CN113450520A - Equipment management method, device, server and storage medium - Google Patents

Equipment management method, device, server and storage medium Download PDF

Info

Publication number
CN113450520A
CN113450520A CN202110694649.8A CN202110694649A CN113450520A CN 113450520 A CN113450520 A CN 113450520A CN 202110694649 A CN202110694649 A CN 202110694649A CN 113450520 A CN113450520 A CN 113450520A
Authority
CN
China
Prior art keywords
user
target
equipment
borrow
target equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110694649.8A
Other languages
Chinese (zh)
Other versions
CN113450520B (en
Inventor
冯捷
孙美霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An E Wallet Electronic Commerce Co Ltd
Original Assignee
Ping An E Wallet Electronic Commerce Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An E Wallet Electronic Commerce Co Ltd filed Critical Ping An E Wallet Electronic Commerce Co Ltd
Priority to CN202110694649.8A priority Critical patent/CN113450520B/en
Publication of CN113450520A publication Critical patent/CN113450520A/en
Application granted granted Critical
Publication of CN113450520B publication Critical patent/CN113450520B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1409Mechanical actuation by lifting or attempted removal of hand-portable articles for removal detection of electrical appliances by detecting their physical disconnection from an electrical system, e.g. using a switch incorporated in the plug connector
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Marketing (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • General Business, Economics & Management (AREA)
  • Medical Informatics (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • Development Economics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application is applicable to the technical field of equipment management and provides an equipment management method, an equipment management device, a server and a storage medium. The method comprises the following steps: when the server detects that the user disconnects the data line from the target equipment, acquiring the authorization state of the target equipment; if the authorization state is detected to be that the target equipment is authorized, acquiring the identity information of the user; when the user is judged to have the authority to borrow the target equipment based on the identity information, the user is allowed to borrow the target equipment, and when the user is judged not to have the authority to borrow the target equipment, the target equipment is controlled to collect the first portrait information and give an alarm. In the scheme, operation and maintenance personnel do not need to maintain the test platform on site for 24 hours, so that the economic cost of the test is saved; the method for managing the borrowing mobile equipment can be remotely monitored by the server, and is flexible and effective; when the mobile equipment is lent by an unauthorized user, the mobile equipment can be timely alarmed, so that the real-time monitoring of the mobile equipment is realized, and the safety of the mobile equipment is guaranteed.

Description

Equipment management method, device, server and storage medium
Technical Field
The present application relates to the field of device management technologies, and in particular, to a device management method, a device management apparatus, a server, and a storage medium.
Background
With the improvement of android fragmentation and publishing rhythm, compatibility is a ring that quality assurance of mobile equipment (such as a mobile phone, a tablet, a notebook and the like) cannot bypass, and therefore testing of the mobile equipment is indispensable. The testing of mobile devices necessarily requires the use of a large number of mobile devices, which results in increased testing costs. In order to improve the utilization rate of mobile equipment and further reduce the test cost, a mobile equipment borrowing scheme is provided by a plurality of internet companies, namely offline mobile equipment is collected and stored in a unified mode, when operation and maintenance personnel or testing personnel need to test different mobile equipment, the mobile equipment is tested by borrowing the corresponding mobile equipment, and the mobile equipment is returned after the test is completed. The returned mobile equipment can be used for other testing personnel to carry out the next round of testing. The mobile equipment borrowing scheme improves the utilization rate of the mobile equipment and reduces the test cost.
However, in the existing mobile device borrowing scheme, all off-line mobile devices are generally collected and stored in the cabinet uniformly, and the field operation and maintenance personnel respond to the borrowing requirement of the mobile devices. If borrowing is opened, on-site operation and maintenance personnel are cancelled, the user can take the mobile equipment by himself, the mobile equipment is inevitably borrowed out of control, and the safety of the mobile equipment is not guaranteed. Therefore, there is an urgent need for a flexible and efficient method for remotely managing borrowing by a mobile device.
Disclosure of Invention
In view of this, embodiments of the present application provide a device management method, a device management apparatus, a server, and a storage medium, where the method may flexibly and effectively remotely manage borrowing of a mobile device, so as to solve the problems of high test cost and no security guarantee of the mobile device in the existing mobile device borrowing scheme.
A first aspect of an embodiment of the present application provides an apparatus management method, including:
when a server detects that a user disconnects a data line from a target device, acquiring an authorization state of the target device, wherein one end of the data line is connected with the server, the other end of the data line is connected with the target device, and the authorization state is used for indicating whether the target device is allowed to be borrowed or not;
if the authorization state is detected to be that the target equipment is authorized, acquiring the identity information of the user;
judging whether the user has the authority to borrow the target equipment or not based on the identity information;
when it is determined that the user has the authority to borrow the target device, allowing the user to borrow the target device; or the like, or, alternatively,
and when the target equipment is judged to be not borrowed by the user, controlling the target equipment to collect first portrait information of the user, and giving an alarm based on the first portrait information.
Optionally, after the server acquires the authorization status of the target device when detecting that the user disconnects the data line from the target device, the method further includes:
and if the authorization state is detected to be that the target equipment is not authorized, controlling the target equipment to acquire second portrait information of the user, and giving an alarm based on the second portrait information.
Optionally, the obtaining the identity information of the user if it is detected that the authorization status is that the target device is authorized includes:
if the authorization state is detected to be that the target equipment is authorized, controlling the target equipment to acquire the face image of the user;
and inputting the face image into a trained identity recognition network model for processing to obtain identity information corresponding to the user.
Optionally, the determining, based on the identity information, whether the user has a right to borrow the target device includes:
acquiring identification information of the target equipment;
when the identity information associated with the identification information is found in a preset matching table, judging that the user has the authority to borrow the target equipment; or the like, or, alternatively,
and when the identity information associated with the identification information is not found in a preset matching table, judging that the user does not have the authority to borrow the target equipment.
Optionally, before the server detects that the user disconnects the data line from the target device and acquires the authorization status of the target device, the device management method further includes:
and when detecting that the target equipment calls a first preset mode, judging that the connection between the data line and the target equipment is disconnected.
Optionally, after the user is allowed to borrow the target device when it is determined that the user has the right to borrow the target device, the device management method further includes:
and when detecting that the target equipment calls a second preset mode, judging that the data line is connected with the target equipment in an access mode, and recording return information of the target equipment.
Optionally, after the user is allowed to borrow the target device when it is determined that the user has the right to borrow the target device, the device management method further includes:
and if the data line is not detected to be connected with the target equipment in the preset time, sending prompt information to the target equipment, wherein the prompt information is used for prompting the user to return the target equipment.
Optionally, the data line is connected to the target device through an android interface, a lightning interface, or an earphone interface.
A second aspect of an embodiment of the present application provides an apparatus management device, including:
a first obtaining unit, configured to obtain an authorization status of a target device when a server detects that a user disconnects a data line from the target device, where one end of the data line is connected to the server and the other end of the data line is connected to the target device, and the authorization status is used to indicate whether the target device is allowed to be borrowed;
a second obtaining unit, configured to obtain identity information of the user if it is detected that the authorization status is that the target device is authorized;
a judging unit, configured to judge whether the user has an authority to borrow the target device based on the identity information;
a first determination unit configured to allow the user to borrow the target apparatus when it is determined that the user has a right to borrow the target apparatus;
and the second judging unit is used for controlling the target equipment to collect the first portrait information of the user and giving an alarm based on the first portrait information when the user is judged not to be authorized to borrow the target equipment.
A third aspect of embodiments of the present application provides a server, including a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor, when executing the computer program, implements the steps of the device management method according to the first aspect.
A fourth aspect of embodiments of the present application provides a computer-readable storage medium, which stores a computer program that, when executed by a processor, implements the steps of the device management method according to the first aspect.
A fifth aspect of embodiments of the present application provides a computer program product, which, when run on a server, causes the server to perform the steps of the device management method according to the first aspect.
The device management method, the device management apparatus, the server and the storage medium provided by the embodiment of the application have the following beneficial effects:
when the server detects that the user disconnects the data line from the target equipment, acquiring the authorization state of the target equipment; one end of the data line is connected with the server, the other end of the data line is connected with the target equipment, and the authorization state is used for indicating whether the target equipment is allowed to be borrowed or not; if the authorization state is detected to be that the target equipment is authorized, acquiring the identity information of the user; judging whether the user has the authority to borrow the target equipment or not based on the identity information; when the user is judged to have the authority to borrow the target equipment, allowing the user to borrow the target equipment, wherein the borrowed target equipment is used for testing; and when the user is judged not to have the authority to borrow the target equipment, controlling the target equipment to acquire the first portrait information of the user and giving an alarm based on the first portrait information. In the scheme, a cabinet with a high price is not required to be deployed, and operation and maintenance personnel are not required to perform 24-hour field maintenance, so that the economic cost of the test is greatly saved; the method for managing the borrowing mobile equipment can be remotely monitored by the server, and is flexible and effective; when the mobile equipment is lent by an unauthorized user, the mobile equipment can be timely alarmed, so that the real-time monitoring of the mobile equipment is realized, the safety of the mobile equipment is ensured, and the legal borrowing rights and interests of authorized users are also ensured.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic flow chart of a device management method provided in an embodiment of the present application;
fig. 2 is a schematic flow chart of a device management method according to another embodiment of the present application;
fig. 3 is a schematic flow chart of a device management method according to another embodiment of the present application;
fig. 4 is a schematic flow chart of a device management method according to still another embodiment of the present application;
fig. 5 is a schematic flow chart of a device management method according to another embodiment of the present application;
fig. 6 is a schematic diagram of a device management apparatus according to an embodiment of the present application;
fig. 7 is a schematic diagram of a server according to another embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
In the description of the embodiments of the present application, "/" means "or" unless otherwise specified, for example, a/B may mean a or B; "and/or" herein is merely an association describing an associated object, and means that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, in the description of the embodiments of the present application, "a plurality" means two or more than two.
In the following, the terms "first", "second" are used for descriptive purposes only and are not to be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present embodiment, "a plurality" means two or more unless otherwise specified.
With the improvement of android fragmentation and publishing rhythm, compatibility is a ring that quality assurance of mobile equipment (such as a mobile phone, a tablet, a notebook and the like) cannot bypass, and therefore testing of the mobile equipment is indispensable. The testing of mobile devices necessarily requires the use of a large number of mobile devices, which results in increased testing costs. In order to improve the utilization rate of mobile equipment and further reduce the test cost, a mobile equipment borrowing scheme is provided by a plurality of internet companies, namely offline mobile equipment is collected and stored in a unified mode, when operation and maintenance personnel or testing personnel need to test different mobile equipment, the mobile equipment is tested by borrowing the corresponding mobile equipment, and the mobile equipment is returned after the test is completed. The returned mobile equipment can be used for other testing personnel to carry out the next round of testing. The mobile equipment borrowing scheme improves the utilization rate of the mobile equipment and reduces the test cost.
The inventor realizes that in the implementation process of the existing mobile device borrowing scheme, all off-line mobile devices are generally collected and stored in a cabinet uniformly, and field operation and maintenance personnel respond to the borrowing requirement of the mobile devices, and the implementation mode has high cabinet cost and also needs to be matched on site by the operation and maintenance personnel for 24 hours, so that the personnel cost is increased. If borrowing is opened, on-site operation and maintenance personnel are cancelled, the user can take the mobile equipment by himself, the mobile equipment borrowing is out of control, and the safety of the mobile equipment is not guaranteed (for example, if someone borrows the mobile equipment, the borrowing personnel cannot be found accurately due to unsupervised condition). Therefore, there is an urgent need for a flexible and efficient method for remotely managing borrowing by a mobile device.
In view of this, the present application provides an apparatus management method, which includes obtaining an authorization status of a target apparatus when a server detects that a user disconnects a data line from the target apparatus; one end of the data line is connected with the server, the other end of the data line is connected with the target equipment, and the authorization state is used for indicating whether the target equipment is allowed to be borrowed or not; if the authorization state is detected to be that the target equipment is authorized, acquiring the identity information of the user; judging whether the user has the authority to borrow the target equipment or not based on the identity information; when the user is judged to have the authority to borrow the target equipment, allowing the user to borrow the target equipment, wherein the borrowed target equipment is used for testing; and when the user is judged not to have the authority to borrow the target equipment, controlling the target equipment to acquire the first portrait information of the user and giving an alarm based on the first portrait information. In the scheme, a cabinet with a high price is not required to be deployed, and operation and maintenance personnel are not required to perform 24-hour field maintenance, so that the time and the labor are saved, and the economic cost of the test is greatly reduced; the method for managing the borrowing mobile equipment can be remotely monitored by the server, and is flexible and effective; when the mobile equipment is lent by an unauthorized user, the mobile equipment can be timely alarmed, so that the real-time monitoring of the mobile equipment is realized, the safety of the mobile equipment is ensured, and the legal borrowing rights and interests of authorized users are also ensured.
Fig. 1 is a schematic flowchart of a device management method according to an embodiment of the present application. It should be understood that the executing subject of the device management method provided by the present application is a server, and the server includes, but is not limited to, an independent server, a distributed server, a server cluster or a cloud server, and the like. The device management method as shown in fig. 1 may include: s101 to S105 are parallel to S104 and S105, and S105 is not executed after S104, but the specific execution manner is not limited to practice. S101 to S105 are specifically as follows:
s101: when the server detects that the user disconnects the data line from the target device, the server acquires the authorization state of the target device, wherein one end of the data line is connected with the server, the other end of the data line is connected with the target device, and the authorization state is used for indicating whether the target device is allowed to be borrowed or not.
The equipment comprises intelligent terminal equipment such as a mobile phone, a tablet, a notebook and the like. In this embodiment, a device is taken as an example for explanation, which is not limited to this. The data lines may include Universal Serial Bus (USB) data lines, OTG data lines (On-The-Go), and The like. Illustratively, the USB data lines may include Micro-USB data lines, Type-C USB data lines, apple data lines (Lightning), and the like. The data line is only an exemplary illustration, and the data line is not limited to connect each device and the server.
Illustratively, each device (e.g., a mobile phone) is pre-deployed on a preset open rack, and the open rack can be used for placing a plurality of devices at the same time without 24-hour field maintenance of workers and locking. And connecting each mobile phone with the server through a USB data line. Specifically, according to different interfaces of each mobile phone, a corresponding data line is selected, and each mobile phone is connected with the server. For example, an android mobile phone generally has a Micro-USB interface and a Type-C interface, and for the android mobile phone with the Micro-USB interface, the android mobile phone is connected with a server through a Micro-USB data line; to the android mobile phone of Type-C interface, be connected it with the server through Type-C USB data line. For another example, the interface of the apple phone is a lightning interface, and the lightning interface is connected with the server through an apple data line. The description is given for illustrative purposes only and is not intended to be limiting.
Optionally, in an implementable manner, the data line may also be connected to the server through a headset interface. Illustratively, a data line matched with the earphone interface and used for transmitting data is acquired, one end of the data line is accessed to the earphone interface of the equipment, and the other end of the data line is accessed to the server.
Optionally, these handsets may also be deployed in an open rack, in categories. For example, a tester may have different test requirements for different mobile phones, and the mobile phones are classified and deployed on each open rack according to the different test requirements. For example, mobile phones that need software testing are classified into one category, mobile phones that need hardware testing are classified into one category, and the like. The description is given for illustrative purposes only and is not intended to be limiting.
The target device is any one of a plurality of devices. When the data line at the end of the target device is connected or disconnected, the data line can be sensed in real time through the underlying interface of the target device. And when the target equipment is detected to call the first preset mode, judging that the connection between the data line and the target equipment is disconnected. For example, the target device is a target mobile phone, the target mobile phone is connected with the server through a Micro-USB data line, when the Micro-USB data line of the target mobile phone end is unplugged, the bottom layer interface of the target mobile phone system calls a first preset method to indicate that the target mobile phone detects that the current state of the Micro-USB interface of the local end is disconnected, and meanwhile, the server also detects that the target mobile phone is disconnected from the target mobile phone. Or the target mobile phone sends the disconnection state to the server in a wireless mode. When the local end of the target mobile phone is connected with the Micro-USB data line, the bottom layer interface of the target mobile phone system calls a second preset method to indicate that the target mobile phone detects that the current state of the Micro-USB interface of the local end is connection, and meanwhile, the server also detects that the target mobile phone is connected with the target mobile phone. Or the target mobile phone sends the access state to the server in a wireless mode.
For example, the first preset method may include a device disconnection (device disconnected) method, and in an implementation process, when a bottom layer interface (idevicechensistiener) of the target mobile phone system calls back the device disconnected method, the server determines that the current state of the Micro-USB interface of the target mobile phone is disconnected, that is, it is perceived that the Micro-USB data line is unplugged from the target mobile phone. The second preset method may include a device connected (deviceConnected) method, and in an implementation process, when a bottom layer interface (idevicechangistener) of the target mobile phone system calls back the deviceConnected method, the server determines that the current state of the Micro-USB interface of the target mobile phone is an access state, that is, the target mobile phone is perceived to be accessed to the Micro-USB data line. The description is given for illustrative purposes only and is not intended to be limiting.
And setting an authorization state for each device in advance according to actual test requirements. For example, the authorization status is set in advance for the target device. Wherein the authorization status is used to indicate whether the target device is allowed to be borrowed. The authorization status may include that the target device is authorized or that the target device is unauthorized. When the authorization state is that the target device is authorized, indicating that the target device is allowed to be borrowed; when the authorization status is that the target device is unauthorized, it indicates that the target device is not allowed to be borrowed.
When the server detects that the user disconnects the data line from the target device (such as a target mobile phone), the server acquires the identification information of the target device and determines the authorization state of the target device based on the identification information of the target device. The identification information is used to uniquely identify the target device. For example, the identification information may be a serial number of the target device, or may be a unique identifier that is set by the tester for each device in advance, which is not limited herein.
Illustratively, when a user unplugs the data line at the end of the target mobile phone, the underlying interface of the target mobile phone system calls a first preset method to indicate that the target mobile phone detects that the current state of the Micro-USB interface at the local end is disconnected, and the target mobile phone sends the disconnected state to the server in a wireless manner. When the target mobile phone sends the disconnection state to the server, the target mobile phone carries identification information (such as a serial number) corresponding to the target mobile phone. The server detects that the user disconnects the data line from the target mobile phone, obtains the serial number of the target mobile phone, and searches the serial number of the target mobile phone in a preset authorization table. If the serial number of the target mobile phone is found in the preset authorization table, the target mobile phone is authorized, and the authorization state of the target mobile phone is correspondingly marked as: the target handset is authorized. If the serial number of the target mobile phone is not found in the preset authorization table, the target mobile phone is proved to be unauthorized, and the authorization state of the target mobile phone is correspondingly marked as: the target handset is not authorized. The description is given for illustrative purposes only and is not intended to be limiting.
Optionally, in a possible implementation manner, before S101, the method may further include: and pre-constructing a preset authorization table. Specifically, when each device establishes a connection with the server for the first time, the device may transfer a parameter (Idevice parameter), and the serial number of the device may be obtained through the parameter, and the device sends the serial number to the server through the data line, so as to obtain the serial number of each device in this manner. An empty preset authorization table is pre-established in the server, and the serial number of the device which can be borrowed is added to the preset authorization table according to the actual test requirement. The preset authorization table can be updated in real time.
Optionally, in a possible implementation manner, when each device initially establishes a connection with the server, device information of each device is obtained. The device information may include identification information (serial number), version information, hardware information, appearance, model, color, picture, etc. of the device. The method comprises the steps that an equipment list is generated based on equipment information of each piece of equipment, a tester can select which pieces of equipment can be borrowed from the equipment list, the borrowed equipment can be selected, a borrowing process is initiated, after relevant managers pass examination and approval, offline borrowing rights of the borrowed equipment are legally obtained, and identification information (serial numbers) of the borrowed equipment is extracted from the equipment information of the borrowed equipment. A preset authorization table is generated based on the serial number of the borrowable device.
S102: and if the authorization state is detected to be that the target equipment is authorized, acquiring the identity information of the user.
When the authorization state of the target device is that the target device is authorized, the target device is proved to be available for borrowing by the user, but the user who unplugs the data line cannot be guaranteed to have the right to borrow the target device, so that the server is required to obtain the identity information of the user. The server can control the target device to collect the image information or the video information of the user, and the identity information of the user is determined according to the collected image information or the video information.
S103: and judging whether the user has the authority to borrow the target equipment or not based on the identity information.
And judging whether the identity information is matched with the target equipment. If so, proving that the user has the authority to borrow the target equipment; if not, the user is proved to have no authority to borrow the target equipment. Illustratively, whether the identity information matches with the identification information corresponding to the target device is determined. If so, proving that the user has the authority to borrow the target equipment; if not, the user is proved to have no authority to borrow the target equipment.
S104: when it is determined that the user has the authority to borrow the target device, allowing the user to borrow the target device, wherein the borrowed target device is used for testing.
If the user currently disconnecting the data line and the target equipment has the authority to borrow the target equipment, the server allows the user to borrow the target equipment, and the user can take away the target equipment for testing. Since the user has the right to borrow the target device, the server will not alarm.
Optionally, when the user has the right to borrow the target device, the server may record borrowing information, which is convenient for subsequent viewing and return of the target device, and also ensures the security of the target device. For example, the borrowing time, the identity information of the user, and the identification information of the target device borrowed by the user are recorded. If the target device is not returned for a long time, the target device can be searched through the borrowing information.
S105: and when the target equipment is judged to be not available for borrowing by the user, controlling the target equipment to collect the first portrait information of the user, and giving an alarm based on the first portrait information.
And if the user currently disconnecting the data line and the target equipment does not have the authority to borrow the target equipment, the server control equipment gives an alarm. And the server sends an alarm instruction to the target equipment, wherein the alarm instruction is used for triggering the target equipment to alarm.
Illustratively, the manner in which the target device alerts may include voice alerts. For example, some alert audio is pre-recorded and stored in the target device, and when the target device receives an alert instruction, the alert audio is played by calling a preset interface (for example, the alert audio is played by calling a sun. The specific content of the alarm audio can be recorded by the user according to the actual situation, which is not limited.
The first portrait information may include a face image corresponding to the user, and the first portrait information may also be an image including a face of the user, such as a top portrait of the user. The manner in which the target device alerts may also include a video alert. For example, when the target device receives an alarm instruction, the preset interface is called to play the alarm audio, the front camera is called to shoot the face image or video of the user without authority in real time, the shot face image or video is sent to the server, the server can deliver the received face image or video of the user without authority to a large screen, the user who illegally borrows the target device can be conveniently determined in time, and the safety of the target device is guaranteed.
In the scheme, when the server detects that the user disconnects the data line from the target equipment, the authorization state of the target equipment is obtained; one end of the data line is connected with the server, the other end of the data line is connected with the target equipment, and the authorization state is used for indicating whether the target equipment is allowed to be borrowed or not; if the authorization state is detected to be that the target equipment is authorized, acquiring the identity information of the user; judging whether the user has the authority to borrow the target equipment or not based on the identity information; when the user is judged to have the authority to borrow the target equipment, allowing the user to borrow the target equipment, wherein the borrowed target equipment is used for testing; and when the user is judged not to have the authority to borrow the target equipment, controlling the target equipment to acquire the first portrait information of the user and giving an alarm based on the first portrait information. In the scheme, a cabinet with a high price is not required to be deployed, and operation and maintenance personnel are not required to perform 24-hour field maintenance, so that the economic cost of the test is greatly saved; the method for managing the borrowing equipment can be remotely monitored by the server, and is flexible and effective; when the equipment is lent by an unauthorized user, the equipment can be timely alarmed, so that the real-time monitoring of the equipment is realized, the safety of the equipment is ensured, and the legal borrowing rights and interests of the authorized user are also ensured. And the alarm is given based on the portrait information of the user, which is beneficial to quickly positioning the user who does not have the permission to borrow the target equipment, and the protection on the equipment safety is deepened.
Fig. 2 is a schematic flowchart of a device management method according to another embodiment of the present application. For example, in some possible implementations of the present application, the above-mentioned S102 may include S1021 to S1022, and the following will specifically describe steps S1021 to S1022.
S1021: and if the authorization state is detected to be that the target equipment is authorized, controlling the target equipment to acquire the face image of the user.
The face image may be a face photograph corresponding to the user, or may be a photograph including a face of the user. When the server detects that the authorization state of the target device is that the target device is authorized, an image acquisition instruction is sent to the target device, and the image acquisition instruction is used for triggering the target device to start the front camera and controlling the front camera to shoot a photo, namely acquiring a face image of the user. The target equipment sends the collected face image of the user to the server, and the server receives the face image.
S1022: and inputting the face image into the trained identity recognition network model for processing to obtain the identity information corresponding to the user.
In this embodiment, a server stores a pre-trained identity recognition network model in advance. The identity recognition network model is obtained by training an initial identity recognition network based on a sample training set by using a machine learning algorithm. The sample training set comprises different face photos corresponding to all testers and identity information corresponding to each face photo. The identity information may include the user's name, gender, identification number, etc. Inputting the sample training set into an initial identity recognition network for training, wherein the initial identity recognition network learns the association relationship between different face photos and the identity information corresponding to each face photo, continuously adjusting the parameters of the initial identity recognition network in the training process, and obtaining a trained identity recognition network model when the loss function corresponding to the initial identity recognition network is converged. For a specific training process, reference may be made to a process for training a similar model in the prior art, which is not described herein again. It is worth to be noted that the trained identity recognition network model can be updated at any time, when a new tester has the authority to borrow equipment, and when the identity recognition network model is trained before, the training is not performed based on the face photo of the new tester and the identity information corresponding to the new tester, a plurality of face photos of the new tester are collected, and the training is performed based on the face photo of the new tester and the identity information corresponding to the new tester, so that the new tester can be recognized when the face photo of the new tester is processed by the identity recognition network model obtained through final training.
The face image is input into a trained identity recognition network model for processing, the identity recognition network model extracts face features corresponding to the face image, identity information corresponding to a user is determined based on the face features, and the identity information is output. It should be noted that, if the previous sample training set contains the face photo corresponding to the user, the identity information of the user output by the identity recognition network model is name, gender, identity card number, and the like. And if the face photo corresponding to the user does not exist in the previous sample training set, the identity information of the user output by the identity recognition network model is a stranger. The stranger can be understood as a non-testing person, and when the identity information is a stranger, the user does not have the right to borrow the target equipment.
The face image is processed based on the trained identity recognition network model, so that the identity information corresponding to the user can be quickly and accurately obtained, and whether the user has the authority to borrow the target equipment or not can be conveniently and accurately judged subsequently.
Optionally, in a possible implementation manner, the obtaining of the identity information corresponding to the user may also be that face photos of different angles corresponding to each tester are collected in advance, the identity information of each face photo is marked, and the face photos with the marks are stored in a database of the server. When the face photo of the user is collected, calculating the image similarity between the collected face photo and each face photo with the mark stored in the database, and if the similarity is greater than or equal to a preset threshold value, taking the identity information corresponding to the face photo with the mark as the identity information of the user. And if all the calculated image similarities are smaller than a preset threshold value, recording the identity information of the user as a stranger. The method for calculating the picture similarity can refer to the prior art, and is not repeated here.
Optionally, in a possible implementation manner, when the server detects that the authorization state of the target device is that the target device is authorized, a video capture instruction is sent to the target device, where the video capture instruction is used to trigger the target device to start up the front-facing camera and control the front-facing camera to record a video. The duration of the video may be set by the user in advance, for example, the duration of the video may be 2 seconds. The description is given for illustrative purposes only and is not intended to be limiting. The target device sends the collected video of the user to the server, and the server receives the video. And performing framing processing on the video to obtain a plurality of single-frame images, and sequentially inputting the plurality of single-frame images into the trained identity recognition network model for processing to obtain identity information corresponding to the user. The description is given for illustrative purposes only and is not intended to be limiting.
Fig. 3 is a schematic flowchart of a device management method according to another embodiment of the present application. For example, in some possible implementations of the present application, the above S103 may include S1031 to S1033, it is worth to be noted that S1032 and S1033 are juxtaposed, and S1033 is not executed after S1032, and a specific execution manner is subject to practical application, and is not limited thereto. S1031 to S1033 are specifically as follows:
s1031: identification information of the target device is acquired.
The target device sends the identification information of the target device to the server in a disconnection state, and the server acquires the identification information of the target device. The identification information of the target device may be a serial number of the target device.
S1032: and when the identity information associated with the identification information is found in the preset matching table, judging that the user has the authority to borrow the target equipment.
And according to actual requirements, establishing a preset matching table in advance based on the identification information corresponding to each device and the identity information corresponding to each tester. Illustratively, identification information (such as serial numbers) of all the borrowable devices is acquired, identity information (such as identification numbers) of testers of all the borrowable devices is acquired, a relationship between each borrowable device and each tester is established according to actual requirements, and a preset matching table is generated based on the relationship.
For example, the devices that can be borrowed are device 1, device 2, device 3, device 4, and device 5, the identification information corresponding to these five devices is a, b, c, d, and e, respectively, the testers that can borrow the devices are tester 1, tester 2, tester 3, tester 4, and tester 5, and the identity information of these five testers is A, B, C, D, E, respectively. Presetting that a tester 1 can borrow the equipment 1 according to actual conditions, and marking as A-a; the tester 2 can borrow the equipment 2 and is marked as B-B; and by analogy, establishing the corresponding relation between the identification information of all the devices and the identity information of all the testers. The description is given for illustrative purposes only and is not intended to be limiting.
It should be noted that one tester may borrow a plurality of devices, and one device may also be borrowed by different testers, which is not limited by the comparison. For example, tester 1 may borrow device 1, device 2, and device 3 simultaneously. The preset matching table can be adjusted in real time according to different borrowing relationships. The description is given for illustrative purposes only and is not intended to be limiting.
And searching whether the identity information associated with the identification information exists in a preset matching table. For example, after finding the serial number of the target mobile phone currently unplugged from the data line in the preset matching table, finding whether the identity information associated with the serial number includes the identity information of the user currently unplugged from the data line, or finding whether the identity information associated with the serial number is the same as the identity information of the user currently unplugged from the data line. And if the identity information associated with the serial number is found in the preset matching table, judging that the user who pulls out the data line currently has the authority to borrow the target mobile phone.
S1033: and when the identity information associated with the identification information is not found in the preset matching table, judging that the user does not have the authority to borrow the target equipment.
For example, if the identity information associated with the serial number is found to be different from the identity information of the user currently unplugging the data line, that is, the identity information associated with the serial number is not found in the preset matching table, it is determined that the user currently unplugging the data line does not have the right to borrow the target mobile phone.
Alternatively, in an implementation manner, if the identity information of the user who currently pulls out the data line is a stranger, it may be directly determined that the user does not have the right to borrow the target device. The realization mode improves the rate of judging whether the user has the authority to borrow the target equipment, and then the alarm can be given in time when the user does not have the authority, thereby further ensuring the safety of the target equipment.
Optionally, in a possible implementation manner, after S104, the device management method may further include: and when the target equipment is detected to call the second preset mode, judging that the data line is connected with the target equipment in an access mode, and recording return information of the target equipment. Wherein the second preset method may include a device connected (deviceConnected) method. Illustratively, after allowing the user to borrow the target device, the user may borrow the target device. When the target device is detected to be connected with the data line access again, the target device is returned for the user, and the return information of the target device can be recorded at the moment, so that the subsequent user can conveniently borrow the target device and can conveniently consult the borrowing information of the target device. In the implementation process, when a bottom layer interface (IDeviceChangeListener) of a target mobile phone system calls back a deviceConnected method, the server side judges that the current state of the Micro-USB interface of the target mobile phone is accessed, namely the target mobile phone is perceived to be accessed to the Micro-USB data line. At this time, the borrowing information of the target mobile phone may be recorded, for example, the borrowing information may include a serial number, borrowing time, returning time, identity information of the user, and the like of the target mobile phone. The description is given for illustrative purposes only and is not intended to be limiting.
Fig. 4 is a schematic flowchart of a device management method according to yet another embodiment of the present application. The device management method as shown in fig. 4 may include: s201 to S202. In step S201 shown in fig. 4, reference may be made to the above description on S101, and for brevity, the description is not repeated here. Step S202 will be specifically explained below.
S201: and when the server detects that the user disconnects the data line from the target equipment, acquiring the authorization state of the target equipment.
S202: and if the authorization state is detected to be that the target equipment is not authorized, controlling the target equipment to acquire second portrait information of the user, and giving an alarm based on the second portrait information.
When the authorization status is that the target device is not authorized, the target device is certified to be disallowed to be borrowed. Therefore, in order to ensure the safety of the target equipment and also ensure the legal borrowing rights and interests of the user, the server controls the target equipment to alarm.
Illustratively, when a user disconnects a data line from a target device, and the target device is detected to be unauthorized, the server sends an alarm instruction to the target device, and the alarm instruction is used for triggering the target device to alarm.
In the scheme, when the authorization state of the target equipment is unauthorized, namely the target equipment does not allow any user to borrow, the alarm can be given in time. The system does not need to deploy a cabinet with a high price and does not need 24-hour field maintenance of operation and maintenance personnel, thereby saving time and labor, realizing real-time monitoring of the equipment, ensuring the safety of the equipment and also ensuring the legal borrowing rights and interests of authorized users.
Fig. 5 is a schematic flowchart of a device management method according to yet another embodiment of the present application. The device management method as shown in fig. 5 may include: s301 to S305. For reference, the steps S301 to S304 shown in fig. 5 may refer to the above description of S101 to S104, and are not repeated here for brevity. Step S305 will be specifically described below.
S305: and if the access connection between the data line and the target equipment is not detected within the preset time, sending prompt information to the target equipment, wherein the prompt information is used for prompting a user to return the target equipment.
For example, the preset duration is a borrowing duration allowed by the target device, and the preset duration may be preset and adjusted by the user, which is not limited in this regard. When the connection between the equipment and the data line is detected, the serial number of the currently accessed equipment is acquired, and whether the serial number of the equipment is consistent with the serial number of the borrowed target equipment or not is judged. And if the target equipment is not detected to be connected with the data line access within the preset time length, judging that the user does not return the target equipment within the allowed borrowing time length. And sending prompt information to the target equipment, wherein the prompt information is used for prompting the user to return the target equipment in time. For example, the prompt message may be: and if the borrowing time of the target equipment which is borrowed by the user exceeds the borrowing time, the user returns the target equipment in time. The description is given for illustrative purposes only and is not intended to be limiting. In the implementation mode, the user can be reminded of returning the borrowed equipment in time, the safety of the target equipment is further guaranteed, and meanwhile, other users can borrow the target equipment conveniently.
Optionally, in a possible implementation manner, the device management method provided by the present application may also be applied to smart device display in a mall, a business hall, and the like. For example, in a mobile phone brick and mortar store, in order to enable a user to better experience various functions of a mobile phone, the mobile phone is displayed in a display stand, but staff in the store is limited, so that the user cannot stare at each mobile phone in real time, and the safety of each displayed mobile phone cannot be guaranteed. Therefore, the existing mobile phone physical stores purchase the mobile phone anti-theft device, the patch cord of the mobile phone anti-theft device is connected to the mobile phone end, and if someone pulls out the patch cord, the mobile phone anti-theft device can send out an alarm sound to achieve the alarm effect. However, in the alarm mode, a large number of mobile phone anti-theft devices need to be purchased, the mobile phone anti-theft cost is increased, the images of illegal users cannot be shot in time during alarm, and if someone steals the mobile phone, the mobile phone cannot be recovered in time. And the user who pulls out the patch cord can not be judged, and even if the staff pulls out the patch cord, the mobile phone anti-theft device can also give an alarm. By adopting the equipment management method, the equipment management device, the server and the storage medium, the situations can be effectively avoided, and the safety of each displayed mobile phone can be effectively guaranteed. When the device management method provided by the present application is applied to such a scenario, the specific implementation manner may refer to descriptions in S101 to S105 and S201 to S202, and details are not described herein again.
For example, the staff is equivalent to a tester, the customer is equivalent to a stranger, and if the staff unplugs the data line, the staff is judged to have the authority to take the mobile phone, so that no alarm is given; if the customer pulls out the data line, the customer is judged to have no authority to take the mobile phone, and an alarm is given. The specific alarm manner can refer to the alarm description, and is not described herein again.
Referring to fig. 6, fig. 6 is a schematic diagram of a device management apparatus according to an embodiment of the present application. The device comprises units for performing the steps in the embodiments corresponding to fig. 1-5. Please refer to the related description of the embodiments in fig. 1 to 5. For convenience of explanation, only the portions related to the present embodiment are shown. Referring to fig. 6, it includes:
a first obtaining unit 310, configured to obtain an authorization status of a target device when a server detects that a user disconnects a data line from the target device, where one end of the data line is connected to the server and the other end of the data line is connected to the target device, and the authorization status is used to indicate whether the target device is allowed to be borrowed;
a second obtaining unit 320, configured to obtain identity information of the user if it is detected that the authorization status is that the target device is authorized;
a determining unit 330, configured to determine whether the user has an authority to borrow the target device based on the identity information;
a first determination unit 340 configured to allow the user to borrow the target apparatus when it is determined that the user has an authority to borrow the target apparatus, wherein the borrowed target apparatus is used for a test;
and a second determining unit 350, configured to control the target device to acquire first portrait information of the user and alarm based on the first portrait information when it is determined that the user does not have an authority to borrow the target device.
Optionally, the device management apparatus further includes:
and the control unit is used for controlling the target equipment to acquire second portrait information of the user and giving an alarm based on the second portrait information if the authorization state is detected to be that the target equipment is unauthorized.
Optionally, the second obtaining unit 320 is specifically configured to:
if the authorization state is detected to be that the target equipment is authorized, controlling the target equipment to acquire the face image of the user;
and inputting the face image into a trained identity recognition network model for processing to obtain identity information corresponding to the user.
Optionally, the determining unit 330 is specifically configured to:
acquiring identification information of the target equipment;
when the identity information associated with the identification information is found in a preset matching table, judging that the user has the authority to borrow the target equipment; or the like, or, alternatively,
and when the identity information associated with the identification information is not found in a preset matching table, judging that the user does not have the authority to borrow the target equipment.
Optionally, the data line is connected to the target device through an android interface, a lightning interface, or an earphone interface.
Optionally, the device management apparatus further includes:
and the third judging unit is used for judging that the connection between the data line and the target equipment is disconnected when the target equipment is detected to call a first preset mode.
Optionally, the device management apparatus further includes:
and the fourth judging unit is used for judging the access connection of the data line and the target equipment and recording the return information of the target equipment when the target equipment is detected to call a second preset mode.
Optionally, the device management apparatus further includes:
and the prompting unit is used for sending prompting information to the target equipment if the access connection between the data line and the target equipment is not detected within a preset time length, wherein the prompting information is used for prompting the user to return the target equipment.
Referring to fig. 7, fig. 7 is a schematic diagram of a server according to another embodiment of the present application. As shown in fig. 6, the server 4 of this embodiment includes: a processor 40, a memory 41, and computer instructions 42 stored in the memory 41 and executable on the processor 40. The processor 40, when executing the computer instructions 42, implements the steps in the various device management method embodiments described above, such as S101-S105 shown in fig. 1. Alternatively, the processor 40, when executing the computer instructions 42, implements the functions of the units in the embodiments described above, such as the functions of the units 310 to 350 shown in fig. 6.
Illustratively, the computer instructions 42 may be divided into one or more units that are stored in the memory 41 and executed by the processor 40 to accomplish the present application. The one or more units may be a series of computer instruction segments capable of performing specific functions, which are used to describe the execution of the computer instructions 42 in the server 4. For example, the computer instructions 42 may be divided into a first acquisition unit, a second determination unit, a first determination unit, and a second determination unit, each of which functions as described above.
The server may include, but is not limited to, a processor 40, a memory 41. Those skilled in the art will appreciate that fig. 7 is merely an example of a server 4 and is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or different components, e.g., the server may also include input-output devices, network access devices, buses, etc.
The Processor 40 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 41 may be an internal storage unit of the server, such as a hard disk or a memory of the server. The memory 41 may also be an external storage terminal of the server, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the server. Further, the memory 41 may also include both an internal storage unit of the server and an external storage terminal. The memory 41 is used for storing the computer instructions and other programs and data required by the terminal. The memory 41 may also be used to temporarily store data that has been output or is to be output.
The embodiment of the present application further provides a computer storage medium, where the computer storage medium may be nonvolatile or volatile, and the computer storage medium stores a computer program, and the computer program, when executed by a processor, implements the steps in the foregoing device management method embodiments.
The present application further provides a computer program product, which when run on a server, causes the server to perform the steps in the above-mentioned respective device management method embodiments.
An embodiment of the present application further provides a chip or an integrated circuit, where the chip or the integrated circuit includes: and the processor is used for calling and running the computer program from the memory so that the server provided with the chip or the integrated circuit executes the steps in each device management method embodiment.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules, so as to perform all or part of the functions described above. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not cause the essential features of the corresponding technical solutions to depart from the spirit scope of the technical solutions of the embodiments of the present application, and are intended to be included within the scope of the present application.

Claims (10)

1. A device management method, comprising:
when a server detects that a user disconnects a data line from a target device, acquiring an authorization state of the target device, wherein one end of the data line is connected with the server, the other end of the data line is connected with the target device, and the authorization state is used for indicating whether the target device is allowed to be borrowed or not;
if the authorization state is detected to be that the target equipment is authorized, acquiring the identity information of the user;
judging whether the user has the authority to borrow the target equipment or not based on the identity information;
when it is determined that the user has the authority to borrow the target device, allowing the user to borrow the target device; or the like, or, alternatively,
and when the target equipment is judged to be not borrowed by the user, controlling the target equipment to collect first portrait information of the user, and giving an alarm based on the first portrait information.
2. The device management method according to claim 1, wherein after the server acquires the authorization status of the target device when detecting that the user disconnects the data line from the target device, the method further comprises:
and if the authorization state is detected to be that the target equipment is not authorized, controlling the target equipment to acquire second portrait information of the user, and giving an alarm based on the second portrait information.
3. The device management method according to claim 1, wherein the obtaining the identity information of the user if it is detected that the authorization status is that the target device is authorized comprises:
if the authorization state is detected to be that the target equipment is authorized, controlling the target equipment to acquire the face image of the user;
and inputting the face image into a trained identity recognition network model for processing to obtain identity information corresponding to the user.
4. The device management method according to claim 1, wherein the determining whether the user has a right to borrow the target device based on the identity information comprises:
acquiring identification information of the target equipment;
when the identity information associated with the identification information is found in a preset matching table, judging that the user has the authority to borrow the target equipment; or the like, or, alternatively,
and when the identity information associated with the identification information is not found in a preset matching table, judging that the user does not have the authority to borrow the target equipment.
5. The device management method according to any one of claims 1 to 4, wherein before the server acquires the authorization status of the target device when detecting that the user disconnects the data line from the target device, the device management method further comprises:
and when detecting that the target equipment calls a first preset mode, judging that the connection between the data line and the target equipment is disconnected.
6. The device management method according to claim 1, wherein after allowing the user to borrow the target device when it is determined that the user has the authority to borrow the target device, the device management method further comprises:
and when detecting that the target equipment calls a second preset mode, judging that the data line is connected with the target equipment in an access mode, and recording return information of the target equipment.
7. The device management method according to claim 1, wherein after allowing the user to borrow the target device when it is determined that the user has the authority to borrow the target device, the device management method further comprises:
and if the data line is not detected to be connected with the target equipment in the preset time, sending prompt information to the target equipment, wherein the prompt information is used for prompting the user to return the target equipment.
8. An apparatus for managing devices, comprising:
a first obtaining unit, configured to obtain an authorization status of a target device when a server detects that a user disconnects a data line from the target device, where one end of the data line is connected to the server and the other end of the data line is connected to the target device, and the authorization status is used to indicate whether the target device is allowed to be borrowed;
a second obtaining unit, configured to obtain identity information of the user if it is detected that the authorization status is that the target device is authorized;
a judging unit, configured to judge whether the user has an authority to borrow the target device based on the identity information;
a first determination unit configured to allow the user to borrow the target apparatus when it is determined that the user has a right to borrow the target apparatus;
and the second judging unit is used for controlling the target equipment to collect the first portrait information of the user and giving an alarm based on the first portrait information when the user is judged not to be authorized to borrow the target equipment.
9. A server comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 7.
CN202110694649.8A 2021-06-22 2021-06-22 Equipment management method, device, server and storage medium Active CN113450520B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110694649.8A CN113450520B (en) 2021-06-22 2021-06-22 Equipment management method, device, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110694649.8A CN113450520B (en) 2021-06-22 2021-06-22 Equipment management method, device, server and storage medium

Publications (2)

Publication Number Publication Date
CN113450520A true CN113450520A (en) 2021-09-28
CN113450520B CN113450520B (en) 2023-06-13

Family

ID=77812270

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110694649.8A Active CN113450520B (en) 2021-06-22 2021-06-22 Equipment management method, device, server and storage medium

Country Status (1)

Country Link
CN (1) CN113450520B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009003668A (en) * 2007-06-21 2009-01-08 Chugoku Electric Power Co Inc:The Equipment borrowing support apparatus, equipment borrowing support method, program, and equipment borrowing support system
CN107077436A (en) * 2014-09-24 2017-08-18 微软技术许可有限责任公司 Target device resource is lent to host device computing environment
CN108763892A (en) * 2018-04-18 2018-11-06 Oppo广东移动通信有限公司 Right management method, device, mobile terminal and storage medium
CN109359037A (en) * 2018-09-26 2019-02-19 深圳壹账通智能科技有限公司 A kind of management method of shared device, storage medium and server
CN110232970A (en) * 2019-05-10 2019-09-13 中日友好医院 A kind of shared Medical Devices and shared medical apparatus system and its application method
CN111737664A (en) * 2020-05-20 2020-10-02 广州市格利网络技术有限公司 Re-authorization use control method and device of borrowing equipment
CN112509188A (en) * 2020-12-18 2021-03-16 安徽中杰信息科技有限公司 Equipment intelligent security manages cabinet and management system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009003668A (en) * 2007-06-21 2009-01-08 Chugoku Electric Power Co Inc:The Equipment borrowing support apparatus, equipment borrowing support method, program, and equipment borrowing support system
CN107077436A (en) * 2014-09-24 2017-08-18 微软技术许可有限责任公司 Target device resource is lent to host device computing environment
CN108763892A (en) * 2018-04-18 2018-11-06 Oppo广东移动通信有限公司 Right management method, device, mobile terminal and storage medium
CN109359037A (en) * 2018-09-26 2019-02-19 深圳壹账通智能科技有限公司 A kind of management method of shared device, storage medium and server
CN110232970A (en) * 2019-05-10 2019-09-13 中日友好医院 A kind of shared Medical Devices and shared medical apparatus system and its application method
CN111737664A (en) * 2020-05-20 2020-10-02 广州市格利网络技术有限公司 Re-authorization use control method and device of borrowing equipment
CN112509188A (en) * 2020-12-18 2021-03-16 安徽中杰信息科技有限公司 Equipment intelligent security manages cabinet and management system

Also Published As

Publication number Publication date
CN113450520B (en) 2023-06-13

Similar Documents

Publication Publication Date Title
CN106506442A (en) A kind of smart home multi-user identification and its Rights Management System
CN108197450B (en) Face recognition method, face recognition device, storage medium and electronic equipment
CN108806153A (en) Alert processing method, apparatus and system
CN106095413B (en) A kind of configuration method and device of bluetooth driver
CN111508521B (en) Security method, terminal device and storage medium
CN107818652A (en) Information processing method and equipment
CN105989267B (en) Safety protection method and device based on voiceprint recognition
WO2022216020A1 (en) Image/audio acquisition or editing apparatus for generating original image/audio file or deepfake-modulated file including metadata associated with generation history of image/audio, hash bank server for receiving and storing hash value related to original image/audio file or deepfake-modulated file, and server and method for receiving and processing original image/audio file or deepfake-modulated file
CN109213897A (en) Video searching method, video searching apparatus and video searching system
US8478340B1 (en) Device for and method of detecting SIM card removal and reinsertion
CN111159685A (en) User account management method and device, intelligent device and storage medium
CN108540591B (en) Address book management method, address book management device and electronic equipment
CN106603817A (en) Incoming call processing method and device and electronic equipment
CN110413249A (en) Acoustic input dephonoprojectoscope and remote interactive system
CN106713596A (en) Video playing method, device and mobile terminal
CN111711777B (en) Intelligent work recorder management system and method
CN113450520B (en) Equipment management method, device, server and storage medium
CN107659783A (en) Computer room remote monitoring calling system based on Internet of Things
CN106533918A (en) User addition prompting method and apparatus
CN106331337A (en) Terminal peripheral starting method and device
CN106343694A (en) Luggage case safety monitoring method and luggage case safety monitoring device
WO2021073270A1 (en) Method and apparatus for risk management and control, computer apparatus, and storage medium
KR102502105B1 (en) Method, Apparatus and System for Protecting Portrait Rights
TW201833759A (en) Contact information display method and device, and information display method and device
CN104486512B (en) Calling detection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant