identity identifier in the locker numbers corresponding to the occupied lockers according to the register data table stored in the current terminal, and opening the target locker corresponding to the target locker number to authorize the fetching of the target user.
In this embodiment, when the locker opening request is a storage locker opening request, the user does not occupy the locker currently, that is, the locker number corresponding to the target identity does not exist in the current locker, and the target locker number can be determined in the idle locker. And when the cabinet opening request is an article taking and cabinet opening request, the user currently occupies the locker, namely searching and determining the corresponding target cabinet number according to the target identity. Specifically, the verified person can carry out storage operation before any cabinet, and after the storage is successful, the information of the bag holder is recorded. When the user swipes the card before other cabinets to store the object, the terminal display screen can remind the user of the specific cabinet number and the box number of the object, and when the user takes the object before different cabinets, the user can also be reminded of the specific cabinet number of the user, so that the user is prevented from carrying out misoperation or forgetting the specific cabinet number of the object. Meanwhile, the illegal times of bag storage of the user can be counted and displayed on a screen every time the bag is stored/taken, and the safe deposit cabinet is well documented, is used by teachers and students correctly and complies with the bag storage rule. The rule is to count the violations once every night, for example, enter the blacklist directly every three days, or enter the blacklist more than 3 times every night.
The embodiment provides a verification method of a locker, which includes the steps of obtaining a target identity in a locker opening request when the locker opening request is received, and verifying identity validity of the target identity according to a preset identity registry stored in a current terminal; and if the target identity passes the validity verification, determining a target cabinet number corresponding to the target identity according to a preset rule, and opening a target locker corresponding to the target cabinet number to authorize the locker of the target user. Through the mode, the identity registration table is issued to each terminal for storage, so that identity authentication is completed through the terminal when identity information cannot be authenticated through the server in a disconnected network state, user experience is improved, and authentication efficiency is improved.
Further, if the locker opening request is an article-taking locker opening request, after the step of determining a target locker number corresponding to the target identity identifier in the locker numbers corresponding to the occupied locker according to the storage data table stored in the current terminal, the method further includes:
acquiring the current fetching termination time of the target cabinet number, and acquiring the currently stored storage starting time of the target cabinet number;
and calculating the deposit time interval between the storage starting time and the fetching termination time, and adding the target identity mark to a deposit blacklist when the deposit time interval exceeds a preset time threshold value, and generating and displaying a prompt message of deposit overtime.
In this embodiment, the current time of storing the article by the user is first obtained, all the hour/minute seconds in the time format are set to 0, the same hour/minute/second in the time format is also set to 0 when the user fetches the article, finally, the number of days of the user in the middle of night is obtained by subtracting the access time and the article fetching time by the timestamp respectively, the result is recorded in the data table, and when the user breaks the rule again later, the number of times in the middle of night is added to obtain the total number of times of violation, and the total number of times of violation is transmitted to the terminal display screen for display. For example, taking seconds as a unit, the day is 86400 seconds, if the storage time is 2019-1-2210: 23:24 and the taking time is 2019-1-2418: 23:45, the storage time is 2019-1-2200: 00:00:00 and the taking time is 2019-1-2400: 00:00, the storage time and the taking time are calculated, the storage time and the taking time are converted into corresponding formats and are respectively divided by 86400, and the overnight times can be obtained by subtracting the storage time and the taking time.
Wherein, the step of updating the identity registry or the registered data table stored in each terminal according to the updated partial data specifically comprises:
and if the updated part data is of the newly added type, inserting the updated part data of the newly added type into the tail end of the identity registry or the registered data table of each terminal according to the preset index table of each terminal.
In this embodiment, the information table and the update table of the previous day may be compared at regular time every day or when it is detected that the data in the server is updated, and the data that needs to be added, deleted, or modified may be searched and marked. The management platform generates a backup table of each terminal, the changed data is issued, when a certain terminal fails to issue the data, the next terminal is updated, and once the management platform and the failed terminal are reconnected, the data is issued to the terminal according to the data which is updated in the last time and fails to issue, so that the breakpoint issuance of the data is ensured, the repeated issuance cannot occur, and the communication timeliness is improved.
In one embodiment, the system communicates in the JSON format, which has the advantages of: (1) the data format is simple, easy to read and write, the format is compressed, and the occupied bandwidth is small; (2) a plurality of languages are supported, so that the analysis is convenient for a server side; (3) the language is easy to analyze, and the client can simply read JSON data through eval (); (4) the code development amount is greatly simplified, and the maintenance and the later expansion are easy. And the number of records transmitted per packet can be manually configured. And after receiving each frame of data, the terminal software performs corresponding operations of adding, deleting and modifying, if the operation fails, a failed state value is returned, the management platform performs retransmission operation, and when the retransmission operation exceeds a certain number of times, the current terminal equipment is automatically skipped, and the database of the next terminal is updated. The system realizes reliable communication of UDP communication, and ensures the reliability and stability of data transmission. In a specific embodiment, the number of data records sent by each frame may be set according to the maximum data size allowed to be issued, then the card number field and the flag bit are combined by a specific symbol, for example, "|", and are separated by commas, and the data records are packed and sent according to the number of the data records to be sent, and whether the currently updated terminal is in a network-connectable online state is determined, if so, the issuing is completed, otherwise, the next terminal is updated. When data is sent, the data is sent together with less than one frame. And if the feedback of the terminal is not received, the delayed retransmission is carried out, and when the feedback filling error of the terminal is received, the data updating is carried out again, and the data issuing operation is carried out. If the delayed retransmission exceeds a certain number of times, the current terminal is judged to be in a disconnected state, and the data updating of the next terminal is carried out until the data updating of all terminals is completed.
Further, the step of performing identity validity verification on the target identity according to a preset identity registry stored in the current terminal specifically includes:
acquiring an identity identification digital field in an identity registry stored in the current terminal, and establishing an index table according to the identity identification digital field;
and acquiring a target identification data field in the target identity, and judging whether the target identification data field exists in the index table so as to verify the identity validity of the target identity.
In this embodiment, in order to improve user experience and improve verification efficiency, networking is mainly used, and the campus network in current operation is organically combined, and offline operation is considered. In particular, database queries are one of the most prominent functions of databases. The verification speed mainly depends on the speed of querying data, and in the embodiment, data query optimization is performed from the perspective of a query algorithm. Since each search algorithm can only be applied to a specific data structure, the database needs to satisfy the data structure of the specific search algorithm outside the data. To improve data query efficiency, data can be referenced (pointed to) by way of indexes, thereby implementing advanced lookup algorithms on these data structures. At present, most database systems and file systems adopt B-Tree or the variant B + Tree thereof as an index structure. In order to improve the data query efficiency, the mode adopted by the system for carrying out identity verification on the package storage user is a method for matching a certain column of suffix character strings. Namely, the identification number field in the identification registry stored in the current terminal is obtained in advance, and an index table is established according to the identification data field. And acquiring a target identification data field in the target identity, and judging whether the target identification data field exists in the index table so as to verify the identity validity of the target identity. The identity identification digital field can be partial or complete, whether identity validity verification is passed or not is firstly determined according to the digital field, and then other information is further determined in the database according to the identity digital field. For example, the card number of a campus card usually consists of 10 digits, the front may contain several '0's, the database designed by the system mainly stores the card number in the form of character string, and only the column of the card number field needs to be queried for authentication. In the specific embodiment, for convenience of describing the B-Tree, first, a piece of data is defined, and the record is a binary [ key, data ], and the key is a key value of the record (the key is different from each other for different data records); the data is data of the data records except key. B + Tree differs from B-Tree in that: (1) the upper limit of the pointer of each node is 2d instead of 2d + 1; (2) the internal nodes do not store data, only store keys, and the leaf nodes do not store pointers. In general, B + Tree is more suitable for realizing an external storage index structure than B-Tree, so that database queries all adopt B + Tree indexes added with sequential access pointers. The system adopts MySQL database, and in MySQL, index belongs to concept of storage engine level. The index implementation modes of different storage engines are different, the system is implemented by adopting InoDB indexes, namely, the query speed is optimized by using a prefix matching principle. Specifically, because the card number field is most frequently used, the card number field may be placed to the far left for ease of lookup. During searching, the right 5 characters are matched, and if repeated records are found, the right 4-5 numbers are matched, so that the searching speed is increased. In more embodiments, the method further adopts a pushing rule, and inserts newly added data into the tail end of the data table according to the index; for modified data, the field concat function which may need to be changed is concatenated, and when the generated total fields are different, the updating and marking are required. And for the deleted data, comparing the same row of the record according to the index, and matching the next row by using the current row when the matching is unsuccessful, and so on. In order to ensure that records needing to be added or deleted are marked when updating is carried out at regular time, and output results are stored in a sending table for storage. According to the data table comparison algorithm shown in fig. 6, if the total field is successfully matched and the index numbers are the same, it indicates that the current data table is not updated, and the un-updated data does not need to be sent to the terminal software of each locker. The data with the difference in the table can be automatically found out for storage, only the modified data is issued, all the data is avoided being issued, each terminal corresponds to one table, and the integrity of data transmission is guaranteed.
In addition, an embodiment of the present invention further provides a verification device for a locker, where the verification device for a locker includes a processor, a memory, and a locker verification program stored in the memory and executable by the processor.
The verification program of the register cabinet is executed by the processor to realize the steps of the verification method of the register cabinet.
In addition, the embodiment of the invention also provides a computer readable storage medium.
The computer readable storage medium of the present invention stores the verification program of the locker, wherein the verification program of the locker is executed by the processor to implement the steps of the verification method of the locker as described above.
The method for implementing the verification program of the locker when executed can refer to the embodiments of the verification method of the locker of the present invention, and will not be described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A verification method of a locker is characterized by comprising the following steps:
when a cabinet opening request is received, acquiring a target identity in the cabinet opening request, and performing identity validity verification on the target identity according to a preset identity registry stored in a current terminal;
and if the target identity passes the validity verification, determining a target cabinet number corresponding to the target identity according to a preset rule, and opening a target locker corresponding to the target cabinet number to authorize the locker of the target user.
2. The locker verification method according to claim 1, wherein if the target id passes the validity verification, determining a target locker number corresponding to the target id according to a preset rule, and opening the target locker corresponding to the target locker number to authorize the target user, specifically comprises:
if the target identity passes the validity verification, judging whether the opening request is a storage opening request or a fetching opening request;
and if the locker opening request is a storage locker opening request, determining a target locker number in the locker numbers corresponding to the idle lockers according to a preset distribution rule, and opening the target locker corresponding to the target locker number to authorize the storage of the target user.
3. The verification method for the locker as recited in claim 2, wherein, after the step of determining whether the locker opening request is a storage locker opening request or a pickup locker opening request if the target id passes the validity verification, the method further comprises:
and if the locker opening request is a fetching and locker opening request, determining a target locker number corresponding to the target identity identifier in the locker numbers corresponding to the occupied lockers according to the register data table stored in the current terminal, and opening the target locker corresponding to the target locker number to authorize the fetching of the target user.
4. The locker authentication method according to claim 3, wherein, if the locker opening request is an article-taking locker opening request, after the step of determining the target locker number corresponding to the target id from among the locker numbers corresponding to the occupied locker according to the registration data table stored in the current terminal, further comprising:
acquiring the current fetching termination time of the target cabinet number, and acquiring the currently stored storage starting time of the target cabinet number;
and calculating the deposit time interval between the storage starting time and the fetching termination time, and adding the target identity mark to a deposit blacklist when the deposit time interval exceeds a preset time threshold value, and generating and displaying a prompt message of deposit overtime.
5. The verification method for the locker as claimed in claim 1, wherein after the steps of obtaining the target identity in the locker opening request when the locker opening request is received and verifying the identity validity of the target identity according to a preset identity registry stored in the current terminal in the network disconnection state, the verification method further comprises:
when the updating operation of the identity registry or the registered data table stored in the server is detected, acquiring updating part data corresponding to the identity registry or the registered data table stored in the server;
and updating the identity registry or the register data table stored in each terminal according to the updated partial data.
6. The locker verification method according to claim 5, wherein said step of updating the identity registry or the registration data table stored in each terminal according to said updated partial data comprises:
and if the updated part data is of the newly added type, inserting the updated part data of the newly added type into the tail end of the identity registry or the registered data table of each terminal according to the preset index table of each terminal.
7. The locker verification method according to any of claims 1 to 6, wherein said step of verifying the validity of the target identity according to a preset identity registry stored in the current terminal specifically comprises:
acquiring an identity identification digital field in an identity registry stored in the current terminal, and establishing an index table according to the identity identification digital field;
and acquiring a target identification data field in the target identity, and judging whether the target identification data field exists in the index table so as to verify the identity validity of the target identity.
8. The locker verification method according to any of claims 1 to 6, wherein, before the step of verifying the validity of the target identity according to a preset identity registry stored in the current terminal, the method further comprises:
and receiving the identity registration table sent by the server, updating the currently stored identity registration table into the received identity registration table, and sending the identity registration table to each terminal by the server at regular time.
9. A locker verification apparatus comprising a processor, a memory, and a locker verification program stored on the memory and executable by the processor, wherein the locker verification program when executed by the processor implements the locker verification method according to any one of claims 1 to 8.
10. A computer-readable storage medium, on which a locker authentication program is stored, wherein the locker authentication program, when executed by a processor, implements the locker authentication method steps of any one of claims 1 to 8.
CN202011343871.5A 2020-11-25 2020-11-25 Locker verification method, device and storage medium Pending CN112447012A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011343871.5A CN112447012A (en) 2020-11-25 2020-11-25 Locker verification method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011343871.5A CN112447012A (en) 2020-11-25 2020-11-25 Locker verification method, device and storage medium

Publications (1)

Publication Number Publication Date
CN112447012A true CN112447012A (en) 2021-03-05

Family

ID=74738428

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011343871.5A Pending CN112447012A (en) 2020-11-25 2020-11-25 Locker verification method, device and storage medium

Country Status (1)

Country Link
CN (1) CN112447012A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113903121A (en) * 2021-09-23 2022-01-07 无锡宇宁智能科技有限公司 5G Internet of things terminal and communication method thereof
CN114140943A (en) * 2021-11-26 2022-03-04 上海蜜罐科技有限公司 Express cabinet convenient and fast pickup system and method
CN116913011A (en) * 2023-08-28 2023-10-20 深圳市易安格实业有限公司 Intelligent cabinet storing and taking system and method based on Internet of things

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103236116A (en) * 2013-03-21 2013-08-07 胡飞虎 System for depositing in or withdrawing from electronic cabinet cells and delivering method
CN106297055A (en) * 2016-08-30 2017-01-04 湖南大学 A kind of locker, storage cabinet control and system
CN107133753A (en) * 2016-02-29 2017-09-05 苏宁云商集团股份有限公司 It is a kind of to pick up by oneself the method and system that cabinet accesses parcel offline
CN107808438A (en) * 2017-12-08 2018-03-16 苏州高新文体集团有限公司 A kind of Venue Management system based on vena metacarpea certification
US20200017299A1 (en) * 2018-07-12 2020-01-16 Walmart Apollo, Llc Automated storage retrieval system connection and communication protocol

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103236116A (en) * 2013-03-21 2013-08-07 胡飞虎 System for depositing in or withdrawing from electronic cabinet cells and delivering method
CN107133753A (en) * 2016-02-29 2017-09-05 苏宁云商集团股份有限公司 It is a kind of to pick up by oneself the method and system that cabinet accesses parcel offline
CN106297055A (en) * 2016-08-30 2017-01-04 湖南大学 A kind of locker, storage cabinet control and system
CN107808438A (en) * 2017-12-08 2018-03-16 苏州高新文体集团有限公司 A kind of Venue Management system based on vena metacarpea certification
US20200017299A1 (en) * 2018-07-12 2020-01-16 Walmart Apollo, Llc Automated storage retrieval system connection and communication protocol

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113903121A (en) * 2021-09-23 2022-01-07 无锡宇宁智能科技有限公司 5G Internet of things terminal and communication method thereof
CN114140943A (en) * 2021-11-26 2022-03-04 上海蜜罐科技有限公司 Express cabinet convenient and fast pickup system and method
CN116913011A (en) * 2023-08-28 2023-10-20 深圳市易安格实业有限公司 Intelligent cabinet storing and taking system and method based on Internet of things

Similar Documents

Publication Publication Date Title
CN112447012A (en) Locker verification method, device and storage medium
CN110750562A (en) Storm-based real-time data comparison early warning method and system
CN107194666A (en) Report Server Management method and terminal device based on block chain technology
CN108696511A (en) A kind of public notification of information method, apparatus and relevant device based on block chain
CN109951289A (en) A kind of recognition methods, device, equipment and readable storage medium storing program for executing
US8756679B2 (en) Electronic device and method for unlocking locked operating system
AU2014366538A1 (en) Method and system for updating Optical Distribution Network (ODN) device by using intelligent management terminal
CN110532529A (en) A kind of recognition methods of file type and device
CN107580002B (en) Double-factor authentication security manager login system and method
CN101964710A (en) Digital signature and signature authenticating method
CN113037505B (en) Method and system for realizing trusted Web application
CN109427027A (en) Folder processing method, device, system, pocessor and storage media
EP3929882A1 (en) Access control
CN109766678A (en) Towards mobile terminal device-fingerprint identification authentication method, system, medium and equipment
JP4903180B2 (en) External storage medium use management method, information processing apparatus, and program
CN110457351B (en) Government financing platform data information-based management system and management method
CN111882736B (en) Intelligent money box storage cabinet management system and method
CN104378402B (en) User contact infonnation update method and device
CN106713666B (en) Identification display method and device for verification information
CN111739228A (en) Face recognition security system based on Internet of things and operation method
CN110059491A (en) Data import monitoring method, device, equipment and readable storage medium storing program for executing
US7784091B2 (en) Data processing system
KR102601890B1 (en) DID Access Certifying System by Using Smart Treminal and Method thereof
CN115361450A (en) Request information processing method, apparatus, electronic device, medium, and program product
CN109635552A (en) Electronic equipment identity information verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210305

RJ01 Rejection of invention patent application after publication