CN113840002A - Information processing method, system, equipment and medium for locker under weak network environment - Google Patents

Information processing method, system, equipment and medium for locker under weak network environment Download PDF

Info

Publication number
CN113840002A
CN113840002A CN202111123990.4A CN202111123990A CN113840002A CN 113840002 A CN113840002 A CN 113840002A CN 202111123990 A CN202111123990 A CN 202111123990A CN 113840002 A CN113840002 A CN 113840002A
Authority
CN
China
Prior art keywords
online
server
offline
data
locker
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111123990.4A
Other languages
Chinese (zh)
Inventor
潘康达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhilai Science and Technology Co Ltd
Original Assignee
Shenzhen Zhilai Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhilai Science and Technology Co Ltd filed Critical Shenzhen Zhilai Science and Technology Co Ltd
Priority to CN202111123990.4A priority Critical patent/CN113840002A/en
Publication of CN113840002A publication Critical patent/CN113840002A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/10Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property
    • G07F17/12Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property comprising lockable containers, e.g. for accepting clothes to be cleaned
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F9/00Details other than those peculiar to special kinds or types of apparatus
    • G07F9/002Vending machines being part of a centrally controlled network of vending machines
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • H04L47/2425Traffic characterised by specific attributes, e.g. priority or QoS for supporting services specification, e.g. SLA
    • H04L47/2433Allocation of priorities to traffic types
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/54Presence management, e.g. monitoring or registration for receipt of user log-on information, or the connection status of the users
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses an information processing method, system, equipment and medium of a locker under a weak network environment, and relates to the field of intelligent lockers. The method comprises the steps of obtaining the current communication connection state of a locker terminal and a server, and determining the operation mode of the locker terminal; sending a task request to a locker terminal, verifying identity information of a user, and determining whether the user has corresponding service operation authority; guiding a user to complete corresponding business operation, and obtaining a corresponding task request and a register data packet according to the operation mode of the register cabinet terminal; dividing the task request and the register data packet into a plurality of online data packets or offline data packets with different priority orders; and sending the online data packets or the offline data packets to the server according to the priority sequence, and receiving the user information data packets sent by the server. The invention can ensure normal data interaction between the server and the locker terminal in the weak network environment and improve the user experience.

Description

Information processing method, system, equipment and medium for locker under weak network environment
Technical Field
The invention relates to the field of intelligent locker, in particular to an information processing method, system, equipment and medium of a locker in a weak network environment.
Background
In recent years, with the popularization of deposit cabinets, more and more deposit cabinets are applied to places where people are involved in daily life, such as malls, hospitals, parking lots and the like, and the use scenes of the deposit cabinets are also quite rich and complicated. With the complexity of the use scene, certain challenges are brought to the good operation of the locker, wherein the common problems include poor network signals, high delay and the like, and the difficulty in the field of intelligent lockers is how to solve the information transmission processing in the weak network environment so as to improve the use experience of users.
At present, a locker system usually adopts a B/S mode architecture, the B/S mode architecture uniformly manages locker terminals by a WEB-side server, and the B/S mode architecture has the following technical problems: when the B/S mode architecture is applied to the weak network environment, normal data interaction between the server and the locker terminal cannot be guaranteed, and great challenges can be brought to data interaction between the locker terminal and the server, so that the use experience of a user is poor easily.
Disclosure of Invention
The embodiment of the invention provides an information processing method, system, equipment and medium for a locker in a weak network environment, and aims to solve the problem that normal data interaction between a server and a locker terminal cannot be guaranteed in the weak network environment in the prior art.
The technical scheme of the invention is as follows: the information processing method of the locker under the weak network environment comprises the following steps:
the method comprises the steps of obtaining the current communication connection state of a locker terminal and a server, and determining the operation mode of the locker terminal according to the current communication connection state, wherein the operation mode comprises an online mode and an offline mode;
if the locker terminal runs in an offline mode, when an operation instruction input by a user is received, performing offline verification on user identity information carried in the operation instruction by using a pre-stored user information data packet;
when the offline verification passes, acquiring offline local data according to the offline service operation of a user, dividing the offline local data into a plurality of offline data packets with different priorities, and storing the plurality of offline data packets in a database module of the locker terminal;
if the locker terminal runs in an online mode, storing user information data packets issued by the server in a database module of the locker terminal, and sequentially uploading a plurality of offline data packets in the database module to the server according to the priority from high to low;
when an operation instruction input by a user is received, user identity information carried in the operation instruction is sent to a server for online verification;
when the online verification is passed, acquiring online local data according to online service operation of a user, dividing the online local data into a plurality of online data packets with different priorities, and sequentially uploading the online data packets to a server according to the priority from high to low.
Preferably, the sequentially uploading the online data packets to the server according to the order of the priorities from high to low includes: uploading the online data packet with the highest priority to a server; sequentially writing the online data with the middle priority into a data table to be uploaded according to the sequence of the priorities from high to low, and marking the corresponding online data packet in the data table to be uploaded in a non-uploaded state; when the uploading of the online data packets with the highest priority is finished, sequentially uploading the online data packets in the uploading data table to a server according to the order of the recording time from morning to evening; and receiving confirmation receiving information fed back by the server, and marking the corresponding online data packet as an uploaded state in the uploading data table.
Preferably, after the sending and uploading the online data packet with the highest priority to the server, the method further includes: storing the online data packet with the lowest priority in a database module of the locker terminal; setting default uploading time for the online data packet with the lowest priority; and if the locker terminal operates in an online mode and the current time exceeds the default uploading time, uploading the online data packet with the lowest priority in the database module to a server.
Preferably, the uploading the plurality of offline data packets in the database module to the server in sequence from high to low according to the priority includes: writing the offline data into a data table to be uploaded in sequence according to the priority from high to low, and marking the offline data packets in the data table to be uploaded in a non-uploading state; sequentially uploading the offline data packets in the uploading data table to a server according to the sequence of the recording time from morning to evening; and receiving confirmation receiving information fed back by the server, and marking the corresponding offline data packet as an uploaded state in the uploading data table.
Preferably, the method further comprises the following steps: recording the uploading times of each off-line data packet or on-line data packet in the uploading data table; when the number of times of uploading the offline data packet or the online data packet reaches a counting threshold value, marking the corresponding offline data packet or online data packet in an abnormal state in the uploading data table.
Preferably, the method further comprises the following steps: regularly patrolling whether an offline data packet and/or an online data packet which are not uploaded to a server exist in the locker terminal; and when the locker terminal operates in an online mode, sequentially uploading offline data packets and/or online data packets which are not uploaded to the server according to the priority order.
Preferably, the acquiring the current communication connection state of the locker terminal and the server includes: acquiring a preset timing heartbeat cycle and response threshold time; sending a heartbeat data packet to a server according to the timing heartbeat cycle, and judging whether a response result of the server for the heartbeat data packet is received within the response threshold time; if so, determining that the locker terminal and the server are in a communication connection state currently; if not, determining that the locker terminal and the server are in the communication disconnection state currently.
The other technical scheme of the invention is as follows: the utility model provides an online off-line information processing system of locker under weak network environment, be applied to locker terminal, its characterized in that includes:
the system comprises a network detection module, a storage cabinet terminal and a server, wherein a user acquires the current communication connection state of the storage cabinet terminal and the server, and determines the operation mode of the storage cabinet terminal according to the current communication connection state, wherein the operation mode comprises an online mode and an offline mode;
the front-end human-computer interaction interface module is used for carrying out off-line verification on user identity information carried in an operation instruction by utilizing a pre-stored user information data packet or sending the user identity information carried in the operation instruction to a server for carrying out on-line verification when the operation instruction input by a user is received;
the service logic processing module is used for acquiring offline local data according to the offline service operation of a user when the offline verification passes, dividing the offline local data into a plurality of offline data packets with different priorities, and storing the plurality of offline data packets in the database module of the locker terminal; the online local data acquisition module is used for acquiring online local data according to online service operation of a user when online verification passes, and dividing the online local data into a plurality of online data packets with different priorities;
the locker terminal database module is used for storing a plurality of offline data packets with different priorities, a plurality of online data packets with different priorities and user information data packets sent by the server;
and the network module is used for storing the user information data packets issued by the server in a database module of the locker terminal, sequentially uploading a plurality of off-line data packets in the database module to the server according to the sequence of the priority from high to low, and sequentially uploading the on-line data packets to the server according to the sequence of the priority from high to low.
The other technical scheme of the invention is as follows: an electronic device is provided that includes a processor, and a memory coupled to the processor, the memory storing program instructions executable by the processor; and when the processor executes the program instructions stored in the memory, the online and offline information processing method of the register cabinet under the weak network environment is realized.
The other technical scheme of the invention is as follows: there is provided a computer-readable storage medium storing a computer program which, when executed by a processor, implements the locker online/offline information processing method in the weak network environment.
The beneficial effect of this application does:
1. the method and the system carry out priority division on a request (namely an online request) sent to a server by a locker terminal and a locker data packet (comprising an offline data packet and an online data packet) generated in the operation process of the locker terminal, and send the online request, the offline data packet and the online data packet according to the priority sequence.
2. The locker terminal has an online mode and an offline mode, when a network is normal, the locker terminal initiates a request to a server to finish normal object storage/fetching operation of a user and uploads records generated in the process to the server, when the network is in an abnormal state, the locker terminal independently finishes the object storage/fetching operation of the user, marks priorities of data which are generated in the process and need to be reported, temporarily stores a local database, uploads the data which are not uploaded according to the priorities after the network is normal, uploads the data with the highest priority, uploads the data with the next priority, and sets specific default time for uploading when the data with the next priority are left.
3. The locker terminal and the server follow a receiving and sending confirmation mechanism and a retransmission mechanism, so that reliable and stable data transmission is ensured, and abnormal conditions caused by data loss are avoided.
4. Whether the network is normal or not, the locker terminal can determine whether the user has corresponding service operation authority or not, and the difference is that the locker terminal can only simply judge whether the user has the authority or not according to user information stored by the locker terminal during off-line, and can judge whether the user has the authority or not on-line in real time and more accurately on site.
5. When the data interaction is carried out only when the network is normal, and the data interaction is carried out, the locker terminal not only sends an online data packet and an offline data packet to the server, but also receives a user information data packet issued by the server, and with the help of the user information data packet, the user information in the locker terminal can be updated in real time, so that the locker terminal can better realize the function of storing/fetching objects during offline operation, the user operation is more convenient, and the use experience of the user is improved;
6. according to the method and the device, the data are prioritized and uploaded in sequence, so that the pressure of the communication channel in the weak network environment is greatly reduced, the real-time performance is guaranteed, and the user experience is improved. Meanwhile, the offline online mode can be switched in time, and the situation that the locker terminal tries to detect the network for multiple times when the user operates the locker terminal is avoided, so that the user experience is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
FIG. 1 is a flowchart illustrating an information processing method for a locker under a weak network environment according to a first embodiment of the present invention;
FIG. 2 is a flowchart of a locker terminal issuing a request to a server according to a first embodiment of the present invention;
FIG. 3 is a flow chart of a server issuing data according to a first embodiment of the present invention;
FIG. 4 is a flowchart illustrating uploading of data of a registered data packet at a terminal of a register according to a first embodiment of the present invention;
FIG. 5 is a flowchart of a cabinet terminal retransmission mechanism according to the first embodiment of the present invention;
FIG. 6 is a schematic structural diagram of an online/offline information processing apparatus for a locker under a weak network environment according to a second embodiment of the present invention;
FIG. 7 is a schematic structural diagram of a locker online/offline information processing apparatus in a weak network environment according to a third embodiment of the present invention;
fig. 8 is a schematic structural diagram of an electronic device according to a fourth embodiment of the invention;
fig. 9 is a schematic structural diagram of a storage medium according to a fifth embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The weak network environment refers to a situation that a network is frequently disconnected under a use scene that the network signal strength is general (weak), so that the communication between a locker terminal and a server is frequently disconnected or overtime. In the weak network environment, the inventor realizes that the locker has the following problems: 1. the network is often in a connected or disconnected state, and the off-line and on-line mode is inconvenient to switch; 2. under the weak network environment, the problem of data transmission overtime or data loss frequently occurs in data transmission, so that the data of the locker terminal is inconsistent with the data of the server, and the abnormality occurs; 3. under the weak network environment, the offline data are too much accumulated, and after the network is recovered, a plurality of terminals upload data concurrently, which brings great challenges to the processing of a communication channel and a server; 4. Under the weak network environment, data transmission is not timely, so that the service logic of the locker terminal is influenced, and poor experience is brought to the use of a user.
Fig. 1 is a schematic flowchart of an information processing method for a locker in a weak network environment according to a first embodiment of the present invention, including obtaining a current communication connection state between a locker terminal and a server, and determining an operation mode of the locker terminal; sending a task request to a locker terminal, verifying identity information of a user, and determining whether the user has corresponding service operation authority; guiding a user to complete corresponding business operation, and obtaining a corresponding task request and a register data packet according to the operation mode of the register cabinet terminal; and dividing the task request and the register data packet into a plurality of online data packets or offline data packets with different priority orders, sending the online data packets or the offline data packets to the server according to the priority orders, and receiving the user information data packets sent by the server. It should be noted that, if the result is substantially the same, the method of the present invention is not limited to the flow sequence shown in fig. 1, and specifically, the method for processing the locker (online/offline) information in the weak network environment includes the steps of:
s1, obtaining the current communication connection state of the locker terminal and the server, and determining the operation mode of the locker terminal, namely determining whether the locker terminal operates in an online mode or an offline mode.
In this step, the operation mode includes an online mode and an offline mode, and if the communication connection state between the locker terminal and the server is normal (i.e. the network connection is normal), the locker terminal operates in the online mode; if the communication connection state between the locker terminal and the server is abnormal (namely, the network connection is abnormal), the locker terminal operates in an online mode, and the method for acquiring the current communication connection state between the locker terminal and the server in the step is as follows:
s11, acquiring a preset timing heartbeat cycle and response threshold time;
s12, sending heartbeat data packets to the server according to the timing heartbeat cycle, and judging whether response results of the server for the heartbeat data packets are received within the response threshold time;
s13, if yes, determining that the locker terminal and the server are in a communication connection state (namely, the network connection is normal); if not, determining that the locker terminal and the server are in a communication disconnection state (namely, abnormal network connection) currently.
In actual work, people can set the timing heartbeat cycle and the response threshold time by themselves, for example, the timing heartbeat cycle is set to 60 seconds, and the response threshold time is set to 5 seconds. Within the response threshold time (such as 5 seconds), if the locker terminal receives the response result of the server for the heartbeat data packet, the network (connection) between the locker terminal and the server is normal; otherwise, within the response threshold time (e.g. 5 seconds), the locker terminal does not receive the response result of the server for the heartbeat data packet, which indicates that the network (connection) between the locker terminal and the server is abnormal.
In actual work, the application can also switch the use mode of the locker terminal according to the response result, and if the state of the locker terminal is switched from the original off-line mode to the on-line mode after the response result is received, so that the locker terminal can automatically detect the network and switch the off-line mode/the on-line mode in time, and the locker terminal is prevented from trying to detect the network for multiple times during user operation, thereby influencing the use of a user.
During actual work, when the identity information of the user is authenticated, the register cabinet terminal needs to send a request to the server, and if the server reply (response result) is not received within the time-out (response threshold time), the offline state is started, so that the normal operation of the user is ensured, and the use experience of the user is improved.
And S2, sending a task request to the locker terminal, verifying the identity information of the user, and determining whether the user has corresponding service operation authority.
During actual work, the request sent by the locker terminal to the locker terminal can be divided into an online request and an offline request, both the online request and the offline request can be sent to the server, both the online local data and the offline local data can be called as local data, and the task request includes but is not limited to user identity information identification, user register record query and the like.
During actual work, user identity information identification refers to user information bound by a user in advance, and the user information comprises but is not limited to a user IC card, a user fingerprint, a user face, a user identity unique identification code and the like, and is registered in a server, the user scans the IC card, the fingerprint and the face information at a locker terminal, the locker terminal initiates an identity identification request (which can be an online request and an offline request) to the server, the server compares the user information requested by the locker with the user information registered in advance and returns a comparison result to complete identity authentication, and the server also sends the user information (namely a user information data packet) to each locker terminal for offline identity identification of different locker terminals, so that the application is more intelligent.
In the step, the service operation authority of the application is divided into online service operation and offline service operation, and if the locker terminal runs in an online mode, a user is guided to complete the online service operation; and if the locker terminal runs in an off-line mode, guiding the user to complete off-line business operation.
As shown in fig. 2, the process of initiating the request from the locker terminal to the server includes: s211, the locker terminal sends a request data packet (such as an online data packet or an offline data packet) to the server; s212, checking whether the network is normal; s213, if the network is normal, the network module in the locker terminal sends a request to the server; s214, judging whether the server returns a request result (such as confirming the received information); s215, if the server returns the request result, the request is completed. During actual work, the process that the locker terminal initiates a request flow to the server further comprises the following steps: s216, if the network is abnormal or the server does not return the request result, the register cabinet terminal operates in an off-line mode.
When a locker terminal initiates a request to a server, if a user identity authentication request exists, the locker terminal sends a request data packet to the server, the request is arranged with a p0 priority and immediately added into a sending queue, a network module sends data to the server, the locker terminal enters a request waiting stage, the server receives the request of the locker terminal and returns a request result to the locker terminal, the locker terminal takes corresponding action after obtaining the result, if the server does not reply the request result of the locker terminal due to overtime or the current network state is abnormal, the locker terminal automatically enters an offline mode, offline data (records) are recorded in a local data table to be uploaded after offline operation is completed, and the locker terminal uploads the offline data to the server after the network is normal.
In actual work, the method for verifying the user identity information to determine whether the user has the authority to perform business operation is as follows: s221, acquiring user identity information input by a user during service operation; s222, calling user identity information prestored in a server or a locker terminal; s223, comparing the input user identity information with pre-stored user identity information to obtain a comparison result, and judging whether the user has the authority to perform business operation according to the comparison result.
In actual work, no matter whether the network is normal or not, the register terminal sends a user identity authentication request to the server to verify user identity information, so as to determine whether a user has a corresponding service operation authority, and the difference is as follows:
when the network is abnormal (that is, when the locker terminal operates in an offline mode, the same applies below), the register terminal can judge whether the user has the authority or not only according to the user identity information stored by the register terminal at the moment, and data (identity verification information) generated when judging whether the user has the authority or not is not uploaded to the server, and at the moment, the locker terminal needs to guide the user to finish the business operation independently under the condition that the identity of the locker terminal is not verified by the server;
when the network is normal (namely when the locker terminal operates in an online mode), the register terminal can judge whether the user has the authority in real time on site more accurately, and data generated when the user is judged whether the user has the authority in online mode can be uploaded to the server.
And S3, guiding the user to complete corresponding business operation, and obtaining a corresponding task request and a register data packet according to the operation mode of the register cabinet terminal.
In this step, the online request type obtained when the locker terminal operates in the online mode is substantially the same as the offline request type obtained when the locker terminal operates in the online mode, and both of them include user identification information identification, user registration record query, and the like. However, when a user identity information identification request is to be treated, the online mode operation and the offline mode operation are still different, specifically: when the locker terminal sends a user identity information identification request to the server during online operation, the server returns corresponding confirmation receipt information, and the locker terminal can identify the user identity information alone and can also finish the user identity information identification with the help of the server; when the system runs off line, data interaction cannot be carried out between the locker terminal and the server, and at the moment, the locker terminal can only complete user identity information identification according to data information stored by the locker terminal (such as user identity information issued when the server is on line).
S31, when the locker terminal operates in the online mode, acquiring an online request and an online data packet according to the online service operation of the user, including:
in this step, the business logic of deposit/retrieval of the locker terminal is limited by the server. When the locker terminal generates a storage/fetching behavior, a user identity authentication request needs to be sent to the server, after the server receives the user identity information, the server compares the user identity information with the user information registered in advance to confirm whether the user has the use authority or not and returns a comparison result, and the locker terminal confirms whether the storage/fetching operation is allowed or not according to the result returned by the server.
S32, when the locker terminal operates in an off-line mode, obtaining an off-line data packet according to the off-line service operation of the user;
in this step, since the locker terminal is in the weak network environment, the network is disconnected frequently, which may result in communication between the locker terminal and the server being blocked, resulting in communication between the locker terminal and the server being disconnected. At this time, in order to meet the data interaction requirement, and because a part of the offline request (such as the user identification information identification) in the locker terminal is not sent to the server, the data (the user identification information) generated by the request which is not sent by the part is not sent to the server.
During actual work, the offline data packet and the online data packet can be both called as a deposit data packet, which includes but is not limited to deposit record, fetch record, unpacking record, administrator background operation record, deposit cabinet terminal system log record, deposit cabinet terminal personnel information synchronous record, and the like, specifically:
the deposit/retrieval record includes, but is not limited to, a record number, a user ID, a user authentication mode, a deposit time, a retrieval time (the retrieval order is available), a record effective deadline, and the like.
And the unpacking records comprise but are not limited to record numbers, operator Identity (ID), unpacking types, unpacking time and the like.
And thirdly, the administrator background operation records include but are not limited to record numbers, administrator Identity (ID), operation types (such as account password updating, background unpacking, background clearing records and the like), and operation time.
Log records of the locker terminal system include, but are not limited to, record numbers, system log types (locker terminal system start/exit records, locker terminal network exception records, locker terminal device connection exception records), record times, and the like.
And fifthly, synchronously recording the personnel information at the terminal of the locker, including but not limited to recording number, personnel information synchronization starting time, personnel information synchronization ending time and personnel information synchronization result.
And S4, dividing the task request and register data packet into a plurality of online data packets or offline data packets with different priority orders.
S41, when the locker terminal operates in an online mode, the method comprises the following steps:
s411, if the locker terminal runs in an online mode, storing user information data packets issued by a server in a database module of the locker terminal, and sequentially uploading a plurality of offline data packets in the database module to the server according to the sequence of priorities from high to low;
s412, when an operation instruction input by a user is received, sending user identity information carried in the operation instruction to a server for online verification;
and S413, when the online verification is passed, acquiring online local data according to the online service operation of the user, dividing the online local data into a plurality of online data packets with different priorities, and sequentially uploading the online data packets to a server according to the priority from high to low.
In this step, the locker terminal and the server directly perform data interaction, and at this time, data transmission is directly completed online, and at this time, the locker terminal also receives data (i.e., a user information data packet) from the server.
Meanwhile, the fact that the server issues the user information data packet to the locker terminal and the locker terminal receives the user information data packet is a more important invention point of the application, and with the help of the user information data packet, the locker terminal of the application can continuously expand and update data in the locker terminal, so that the data in the locker terminal has better timeliness, and therefore the data in the locker terminal can be interconnected, the function of storing/fetching objects can be better realized during offline operation, the user operation is more convenient, and the use experience of the user is further improved.
And S42, when the locker terminal operates in the offline mode, dividing the offline local data into a plurality of offline data packets with different priority orders, and then storing the offline data packets in the locker terminal database module.
In this step, in order to improve the user experience, the application supports the use in an offline mode, that is, the locker terminal can be separated from the server to independently complete the service logic, and record the service operation of the user (that is, obtain the offline local data), and after the network is normal, the offline local data is uploaded to the server.
During actual work, although data interaction is not performed when the network is abnormal, the method and the system can still guide the user to complete business operation (storage/fetching), and only the register cabinet cannot perform online verification and online data transmission when the network is abnormal, so that the function of the register cabinet terminal is not so strong, the data is not so accurate, but the register cabinet terminal can also well guide the user to complete corresponding business operation with the help of the existing data (user information data packet).
In actual work, the priority is divided mainly according to the real-time requirement and the importance degree of data, the priority levels include but are not limited to levels such as p0, p1 and p2, the priority order is in a descending trend in sequence, the p0 level is the highest priority level, the p1 level is the middle priority level, and the p2 level is the lowest priority level. Wherein, the p0 level data includes but is not limited to user identification information identification, user register record query, deposit record, and fetching record; the p1 level data package includes but is not limited to an open box record, an administrator background operation record, and the like; p2 or below levels include, but are not limited to, locker end system log records, timed update personnel information records.
In actual operation, the data packets in the same level (e.g., p0) are sorted according to the existing generation time, for example, in the p0 level, the user id identification request is generated earlier than the deposit record, and when sorting is performed, the user id identification request is arranged in front of the deposit record, and the user id identification request is sent preferentially.
And S5, sending the online data packet and the offline data packet to a server according to the priority sequence, and receiving a user information data packet sent by the server when the network is normal.
In actual operation, the uploading step of the registered packet data (offline data packet and/or online data packet) with different priorities comprises the following steps: s511, uploading the offline data packet and/or the online data packet with the highest priority to a server; s512, sequentially writing the online data with the middle priority except the highest priority into a data table to be uploaded according to the sequence of the priorities from high to low, and marking the corresponding online data packet in the data table to be in an un-uploaded state; s513, when the uploading of the online data packets with the highest priority is finished, sequentially uploading the online data packets in the uploading data table to a server according to the order of the recording time from morning to evening; and S514, receiving the confirmation and acceptance information fed back by the server, and marking the corresponding online data packet in the uploaded data table to be in an uploaded state.
During actual operation, the uploading step of the registered packet data (offline data packet and/or online data packet) with different priorities further comprises: s515, storing the online data packet with the lowest priority in a database module of the locker terminal; s516, setting default uploading time for the online data packet with the lowest priority; s517, if the locker terminal operates in an online mode and the current time exceeds the default uploading time, uploading the online data packet with the lowest priority in the database module to a server.
In actual work, the default uploading time is mainly used for uploading data of a lower priority level of a p2 level of the locker terminal and below, the real-time requirement of the data is not high, the data can be processed in a delayed mode, the locker terminal can set any time to upload the data, and if the time is set in a time period with low use frequency, the peak use period is staggered, so that the communication channel pressure in the weak network environment can be reduced.
In actual operation, step S5 includes: s521, writing the offline data into a data table to be uploaded in sequence according to the priority from high to low, and marking the offline data packets in the data table to be uploaded in a non-uploading state; s522, sequentially uploading the offline data packets in the uploading data table to a server according to the sequence of the recording time from morning to evening; and S523, receiving the confirmation receiving information fed back by the server, and marking the corresponding offline data packet as an uploaded state in the upload data table.
Preferably, the step S5 further includes: s523, before the off-line data packets and/or the on-line data packets are sequentially uploaded to the server, all the off-line data packets and/or the on-line data packets in the non-uploaded state are entered into a preset data table to be reported; s524, when the offline data packets and/or the online data packets are sequentially uploaded to the server, the offline data packets and/or the online data packets marked as the non-uploading state are sequentially uploaded to the server according to the priority sequence; and S525, after the offline data packets and/or online data packets are sequentially uploaded to the server, marking the offline data packets and/or online data packets which are returned by the server and confirm the received information as an uploaded state, removing the offline data packets and/or online data packets marked as the uploaded state from the data table to be reported, and marking the offline data packets and/or online data packets exceeding a preset maximum uploading frequency default value in the data table to be reported as an abnormal state.
As shown in fig. 4, the uploading process of the stage register data packet in the register terminal includes: s531, generating a register data packet by a register cabinet terminal; s532, dividing the priority of the registered data packet; s533, judging whether the current network is normal; s534, judging whether the registered data packet to be uploaded is p 0-level data or not; s535, if yes, uploading the p0 level register data packet by the register cabinet terminal through a network module; s536, judging whether the server returns confirmation information or not; and S537, processing the data in the p0 level register data packet by the server. During actual work, the data uploading process of the level register data packet in the register cabinet terminal further comprises the following steps: and S538, the locker terminal inputs the level register data packet into the locker terminal database module.
When the system works actually, when a user adopts article storage/fetching operation or an administrator operates, a locker terminal stores article storage records, article fetching records, operation records, log records and the like in the local and uploads a server, firstly, a locker terminal back-end processing module carries out priority division on generated data packets needing to be uploaded according to importance degree, real-time performance and the like, divides several grades such as p0, p1, p2 and the like, judges the network connection state of the current locker terminal and the server, if the current network connection is normal, the data packets of the p0 grade are added into a sending list, the locker terminal network module sends the data packets to the server one by one according to the list, waits for the server to receive confirmation replies, and after the server receives the confirmation replies, the information is reported successfully and is removed from the locker terminal list sending list; and if the sending time is out and the reply data is not received, adding the data into a data table to be uploaded of the local database. And the grade records of p1 and below are directly added into a data table to be uploaded of a local database. And if the network is abnormal, all the generated uploading records are stored in the local database to-be-uploaded data table. And temporarily storing the data in the local data table to be uploaded, taking out and uploading the data to the server from the terminal of the locker from high to low in sequence according to the grade at regular time under the conditions that the current sending list is empty and the network is normal, and marking the record as an uploaded data packet after each record is uploaded successfully, wherein the record is not taken out any more next time. And if the level p2 or below is set by the register cabinet terminal for uploading at the default time, if the time is set to 2 am, the register cabinet terminal inquires the p2 of the data table to be uploaded and the non-uploaded data at the level below, adds the data into the sending list, and the network module sends the data packet to the server side. And after the uploading is successful, marking the data packet as the uploaded data packet.
In actual operation, the data table to be uploaded includes, but is not limited to, the following fields, record ID, type of upload record, record time, record content, record upload status (uploaded, not uploaded), record upload times, and record status (normal, abnormal).
During actual work, the data interaction between the locker terminal and the server is completed through the communication of the network modules of the locker terminal and the server, and the invention discusses the information processing in the weak network environment. Therefore, the communication protocol between the locker terminal and the server network module needs to satisfy the following characteristics: the system has the characteristics of high reliability and stability, low bandwidth operation, protocol design for communication of remote sensors and control equipment of unreliable networks, small-size transmission, low cost and the like. It includes but is not limited to MQTT protocol, etc.
During actual work, when the registered data packets (online data packets and offline data packets) are uploaded to the server, the registered data packets are uploaded according to priorities, and the method specifically comprises the following steps:
firstly, when the network is normal, the p 0-level data generated each time are immediately sent to a locker terminal sending list, a network module immediately sends a data packet to a server side, and if the uploading is successful, the uploaded data are deleted from the uploading list; and the p1 and later levels are temporarily stored in a data table to be uploaded of a local database and marked as data which are not uploaded, after the uploading of the p0 level data is finished, the p1 level data which are not uploaded in the data table to be uploaded are inquired regularly, the data are taken out and added into a sending list according to the record storing time in sequence, a network module sends a data packet to a server, and after each record is uploaded successfully, the record is marked as the uploaded data packet. And if the level p2 or below is set by the register cabinet terminal for uploading at the default time, if the time is set to 2 am, the register cabinet terminal inquires the p2 of the data table to be uploaded and the non-uploaded data at the level below, adds the data into the sending list, and the network module sends the data packet to the server side. And after the uploading is successful, marking the data packet as the uploaded data packet.
When the network is abnormal, all the level data are firstly temporarily stored in a data table to be uploaded of a local database and marked as data packets which are not uploaded, when the network is normal, the data packets which are not uploaded at the p0 level are firstly taken out and added into a sending list, a network module sends the data packets to a server, and after the uploading of the data packets at the p0 level is finished, the data packets at the p1 level are sequentially taken out and are continuously uploaded. And the p2 and the lower level data packets are taken out and uploaded to the server after the time reaches the set default time.
And thirdly, dividing data packets stored in the data table to be uploaded at the locker terminal into an un-uploaded state and an uploaded state, wherein the data packets are in the un-uploaded state when initially stored in the data table to be uploaded, and only after the data are successfully uploaded or when the maximum default uploading frequency is set by the locker terminal, the data packets are marked as the uploaded state, and the data in the uploaded state can be removed from the data table to be uploaded.
In actual operation, the present application further includes a receiving and sending acknowledgement mechanism and a timeout retransmission mechanism:
wherein, the timeout retransmission mechanism comprises: regularly patrolling whether an offline data packet and/or an online data packet which are not uploaded to a server exist in the locker terminal; and when the locker terminal operates in an online mode, sequentially uploading offline data packets and/or online data packets which are not uploaded to the server according to the priority order.
As shown in fig. 5, the flow of the timeout retransmission mechanism includes: s61, regularly patrolling a data table to be reported; s62, checking whether the data to be reported has unreported data in the data table, if not, returning to the step S61, and if so, executing the step S63; s63, judging whether the network is normal, if not, returning to the step S61, if so, executing the step S64; s64, recording the registered data packets into a data table to be reported according to the priority sequence, wherein only the priority data of the same level are taken each time; s65, the locker terminal sends the register data packets one by one through the network module; s66, judging whether the server returns the confirmation receiving information, if not, returning to the step S67, if yes, executing the step S65; and S67, retransmitting the piece of data.
Further, in order to prevent invalidation or the server being unable to recognize long-term repeated uploading of data packets and occupy a communication channel, the application further records the number of times of uploading registered data packets for comparison with a default value of the maximum uploading number set by the locker terminal, if the maximum uploading number is set to be 3 times, the uploading is cancelled and marked as abnormal data after the 3 times of uploading is failed, and the timeout retransmission mechanism specifically comprises the following steps: marking the off-line data packets and/or on-line data packets which are not marked as the non-uploading state; the off-line data packets and/or on-line data packets marked as the non-uploading state are sequentially uploaded to the server according to the priority order, and whether confirmation receiving information returned by the server is received or not is respectively checked; if so, marking the offline data packet and/or the online data packet as an uploaded state; and if not, adding one to the number of times of the non-uploading state, and stopping uploading the offline data packet and/or the online data packet when the number of times of the non-uploading state exceeds a preset maximum uploading number default value, wherein the initial value of the number of times of the non-uploading state is zero.
In actual operation, when the network is normal, sequentially uploading (registering) data packets in the data table to be uploaded (also not uploading data) according to the method described in step S4, after receiving a confirmation message returned by the server, marking the data packets as an uploaded state, and if the data packets are not received by the server after the uploading is overtime, keeping the record state unchanged, and waiting for the next time when the logic processing module is taken out from the data table to be uploaded in the local database and uploads again. Every time the data packet is taken out, the recorded uploading frequency is added with 1, and after the set default maximum uploading frequency is exceeded, the record is marked as an uploaded state and is marked as an abnormal data packet so as to prevent invalidation or the server from being incapable of identifying the data packet and repeatedly uploading the data packet for a long time.
The transceiving confirmation mechanism comprises: each registered data packet (including data in an offline data packet and data in a current data packet) of the server reported by the locker terminal needs to be returned by the server to confirm receipt information, so that the server can consider that the uploading is successful, and the registered data packet replied by the server is not received when the uploading is overtime, and the data packet of the data table to be uploaded in the locker terminal database is not recorded, and is stored in the data table to be uploaded in the locker terminal database and marked as the data packet not to be uploaded, and the data packet recorded in the data table to be uploaded is not changed in uploading state and is still in an non-uploading state.
As shown in fig. 6, the online and offline information processing system for a locker in a weak network environment according to the second embodiment of the present invention includes a locker terminal 1, including but not limited to a front-end human-machine interaction interface module 11 and a back-end logic module 12:
the front-end human-computer interaction interface module 11 is configured to perform offline verification on user identity information carried in an operation instruction by using a pre-stored user information data packet when the operation instruction input by a user is received, or send the user identity information carried in the operation instruction to a server for online verification. During actual work, the front-end human-computer interaction interface module 11 mainly guides a user to complete business operations, including but not limited to operations of storing/fetching objects, background unpacking by an administrator, box cleaning, box locking, record query, parameter configuration and the like. The front-end human-computer interaction interface module is separated from the background service module, and the front-end human-computer interaction can quickly make a response and give a good operation experience to a user.
The back-end logic module 12 mainly functions to respond to the front-end user service operation and process the main behavior logic of the locker terminal, and includes, but is not limited to, a service logic processing module 121, a network transmission module 124, a network detection module 123, and a local database storage module 122, wherein,
the network detection module 123 is configured to enable a user to obtain a current communication connection state of the locker terminal and the server, and determine an operation mode of the locker terminal according to the current communication connection state, where the operation mode includes an online mode and an offline mode. During actual work, the network detection module is mainly used for detecting whether the network module is normal or not, so that the online or offline mode of the locker terminal is rapidly switched.
The service logic processing module 121 is configured to, when the offline verification passes, obtain offline local data according to an offline service operation of a user, divide the offline local data into a plurality of offline data packets with different priorities, and store the plurality of offline data packets in the database module of the locker terminal; and the online verification module is used for acquiring online local data according to the online service operation of the user when the online verification passes, and dividing the online local data into a plurality of online data packets with different priorities. During actual work, the service logic processing module is used for responding to the service operation of the front-end user and generating corresponding records at corresponding nodes, and if the user stores/fetches objects, the corresponding records are generated, and the records of storing/fetching the objects, the records of unpacking the objects and the like are generated. And recording the data into a database module, simultaneously uploading the data of the server, prioritizing the data, adding the data into a data sending queue according to the priority, and calling a network module to finish data reporting.
The local database storage module 122, which may also be referred to as a locker terminal database module, is configured to store a plurality of offline data packets with different priorities, a plurality of online data packets with different priorities, and a user information data packet sent by a server. During actual work, the locker terminal database module is a database module unique to each locker terminal, is an embedded small database, and occupies very low resources. The method is mainly used for storing the operation data of the terminal user of the locker, and comprises but is not limited to storage order record, fetching order record, administrator operation record, record to be uploaded, user information record, locker terminal log record and the like.
The network transmission module 124, which may also be referred to as a network module, is configured to store user information data packets sent by a server in a database module of a locker terminal, sequentially upload a plurality of offline data packets in the database module to the server according to a sequence from high to low in priority, and sequentially upload online data packets to the server according to the sequence from high to low in priority. In actual work, the network module is mainly a 4G network module (namely, a 5G network module), the application of the network module is wide, and the locker terminal can be used in a plurality of complex scenes to complete business logic operation through data interaction between the network module and the server.
In actual work, in order to enable the user to experience better, the system further comprises a UI interface module 111, wherein the UI interface module is mainly a WEB front-end human-computer interaction interface and assists an administrator in completing functions including personnel information adding, terminal use record inquiring, terminal log inquiring, terminal order information inquiring, system setting and the like.
The online/offline data (information) processing device applied to the locker terminal in the weak network environment of this embodiment mainly includes, but is not limited to, a UI interface module 111, a service logic processing module, a local database storage module, a network detection module, and a network transmission module. All modules cooperate with each other to finish man-machine interaction with a user, verify user identity information and assist the user to finish temporary deposit of articles by using a deposit cabinet, record deposit records and operation records of the user, and finish data interaction with a server; when the locker terminal and the server can not communicate with each other through the network, the locker terminal can be separated from the server to finish the user storage business logic independently, and after the network is normal, the offline operation record is uploaded to the server.
As shown in fig. 6, the online/offline information processing system for locker in weak network environment according to the second embodiment of the present invention further includes a server 2, including:
the network transmission module 24, which may also be referred to as a network module, is configured to receive a plurality of offline data packets and/or a plurality of online data packets that are uploaded by the locker terminal and have different priority orders, and send a user information data packet to the locker terminal. During actual work, the network module is used for interacting with the locker terminal data, receiving recorded data (a locker data packet) or a request data packet (an online request) uploaded by the locker terminal, replying a confirmation data packet, and sending server data such as a remote control instruction, user identity information and the like.
The personnel information management module 22, which may also be referred to as a user management module, is configured to add or delete user information to form a plurality of user information data packets, and issue the user information data packets to the locker terminal through the network module; and the data management module is used for managing data in a plurality of user information data packets, data in a plurality of off-line data packets and data in a plurality of on-line data packets. During actual work, the user management module is mainly used for managing the use user information of the locker terminal, and the use user information comprises user information of adding, deleting, checking and modifying and administrator information.
A UI interface module 21, configured to assist the user management module in adjusting data in the user information data packet, data in the offline data packet, and data in the online data packet. During actual work, the UI interface module is mainly a WEB front-end human-computer interaction interface and assists an administrator in completing functions including personnel information addition, locker terminal use record query, locker terminal log query, locker terminal order information query, system setting and the like.
A data storage module 23, configured to store the plurality of user information data packets, the plurality of offline data packets, and the plurality of online data packets. In actual work, the data storage module mainly accesses a large-scale relational database management system which is deployed on the same carrier with a server, and the server completes the functions of increasing, deleting and modifying data by connecting the database and operating the database by using SQL (Structured Query Language). The server data storage module is mainly used for storing information including but not limited to use records, personnel information records, administrator information records, current cabinet state, cabinet distribution and the like of all the locker terminals, and management personnel can conveniently check the use condition, order records, log information and the like of the cabinet at any time.
The service logic processing module 26, which may also be referred to as a logic processing module, is configured to parse the offline data packets and the online data packets uploaded by the locker terminal, and respond to an online request of the locker terminal. During actual work, the logic processing module is used for analyzing the data reported by the locker terminal, responding to a locker terminal reporting request, such as user identity authentication, and processing and analyzing all recorded data reported by the locker terminal and recording the recorded data into the server database, so that an administrator can conveniently check the data at any time.
As shown in fig. 7, the online and offline information processing system for a locker in a weak network environment according to the third embodiment of the present invention is applied to a locker terminal, and includes:
the network module 51 is used for acquiring the current communication connection state of the locker terminal and the server, and determining the operation mode of the locker terminal according to the current communication connection state, wherein the operation mode comprises an online mode and an offline mode;
the offline verification module 52 is configured to, if the locker terminal operates in an offline mode, perform offline verification on the user identity information carried in the operation instruction by using a pre-stored user information data packet when receiving the operation instruction input by the user;
an offline operation module 53, which, when the offline verification passes, acquires offline local data according to the offline service operation of the user, divides the offline local data into a plurality of offline data packets with different priorities, and stores the plurality of offline data packets in a database module of the locker terminal;
an online data interaction module 54, configured to, if the locker terminal operates in an online mode, sequentially upload the offline data packets in the database module to the server according to a priority order from high to low;
the online verification module 55 is configured to send user identity information carried in an operation instruction to the server for online verification when the operation instruction input by the user is received;
and the online operation module 56 is used for acquiring online local data according to online service operation of a user when online verification is passed, dividing the online local data into a plurality of online data packets with different priorities, and sequentially uploading the online data packets to the server according to the priority from high to low.
In actual work, in order to make the application more convenient to use, the application further comprises an order information management module 25 which is mainly used for managing deposit records, fetching records and the like uploaded by each locker terminal, and whether the user uses the cabinet records or not can be inquired during identity authentication of the locker terminal, so that the phenomenon that one user occupies a plurality of grids is limited. Meanwhile, managers can check detailed records of the articles stored in the terminals of the storage cabinets at any time.
The server in the embodiment is mainly used for centrally managing the locker, and comprises the functions of personnel information input, real-time use state monitoring of the locker, user identity information authentication, locker use record query and the like, and meanwhile, the use scene of the locker is limited, and the phenomenon that the same person stores articles for many times in different lockers is avoided.
The server in the application can be an independent server, can also be a WEB server, and can also be a cloud server providing basic cloud computing services such as cloud service, a cloud database, cloud computing, a cloud function, cloud storage, Network service, cloud communication, middleware service, domain name service, security service, Content Delivery Network (CDN), big data and an artificial intelligence platform.
As shown in fig. 3, the present invention further provides a server data issuing method, including: s71, the server generates data to be transmitted (sent), such as user information data packets; s72, judging whether the current network is normal; s73, the server sends data to the locker terminal, such as user information data packet; s74, determining whether the terminal of the locker returns the confirmation information, wherein the step can be referred to the step S5; and S75, finishing the issuing.
In actual work, when user information is updated or a user remotely operates a locker, a server needs to actively send a data packet (namely, a user information data packet) to the locker, the server sends the sent data packet to a locker terminal, the server enters a result waiting state, the locker terminal receives the sent data packet, analyzes and completes the operation, then returns an execution result, and sends the execution result to the server, and the server makes a corresponding prompt after receiving the result. If the server overtime locker terminal returns the received confirmation information, the current operation is determined to be failed, and the operation failure is prompted. For some data related to the locker terminal service process, such as the staff information data required to be used for the locker terminal offline verification, the server will start the retransmission mechanism (refer to step S6 specifically) after failing to issue the data, and then re-issue the data.
The server of the application can be an independent server, can also be a server, and can also be a cloud server providing basic cloud computing services such as cloud service, a cloud database, cloud computing, a cloud function, cloud storage, Network service, cloud communication, middleware service, domain name service, security service, Content Delivery Network (CDN), big data and an artificial intelligence platform.
Fig. 8 is a schematic structural diagram of an electronic device according to the present invention. As shown in fig. 8, the electronic device 30 includes a processor 31 and a memory 32 coupled to the processor 31. The memory 32 stores program instructions for implementing the information processing method of the locker in the weak network environment according to any of the embodiments. The processor 31 is operative to execute program instructions stored by the memory 32 to perform a clock planning layout on the FPGA.
The processor 31 may also be referred to as a CPU (Central Processing Unit). The processor 31 may be an integrated circuit chip having signal processing capabilities. The processor 31 may also be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Referring to fig. 9, fig. 9 is a schematic structural diagram of a storage medium according to a fifth embodiment of the invention. The storage medium 40 of the fourth embodiment of the present invention stores program instructions 41 capable of implementing all the methods described above, where the program instructions 41 may be stored in the storage medium in the form of a software product, and include several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute all or part of the steps of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a mobile hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, or terminal devices, such as a computer, a server, a mobile phone, and a tablet.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of a unit is merely a logical division, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes performed by the present specification and drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
While the invention has been described with reference to specific embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention.

Claims (10)

1. An information processing method for a locker in a weak network environment is characterized by comprising the following steps:
the method comprises the steps of obtaining the current communication connection state of a locker terminal and a server, and determining the operation mode of the locker terminal according to the current communication connection state, wherein the operation mode comprises an online mode and an offline mode;
if the locker terminal runs in an offline mode, when an operation instruction input by a user is received, performing offline verification on user identity information carried in the operation instruction by using a pre-stored user information data packet;
when the offline verification passes, acquiring offline local data according to the offline service operation of a user, dividing the offline local data into a plurality of offline data packets with different priorities, and storing the plurality of offline data packets in a database module of the locker terminal;
if the locker terminal runs in an online mode, sequentially uploading a plurality of offline data packets in the database module to a server according to the sequence of priorities from high to low;
when an operation instruction input by a user is received, user identity information carried in the operation instruction is sent to a server for online verification;
when the online verification is passed, acquiring online local data according to online service operation of a user, dividing the online local data into a plurality of online data packets with different priorities, and sequentially uploading the online data packets to a server according to the priority from high to low.
2. The method as claimed in claim 1, wherein the sequentially uploading the online data packets to the server according to the priority order comprises:
uploading the online data packet with the highest priority to a server;
sequentially writing the online data packets with the intermediate priority into a data table to be uploaded according to the sequence of the priority from high to low, and marking the corresponding online data packets in the data table to be uploaded in a non-uploading state;
when the uploading of the online data packets with the highest priority is finished, sequentially uploading the online data packets in the uploading data table to a server according to the order of the recording time from morning to evening;
and receiving confirmation receiving information fed back by the server, and marking the corresponding online data packet as an uploaded state in the uploading data table.
3. The method as claimed in claim 2, wherein after the sending and uploading the highest priority online data packet to the server, the method further comprises:
storing the online data packet with the lowest priority in a database module of the locker terminal;
setting default uploading time for the online data packet with the lowest priority;
and if the locker terminal operates in an online mode and the current time exceeds the default uploading time, uploading the online data packet with the lowest priority in the database module to a server.
4. The information processing method of locker under weak network environment as claimed in claim 2, wherein said uploading the plurality of said offline data packets in said database module to the server in sequence from high to low in priority comprises:
writing the offline data into a data table to be uploaded in sequence according to the priority from high to low, and marking the offline data packets in the data table to be uploaded in a non-uploading state;
sequentially uploading the offline data packets in the uploading data table to a server according to the sequence of the recording time from morning to evening;
and receiving confirmation receiving information fed back by the server, and marking the corresponding offline data packet as an uploaded state in the uploading data table.
5. The information processing method of locker under weak network environment as claimed in claim 4, further comprising:
recording the uploading times of each off-line data packet or on-line data packet in the uploading data table;
when the number of times of uploading the offline data packet or the online data packet reaches a counting threshold value, marking the corresponding offline data packet or online data packet in an abnormal state in the uploading data table.
6. The information processing method for locker under weak network environment according to any of claims 1 to 5, further comprising:
regularly patrolling whether an offline data packet and/or an online data packet which are not uploaded to a server exist in the locker terminal;
and when the locker terminal operates in an online mode, sequentially uploading offline data packets and/or online data packets which are not uploaded to the server according to the priority order.
7. The method as claimed in claim 6, wherein the obtaining the current communication connection status of the locker terminal and the server comprises:
acquiring a preset timing heartbeat cycle and response threshold time;
sending a heartbeat data packet to a server according to the timing heartbeat cycle, and judging whether a response result of the server for the heartbeat data packet is received within the response threshold time;
if so, determining that the locker terminal and the server are in a communication connection state currently; if not, determining that the locker terminal and the server are in the communication disconnection state currently.
8. The utility model provides an online off-line information processing system of locker under weak network environment, is applied to locker terminal, its characterized in that includes:
the system comprises a network module, a storage cabinet terminal and a server, wherein the network module is used for acquiring the current communication connection state of the storage cabinet terminal and the server and determining the operation mode of the storage cabinet terminal according to the current communication connection state, and the operation mode comprises an online mode and an offline mode;
the offline verification module is used for performing offline verification on the user identity information carried in the operation instruction by utilizing a pre-stored user information data packet when the operation instruction input by the user is received if the locker terminal operates in an offline mode;
the offline operation module is used for acquiring offline local data according to the offline service operation of a user when the offline verification passes, dividing the offline local data into a plurality of offline data packets with different priorities, and storing the plurality of offline data packets in the database module of the locker terminal;
the online data interaction module is used for sequentially uploading a plurality of offline data packets in the database module to a server according to the sequence of priorities from high to low if the locker terminal operates in an online mode;
the online verification module is used for sending the user identity information carried in the operation instruction to the server for online verification when receiving the operation instruction input by the user;
and the online operation module is used for acquiring online local data according to online service operation of a user when online verification passes, dividing the online local data into a plurality of online data packets with different priorities, and sequentially uploading the online data packets to the server according to the priority from high to low.
9. An electronic device comprising a processor, and a memory coupled to the processor, the memory storing program instructions executable by the processor; the processor executes the program instructions stored in the memory to realize the information processing method of the locker in the weak network environment according to any one of claims 1 to 7.
10. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the method for processing locker online/offline information in the weak network environment according to any one of claims 1 to 7.
CN202111123990.4A 2021-09-24 2021-09-24 Information processing method, system, equipment and medium for locker under weak network environment Pending CN113840002A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111123990.4A CN113840002A (en) 2021-09-24 2021-09-24 Information processing method, system, equipment and medium for locker under weak network environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111123990.4A CN113840002A (en) 2021-09-24 2021-09-24 Information processing method, system, equipment and medium for locker under weak network environment

Publications (1)

Publication Number Publication Date
CN113840002A true CN113840002A (en) 2021-12-24

Family

ID=78969973

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111123990.4A Pending CN113840002A (en) 2021-09-24 2021-09-24 Information processing method, system, equipment and medium for locker under weak network environment

Country Status (1)

Country Link
CN (1) CN113840002A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114496202A (en) * 2022-01-26 2022-05-13 北京融威众邦电子技术有限公司 Intelligent system for equipment inspection and repair reporting
CN117040696A (en) * 2023-10-09 2023-11-10 深圳市天思智慧科技有限公司 Message complementary transmission method based on MQTT protocol

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130138496A1 (en) * 2011-11-24 2013-05-30 LaShou Group INC. Systems, devices and methods for offline coupon verification
CN109118597A (en) * 2018-08-29 2019-01-01 上海哔哩哔哩科技有限公司 Intelligent terminal, ticketing service verifying system, method and computer readable storage medium
CN109547510A (en) * 2017-09-22 2019-03-29 镇江雅迅软件有限责任公司 A kind of off-line system method of data synchronization
CN110177077A (en) * 2019-04-16 2019-08-27 平安普惠企业管理有限公司 System of account processed offline method, apparatus, equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130138496A1 (en) * 2011-11-24 2013-05-30 LaShou Group INC. Systems, devices and methods for offline coupon verification
CN109547510A (en) * 2017-09-22 2019-03-29 镇江雅迅软件有限责任公司 A kind of off-line system method of data synchronization
CN109118597A (en) * 2018-08-29 2019-01-01 上海哔哩哔哩科技有限公司 Intelligent terminal, ticketing service verifying system, method and computer readable storage medium
CN110177077A (en) * 2019-04-16 2019-08-27 平安普惠企业管理有限公司 System of account processed offline method, apparatus, equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘朋祖: ""智能快件箱通讯设计与实现"", 《中国优秀硕士论文全文数据库》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114496202A (en) * 2022-01-26 2022-05-13 北京融威众邦电子技术有限公司 Intelligent system for equipment inspection and repair reporting
CN117040696A (en) * 2023-10-09 2023-11-10 深圳市天思智慧科技有限公司 Message complementary transmission method based on MQTT protocol

Similar Documents

Publication Publication Date Title
CN113840002A (en) Information processing method, system, equipment and medium for locker under weak network environment
CN109361770A (en) The system and method for bidirectional real-time is realized based on WebSocket and message queue
CN100578507C (en) Data-base space automatic extended method and management module
CN105426238B (en) A kind of control method of the equipment backstage instruction management system based on internal memory
CN103839318B (en) The gate control system of a kind of remote centralized certification and method
CN109714202A (en) A kind of client off-line reason method of discrimination and concentrating type safety management system
CN110063042B (en) Database fault response method and terminal thereof
CN102929224A (en) Condition acquisition controller (CAC) for power transformer equipment and system control method
CN106375150A (en) Disconnection control method and device for server
JP2020535501A (en) Target recognition method, device and intelligent terminal
CN114328132A (en) Method, device, equipment and medium for monitoring state of external data source
CN112969172B (en) Communication flow control method based on cloud mobile phone
CN113572757A (en) Server access risk monitoring method and device
CN117439838A (en) Edge computing gateway master-slave machine-oriented self-adaptive rapid networking method
CN103366433A (en) System and method for monitoring state of one-card entrance guard in real time
US10674337B2 (en) Method and device for processing operation for device peripheral
CN111739228A (en) Face recognition security system based on Internet of things and operation method
CN100393043C (en) Method and ststem for enforcing the administration policy of a system
CN116302989A (en) Pressure testing method and system, storage medium and computer equipment
CN203101932U (en) Power transformation equipment condition acquisition controller
CN112787863B (en) Remote operation and maintenance secure communication method and device and computer readable storage medium
CN104580507A (en) Field station data transmission and integration method
CN100395721C (en) System and method for centralized monitoring of limited program
CN109412861B (en) Method for establishing security association display of terminal network
CN104580508A (en) Field station data transmission and integration system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination