CN114387732B - Control method, control device, storage system and storage medium - Google Patents

Control method, control device, storage system and storage medium Download PDF

Info

Publication number
CN114387732B
CN114387732B CN202210081009.4A CN202210081009A CN114387732B CN 114387732 B CN114387732 B CN 114387732B CN 202210081009 A CN202210081009 A CN 202210081009A CN 114387732 B CN114387732 B CN 114387732B
Authority
CN
China
Prior art keywords
information
locker
target
user
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210081009.4A
Other languages
Chinese (zh)
Other versions
CN114387732A (en
Inventor
张溱雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BOE Technology Group Co Ltd
Ordos Yuansheng Optoelectronics Co Ltd
Original Assignee
BOE Technology Group Co Ltd
Ordos Yuansheng Optoelectronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BOE Technology Group Co Ltd, Ordos Yuansheng Optoelectronics Co Ltd filed Critical BOE Technology Group Co Ltd
Priority to CN202210081009.4A priority Critical patent/CN114387732B/en
Publication of CN114387732A publication Critical patent/CN114387732A/en
Application granted granted Critical
Publication of CN114387732B publication Critical patent/CN114387732B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/10Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property
    • G07F17/12Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property comprising lockable containers, e.g. for accepting clothes to be cleaned
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/10Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Abstract

The application discloses a control method and device of a storage system, the storage system and a storage medium. The control method comprises the following steps: acquiring authentication information of a user, determining identity information, position information and attendance information of the user according to the user authentication information, determining a target locker according to the position information, generating password information for opening the target locker, and sending the password information to a user terminal determined by the identity information. In the control method, the attendance and the storage cabinet are used as the related tie through an effective mechanism, and the nearby storage cabinet is generated immediately after attendance authentication to store articles, so that the intelligent management of staff attendance and storage is realized.

Description

Control method, control device, storage system and storage medium
Technical Field
The present disclosure relates to the field of intelligent control technologies, and in particular, to a control method and device for a storage system, and a storage medium.
Background
At present, many enterprises can set up a storage mechanism, staff swipes cards into the range of the enterprises to enter a storage room, change clothes or work shoes to enter an office area, and put unnecessary things in a personal locker, however, the current mode has some disadvantages: if the building area of the office area is large, the locker is usually located in various directions, the locker areas are far away from each other, the locker is distributed to individuals, staff is limited to enter the office area at a specific position, and each locker is assigned to the individual, so that the locker utilization rate is low, and as the company scale is enlarged and the staff grows, the locker resources are tense.
Disclosure of Invention
The present application aims to solve at least one of the technical problems existing in the prior art. For this reason, the application provides a control method of a storage system, a control device of the storage system, the storage system and a storage medium.
The control method of the storage system in the embodiment of the application comprises the following steps:
acquiring authentication information of a user;
determining identity information, position information and attendance information of a user according to the user authentication information;
determining a target locker according to the position information;
generating password information for opening the target locker; and
and sending the password information to the user terminal determined by the identity information.
In some embodiments, the determining the target locker based on the location information comprises:
determining an idle locker within a predetermined range of the location information;
and selecting one idle locker as the target locker.
In some embodiments, the selecting one of the free lockers is the target locker.
Determining a target idle locker which is not located in the same area with the previous target locker in the idle locker;
and selecting one target idle locker as the target locker.
In certain embodiments, the control method further comprises:
and sending the password information to the target locker so as to control the target locker to display prompt information.
In certain embodiments, the control method further comprises:
acquiring the use information of a target locker;
and generating cleaning information under the condition that the target locker is used.
In some embodiments, the authentication information includes any one of fingerprint information, face information, and iris information.
In some embodiments, the password information includes zone location number information, a password, and attendance information of the target locker.
The control device of the storage system according to the embodiment of the application includes:
the acquisition module is used for acquiring authentication information of the user;
the first determining module is used for determining identity information, position information and attendance information of the user according to the user authentication information;
the second determining module is used for determining a target locker according to the position information;
the generation module is used for generating password information for opening the target locker; and
and the sending module is used for sending the password information to the user terminal determined by the identity information.
The non-transitory computer readable storage medium of the embodiments of the present application includes a computer program that, when executed by a processor, causes the processor to execute the control method of the storage system described above.
In the control method, the control device, the storage system and the computer storage medium of the storage system, the user authentication information is obtained, and meanwhile, the distribution of the storage cabinet is realized through the user authentication information, so that redundancy of redundant storage cabinets is greatly reduced, waste of resources is effectively avoided, distribution of the storage cabinets can be more reasonably realized, and the utilization rate of enterprise resources is improved.
Additional aspects and advantages of embodiments of the application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of embodiments of the application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings, in which:
FIG. 1 is a flow chart of a method of controlling a storage system according to certain embodiments of the present application;
FIG. 2 is a block diagram of a control device of a storage system according to certain embodiments of the present application;
FIG. 3 is a flow chart of a method of controlling a storage system according to certain embodiments of the present application;
FIG. 4 is a flow chart of a method of controlling a storage system according to certain embodiments of the present application;
FIG. 5 is a flow chart of a method of controlling a storage system according to certain embodiments of the present application;
fig. 6 is a flow chart of a control method of a storage system according to some embodiments of the present application.
Detailed Description
Examples of embodiments of the present application are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The examples described below by referring to the drawings are illustrative and intended for the purpose of explaining the present application and are not to be construed as limiting the embodiments of the present application.
Along with gradual enhancement of enterprise informatization level, enterprises introduce various electronic informatization intelligent devices and systems to enhance enterprise information security, informatization office work, intelligent manufacturing and the like, and the application of large-scale electronic informatization intelligent devices and systems gradually enables staff attendance and storage to become important improvement indexes.
The large-scale company all can be equipped with attendance mechanism and storing mechanism, and staff swipes the card and gets into the company within range and get into the storing room, changes clothing or worker's shoes and get into the office area, puts the unnecessary thing in individual locker, and current traditional mode has some drawbacks: first: if staff records attendance checking through punching, the situation that the staff possibly has a substitute for brushing exists, and objective risk sharing exists; second,: because the factory building area is large, the locker is correspondingly built in each direction, the locker areas are far away from each other, if the locker is distributed to individuals, staff is limited to enter an office area from the area where the shoe cabinet is located, and the locker is limited greatly and is not flexible and convenient; third,: each locker belongs to individuals, so that the locker utilization rate is limited greatly, and staff leave or stay, which still occupy the locker, and the locker resources are strained along with the expansion of the company scale and the growth of staff; fourth,: in terms of security, the individual of each locker is controlled by a key, and if the key is lost or is picked up by other people to be unreturned, there is a great risk for the security of personal items.
In view of this, referring to fig. 1, the present application provides a control method of a storage system, the control method includes the steps of:
01, acquiring authentication information of a user;
02, determining identity information, position information and attendance information of the user according to the user authentication information;
03, determining a target locker according to the position information;
04, generating password information for opening the target locker; and
and 05, sending the password information to the user terminal determined by the identity information.
Referring to fig. 2, an embodiment of the present application provides a control device 10 of a storage system, where the control device 10 includes an obtaining module 11, a first determining module 12, a second determining module 13, a generating module 14, and a sending module 15.
Step 01 may be implemented by the acquisition module 11, step 02 may be implemented by the first determination module 12, step 03 may be implemented by the second determination module 13, step 04 may be implemented by the generation module 14, and step 05 may be implemented by the transmission module 15. Alternatively, the obtaining module 11 may be configured to obtain authentication information of the user; the first determining module 12 may be configured to determine identity information, location information, and attendance information of the user according to the user authentication information; the second determining module 13 is used for determining a target locker according to the position information; the generating module 14 may be configured to generate password information for opening the target locker, and the transmitting module 15 may be configured to transmit the password information to the user terminal determined by the identity information.
According to the storage system, the storage system comprises a processor and a memory, the memory stores a computer program, when the computer program is executed by the processor, the processor is used for acquiring authentication information of a user, determining identity information, position information and attendance information of the user according to the authentication information of the user, determining a target locker according to the position information, generating password information for opening the target locker, and sending the password information to a user terminal determined by the identity information.
In the control method, the control device 10 and the storage system of the embodiment of the application, the user authentication information is obtained to carry out attendance checking, and meanwhile, the storage cabinet is distributed through the user authentication information, so that the user can store articles conveniently. Therefore, redundancy of the redundant storage cabinets is greatly reduced, waste of resources is effectively saved, distribution of the storage cabinets can be reasonably achieved, and utilization rate of enterprise resources is improved.
In some embodiments, the control device 10 may be part of a storage system. Alternatively, the storage system includes a control device 10. For example, the control device 10 may be a discrete component assembled in a manner to have the aforementioned functions, or a chip having the aforementioned functions in the form of an integrated circuit, or a computer software code segment that when run on a computer causes the computer to have the aforementioned functions.
Specifically, the storage system also comprises an information acquisition device and a storage cabinet. The processor and the memory may be provided in the information collecting device, i.e. the information collecting device comprises a processor and a memory. Of course, in other examples, the processor and storage may be separate from the information gathering device.
The information acquisition equipment can include a plurality of, and a plurality of information acquisition equipment can be in different regions respectively, and the specific quantity of information acquisition equipment is not limited, can set up according to actual demand. The information collecting device may be an attendance checking device, that is, the information collecting device is configured to collect authentication information of a user for attendance checking. The authentication information may include, but is not limited to, fingerprint information, iris attendance, face image information, etc. of the user, that is, the attendance mode may be, but is not limited to, fingerprint attendance, iris attendance, face recognition attendance, etc. The information gathering device may include one or more of a fingerprint identification attendance device, a face recognition attendance device, or an iris identification attendance device. For example, in this embodiment, the information collecting device may be illustrated by using an iris recognition attendance checking device as an example, and it may be understood that the iris attendance checking mechanism reduces the risk of objective replacement of the card-swiping and the leakage-swiping existing in the traditional enterprise card-swiping attendance checking, so that the enterprise is convenient for accurately checking the employee work record.
The locker can comprise a plurality of lockers, and the locker can comprise a password input device, a door lock controller, a magnetic lock and the like. The password input device receives a password input by a user and sends the received instruction information to the processor, so that the processor can make a password correct and incorrect judgment through the password. The magnetic lock is used for controlling the opening of the storage cabinet door, and is installed on the storage cabinet door, and the door lock controller is used for opening the magnetic lock on the storage cabinet door under the condition of the received unlocking instruction.
The processor may acquire iris information of the user from the information acquisition device, and may determine location information when the iris information is acquired according to the iris information, for example, the information acquisition device may include a device A, B, C, D, and four devices are respectively distributed at four locations numbered 1, 2, 3, and 4, if the processor receives iris information of the device a, the processor may determine that the user is at the location 1 according to the iris information, and if the processor receives iris information of the device C, the processor may determine that the user is at the location 3 according to the iris information.
Further, the memory may store iris information, communication information, other user related information, etc. entered in advance by the user. The processor can compare the received iris information with the iris information stored in the memory in advance, and if the comparison and verification are passed, the processor can determine the identity information of the user, generate the attendance information of the identity information of the user and update the attendance record. If the comparison verification fails, the steps can be repeated to acquire iris information of the user again, and then the iris information is compared with the pre-iris information for verification.
And further, after the position information of the user is obtained, the processor takes the nearby locker of the user as the target locker according to the position information of the user, distributes the locker to the user and generates password information for opening the target locker. Wherein. The password information may include area location number information, password, attendance information, etc. of the target locker. The password can be a randomly generated 6-digit password used for starting the target locker. In addition, the processor can adopt JAVA language to realize the development and interface design of generating the password information for opening the target locker.
It can be understood that after checking in and authenticating, the user can receive the password information with the information such as the locker number and the locker opening password of the staff, so that the locker is controlled to be opened and closed through the password, and compared with the traditional key for controlling, the safety risk caused by losing the key or picking up the key by other people is avoided.
For example, in some examples, where the user is located in zone a, then a zone a 037 (zone location number information) locker is allocated to the user, and the generated password information may be: personnel XXX passes the attendance authentication, and the distribution locker is a locker A region 037 (region position number information) and the locker opening password is 652349".
And finally, the processor matches the communication address of the corresponding user terminal in the memory according to the user identity information, sends the password information to the user terminal, so that the user can look up the password information on the user terminal, find the target locker according to the region position number information in the password information, input the password from the password input device of the locker, send the received password to the processor, verify by the processor, generate an unlocking instruction and send the unlocking instruction to the door lock controller of the target locker if the password verification is correct, and enable the door lock controller to open the magnetic lock on the door of the target locker under the condition of the received unlocking instruction so as to open the target locker.
Therefore, when the attendance is realized, the efficient utilization of the storage cabinet can be realized, the problem that the conventional storage cabinet key is opened and the hidden danger and the resource waste caused by fixed action are avoided.
Referring to fig. 3, in some embodiments, step 03 includes the sub-steps of:
031, determining free lockers within a predetermined range of location information;
032, selecting an idle locker as a target locker.
With further reference to fig. 2, in some embodiments, sub-steps 021-022 may be implemented by the second determination module 13. That is, the second determining module 13 may be configured to determine free lockers within a predetermined range of location information, and select one free locker as the target locker.
In some embodiments, the processor may be configured to determine free lockers that are within a predetermined range of location information, and select one free locker as the target locker.
Therefore, the idle locker in the preset range of the user is used as the target locker, so that the user can conveniently store things in the nearby area after checking in, and the user can freely select to enter the office area from any direction instead of entering the user from the specific position only, and the user experience is improved.
Referring to fig. 4, in some embodiments, step 032 includes the sub-steps of:
0321, determining a target idle locker which is not located in the same area with the previous target locker in the idle locker;
0322 selecting a target idle locker as the target locker.
With further reference to fig. 2, in some embodiments sub-steps 0321-0322 may be implemented by the second determination module 13. That is, the second determining module 13 may be configured to determine a target free locker that is not located in the same area as the previous target locker in the free lockers, and select one target free locker as the target locker.
In some embodiments, the processor may be configured to determine a target free locker of the free lockers that is not in the same area as the previous target locker, and select one of the target free lockers as the target locker.
It should be noted that, the last target locker refers to a locker allocated by a last attendance person located at the same attendance position as the current user. For example, at the first attendance location, the locker assigned by the previous attendance person prior to the current attendance person is the last target locker.
By sequentially distributing the idle lockers in different areas as the target lockers to the users who check in the attendance, the users who check in the attendance sequentially can store related articles in different areas, so that a plurality of users can be prevented from searching the target lockers in the same area after receiving the password information of the target lockers, and the efficiency of the users for searching the target lockers is improved.
Specifically, the processor may sequentially assign the lockers according to the region in which the locker is located, so that the locker in a region different from the previous one is assigned to the user each time. For example, in some examples, if the region of the locker may include a/B/C/D/E …, the locker may be divided according to the region division, one of the free lockers in the region a is assigned to the current attendance person as the target locker, one of the free lockers in the region B is assigned to the subsequent attendance person as the target locker, and one of the free lockers in the region C is assigned to the subsequent attendance person as the target locker. Therefore, people entering in the same time period can not be stored in one area, and the situation that attendance checking staff are jammed in the same area is avoided.
Referring to fig. 5, in some embodiments, the control method further includes the steps of:
06, sending the password information to the target locker to control the target locker to display the prompt information.
With further reference to fig. 2, in some embodiments, step 06 may be implemented by the sending module 15. That is, the sending module 15 may be configured to send the password information to the target locker to control the target locker to display the prompt information.
In some embodiments, the processor may be configured to send a password message to the target locker to control the target locker to display a prompt message.
It should be noted that each storage cabinet includes an indicator light and an indicator light controller, where the indicator light controller may also backup the physical location of each storage cabinet (e.g. a region 037). After the processor sends the password information to the target locker, the indicator light controller can check the regional position number information (such as A region 037) and the physical position of the locker, and if the check is successful, the indicator light can be generated to be triggered to light. Therefore, the target locker can be conveniently and quickly found by sending the password information to the target locker, and user experience is improved.
Further, the password is automatically extinguished when the user inputs password authentication or when the service is overtime (e.g., no password information is received for 5 minutes).
In addition, in some examples, after the target locker receives the control information, the door lock controller may further perform comparison verification according to the password in the control information and the password received by the password input unit, and if verification is successful, the magnetic lock on the locker door is opened to open the target locker.
Referring to fig. 6, in some embodiments, the control method further includes:
07, obtaining the use information of the target locker;
and 08, generating cleaning information under the condition that the target locker is used.
In some embodiments, step 07 may be implemented by the acquisition module 110 and step 08 may be implemented by the generation module 140. Alternatively, the obtaining module 110 may be configured to obtain usage information of the target locker, and the generating module 140 may be configured to generate the cleaning information when the target locker is used.
In some embodiments, the processor may be configured to obtain information about the use of the target locker and generate the cleaning information in the event of use of the target locker.
Specifically, the locker may further include a cleaning application input unit and a cleaning warning controller, after the user presses the cleaning application input unit, the processor may receive usage information of the locker, thereby generating cleaning information, and send the cleaning information to the cleaning warning controller of the corresponding target locker, so that the cleaning warning controller sends a cleaning warning, and sends the cleaning warning to a maintenance history background form, and after receiving the warning, a corresponding cleaning person timely performs maintenance cleaning, and in addition, the cleaning information may be sent to the storage for recording.
The embodiments of the present application also provide a non-transitory computer readable storage medium containing a computer program, which when executed by a processor, causes the processor to execute the control method of the storage system and the training method of the image processing algorithm model.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any other combination. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a digital video disc (digital video disc, DVD)), or a semiconductor medium (e.g., a Solid State Disk (SSD)), or the like.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the embodiments of the present application.
In the several embodiments provided in this application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The foregoing is merely specific embodiments of the present application, but the scope of the embodiments of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes or substitutions are intended to be covered by the scope of the embodiments of the present application. Therefore, the protection scope of the embodiments of the present application shall be subject to the protection scope of the claims.

Claims (8)

1. A method of controlling a storage system, the method comprising:
acquiring authentication information of a user, including: acquiring authentication information of a user through attendance checking equipment;
determining identity information, position information and attendance information of a user according to the user authentication information;
determining a target locker according to the position information;
generating password information for opening the target locker; and
transmitting the password information to the user terminal determined by the identity information;
the determining the target locker according to the position information comprises the following steps: determining an idle locker within a predetermined range of the location information; selecting one idle locker as the target locker;
selecting one idle locker as the target locker; determining a target idle locker which is not located in the same area with the previous target locker in the idle locker; and selecting one target idle locker as the target locker.
2. The control method according to claim 1, characterized in that the control method further comprises:
and sending the password information to the target locker so as to control the target locker to display prompt information.
3. The control method according to claim 1, characterized in that the control method further comprises:
acquiring the use information of a target locker;
and generating cleaning information under the condition that the target locker is used.
4. The control method according to claim 1, wherein the authentication information includes any one of fingerprint information, face information, and iris information.
5. The control method of claim 1, wherein the password information comprises zone location number information, a password, and attendance information of the target locker.
6. A control device for a storage system, comprising:
the acquisition module is used for acquiring authentication information of the user, and comprises the following steps: acquiring authentication information of a user through attendance checking equipment;
the first determining module is used for determining identity information, position information and attendance information of the user according to the user authentication information;
the second determining module is used for determining a target locker according to the position information;
the generation module is used for generating password information for opening the target locker; and
the sending module is used for sending the password information to the user terminal determined by the identity information;
the determining the target locker according to the position information comprises the following steps: determining an idle locker within a predetermined range of the location information; selecting one idle locker as the target locker;
selecting one idle locker as the target locker; determining a target idle locker which is not located in the same area with the previous target locker in the idle locker; and selecting one target idle locker as the target locker.
7. A storage system comprising a processor and a memory, the memory storing a computer program which, when executed by the processor, causes the processor to perform the method of controlling a storage system as claimed in any one of claims 1 to 5.
8. A non-transitory computer readable storage medium containing a computer program, characterized in that the computer program, when executed by a processor, causes the processor to perform the control method of the storage system of any one of claims 1-5.
CN202210081009.4A 2022-01-24 2022-01-24 Control method, control device, storage system and storage medium Active CN114387732B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210081009.4A CN114387732B (en) 2022-01-24 2022-01-24 Control method, control device, storage system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210081009.4A CN114387732B (en) 2022-01-24 2022-01-24 Control method, control device, storage system and storage medium

Publications (2)

Publication Number Publication Date
CN114387732A CN114387732A (en) 2022-04-22
CN114387732B true CN114387732B (en) 2023-06-16

Family

ID=81203910

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210081009.4A Active CN114387732B (en) 2022-01-24 2022-01-24 Control method, control device, storage system and storage medium

Country Status (1)

Country Link
CN (1) CN114387732B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116527435A (en) * 2022-11-30 2023-08-01 深圳开鸿数字产业发展有限公司 Control method of storage system, storage system and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002129795A (en) * 2000-10-20 2002-05-09 Alpha Corp Locker device
CN205644692U (en) * 2016-03-30 2016-10-12 广州意合信息科技有限公司 Large -scale locker opening control system
CN112215559A (en) * 2020-12-10 2021-01-12 浙江口碑网络技术有限公司 Cabinet grid distribution method, device and system of intelligent cabinet
CN112288903A (en) * 2020-11-20 2021-01-29 中科三清科技有限公司 Card punching system, method and equipment

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3560327B2 (en) * 2000-06-16 2004-09-02 株式会社フルタイムシステム Locker system
US6879243B1 (en) * 2002-02-14 2005-04-12 Penco Products, Inc. Electronically-controlled locker system
JP2006185315A (en) * 2004-12-28 2006-07-13 Tokai Riken Kk Security system
JP3852859B1 (en) * 2005-07-07 2006-12-06 義一 高崎 Locking assist system, lock assist device
CN105184879B (en) * 2015-04-30 2018-02-13 北京天诚盛业科技有限公司 The methods, devices and systems of bio-identification work attendance
CN106683244B (en) * 2016-12-21 2020-03-27 上海斐讯数据通信技术有限公司 Key distribution system and key distribution transceiving method
CN108648366A (en) * 2018-05-18 2018-10-12 希梦科技(深圳)有限公司 A kind of storing method and system of locker
CN109064675A (en) * 2018-07-23 2018-12-21 巢包物联网科技(上海)有限公司 Luggage Deposit verification method, device and intelligent inbox
JP2021128513A (en) * 2020-02-13 2021-09-02 グローリー株式会社 Staff management system, management device, and staff management method
CN213545339U (en) * 2020-11-28 2021-06-25 滁州职业技术学院 Construction monitoring system based on bim technology

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002129795A (en) * 2000-10-20 2002-05-09 Alpha Corp Locker device
CN205644692U (en) * 2016-03-30 2016-10-12 广州意合信息科技有限公司 Large -scale locker opening control system
CN112288903A (en) * 2020-11-20 2021-01-29 中科三清科技有限公司 Card punching system, method and equipment
CN112215559A (en) * 2020-12-10 2021-01-12 浙江口碑网络技术有限公司 Cabinet grid distribution method, device and system of intelligent cabinet

Also Published As

Publication number Publication date
CN114387732A (en) 2022-04-22

Similar Documents

Publication Publication Date Title
CN106887064B (en) Access controller based on dynamic password and access control system
US6971029B1 (en) Multi-ringed internet co-location facility security system and method
CN104240342B (en) Access control method and device based on identity authentication
US20100316262A1 (en) Biometric matching system and biometric matching method
KR100893905B1 (en) Method and system for managing entrance using biometrics
US20130046800A1 (en) Systems for Distributed Secure Storage of Personal Data, In Particular Biometric Impressions, and System, Local Device, and Method for Monitoring Identity
KR20140043082A (en) System and method for user access of dispensing unit
CN201508555U (en) Internet bar management system based on face recognition
US20220108576A1 (en) Gate open/close control device and gate open/close control method
CN106104548B (en) Integrated access control and identity management system
CN101847279A (en) Network human face recognition system with intelligent management system and recognition method thereof
US20070061272A1 (en) Access administration system and method for a currency compartment
CN104637184A (en) Medical storage control method and system based on human face recognition
US20080183707A1 (en) Verification Apparatus, Verification Method and Verification Program
US20220147604A1 (en) Facial authentication management server and facial authentication management method
US11893844B2 (en) Face authentication machine and face authentication method
US20210407234A1 (en) Methods and systems for offline verification code generation based on smart door lock system
US20220147994A1 (en) Face authentication system and face authentication method
US20200098208A1 (en) Security control device, security control method, security system and storage medium
US20130194433A1 (en) Imaging processing system and method and management apparatus
CN114387732B (en) Control method, control device, storage system and storage medium
CN109035507A (en) A kind of intelligent key management system based on loss protecting
CN108182743A (en) A kind of face identification system
CN108364376A (en) A kind of gate inhibition and integrated Work attendance method of checking card
CN111739228A (en) Face recognition security system based on Internet of things and operation method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant