CN115550103B - Control method of storage system, storage system and storage medium - Google Patents

Control method of storage system, storage system and storage medium Download PDF

Info

Publication number
CN115550103B
CN115550103B CN202211515705.8A CN202211515705A CN115550103B CN 115550103 B CN115550103 B CN 115550103B CN 202211515705 A CN202211515705 A CN 202211515705A CN 115550103 B CN115550103 B CN 115550103B
Authority
CN
China
Prior art keywords
terminal
target
virtual key
equipment
storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211515705.8A
Other languages
Chinese (zh)
Other versions
CN115550103A (en
Inventor
张明杨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Kaihong Digital Industry Development Co Ltd
Original Assignee
Shenzhen Kaihong Digital Industry Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Kaihong Digital Industry Development Co Ltd filed Critical Shenzhen Kaihong Digital Industry Development Co Ltd
Priority to CN202310499842.5A priority Critical patent/CN116527435A/en
Priority to CN202211515705.8A priority patent/CN115550103B/en
Publication of CN115550103A publication Critical patent/CN115550103A/en
Application granted granted Critical
Publication of CN115550103B publication Critical patent/CN115550103B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L12/40169Flexible bus arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to the field of intelligent storage cabinets, and specifically provides a control method of a storage system, the storage system and a storage medium, wherein the storage system comprises a plurality of storage devices and a plurality of terminal devices, the storage devices and the terminal devices are connected through a distributed soft bus, and the storage devices share a permission control table, and the control method comprises the following steps: when receiving a control authority request sent by a terminal device, the target storage device judges whether the control authority can be distributed to the terminal device according to an authority control table, wherein the target storage device is any one of a plurality of storage devices; if the control authority can be distributed to the terminal equipment, the target storage equipment generates a target virtual key according to the control authority request, and the target virtual key is stored in a virtual key comparison table of the target storage equipment; the target storage equipment sends the target virtual key to the corresponding terminal equipment, and the terminal equipment obtains the control authority of the target storage equipment through the target virtual key.

Description

Control method of storage system, storage system and storage medium
Technical Field
The application relates to the field of intelligent storage cabinets, in particular to a control method of a storage system, the storage system and a storage medium.
Background
At present, the storage equipment management system connects a data management end of storage equipment with a router, so that the data management end of the storage equipment is connected with a plurality of other terminal equipment through a local area network, then the router, a switch and a remote server are connected with each other, and finally the remote server is connected with a database and face recognition cloud service, so that the remotely connected terminal equipment manages the storage equipment.
The existing storage equipment management system is usually managed by a single terminal equipment, and the management system only has a single terminal equipment, and manages all storage equipment through the terminal equipment, so that the management mode of the single terminal equipment has two defects: if the terminal equipment fails, the whole system cannot work normally; secondly, if a plurality of managers need to manage part of storage devices in the same batch, a single terminal device cannot meet the actual scene requirement.
Disclosure of Invention
The application provides a control method of a storage system, the storage system and a storage medium, which are used for improving the management efficiency of the storage system and also used for guaranteeing the stability of the storage system.
In a first aspect, the present application provides a control method of a storage system, where the storage system includes a plurality of storage devices and a plurality of terminal devices, the storage devices include one or more storage spaces, the storage devices are loaded with a preset operating system, the terminal devices are also loaded with the operating system, based on the operating system, the plurality of storage devices and the plurality of terminal devices are connected through a distributed soft bus, the storage devices store a virtual key comparison table, the virtual key comparison table is used for recording a generated and allocated virtual key and a terminal device corresponding to the virtual key, the plurality of storage devices share a permission control table, and the permission control table is used for recording control permissions of the storage devices obtained by the terminal devices and usage information of the control permissions; the control method comprises the following steps:
When receiving a control authority request sent by the terminal equipment, the target storage equipment judges whether the control authority can be distributed to the terminal equipment according to the authority control table, wherein the target storage equipment is any one of a plurality of storage equipment;
if the control authority of the target storage equipment can be distributed to the terminal equipment, the target storage equipment generates a target virtual key according to the control authority request, and the target virtual key is stored in a virtual key comparison table of the target storage equipment;
the target storage equipment sends the target virtual key to the corresponding terminal equipment, the terminal equipment obtains the control authority of the target storage equipment through the target virtual key, and the terminal equipment at least comprises a first terminal equipment and a second terminal equipment;
the first terminal device sends an authority transfer request to a super terminal to transfer the control authority of the target storage device to a second terminal device, wherein the super terminal is used for changing the virtual key comparison table;
the super terminal receives the permission transfer request, and determines whether to allow the first terminal device to transfer the control permission of the target storage device to the second terminal device according to the permission control table and the permission transfer request;
If the permission is allowed, the first terminal equipment sends a permission transfer request of the target storage equipment to the second terminal equipment, wherein the permission transfer request comprises a first target virtual key of the target storage equipment, the first terminal equipment obtains the control permission of the target storage equipment, the first terminal equipment is one of a plurality of terminal equipment in the storage system, and the second terminal equipment is the other one of the plurality of terminal equipment in the storage system;
if the second terminal equipment receives the permission transfer request, the second terminal equipment obtains the first target virtual key; the target storage device updates the virtual key comparison table and changes the terminal device corresponding to the first target virtual key into the second terminal device.
In a second aspect, the present application provides a control method of a storage system, where the storage system includes a plurality of storage devices and a plurality of terminal devices, the storage devices include one or more storage spaces, the storage devices are loaded with a preset operating system, the terminal devices are also loaded with the operating system, based on the operating system, the plurality of storage devices and the plurality of terminal devices are connected through a distributed soft bus, and the storage devices store a virtual key comparison table, where the virtual key comparison table is used to record a virtual key that has been generated and allocated and a terminal device corresponding to the virtual key; the control method comprises the following steps:
When receiving a control authority request sent by the terminal equipment, the target storage equipment generates a target virtual key according to the control authority request, and stores the target virtual key in a virtual key comparison table of the target storage equipment, wherein the target storage equipment is any one of a plurality of storage equipment;
the target storage equipment sends the target virtual key to the corresponding terminal equipment, the terminal equipment obtains the control authority of the target storage equipment through the target virtual key, and the terminal equipment at least comprises a first terminal equipment and a second terminal equipment;
the method comprises the steps that a first terminal device sends a permission transfer request of target storage equipment to a second terminal device, wherein the permission transfer request comprises a first target virtual key of the target storage equipment, the first terminal device obtains control permission of the target storage equipment, the first terminal device is one of a plurality of terminal devices in a storage system, and the second terminal device is the other one of the plurality of terminal devices in the storage system;
if the second terminal equipment receives the permission transfer request, the second terminal equipment obtains the first target virtual key; the target storage device updates the virtual key comparison table and changes the terminal device corresponding to the first target virtual key into the second terminal device.
In a third aspect, the present application provides a storage system, where the storage system includes a plurality of storage devices and a terminal device, where the storage devices include one or more storage spaces, where the storage devices are mounted with a preset operating system, and the terminal device is also mounted with the operating system, and based on the operating system, the plurality of storage devices and the plurality of terminal devices are connected through a distributed soft bus; the storage device and the terminal device both comprise a memory and a processor;
the memory is used for storing a computer program;
the processor is configured to execute the computer program and implement a control method of the storage system according to any one of the embodiments of the present application when the computer program is executed.
In a fourth aspect, the present application provides a computer readable storage medium storing a computer program which, when executed by a processor, causes the processor to implement a method of controlling a storage system as any one of the embodiments provided herein.
According to the method, the storage system is formed by connecting a plurality of storage devices and a plurality of terminal devices through the distributed soft buses, control authorities of the storage devices and service condition information of the control authorities are shared among the storage devices through the distributed soft buses, so that an authority control table is formed, the target storage devices judge whether the control authorities can be distributed to the terminal devices according to the authority control table through a control method of the storage system, if so, a target virtual key is generated, a virtual key comparison table is updated according to the target virtual key, the target virtual key is sent to the corresponding terminal devices, and the terminal devices obtain the control authorities of the target storage devices through the target virtual key.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a first storage system provided in an embodiment of the present application;
FIG. 2 is a schematic flow chart of a control method of a first storage system according to an embodiment of the present application;
FIG. 3 is a second storage system provided in an embodiment of the present application;
FIG. 4 is a schematic flow chart of a control method of a second storage system according to an embodiment of the present disclosure;
FIG. 5 is a third storage system provided in an embodiment of the present application;
FIG. 6 is a schematic flow chart of a control method of a third storage system according to an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of a storage device according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
It should be noted that the description herein of "first," "second," etc. is for descriptive purposes only and is not to be construed as indicating or implying a relative importance or implying an indication of the number of technical features being indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature.
Reference in the specification to "one embodiment" or "some embodiments" or the like means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," and the like in various places are not necessarily all referring to the same embodiment, but mean "one or more but not all embodiments" unless expressly specified otherwise. The terms "comprising," "including," "having," and variations thereof mean "including but not limited to," unless expressly specified otherwise.
In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be regarded as not exist and not within the protection scope of the present application.
The flow diagrams depicted in the figures are merely illustrative and not necessarily all of the elements and operations/steps are included or performed in the order described. For example, some operations/steps may be further divided, combined, or partially combined, so that the order of actual execution may be changed according to actual situations.
Generally, in order to ensure the safety of access, a user is required to perform operations on site, such as code scanning on site, or positioning and confirming terminal devices for managing the storage device, so that the time required for accessing the objects is increased, and the use experience of the user is reduced. The distributed soft bus technology has the characteristics of autonomous discovery and autonomous connection of the near field equipment, and can realize rapid access and authentication of the near field equipment, so that the distributed soft bus technology is more suitable for managing storage equipment than the traditional technology, the reliability of safety authentication is ensured, the steps of storing and taking articles are simplified, the operation time of a user is shortened, and the use experience of the user is improved.
According to the method and the device, the scene requirement of the storage equipment is cooperatively managed by a plurality of terminal equipment, the multi-terminal communication link is built through the distributed soft bus technology of the distributed system, and the control authority of the storage equipment is unified and integrated, so that the control authority is refined, multi-terminal cooperation interconnection is realized, and the effect of common control is achieved. The operating system installed on the storage device and the terminal device in the application comprises an open source hong Mongolian operating system, such as Kaihong OS.
The distributed soft bus technology can realize unified distributed communication management capability among near field devices and provide discovery connection, networking and transmission capability among devices without distinguishing links.
The embodiment of the application provides a control method of a storage system, the storage system and a storage medium, wherein the storage system for executing the control method is formed by connecting a plurality of storage devices and a plurality of terminal devices through a distributed soft bus, the control rights of the storage devices and the service condition information of the control rights are shared among the plurality of storage devices through the distributed soft bus connection so as to form a rights control table, the target storage device judges whether the control rights can be distributed to the terminal devices according to the rights control table through the control method of the storage system, if so, a target virtual key is generated, the virtual key is updated according to the target virtual key, the target virtual key is sent to the corresponding terminal devices, and the terminal devices acquire the control rights of the target storage devices through the target virtual key.
Specifically, the application provides a storing system, storing system includes a plurality of storing equipment and a plurality of terminal equipment, storing equipment includes one or more storing space, storing equipment includes the control panel, the control panel carries on and has preset operating system, terminal equipment also carries on operating system, a plurality of storing equipment and a plurality of terminal equipment pass through distributed soft bus connection based on operating system, wherein, storing equipment can receive the control information of a plurality of terminal equipment to carry out the operation that control information corresponds, say get the operation of thing and placing article.
According to the storage system, the plurality of terminal devices are jointly managed through the distributed soft bus, a plurality of users can manage the storage devices at the same time, the defect that a system controlled by a single terminal device is easy to collapse is avoided, efficient near-field information interaction management is further realized, management efficiency of the storage devices is improved, and use experience of the users is improved.
The storage system further comprises a super terminal, the super terminal is connected with the storage device through the distributed soft bus, the super terminal can be arranged in the storage device, and can also be installed in the signal range of the distributed soft bus as an independent device, and the super terminal is used for managing the storage device, for example, modifying the permission control table.
As shown in fig. 1, the first storage system provided in the present application includes a plurality of terminal devices (terminal device 1, terminal device 2, and terminal device 3), a plurality of storage devices (storage device 1, storage device 2, and storage device 3), and a super terminal, where each of the storage device 1, storage device 2, and storage device 3 may include one or more storage spaces. And in the signal range of the distributed soft bus, a plurality of terminal devices, a plurality of storage devices and a super terminal are communicated.
The control method provided by the application can be applied to storage equipment and terminal equipment in a storage system, wherein the terminal equipment can be any one of a mobile phone, a camera, a tablet personal computer, wearable equipment, vehicle-mounted equipment, augmented reality (augmented reality, AR)/Virtual Reality (VR) equipment, a notebook computer, a Personal Computer (PC), a netbook and a personal digital assistant (personaldigital assistant, PDA), and the embodiment of the application is not limited.
Based on an operating system, a plurality of storage devices and a plurality of terminal devices are connected through a distributed soft bus, the storage devices are stored with a virtual key comparison table, the virtual key comparison table is used for recording generated and distributed virtual keys and terminal devices corresponding to the virtual keys, the storage devices share an authority control table, and the authority control table is used for recording control authorities of the storage devices obtained by the terminal devices and service condition information of the control authorities.
Referring to fig. 2, the control method of the first storage system provided in the embodiment of the present application includes steps S101 to S103.
S101, when receiving a control authority request sent by a terminal device, the target storage device judges whether the control authority can be distributed to the terminal device according to an authority control table, wherein the target storage device is any one of a plurality of storage devices.
In the range of the distributed soft bus, a plurality of storage devices are associated with each other through the distributed soft bus, and each storage device maintains a virtual key comparison table belonging to the storage device, wherein the virtual key comparison table is used for recording the generated and distributed virtual key and the terminal device corresponding to the virtual key. The plurality of storage devices share data of the virtual key comparison table through the distributed soft bus to form an authority control table, wherein the authority control table is used for recording control authorities of the storage devices and service condition information of the control authorities obtained by the terminal devices, and the service condition information of the control authorities comprises but is not limited to: the terminal equipment capable of acquiring the control authority and the time limit corresponding to the control authority.
When the terminal equipment of the user enters the signal range of the distributed soft bus, the terminal equipment and the storage equipment are connected with each other. The terminal equipment is also provided with an application program for managing the storage equipment, a user can select target storage equipment to be connected through an application interface of the application program, the terminal equipment responds to the selection operation of the user, generates a control authority request and sends the control authority request to the target storage equipment, and the target storage equipment is any one of a plurality of storage equipment. When receiving a control authority request sent by a terminal device, the target storage device queries an authority control table to judge whether the terminal device sending the control authority request is a terminal device capable of acquiring control authority.
In some embodiments, the multiple storage devices may further share the virtual key comparison table stored in the multiple storage devices to the super terminal based on the distributed soft bus, and the super terminal generates the permission control table according to the multiple virtual key comparison tables and sends the permission control table to the corresponding storage device.
It should be noted that, the essence of the virtual key comparison table and the authority control table in the present application is computer data, and not only the data format of the table, but also other data formats are possible, which is not limited herein.
Through setting up super terminal and permission control table, can prevent that the control permission of storing equipment from being directly obtained, when being applied to the storing system in public place, for example, deposit the play storing equipment of express delivery in the resident community, improved storing system's security, prevent that user's article from being taken out at will.
S102, if the control authority can be distributed to the terminal equipment, the target storage equipment generates a target virtual key according to the control authority request, and the target virtual key is stored in a virtual key comparison table of the target storage equipment.
After receiving the control permission request, the target storage device queries a permission control table, and judges whether the terminal device sending the control permission request is a terminal device capable of acquiring control permission according to the permission control table, specifically, the control permission request comprises terminal device information of the corresponding terminal device, the terminal device information is an identity of the terminal device, the permission control table records service condition information of the control permission, and the service condition information comprises storage device information of each storage device, terminal device information and a control permission pairing relation between the storage device information and the terminal device information. In the authority control table, one piece of storage equipment information can be paired with a plurality of pieces of terminal equipment information, namely, the control authority of one piece of storage equipment can be obtained by a plurality of pieces of terminal equipment; one piece of terminal equipment information can be paired with a plurality of pieces of storage equipment information, namely, one piece of terminal equipment can obtain the control authority of a plurality of pieces of storage equipment.
And the target storage equipment inquires the permission control table, if the terminal equipment information received in the permission request and the storage equipment information of the target storage equipment have a pairing relation, a target virtual key is generated, and the target virtual key is sent to the terminal equipment of the permission control request. If the terminal equipment information in the received permission request and the storage equipment information of the terminal equipment information do not have a pairing relation, generating notification information of failure request, and sending the notification information to the terminal equipment of the permission control request.
In some embodiments, if the target storage device cannot allocate its control authority to the terminal device, the terminal device further sends a control authority request to the super terminal, where the control authority request includes terminal device information of the terminal device, and the super terminal is configured to change the virtual key comparison table; if the super terminal receives the control authority request, judging whether the control authority of the target storage equipment can be distributed to the terminal equipment; if the control authority of the target storage equipment can be distributed to the terminal equipment, the super terminal sends the terminal equipment information to the target storage equipment, so that the target equipment updates the virtual key comparison table according to the terminal equipment information.
For example, if the terminal device receives notification information of failure request or the terminal device fails to receive the target virtual key within a preset time, the terminal device generates a control permission application window, the user can operate in the permission control window, and the terminal device responds to the operation of the user and sends a control permission request to the super terminal. The super terminal judges whether the terminal equipment allows obtaining the authority of the target storage equipment, if so, the terminal equipment information is sent to the target storage equipment, the target storage equipment modifies the virtual key comparison table according to the terminal equipment information, or the terminal equipment directly modifies the authority control table, and at the moment, the terminal equipment can obtain the control authority of the target storage equipment only by sending an application to the target storage equipment again; if not, returning to the application failure notification. The embodiment can be used for realizing the authentication of the terminal equipment which does not incorporate the distributed soft bus, and because the initial authority control table is written into the storage equipment by the super terminal operated by the manager, the initial authority control table cannot comprise all terminal equipment information, especially the terminal equipment which does not incorporate the distributed soft bus, and therefore the mechanism is needed to finish the authentication of the new equipment. In this way, the compatibility of the storage system can be improved.
S103, the target storage equipment sends the target virtual key to the corresponding terminal equipment, and the terminal equipment obtains the control authority of the target storage equipment through the target virtual key.
For example, each target virtual key generated by the target storage device is unique, the target storage device sends the target virtual key to the corresponding terminal device, the relationship between the target virtual key and the terminal device is recorded in the virtual key comparison table, and the terminal device can be connected with the target virtual key through the corresponding target virtual key; when the terminal device is connected with the target storage device through the target virtual key of the other terminal devices, the connection fails because the authentication based on the virtual key control table cannot be passed through the target storage device.
In some embodiments, the plurality of terminal devices can each obtain the control authority of the target storage device.
Specifically, the target storage device generates a plurality of target virtual keys, each of which is different, and sends the plurality of target virtual keys to a corresponding plurality of terminals, respectively. When the plurality of terminal devices all have the target virtual secret key of the target storage device, the plurality of terminal devices can simultaneously acquire the control authority of the target storage device through the respective target virtual secret keys, namely the plurality of terminal devices can simultaneously manage the target storage device. The embodiment can be applied to scenes of multiple persons simultaneously managing the storage equipment, so that the efficiency of storing and taking articles in the storage equipment is improved, and the use experience of a user is improved.
In some embodiments, after the terminal device obtains the target virtual key, the terminal device sends the target virtual key to the target storage device; and when the target storage equipment receives the control key, authenticating the terminal equipment according to the control key and the updated virtual key comparison table, and establishing communication connection with the terminal equipment after the authentication is passed so that the terminal equipment can control the target storage equipment.
When the control authority of the storage device is inquired to be consistent with the virtual secret key and the information of the terminal device, the communication connection can be realized in a distributed soft bus mode, and the terminal device controls the storage device through the communication connection, for example, controls the opening or closing of a storage space of the storage device.
For example, the articles of multiple users are stored in different storage spaces of the same target storage device, in the time period of peak flow of the person waiting for work, the situation that multiple users take articles simultaneously may occur, and the existing article taking method needs identity authentication of the users, for example, two-dimension codes are scanned or confirmed on an APP, and then the users are allowed to take articles one by one, so that the users need to queue, the more the number of people in the queue of the users, the longer the time needed by the users to take articles out. The management authority is given to the terminal equipment of a plurality of users through the target virtual key, so that the simultaneous fetching of the plurality of users can be realized, the queuing time of the users is greatly reduced, the use efficiency of the storage equipment is improved, and the use experience of the users is improved. According to the different control authorities corresponding to the target virtual keys, the method and the device can be applied to other scenes, for example, the method and the device allow couriers to store articles and users to take out articles simultaneously, or allow multiple couriers to store articles simultaneously, and are beneficial to improving the use efficiency of storage equipment.
The distributed soft bus realizes the joint management of a plurality of storage devices by a plurality of terminal devices, so that a plurality of users can manage the storage devices at the same time, the defect that a system controlled by a single terminal device is easy to collapse is avoided, the efficient near-field information interaction management is realized, the management efficiency of the storage devices is improved, and the use experience of the users is improved.
In the present application, a plurality of terminal devices can communicate with each other, and the communication method includes a near field communication method, and the near field communication method includes any one of an NFC method, a bluetooth method, and a WiFi method. Accordingly, the function expansion can be performed on the control of the plurality of storage devices by the plurality of terminal devices.
In some embodiments, the terminal device is capable of transferring the control rights of the target storage device to another terminal device.
In some embodiments, the first terminal device sends a permission transfer request to the super terminal to transfer the control permission of the target storage device to the second terminal device; the super terminal receives the permission transfer request, and determines whether to allow the first terminal equipment to transfer the control permission of the target storage equipment to the second terminal equipment according to the permission control table and the permission transfer request; if the permission is allowed, the first terminal equipment sends a permission transfer request of the target storage equipment to the second terminal equipment, wherein the permission transfer request comprises a first target virtual key of the target storage equipment, the first terminal equipment obtains the control permission of the target storage equipment, the first terminal equipment is one of a plurality of terminal equipment in the storage system, and the second terminal equipment is the other one of the plurality of terminal equipment in the storage system; if the second terminal equipment receives the permission transfer request, the second terminal equipment obtains a first target virtual key; the target storage equipment updates the virtual key comparison table, and changes the terminal equipment corresponding to the first target virtual key into second terminal equipment. Therefore, the permission transfer of the user is facilitated, the management efficiency of the storage system is improved, and the user experience is improved.
In some embodiments, if the second terminal device receives the rights transfer request, the second terminal device obtains the first target virtual key; and the target storage equipment updates the virtual key comparison table, and adds the second terminal equipment as the terminal equipment corresponding to the first target virtual key. Thus, both the first terminal device and the second terminal device have the control authority of the target storage device.
The user a of the first terminal device may send, by using the super terminal, a permission transfer request to the second terminal device of the user B, where the permission transfer request includes a first target virtual key, the second terminal device generates a first request window according to the permission transfer request, the user B may choose to accept or not accept the permission transfer request sent by the user a through the first request window, and if the user B chooses to accept the permission transfer request of the user a, the second terminal device obtains the first target virtual key, and the second terminal device may obtain the control permission of the target storage device through the first target virtual key. After the user B selects to accept the permission transfer request of the user a, the user a also sends the permission transfer request to the target storage device, and the target storage device updates the virtual key comparison table according to the permission transfer request, adds the second terminal device as the terminal device corresponding to the first target virtual key, or changes the terminal device corresponding to the first target virtual key into the second terminal device, so that the user B can take out the article of the user a from the target storage device. Therefore, the application scene of the method and the device is expanded, various ways for taking out the articles are provided for the user, and the use experience of the user is improved.
In some embodiments, the second terminal device sends a control authority acquisition request to the super terminal, and the first terminal device acquires the control authority of the target storage device; the super terminal receives the control authority acquisition request, and determines whether to allow the second terminal device to acquire the control authority of the first terminal device on the target storage device according to the authority control table and the control authority acquisition request; if the control authority is allowed, the second terminal equipment sends a control authority acquisition request to the first terminal equipment; if the first terminal equipment receives the control authority acquisition request, the target storage equipment generates a second target virtual key, the second target virtual key is stored in a virtual key comparison table of the target storage equipment, the second target virtual key is sent to the corresponding second terminal equipment, and the second terminal equipment obtains the control authority of the target storage equipment through the second target virtual key.
For example, after the user B of the second terminal device wants to take out the article stored by the user a from the target storage device, the user B queries, through the super terminal, that the taking authority of the article of the user a in the target storage device can be obtained, then the user B sends a control authority acquisition request to the first terminal device of the user a through the second terminal device, the first terminal device generates a second request window according to the control authority acquisition request, the user a can selectively accept or not accept the authority acquisition request sent by the user B through the second request window, if the user a selects to accept the authority transfer request of the user B, the first terminal device sends a first target virtual key to the second terminal device, the second terminal device obtains the target virtual key, and after the user B selects to accept the authority transfer request of the user a, the user a also sends an authority transfer request to the target storage device, and the target storage device updates the virtual key comparison table according to the authority transfer request, and adds the second terminal device as the terminal device corresponding to the first target virtual key. The second terminal device can obtain the control authority of the target storage device through the first target virtual key, namely, the user B can take out the article of the user A from the target storage device. Thus, various ways for taking out the articles are provided for the user, and the use experience of the user is improved.
In some embodiments, the target storage device deletes one of the first target virtual key sent by the first terminal device and the second target virtual key sent by the second terminal device from the virtual key comparison table when the other one of the first target virtual key and the second target virtual key is received.
In one example, the user a may obtain the control right of the storage space C of the target storage device through the first target virtual key, and the user B may obtain the control right of the storage space C of the target storage device through the second target virtual key, but only one of the two persons is allowed to be opened in order to ensure the security of the storage space C, so after the control right of the target storage device is obtained through either one of the first target virtual key and the second target virtual key, the control right of the other virtual key should be cancelled by the target storage device, that is, the other is deleted from the virtual key comparison table. Therefore, the safety of the storage space on the storage equipment can be improved, and the articles are prevented from being lost.
In another example, user a may remove item D from the target storage device with the first target virtual key, and user B may remove item D from the target storage device with the second target virtual key, however, when either of user a and user B remove item D from the target storage device, both the first target virtual key and the second target virtual key should be invalidated, i.e., the target storage device deletes the first target virtual key and the second target virtual key from the virtual key comparison table. Therefore, the storage space can be ensured not to be repeatedly opened, and the safety of the storage equipment is improved.
In some embodiments, if the target storage device receives the permission release instruction sent by the target terminal device, deleting the target virtual key from the virtual key comparison table according to the permission release instruction. The user can also lose the control authority of the target storage device by actively sending an authority release instruction, for example, the user A transfers the control authority of the target storage device to the user B and actively sends the authority release instruction to the target storage device so as to ensure that the control authority of the user B to the target storage device is unique.
The application also provides another control method of the storage system, the storage system for executing the control method comprises a plurality of storage devices and a plurality of terminal devices, the storage devices comprise one or more storage spaces, the storage devices are provided with preset operating systems, the terminal devices are also provided with the operating systems, the storage devices and the terminal devices are connected through a distributed soft bus based on the operating systems, the storage devices store a virtual key comparison table, and the virtual key comparison table is used for recording generated and distributed virtual keys and terminal devices corresponding to the virtual keys.
Referring to fig. 3, the second storage system provided in the present application includes a plurality of terminal devices (terminal device 1, terminal device 2, and terminal device 3) and a plurality of storage devices (storage device 1, storage device 2, and storage device 3). And in the signal range of the distributed soft bus, the plurality of terminal devices, the plurality of storage devices and the super terminal communicate through the plurality of terminal devices, the plurality of storage devices and the super terminal.
Referring to fig. 4, a control method of a second storage system provided in the embodiment of the present application includes steps S201 to S202.
S201, when receiving a control authority request sent by a terminal device, the target storage device generates a target virtual key according to the control authority request, and stores the target virtual key in a virtual key comparison table of the target storage device, wherein the target storage device is any one of a plurality of storage devices.
In the range of the distributed soft bus, a plurality of storage devices are associated with each other through the distributed soft bus, and each storage device maintains a virtual key comparison table belonging to the storage device, wherein the virtual key comparison table is used for recording the generated and distributed virtual key and the terminal device corresponding to the virtual key. The terminal equipment which can be accessed into the storage system is authenticated by an administrator of the storage system, and when the terminal equipment enters the signal range of the distributed soft bus, the terminal equipment and the storage equipment are connected with each other through the distributed soft bus. The terminal equipment is also provided with an application program for managing the storage equipment, a user can select target storage equipment to be connected through an application interface of the application program, the terminal equipment responds to the selection operation of the user, generates a control authority request and sends the control authority request to the target storage equipment, and the target storage equipment is any one of a plurality of storage equipment.
S202, the target storage equipment sends the target virtual key to the corresponding terminal equipment, and the terminal equipment obtains the control authority of the target storage equipment through the target virtual key.
In some embodiments, the plurality of terminal devices can each obtain the control authority of the target storage device.
Specifically, when the plurality of terminal devices of the target storage device all have the target virtual key of the target storage device, the plurality of terminal devices can simultaneously acquire the control authority of the target storage device through the target virtual key, i.e. the plurality of terminal devices can simultaneously manage the target storage device. The embodiment can be applied to scenes of multiple persons simultaneously managing the storage equipment, so that the efficiency of storing and taking articles in the storage equipment is improved, and the use experience of a user is improved.
In some embodiments, after the terminal device obtains the target virtual key, the terminal device sends the target virtual key to the target storage device; and when the target storage equipment receives the control key, authenticating the terminal equipment according to the control key and the updated virtual key comparison table, and establishing communication connection with the terminal equipment after the authentication is passed so that the terminal equipment can control the target storage equipment.
When the control authority of the storage device is inquired to be consistent with the virtual secret key and the information of the terminal device, the communication connection can be realized in a distributed soft bus mode, and the terminal device controls the storage device through the communication connection, for example, controls the opening or closing of a storage space of the storage device.
The storage system used for executing the step S201 and the step S202 allows the terminal equipment to quickly acquire the control authority of the storage equipment, and is more suitable for storage systems in non-open places, such as large storage transfer warehouses, so as to improve the management efficiency of users on the storage systems and further improve the transfer efficiency of logistics.
The distributed soft bus realizes the joint management of a plurality of storage devices by a plurality of terminal devices, so that a plurality of users can manage the storage devices at the same time, the defect that a system controlled by a single terminal device is easy to collapse is avoided, the efficient near-field information interaction management is realized, the management efficiency of the storage devices is improved, and the use experience of the users is improved.
In the present application, a plurality of terminal devices can communicate with each other, and the communication method includes a near field communication method, and the near field communication method includes any one of an NFC method, a bluetooth method, and a WiFi method. Accordingly, the function expansion can be performed on the control of the plurality of storage devices by the plurality of terminal devices.
In some embodiments, the terminal device is capable of transferring the control rights of the target storage device to another terminal device.
In some embodiments, a first terminal device sends a permission transfer request of a target storage device to a second terminal device, the permission transfer request includes a first target virtual key of the target storage device, the first terminal device obtains control permission of the target storage device, the first terminal device is one of a plurality of terminal devices in a storage system, and the second terminal device is another one of the plurality of terminal devices in the storage system; if the second terminal equipment receives the permission transfer request, the second terminal equipment obtains a first target virtual key; the target storage equipment updates the virtual key comparison table, and changes the terminal equipment corresponding to the first target virtual key into second terminal equipment.
In some embodiments, if the second terminal device receives the rights transfer request, the second terminal device obtains the first target virtual key; and the target storage equipment updates the virtual key comparison table, and adds the second terminal equipment as the terminal equipment corresponding to the first target virtual key.
The user a of the first terminal device may wish to take out the object in the target storage device with the help of the user B, the user a may send, to the second terminal device of the user B, a permission transfer request through the first terminal device, where the permission transfer request includes a first target virtual key, the second terminal device generates a first request window according to the permission transfer request, the user B may choose to accept or not accept the permission transfer request sent by the user a through the first request window, and if the user B chooses to accept the permission transfer request of the user a, the second terminal device obtains the first target virtual key, and then the second terminal device may obtain the control permission of the target storage device through the first target virtual key. After the user B selects to accept the permission transfer request of the user a, the user a also sends the permission transfer request to the target storage device, and the target storage device updates the virtual key comparison table according to the permission transfer request, adds the second terminal device as the terminal device corresponding to the first target virtual key, or changes the terminal device corresponding to the first target virtual key into the second terminal device, so that the user B can take out the article of the user a from the target storage device. Therefore, the application scene of the method and the device is expanded, various ways for taking out the articles are provided for the user, and the use experience of the user is improved.
In other embodiments, the second terminal device sends a control authority acquisition request of the target storage device to the first terminal device, and the first terminal device acquires the control authority of the target storage device; if the first terminal equipment receives the control authority acquisition request, the target storage equipment generates a second target virtual key, the second target virtual key is stored in a virtual key comparison table of the target storage equipment, the second target virtual key is sent to the corresponding second terminal equipment, and the second terminal equipment obtains the control authority of the target storage equipment through the second target virtual key.
For example, if the user B of the second terminal device wants to take out the article stored by the user a from the target storage device, the user B sends a control permission acquisition request to the first terminal device of the user a through the second terminal device, the first terminal device generates a second request window according to the control permission acquisition request, the user a can choose to accept or not accept the permission acquisition request sent by the user B through the second request window, if the user a chooses to accept the permission transfer request of the user B, the first terminal device sends a first target virtual key to the second terminal device, the second terminal device obtains the target virtual key, after the user B chooses to accept the permission transfer request of the user a, the user a also sends a permission transfer request to the target storage device, and the target storage device updates the virtual key comparison table according to the permission transfer request, and adds the second terminal device as the terminal device corresponding to the first target virtual key. The second terminal device can obtain the control authority of the target storage device through the first target virtual key, namely, the user B can take out the article of the user A from the target storage device. Thus, various ways for taking out the articles are provided for the user, and the use experience of the user is improved.
In some embodiments, the second terminal device sends a control authority acquisition request of the target storage device to the first terminal device, and the first terminal device acquires the control authority of the target storage device; if the first terminal equipment receives the control authority acquisition request, the target storage equipment generates a second target virtual key, the second target virtual key is stored in a virtual key comparison table of the target storage equipment, the second target virtual key is sent to the corresponding second terminal equipment, and the second terminal equipment obtains the control authority of the target storage equipment through the second target virtual key.
For example, if the user B of the second terminal device wants to take out the article stored by the user a from the target storage device, the user B sends a control right acquisition request to the first terminal device of the user a through the second terminal device, where the control right acquisition request includes information of the second terminal device, the first terminal device generates a third request window according to the control right acquisition request, the user a may choose to accept or not accept the right acquisition request sent by the user B through the third request window, if the user a chooses to accept the right transfer request of the user B, the first terminal device sends the control right acquisition request to the target storage device, and when the target storage device receives the control right acquisition request, generates a second target virtual key according to the information of the second terminal device, updates the information of the second terminal device and the second target virtual key into the virtual key comparison table, and sends the second target virtual key to the second terminal device. The second terminal device can obtain the control authority of the target storage device through the second target virtual key, namely, the user B can take out the article of the user A from the target storage device.
When the user a selects to accept the permission acquisition request sent by the user B through the third request window, the first terminal device may also send a permission acquisition key to the second terminal device, where the second terminal device sends the permission acquisition key and the permission acquisition request to the target terminal device, so that the target terminal device generates the second virtual key and updates the virtual key comparison table, and the second terminal device obtains the control permission of the target storage device.
In some embodiments, the target storage device deletes one of the first target virtual key sent by the first terminal device and the second target virtual key sent by the second terminal device from the virtual key comparison table when the other one of the first target virtual key and the second target virtual key is received.
In some embodiments, the target storage device deletes one of the first target virtual key sent by the first terminal device and the second target virtual key sent by the second terminal device from the virtual key comparison table when the other one of the first target virtual key and the second target virtual key is received.
In some embodiments, if the target storage device receives the permission release instruction sent by the target terminal device, deleting the target virtual key from the virtual key comparison table according to the permission release instruction. The user can also lose the control authority of the target storage device by actively sending an authority release instruction, for example, the user A transfers the control authority of the target storage device to the user B and actively sends the authority release instruction to the target storage device so as to ensure that the control authority of the user B to the target storage device is unique.
The third storage system for executing the control method comprises a plurality of storage devices and a terminal device, wherein the storage devices comprise one or more storage spaces, a preset operating system is carried on the storage devices, an operating system is also carried on the terminal device, the storage devices and the terminal device are connected through a distributed soft bus based on the operating system, a virtual key comparison table is stored in the storage devices, and the virtual key comparison table is used for recording generated and distributed virtual keys. Preset operating systems include hong and other distributed systems.
As shown in fig. 5, the third storage system of the present application includes a terminal device, a first storage device and two second storage devices, where the first storage device and the second storage device may each include one or more storage spaces, and in a signal range of the distributed soft bus, the terminal device, the first storage device and the plurality of second storage devices communicate.
Referring to fig. 6, a control method of a third storage system provided in the embodiment of the present application includes steps S301 to S304.
S301, a terminal device sends a first control authority request to a first storage device, wherein the first storage device is any one of a plurality of storage devices; the terminal equipment receives a first virtual key generated by the first storage equipment according to the first control authority request so as to obtain the control authority of the first storage equipment.
S302, the first storage device sends a control authority request to one or more second storage devices, wherein the second storage devices are any one of the storage devices except the first storage device.
S303, when the second storage device receives the second control authority request sent by the target storage device, generating and storing a second virtual key according to the second control authority request.
S304, the terminal equipment receives the second virtual key, and the terminal equipment obtains the control authority of the second storage equipment through the second virtual key.
The distributed soft bus is used for managing a plurality of storage devices by a single terminal device, efficient near-field information interaction management is also realized, management efficiency of the storage devices is improved, and use experience of a user is improved.
The fourth storage system comprises a plurality of storage devices and terminal devices, wherein each storage device and each terminal device comprise a memory and a processor; the memory is used for storing a computer program; the processor is configured to execute the computer program and implement a control method of the storage system according to any one of the embodiments of the present application when the computer program is executed.
As shown in fig. 7, the storage device 200 may include a processor 211 and a memory 212, where the processor 211 and the memory 212 are connected by a bus, such as an I2C (Inter-integrated Circuit) bus.
Specifically, the processor 211 may be a Micro-controller unit (MCU), a central processing unit (CentralProcessing Unit, CPU), a digital signal processor (DigitalSignal Processor, DSP), or the like.
Specifically, the Memory 212 may be a Flash chip, a Read-Only Memory (ROM) disk, an optical disk, a U-disk, a removable hard disk, or the like. The memory 212 stores therein various computer programs for execution by the processor 211.
As shown in fig. 8, the terminal device 300 may include a processor 311 and a memory 312, where the processor 311 and the memory 312 are connected by a bus, such as an I2C (Inter-integrated Circuit) bus.
Specifically, the processor 311 may be a Micro-controller unit (MCU), a central processing unit (CentralProcessing Unit, CPU), a digital signal processor (DigitalSignal Processor, DSP), or the like.
Specifically, the Memory 312 may be a Flash chip, a Read-Only Memory (ROM) disk, an optical disk, a U-disk, a removable hard disk, or the like. The memory 312 stores therein various computer programs for execution by the processor 311.
The processor 211 is configured to execute a computer program stored in the memory 212, the processor 311 is configured to execute a computer program stored in the memory 312, the processor 211 and the processor 311 are collectively referred to as a system processor, when executing the corresponding computer program, the system processor determines to call the processor 211 or the processor 311 according to an execution subject (the storage device 200 or the terminal device 300) of the computer program, and when executing the corresponding computer program, the processor 211 and the processor 311 respectively implement the following steps correspondingly:
when receiving a control authority request sent by a terminal device, the target storage device judges whether the control authority can be distributed to the terminal device according to an authority control table, wherein the target storage device is any one of a plurality of storage devices; if the control authority can be distributed to the terminal equipment, the target storage equipment generates a target virtual key according to the control authority request, and the target virtual key is stored in a virtual key comparison table of the target storage equipment; the target storage equipment sends the target virtual key to the corresponding terminal equipment, and the terminal equipment obtains the control authority of the target storage equipment through the target virtual key.
In one embodiment, the system processor is configured to, after the implementation target storage device determines whether the control authority can be allocated to the terminal device according to the authority control table, implement:
if the control authority cannot be distributed to the terminal equipment, the terminal equipment also sends a control authority request to the super terminal, wherein the control authority request comprises terminal equipment information of the terminal equipment, and the super terminal is used for changing the virtual key comparison table; if the super terminal receives the control authority request, judging whether the control authority of the target storage equipment can be distributed to the terminal equipment; if the control authority of the target storage equipment can be distributed to the terminal equipment, the super terminal sends the terminal equipment information to the target storage equipment, so that the target equipment updates the virtual key comparison table according to the terminal equipment information.
In some embodiments, the system processor is further configured to implement:
based on the distributed soft bus, the virtual key comparison tables stored by the target storage devices are shared to the super terminal, and the super terminal generates the permission control table according to the virtual key comparison tables.
In some embodiments, the plurality of terminal devices can each obtain the control authority of the target storage device.
In some embodiments, the system processor is further configured to implement:
the first terminal equipment sends an authority transfer request to the super terminal so as to transfer the control authority of the target storage equipment to the second terminal equipment; the super terminal receives the permission transfer request, and determines whether to allow the first terminal equipment to transfer the control permission of the target storage equipment to the second terminal equipment according to the permission control table and the permission transfer request; if the permission is allowed, the first terminal equipment sends a permission transfer request of the target storage equipment to the second terminal equipment, wherein the permission transfer request comprises a first target virtual key of the target storage equipment, the first terminal equipment obtains the control permission of the target storage equipment, the first terminal equipment is one of a plurality of terminal equipment in the storage system, and the second terminal equipment is the other one of the plurality of terminal equipment in the storage system; if the second terminal equipment receives the permission transfer request, the second terminal equipment obtains a first target virtual key; the target storage equipment updates the virtual key comparison table, and changes the terminal equipment corresponding to the first target virtual key into second terminal equipment.
In some embodiments, the system processor is further configured to implement:
if the second terminal equipment receives the permission transfer request, the second terminal equipment obtains a first target virtual key; and the target storage equipment updates the virtual key comparison table, and adds the second terminal equipment as the terminal equipment corresponding to the first target virtual key.
In some embodiments, the system processor is further configured to implement:
the second terminal equipment sends a control authority acquisition request to the super terminal, and the first terminal equipment acquires the control authority of the target storage equipment; the super terminal receives the control authority acquisition request, and determines whether to allow the second terminal device to acquire the control authority of the first terminal device on the target storage device according to the authority control table and the authority control authority acquisition request; if the control authority is allowed, the second terminal equipment sends a control authority acquisition request to the first terminal equipment; if the first terminal equipment receives the control authority acquisition request, the target storage equipment generates a second target virtual key, the second target virtual key is stored in a virtual key comparison table of the target storage equipment, the second target virtual key is sent to the corresponding second terminal equipment, and the second terminal equipment obtains the control authority of the target storage equipment through the second target virtual key.
In some embodiments, the first terminal device stores a first target virtual key of the target storage device; the system processor is further configured to implement:
and when the target storage equipment receives any one of the first target virtual key sent by the first terminal equipment or the second target virtual key sent by the second terminal equipment, deleting the other one from the virtual key comparison table.
In some embodiments, the system processor is further configured to implement:
and if the target storage equipment receives the permission release instruction sent by the target terminal equipment, deleting the target virtual key from the virtual key comparison table according to the permission release instruction.
In some embodiments, when the implementation terminal device obtains the control right of the target storage device through the target virtual key, the system processor is configured to implement:
the terminal equipment sends a target virtual key to target storage equipment; and when the target storage equipment receives the control key, authenticating the terminal equipment according to the control key and the updated virtual key comparison table, and establishing communication connection with the terminal equipment after the authentication is passed so that the terminal equipment can control the target storage equipment.
In another embodiment, when executing the corresponding computer program, the system processor determines to call the processor 211 or the processor 311 according to the execution subject (the storage device 200 or the terminal device 300) of the computer program, and when executing the corresponding computer program, the processor 211 and the processor 311 respectively implement the following steps correspondingly:
when receiving a control authority request sent by a terminal device, the target storage device generates a target virtual key according to the control authority request, and stores the target virtual key in a virtual key comparison table of the target storage device, wherein the target storage device is any one of a plurality of storage devices; the target storage equipment sends the target virtual key to the corresponding terminal equipment, and the terminal equipment obtains the control authority of the target storage equipment through the target virtual key.
In some embodiments, the plurality of terminal devices can each obtain the control authority of the target storage device.
In some embodiments, the system processor is further configured to implement:
the method comprises the steps that a first terminal device sends a permission transfer request of target storage equipment to a second terminal device, the permission transfer request comprises a first target virtual key of the target storage equipment, the first terminal device obtains control permission of the target storage equipment, the first terminal device is one of a plurality of terminal devices in a storage system, and the second terminal device is the other of the plurality of terminal devices in the storage system; if the second terminal equipment receives the permission transfer request, the second terminal equipment obtains a first target virtual key; the target storage equipment updates the virtual key comparison table, and changes the terminal equipment corresponding to the first target virtual key into second terminal equipment.
In some embodiments, the system processor is further configured to implement:
if the second terminal equipment receives the permission transfer request, the second terminal equipment obtains a first target virtual key; and the target storage equipment updates the virtual key comparison table, and adds the second terminal equipment as the terminal equipment corresponding to the first target virtual key.
In some embodiments, the system processor is further configured to implement:
The second terminal equipment sends a control authority acquisition request of the target storage equipment to the first terminal equipment, and the first terminal equipment acquires the control authority of the target storage equipment; if the first terminal equipment receives the control authority acquisition request, the target storage equipment generates a second target virtual key, the second target virtual key is stored in a virtual key comparison table of the target storage equipment, the second target virtual key is sent to the corresponding second terminal equipment, and the second terminal equipment obtains the control authority of the target storage equipment through the second target virtual key.
In some embodiments, the first terminal device stores a first target virtual key of the target storage device; the system processor is further configured to implement:
and when the target storage equipment receives any one of the first target virtual key sent by the first terminal equipment or the second target virtual key sent by the second terminal equipment, deleting the other one from the virtual key comparison table.
In some embodiments, the system processor is further configured to implement:
and if the target storage equipment receives the permission release instruction sent by the target terminal equipment, deleting the target virtual key from the virtual key comparison table according to the permission release instruction.
In some embodiments, when the implementation terminal device obtains the control right of the target storage device through the target virtual key, the system processor is configured to implement:
the terminal equipment sends a target virtual key to target storage equipment; and when the target storage equipment receives the control key, authenticating the terminal equipment according to the control key and the updated virtual key comparison table, and establishing communication connection with the terminal equipment after the authentication is passed so that the terminal equipment can control the target storage equipment.
In some embodiments, the plurality of terminal devices can communicate through a short-range communication mode, where the short-range communication mode includes any one of an NFC mode, a bluetooth mode, and a WiFi mode.
In yet another embodiment, when executing the corresponding computer program, the system processor determines to call the processor 211 or the processor 311 according to the execution subject (the storage device 200 or the terminal device 300) of the computer program, and when executing the corresponding computer program, the processor 211 and the processor 311 respectively implement the following steps correspondingly:
the terminal equipment sends a first control authority request to first storage equipment, wherein the first storage equipment is any one of a plurality of storage equipment; the terminal equipment receives a first virtual key generated by the first storage equipment according to the first control authority request so as to obtain the control authority of the first storage equipment;
The first storage equipment sends a control authority request to one or more second storage equipment, wherein the second storage equipment is any one of the storage equipment except the first storage equipment; when receiving a second control authority request sent by the target storage equipment, the second storage equipment generates and stores a second virtual key according to the second control authority request; the terminal equipment receives the second virtual key, and the terminal equipment obtains the control authority of the second storage equipment through the second virtual key.
The embodiment of the application provides a computer readable storage medium, and one or more programs are stored in the computer readable storage medium and can be executed by one or more processors to realize the control method of any storage system provided by the embodiment of the application.
The computer readable storage medium may be an internal storage unit of the computer device according to the foregoing embodiment, for example, a hard disk or a memory of the computer device. The computer readable storage medium may also be an external storage device of the computer device, for example, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), or the like, which are provided on the computer device.
While the invention has been described with reference to certain preferred embodiments, it will be understood by those skilled in the art that various changes and substitutions of equivalents may be made and equivalents will be apparent to those skilled in the art without departing from the scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (19)

1. The control method of the storage system is characterized in that the storage system comprises a plurality of storage devices and a plurality of terminal devices, the storage devices comprise one or more storage spaces, the storage devices are provided with a preset operating system, the terminal devices are also provided with the operating system, the storage devices and the terminal devices are connected through a distributed soft bus based on the operating system, the storage devices are stored with a virtual key comparison table, the virtual key comparison table is used for recording a generated and distributed virtual key and a terminal device corresponding to the virtual key, the storage devices share a permission control table, and the permission control table is used for recording the control permission of the storage devices and the use condition information of the control permission, which are obtained by the terminal devices; the control method comprises the following steps:
When receiving a control authority request sent by the terminal equipment, the target storage equipment judges whether the control authority can be distributed to the terminal equipment according to the authority control table, wherein the target storage equipment is any one of a plurality of storage equipment;
if the control authority of the target storage equipment can be distributed to the terminal equipment, the target storage equipment generates a target virtual key according to the control authority request, and the target virtual key is stored in a virtual key comparison table of the target storage equipment;
the target storage equipment sends the target virtual key to the corresponding terminal equipment, the terminal equipment obtains the control authority of the target storage equipment through the target virtual key, and the terminal equipment at least comprises a first terminal equipment and a second terminal equipment;
the first terminal device sends an authority transfer request to a super terminal to transfer the control authority of the target storage device to a second terminal device, wherein the super terminal is used for changing the virtual key comparison table;
the super terminal receives the permission transfer request, and determines whether to allow the first terminal device to transfer the control permission of the target storage device to the second terminal device according to the permission control table and the permission transfer request;
If the permission is allowed, the first terminal equipment sends a permission transfer request of the target storage equipment to the second terminal equipment, wherein the permission transfer request comprises a first target virtual key of the target storage equipment, the first terminal equipment obtains the control permission of the target storage equipment, the first terminal equipment is one of a plurality of terminal equipment in the storage system, and the second terminal equipment is the other one of the plurality of terminal equipment in the storage system;
if the second terminal equipment receives the permission transfer request, the second terminal equipment obtains the first target virtual key; the target storage device updates the virtual key comparison table and changes the terminal device corresponding to the first target virtual key into the second terminal device.
2. The control method of a storage system according to claim 1, wherein after the target storage device determines whether or not it is possible to assign its control authority to the terminal device according to the authority control table, the control method further comprises:
if the control authority cannot be distributed to the terminal equipment, the terminal equipment also sends a control authority request to the super terminal, wherein the control authority request comprises terminal equipment information of the terminal equipment, and the super terminal is used for changing the virtual key comparison table;
If the super terminal receives the control authority request, judging whether the control authority of the target storage equipment can be distributed to the terminal equipment or not;
if the control authority of the target storage device can be distributed to the terminal device, the super terminal sends the terminal device information to the target storage device, so that the target storage device updates the virtual key comparison table according to the terminal device information.
3. The method of controlling a storage system according to claim 1, wherein the method further comprises:
based on a distributed soft bus, the virtual key comparison tables stored by the target storage devices are shared to the super terminal by the target storage devices, and the super terminal generates the permission control table according to the virtual key comparison tables.
4. The control method of a storage system according to claim 1, wherein a plurality of terminal devices can each obtain control authority of the target storage device.
5. The method of controlling a storage system according to claim 1, wherein the method further comprises:
if the second terminal equipment receives the permission transfer request, the second terminal equipment obtains the first target virtual key; the target storage device updates the virtual key comparison table, and adds the second terminal device as the terminal device corresponding to the first target virtual key.
6. The method of controlling a storage system according to claim 1, wherein the method further comprises:
the second terminal equipment sends a control authority acquisition request to the super terminal, and the first terminal equipment acquires the control authority of the target storage equipment;
the super terminal receives the control authority acquisition request, and determines whether the second terminal equipment is allowed to acquire the control authority of the first terminal equipment to the target storage equipment according to the authority control table and the control authority acquisition request;
if the control authority acquisition request is allowed, the second terminal equipment sends the control authority acquisition request to the first terminal equipment;
if the first terminal equipment receives the control authority acquisition request, the target storage equipment generates a second target virtual key, the second target virtual key is stored in a virtual key comparison table of the target storage equipment, the second target virtual key is sent to the corresponding second terminal equipment, and the second terminal equipment obtains the control authority of the target storage equipment through the second target virtual key.
7. The method of claim 6, wherein the first terminal device stores a first target virtual key of the target storage device; the control method further includes:
And when the target storage equipment receives any one of the first target virtual key sent by the first terminal equipment or the second target virtual key sent by the second terminal equipment, deleting the other one from the virtual key comparison table.
8. The method of controlling a storage system according to claim 1, wherein the method further comprises:
and if the target storage equipment receives the permission release instruction sent by the target terminal equipment, deleting the target virtual key from the virtual key comparison table according to the permission release instruction.
9. The control method of the storage system according to claim 1, wherein the terminal device obtains the control authority of the target storage device through the target virtual key, comprising:
the terminal equipment sends the target virtual key to the target storage equipment;
and when the target storage equipment receives the target virtual key, authenticating the terminal equipment according to the target virtual key and the updated virtual key comparison table, and establishing communication connection with the terminal equipment after the authentication is passed so that the terminal equipment can control the target storage equipment.
10. The control method of the storage system is characterized in that the storage system comprises a plurality of storage devices and a plurality of terminal devices, the storage devices comprise one or more storage spaces, a preset operating system is mounted on the storage devices, the operating system is also mounted on the terminal devices, the storage devices and the terminal devices are connected through a distributed soft bus based on the operating system, a virtual key comparison table is stored in the storage devices, and the virtual key comparison table is used for recording generated and distributed virtual keys and terminal devices corresponding to the virtual keys; the control method comprises the following steps:
when receiving a control authority request sent by the terminal equipment, the target storage equipment generates a target virtual key according to the control authority request, and stores the target virtual key in a virtual key comparison table of the target storage equipment, wherein the target storage equipment is any one of a plurality of storage equipment;
the target storage equipment sends the target virtual key to the corresponding terminal equipment, the terminal equipment obtains the control authority of the target storage equipment through the target virtual key, and the terminal equipment at least comprises a first terminal equipment and a second terminal equipment;
The method comprises the steps that a first terminal device sends a permission transfer request of target storage equipment to a second terminal device, wherein the permission transfer request comprises a first target virtual key of the target storage equipment, the first terminal device obtains control permission of the target storage equipment, the first terminal device is one of a plurality of terminal devices in a storage system, and the second terminal device is the other one of the plurality of terminal devices in the storage system;
if the second terminal equipment receives the permission transfer request, the second terminal equipment obtains the first target virtual key; the target storage device updates the virtual key comparison table and changes the terminal device corresponding to the first target virtual key into the second terminal device.
11. The control method of a storage system according to claim 10, wherein a plurality of terminal devices can each obtain control authority of the target storage device.
12. The method of claim 10, further comprising:
if the second terminal equipment receives the permission transfer request, the second terminal equipment obtains the first target virtual key; the target storage device updates the virtual key comparison table, and adds the second terminal device as the terminal device corresponding to the first target virtual key.
13. The method of claim 10, further comprising:
the second terminal equipment sends a control authority acquisition request of the target storage equipment to the first terminal equipment, and the first terminal equipment acquires the control authority of the target storage equipment;
if the first terminal equipment receives the control authority acquisition request, the target storage equipment generates a second target virtual key, the second target virtual key is stored in a virtual key comparison table of the target storage equipment, the second target virtual key is sent to the corresponding second terminal equipment, and the second terminal equipment obtains the control authority of the target storage equipment through the second target virtual key.
14. The method of claim 13, wherein the first terminal device stores a first target virtual key of the target storage device; the control method further includes:
and when the target storage equipment receives any one of the first target virtual key sent by the first terminal equipment or the second target virtual key sent by the second terminal equipment, deleting the other one from the virtual key comparison table.
15. The method of claim 10, further comprising:
and if the target storage equipment receives the permission release instruction sent by the target terminal equipment, deleting the target virtual key from the virtual key comparison table according to the permission release instruction.
16. The control method of the storage system according to claim 10, wherein the terminal device obtains the control authority of the target storage device through the target virtual key, comprising:
the terminal equipment sends the target virtual key to the target storage equipment;
and when the target storage equipment receives the target virtual key, authenticating the terminal equipment according to the target virtual key and the updated virtual key comparison table, and establishing communication connection with the terminal equipment after the authentication is passed so that the terminal equipment can control the target storage equipment.
17. The control method of a storage system according to any one of claims 10 to 16, wherein a plurality of the terminal devices can communicate with each other by a near field communication method, the near field communication method including any one of an NFC method, a bluetooth method, and a WiFi method.
18. The storage system is characterized by comprising a plurality of storage devices and a plurality of terminal devices, wherein the storage devices comprise one or more storage spaces, a preset operating system is carried on the storage devices, the operating system is also carried on the terminal devices, and the storage devices and the terminal devices are connected through a distributed soft bus based on the operating system; the storage device and the terminal device both comprise a memory and a processor;
the memory is used for storing a computer program;
the processor being adapted to execute the computer program and to implement the control method of the storage system according to any one of claims 1 to 17 when the computer program is executed.
19. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program which, when executed by a processor, causes the processor to implement a method of controlling the storage system according to any one of claims 1 to 17.
CN202211515705.8A 2022-11-30 2022-11-30 Control method of storage system, storage system and storage medium Active CN115550103B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202310499842.5A CN116527435A (en) 2022-11-30 2022-11-30 Control method of storage system, storage system and storage medium
CN202211515705.8A CN115550103B (en) 2022-11-30 2022-11-30 Control method of storage system, storage system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211515705.8A CN115550103B (en) 2022-11-30 2022-11-30 Control method of storage system, storage system and storage medium

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202310499842.5A Division CN116527435A (en) 2022-11-30 2022-11-30 Control method of storage system, storage system and storage medium

Publications (2)

Publication Number Publication Date
CN115550103A CN115550103A (en) 2022-12-30
CN115550103B true CN115550103B (en) 2023-05-05

Family

ID=84722025

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202310499842.5A Pending CN116527435A (en) 2022-11-30 2022-11-30 Control method of storage system, storage system and storage medium
CN202211515705.8A Active CN115550103B (en) 2022-11-30 2022-11-30 Control method of storage system, storage system and storage medium

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202310499842.5A Pending CN116527435A (en) 2022-11-30 2022-11-30 Control method of storage system, storage system and storage medium

Country Status (1)

Country Link
CN (2) CN116527435A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106534080A (en) * 2016-10-20 2017-03-22 雷飏 Object access authority management method and corresponding background system, device and user terminal
CN114697348A (en) * 2020-12-25 2022-07-01 华为终端有限公司 Distributed implementation method, distributed system, readable medium and electronic device
CN115238259A (en) * 2021-04-22 2022-10-25 华为技术有限公司 Equipment authentication method and related device
CN115390980A (en) * 2022-10-27 2022-11-25 深圳开鸿数字产业发展有限公司 Processing method of distributed interaction, computer equipment and readable storage medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105469508A (en) * 2015-12-31 2016-04-06 上海创功通讯技术有限公司 Storage cabinet, mobile terminal and storage cabinet control method and system
EP3783575A1 (en) * 2017-06-02 2021-02-24 Deutsche Post AG Locker system access control
CN108711234A (en) * 2018-05-18 2018-10-26 希梦科技(深圳)有限公司 It is a kind of to take object method, apparatus and terminal using locker
CN110097706A (en) * 2019-05-13 2019-08-06 广东工业大学 Intelligent storage method, system, Intelligent storage cabinet and computer readable storage medium
CN110211303A (en) * 2019-06-04 2019-09-06 杭州智测自动化科技有限公司 The control method and control device of locker
CN114677810B (en) * 2021-05-20 2023-06-06 腾讯云计算(北京)有限责任公司 Storage data processing method and device, electronic equipment and medium
CN114387732B (en) * 2022-01-24 2023-06-16 京东方科技集团股份有限公司 Control method, control device, storage system and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106534080A (en) * 2016-10-20 2017-03-22 雷飏 Object access authority management method and corresponding background system, device and user terminal
CN114697348A (en) * 2020-12-25 2022-07-01 华为终端有限公司 Distributed implementation method, distributed system, readable medium and electronic device
CN115238259A (en) * 2021-04-22 2022-10-25 华为技术有限公司 Equipment authentication method and related device
CN115390980A (en) * 2022-10-27 2022-11-25 深圳开鸿数字产业发展有限公司 Processing method of distributed interaction, computer equipment and readable storage medium

Also Published As

Publication number Publication date
CN116527435A (en) 2023-08-01
CN115550103A (en) 2022-12-30

Similar Documents

Publication Publication Date Title
US11578984B2 (en) Vehicle control device and program
TWI530610B (en) Access control system using near field communication
US20080207172A1 (en) Service verifying system, authentication requesting terminal, service utilizing terminal, and service providing method
US20080043696A1 (en) Method and System for Mobile Terminals to Share Storage Space
US20040255243A1 (en) System for creating and editing mark up language forms and documents
CN105447949A (en) Intelligent access control system
CN205354152U (en) Intelligent gate inhibition system
CN111190748B (en) Data sharing method, device, equipment and storage medium
CN102857537B (en) A kind of remote invocation method, device and system
JP5065416B2 (en) Method, system and apparatus for protecting terminal data
CN103220316B (en) Data-sharing systems and data processing equipment
CN112543431A (en) Account synchronization method, medium and server
US7310812B2 (en) Service executing method and service providing system
CN115550103B (en) Control method of storage system, storage system and storage medium
US8566948B2 (en) Method and system for controlling access to logical unit of a storage device shared by computers
JP6065623B2 (en) Information management device, portable terminal device, and program
US10172081B2 (en) Information processing system and information processing method
CN115174177B (en) Rights management method, device, electronic apparatus, storage medium, and program product
KR20120073799A (en) Data synchronizing and servicing apparatus and method based on cloud storage
CN105430592A (en) Management system and management method for space micro-positioning mobile device
JP6237870B2 (en) Information processing device, terminal device, and program
JP6311804B2 (en) Terminal device and program
JP6439060B1 (en) Entrance / exit management system
JP2012226672A (en) Facility/equipment reservation system, facility/reservation device, control method and program
CN111355680B (en) Key distribution method, key receiving method, electronic terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant