CN115880045A - Object verification method and device, electronic equipment and computer-readable storage medium - Google Patents

Object verification method and device, electronic equipment and computer-readable storage medium Download PDF

Info

Publication number
CN115880045A
CN115880045A CN202211616751.7A CN202211616751A CN115880045A CN 115880045 A CN115880045 A CN 115880045A CN 202211616751 A CN202211616751 A CN 202211616751A CN 115880045 A CN115880045 A CN 115880045A
Authority
CN
China
Prior art keywords
sub
target object
internet
verification
image information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211616751.7A
Other languages
Chinese (zh)
Inventor
董宇
吴迪
李尧
郅利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
CCB Finetech Co Ltd
Original Assignee
China Construction Bank Corp
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp, CCB Finetech Co Ltd filed Critical China Construction Bank Corp
Priority to CN202211616751.7A priority Critical patent/CN115880045A/en
Publication of CN115880045A publication Critical patent/CN115880045A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The disclosure provides an object verification method and device, electronic equipment and a computer-readable storage medium, which are applied to a remote operation platform, wherein the remote operation platform is connected with an Internet of things platform and can be applied to the technical field of computers and the technical field of finance. The object authentication method includes: responding to the detected object verification instruction, and sending the object verification instruction to the Internet of things platform, wherein the object verification instruction comprises at least one object; acquiring label information from an Internet of things platform, wherein the label information comprises sub-label information corresponding to at least one object; responding to the detected target object verification instruction, and sending the target object verification instruction to the Internet of things platform, wherein the target object verification instruction comprises a target object; acquiring image information from an Internet of things platform, wherein the image information comprises sub-image information corresponding to a target object; and verifying the target object according to the sub-label information and the sub-image information corresponding to the target object to obtain a verification result.

Description

Object verification method and device, electronic equipment and computer-readable storage medium
Technical Field
The present disclosure relates to the field of computer technology and the field of financial technology, and more particularly, to an object verification method and apparatus, an electronic device, a computer-readable storage medium, and a computer program product.
Background
With the development of computer technology, warehousing management can be performed based on the computer technology. Warehousing management can be management of warehouses and materials in the warehouses, and is a planning, organization, control and coordination process performed by warehousing institutions to provide efficient warehousing services by fully utilizing the owned warehousing resources.
Warehouse management may include vault management. The vault management may refer to the management of the inventory of the target objects in the target vault at the target time by a person having vault management authority.
In implementing the disclosed concept, the inventors found that there are at least the following problems in the related art: the efficiency and accuracy of the vault management cannot be guaranteed.
Disclosure of Invention
In view of the above, the present disclosure provides an object verification method and apparatus, an electronic device, a computer-readable storage medium, and a computer program product.
According to one aspect of the disclosure, an object verification method is provided, which is applied to a remote operation platform, the remote operation platform is connected with an internet of things platform, and the method includes:
in response to detecting an object verification instruction, sending the object verification instruction to the internet of things platform, wherein the object verification instruction comprises at least one object;
acquiring label information from the Internet of things platform, wherein the label information comprises sub-label information corresponding to the at least one object;
in response to detecting a target object verification instruction, sending the target object verification instruction to the internet of things platform, where the target object verification instruction includes a target object, and the target object belongs to the at least one object;
acquiring image information from the Internet of things platform, wherein the image information comprises sub-image information corresponding to the target object; and
and verifying the target object according to the sub-label information and the sub-image information corresponding to the target object to obtain a verification result.
According to an embodiment of the present disclosure, the object verification instruction is generated as follows:
in response to detecting that the user performs object verification operation initiated by the remote operation platform, determining position information corresponding to each of the at least one object; and
and generating the object verification instruction according to the position information corresponding to the at least one object.
According to an embodiment of the present disclosure, the target object verification instruction is generated as follows:
in response to detecting that a target object verification operation initiated by a user by using the remote operation platform is detected, determining the sub-tag information and the target position information corresponding to the target object; and
and generating the target object verification instruction according to the sub-tag information and the target position information corresponding to the target object.
According to an embodiment of the present disclosure, the object verification method further includes:
for each of the at least one object,
determining the number of preset sub-objects corresponding to the object;
determining the actual position information of the object in the physical storehouse; and
and associating and storing the sub-label information corresponding to the object and the preset number of sub-objects in a pre-established virtual warehouse according to the actual position information, wherein the virtual warehouse corresponds to the physical warehouse.
According to an embodiment of the present disclosure, the verifying the target object according to the sub-label information and the sub-image information corresponding to the target object, and obtaining a verification result includes:
determining the number of the preset sub-objects corresponding to the sub-label information according to the sub-label information;
determining the actual sub-object number corresponding to the sub-image information according to the sub-image information;
determining a first verification result according to the preset sub-object quantity and the actual sub-object quantity; and
and under the condition that the first verification result represents that the preset sub-object number and the actual sub-object number meet a first preset condition, performing integrity verification on the target object to obtain a second verification result.
According to the embodiment of the present disclosure, after the target object is verified according to the sub-label information and the sub-image information corresponding to the target object, and a verification result is obtained:
outputting early warning information under the condition that the verification result represents that the target object is not verified; and
and under the condition that the verification result indicates that the target object passes the verification, storing the verification result, the sub-label information corresponding to the target object and the sub-image information into a database in an associated manner.
According to another aspect of the present disclosure, an object verification method is provided, which is applied to an equipment management platform, where the equipment management platform is connected to an internet of things platform, and the method includes:
in response to receiving an object verification instruction from the internet of things platform, obtaining tag information according to the object verification instruction, wherein the object verification instruction comprises at least one object, and the tag information comprises sub-tag information corresponding to the at least one object;
sending the label information to the Internet of things platform;
in response to receiving a target object verification instruction from the internet of things platform, acquiring image information according to the target object verification instruction, wherein the target object verification instruction comprises a target object, the target object belongs to the at least one object, and the image information comprises sub-image information corresponding to the target object; and
and sending the image information to the Internet of things platform so that a remote operation platform connected with the Internet of things platform can verify the target object according to the sub-label information and the sub-image information.
According to an embodiment of the present disclosure, the obtaining tag information according to the object verification instruction in response to receiving the object verification instruction from the internet of things platform includes:
determining position information corresponding to each of the at least one object according to the object verification instruction; and
and acquiring sub-label information corresponding to the at least one object according to the position information corresponding to the at least one object by using the first target equipment.
According to an embodiment of the present disclosure, the obtaining image information according to the target object verification instruction in response to receiving the target object verification instruction from the internet of things platform includes:
determining the sub-tag information and the target position information corresponding to the target object according to the target object verification instruction; and
and acquiring sub-image information corresponding to the target object by using second target equipment according to the sub-label information and the target position information.
According to an embodiment of the present disclosure, the first target device includes a radio frequency identification device, and the sub-tag information corresponding to each of the at least one object includes radio frequency identification tag information.
According to an embodiment of the present disclosure, the second target device includes an image pickup device, and the sub-image information corresponding to the target object includes at least one of two-dimensional image information and three-dimensional image information.
According to another aspect of the present disclosure, an object verification apparatus is provided, which is applied to a remote operation platform, the remote operation platform is connected to an internet of things platform, and the apparatus includes:
the system comprises a first sending module, a second sending module and a third sending module, wherein the first sending module is used for responding to the detected object verification instruction and sending the object verification instruction to the Internet of things platform, and the object verification instruction comprises at least one object;
a first obtaining module, configured to obtain tag information from the internet of things platform, where the tag information includes sub-tag information corresponding to each of the at least one object;
a second sending module, configured to send, in response to detecting a target object verification instruction, the target object verification instruction to the internet of things platform, where the target object verification instruction includes a target object, and the target object belongs to the at least one object;
the second acquisition module is used for acquiring image information from the Internet of things platform, wherein the image information comprises sub-image information corresponding to the target object; and
and the verification module is used for verifying the target object according to the sub-label information and the sub-image information corresponding to the target object to obtain a verification result.
According to another aspect of the present disclosure, an object verification apparatus is provided, which is applied to a device management platform, where the device management platform is connected to an internet of things platform, and the apparatus includes:
a third obtaining module, configured to obtain, in response to receiving an object verification instruction from the internet of things platform, tag information according to the object verification instruction, where the object verification instruction includes at least one object, and the tag information includes sub-tag information corresponding to each of the at least one object;
the third sending module is used for sending the label information to the Internet of things platform;
a fourth obtaining module, configured to, in response to receiving a target object verification instruction from the internet of things platform, obtain image information according to the target object verification instruction, where the target object verification instruction includes a target object, the target object belongs to the at least one object, and the image information includes sub-image information corresponding to the target object; and
and the fourth sending module is used for sending the image information to the Internet of things platform so that a remote operation platform connected with the Internet of things platform can verify the target object according to the sub-label information and the sub-image information.
According to another aspect of the present disclosure, there is provided an electronic device including:
one or more processors;
a memory to store one or more instructions that,
wherein the one or more instructions, when executed by the one or more processors, cause the one or more processors to implement a method as described in this disclosure.
According to another aspect of the present disclosure, there is provided a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to implement a method as described in the present disclosure.
According to another aspect of the present disclosure, there is provided a computer program product comprising computer executable instructions for implementing a method as described in the present disclosure when executed.
According to the embodiment of the disclosure, the remote operation platform and the equipment management platform are managed in a unified manner based on the platform of the internet of things, so that the efficiency and the safety of information transmission can be guaranteed. On the basis, since the tag information is acquired according to the object verification instruction, sub-tag information corresponding to each of the at least one object can be included, thereby improving the efficiency of tag information acquisition. Since the image information is acquired according to the target object verification instruction, the sub-image information corresponding to the target object can be included, thereby improving the efficiency of image information acquisition. In addition, the target object is verified according to the sub-label information and the sub-image information corresponding to the target object to obtain a verification result, so that the technical problem that the efficiency and the accuracy of the vault management cannot be guaranteed in the related technology is at least partially solved, the efficiency of object verification is improved, and the accuracy of the vault management is guaranteed.
Drawings
The above and other objects, features and advantages of the present disclosure will become more apparent from the following description of the embodiments of the present disclosure with reference to the accompanying drawings, in which:
FIG. 1 schematically illustrates a system architecture to which an object verification method may be applied, according to an embodiment of the disclosure;
FIG. 2 schematically shows a flow diagram of an object verification method according to an embodiment of the present disclosure;
FIG. 3A schematically illustrates an example schematic diagram of a process of generating object verification instructions according to an embodiment of this disclosure;
FIG. 3B schematically illustrates an example schematic diagram of a process of generating target object validation instructions according to an embodiment of this disclosure;
FIG. 4 schematically illustrates an example schematic diagram of an object verification process in accordance with an embodiment of this disclosure;
FIG. 5 schematically shows a flow diagram of an object verification method according to another embodiment of the present disclosure;
FIG. 6A schematically illustrates an example schematic diagram of a process of obtaining tag information, in accordance with an embodiment of the disclosure;
FIG. 6B schematically illustrates an example schematic diagram of a process of acquiring image information, according to an embodiment of the disclosure;
FIG. 7 schematically illustrates an example schematic diagram of an object verification process according to another embodiment of this disclosure;
FIG. 8 schematically illustrates a block diagram of an object authentication device according to an embodiment of the present disclosure;
fig. 9 schematically shows a block diagram of an object authentication apparatus according to another embodiment of the present disclosure; and
fig. 10 schematically shows a block diagram of an electronic device adapted to implement a method of object authentication according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs, unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B, and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B, and C" would include but not be limited to systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.). In those instances where a convention analogous to "at least one of A, B, or C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B, or C" would include but not be limited to systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.).
In the technical scheme of the disclosure, the acquisition, storage, application and the like of the personal information of the related user all accord with the regulations of related laws and regulations, necessary security measures are taken, and the customs of the public order is not violated.
In the technical scheme of the disclosure, before the personal information of the user is acquired or collected, the authorization or the consent of the user is acquired.
The vault may include at least one of: the bank business institution is a business bank for handling the cashier business, a central allocating bank for handling the internal cash allocating of the administration bank, and an issuing fund security bank for acting the currency issuing business. The vault management can be based on computer technology.
However, in the prior art, since professionals need to be arranged to perform cross-region clinical examination on target objects in a target safe, the efficiency and the accuracy of safe management cannot be guaranteed.
In order to at least partially solve the technical problems in the related art, the present disclosure provides an object verification method and apparatus, an electronic device, and a computer-readable storage medium, which are applied to a remote operation platform, and the remote operation platform is connected to an internet of things platform, and can be applied to the fields of computer technology and financial technology. The object authentication method includes: responding to the detected object verification instruction, and sending the object verification instruction to the Internet of things platform, wherein the object verification instruction comprises at least one object; acquiring label information from an Internet of things platform, wherein the label information comprises sub-label information corresponding to at least one object; responding to the detected target object verification instruction, and sending the target object verification instruction to the Internet of things platform, wherein the target object verification instruction comprises a target object, and the target object belongs to at least one object; acquiring image information from an Internet of things platform, wherein the image information comprises sub-image information corresponding to a target object; and verifying the target object according to the sub-label information and the sub-image information corresponding to the target object to obtain a verification result.
It should be noted that the object verification method and apparatus provided by the embodiments of the present disclosure may be applied to the fields of computer technology and financial technology, for example, in the field of network technology. The object verification method and the object verification device provided by the embodiment of the disclosure can also be used in any fields except the fields of computer technology and financial science and technology, such as the field of warehouse management. The application fields of the object verification method and the object verification device provided by the embodiment of the disclosure are not limited.
Fig. 1 schematically shows a system architecture to which an object verification method may be applied according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of a system architecture to which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, and does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, the system architecture 100 according to this embodiment may include a first terminal device 101, a second terminal device 102, a third terminal device 103, a network 104, and a server 105. The network 104 is used to provide a medium of communication links between the first terminal device 101, the second terminal device 102, the third terminal device 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may interact with the server 105 via the network 104 using at least one of the first terminal device 101, the second terminal device 102, the third terminal device 103, to receive or send messages or the like. Various communication client applications, such as a shopping application, a web browser application, a search application, an instant messaging tool, a mailbox client, social platform software, etc. (for example only), may be installed on the first terminal device 101, the second terminal device 102, and the third terminal device 103.
The first terminal device 101, the second terminal device 102, and the third terminal device 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, radio frequency identification devices, image capture devices, and the like.
The server 105 may be a server providing various services, such as a background management server (for example only) providing support for websites browsed by the user using the first terminal device 101, the second terminal device 102, and the third terminal device 103. The background management server may analyze and perform other processing on the received data such as the user request, and feed back a processing result (e.g., a webpage, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that the object verification method provided by the embodiment of the present disclosure may be generally executed by the server 105. Accordingly, the object authentication apparatus provided by the embodiments of the present disclosure may be generally disposed in the server 105. The object verification method provided by the embodiment of the present disclosure may also be executed by a server or a server cluster that is different from the server 105 and is capable of communicating with the first terminal device 101, the second terminal device 102, the third terminal device 103 and/or the server 105. Accordingly, the object verification apparatus provided in the embodiment of the present disclosure may also be disposed in a server or a server cluster different from the server 105 and capable of communicating with the first terminal device 101, the second terminal device 102, the third terminal device 103 and/or the server 105.
Alternatively, the object verification method provided by the embodiment of the present disclosure may also be executed by the first terminal device 101, the second terminal device 102, or the third terminal device 103, or may also be executed by another terminal device different from the first terminal device 101, the second terminal device 102, or the third terminal device 103. Accordingly, the object verification apparatus provided in the embodiment of the present disclosure may also be disposed in the first terminal device 101, the second terminal device 102, or the third terminal device 103, or disposed in another terminal device different from the first terminal device 101, the second terminal device 102, or the third terminal device 103.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
It should be noted that the sequence numbers of the respective operations in the following methods are merely used as representations of the operations for description, and should not be construed as representing the execution order of the respective operations. The method need not be performed in the exact order shown, unless explicitly stated.
Fig. 2 schematically shows a flow chart of an object verification method according to an embodiment of the present disclosure.
As shown in fig. 2, the object authentication method 200 includes operations S210 to S250.
In operation S210, in response to detecting an object verification instruction, the object verification instruction is sent to the internet of things platform, where the object verification instruction includes at least one object.
In operation S220, tag information from the internet of things platform is acquired, where the tag information includes sub-tag information corresponding to each of the at least one object.
In operation S230, in response to detecting a target object verification instruction, the target object verification instruction is sent to the internet of things platform, where the target object verification instruction includes a target object, and the target object belongs to at least one object.
In operation S240, image information from the internet of things platform is acquired, wherein the image information includes sub-image information corresponding to the target object.
In operation S250, the target object is verified according to the sub-tag information and the sub-image information corresponding to the target object, and a verification result is obtained.
According to an embodiment of the present disclosure, the object verification method 200 may be applied to a remote operation platform. The remote operation platform may be connected with an Internet of Things (IoT) platform. The Internet of things platform can connect the target object with the network through the information sensing equipment according to an agreed protocol so as to exchange and communicate information related to the target object.
According to an embodiment of the present disclosure, an object verification system may include a remote operation platform, an internet of things platform, and a device management platform. The remote operation platform and the equipment management platform can perform information interaction through the Internet of things platform. The object verification system can be applied to the field of financial technology, and for example, vault management can be performed based on the object verification system. In this case, the object may include at least one of: cash, precious metals, and blank vouchers.
According to the embodiment of the disclosure, a code for generating the object verification instruction may be written into a first script in advance, and in response to detecting that a user performs an object verification operation using a remote operation platform, the remote operation platform may execute the first script to generate the object verification instruction. The remote operation platform can send the object verification instruction to a first server of the remote operation platform, so that the first server can send the object verification instruction to the Internet of things platform to obtain the label information.
According to the embodiment of the disclosure, after the platform of the internet of things receives the object verification instruction, the object verification instruction can be sent to the equipment management platform, so that the equipment management platform can obtain the label information according to the object verification instruction. The tag information may include at least one sub-tag information. The sub tag information may correspond to at least one object. After the device management platform obtains the tag information, the tag information can be sent to the internet of things platform. The remote operation platform can acquire label information from the platform of the internet of things.
According to an embodiment of the present disclosure, tag information may be acquired based on a radio frequency device. For example, the manner of obtaining the tag information based on the radio frequency device may include one of the following: the method comprises the steps of obtaining label information based on a Bluetooth device, obtaining label information based on a WiFi (Wireless Fidelity) device, obtaining label information based on an UWB (Ultra Wide Band) device, obtaining label information based on a ZigBee device and obtaining label information based on an RFID (Radio Frequency Identification) label.
According to the embodiment of the disclosure, a code for generating the target object verification instruction may be written in the second script in advance, and in response to detecting that the target object verification operation is performed by the user using the remote operation platform, the remote operation platform may run the second script to generate the target object verification instruction. The remote operation platform can send the target object verification instruction to a first server of the remote operation platform, so that the first server sends the object verification instruction to the internet of things platform to acquire the image information.
According to the embodiment of the disclosure, after receiving the target object verification instruction, the internet of things platform can send the target object verification instruction to the equipment management platform, so that the equipment management platform can obtain image information according to the target object verification instruction. The image information may include at least one sub-image information. The sub-image information may correspond to the target object. The sub-picture information may include one of: video, video frames, and pictures. After the device management platform obtains the image information, the image information can be sent to the internet of things platform. The remote operation platform can acquire image information from the platform of the internet of things. The image information may be acquired based on an image acquisition device.
According to the embodiment of the disclosure, after obtaining the tag information, the remote operation platform may compare the sub-tag information corresponding to each of the at least one object with the corresponding inventory information to obtain a first initial verification result. After the remote operation platform obtains the image information, the target object can be verified according to the sub-label information and the sub-image information corresponding to the target object, and a second initial verification result is obtained. And determining a verification result according to the first initial verification result and the second initial verification result. The verification result can be used to characterize whether the sub-label information, the sub-image information, and the inventory information of the target object are consistent.
According to the embodiment of the disclosure, the remote operation platform and the equipment management platform are managed in a unified manner based on the platform of the internet of things, so that the efficiency and the safety of information transmission can be guaranteed. On the basis, since the tag information is acquired according to the object verification instruction, sub-tag information corresponding to each of the at least one object can be included, thereby improving the efficiency of tag information acquisition. Since the image information is acquired according to the target object verification instruction, the sub-image information corresponding to the target object can be included, thereby improving the efficiency of image information acquisition. In addition, the target object is verified according to the sub-label information and the sub-image information corresponding to the target object to obtain a verification result, so that the technical problem that the efficiency and the accuracy of the vault management cannot be guaranteed in the related technology is at least partially solved, the efficiency of object verification is improved, and the accuracy of the vault management is guaranteed.
Referring to fig. 3A, 3B and 4, an object authentication method 200 according to an embodiment of the present invention is further described.
According to an embodiment of the present disclosure, the object verification method 200 may further include the following operations.
For each object of the at least one object, a preset number of sub-objects corresponding to the object is determined. And determining the actual position information of the object in the physical warehouse. And associating and storing the sub-label information corresponding to the object and the preset number of the sub-objects in a pre-established virtual warehouse according to the actual position information, wherein the virtual warehouse corresponds to the entity warehouse.
According to the embodiment of the disclosure, the virtual storeroom can be established in advance according to the solid storeroom and based on a three-dimensional modeling mode. For example, the virtual warehouse may be established according to at least one stereoscopic shelf in the physical warehouse, the position information corresponding to each of the at least one stereoscopic shelf, the at least one turnover box, and the position information corresponding to each of the at least one turnover box. The three-dimensional modeling approach may include at least one of: non-Uniform Rational B-Splines (NURBS) based three-dimensional modeling and polygonal mesh based three-dimensional modeling.
According to the embodiment of the disclosure, the sub-tag information corresponding to the object and the preset number of sub-objects can be associated and stored in the pre-established virtual warehouse according to the actual position information. In this case, the virtual repository may be used to characterize actual location information corresponding to each of the at least one object, a preset number of sub-objects corresponding to each of the at least one object, and sub-tag information. For example, the object may include a tote, the sub-tag information may include a radio frequency identification tag of the tote, and the preset sub-object number may include a money bundle number corresponding to the tote.
According to the embodiment of the disclosure, since the object verification system may include the remote operation platform, the internet of things platform and the device management platform, the internet of things platform can get through the remote operation platform and the device management platform. On the basis, the user can initiate the object verification operation through the virtual storehouse of the remote operation platform, so that the object verification efficiency is improved.
According to an embodiment of the present disclosure, the object verification instruction may be generated as follows.
In response to detecting an object verification operation initiated by a user using the remote operation platform, determining location information corresponding to each of the at least one object. And generating an object verification instruction according to the position information corresponding to each of the at least one object.
According to the embodiment of the disclosure, a user can log in the remote operation platform and click to enter the virtual storeroom. In response to detecting an object verification operation initiated by a user using the remote operation platform, location information corresponding to each of the at least one object may be determined. For example, the user may select a corresponding vault in the virtual vault to browse at least one stereoscopic shelf. Each three-dimensional shelf in at least one three-dimensional shelf can show at least one turnover box bound with the three-dimensional shelf. In response to detecting an object verification operation of a user on any turnover box in the at least one turnover box, location information corresponding to each of the at least one turnover box may be determined according to a location of the any turnover box in the virtual warehouse.
According to an embodiment of the present disclosure, after obtaining the location information corresponding to each of the at least one object, the object verification instruction may be generated according to the location information corresponding to each of the at least one object. After the object verification instruction is generated, the object verification instruction can be sent to the internet of things platform, so that the internet of things platform can forward the object verification instruction to the equipment management platform.
Fig. 3A schematically illustrates an example schematic diagram of a process of generating object verification instructions according to an embodiment of the disclosure.
As shown in fig. 3A, in 300A, in response to detecting an object authentication operation initiated by a user with a remote operation platform, at least one object 301 corresponding to the object authentication operation may be determined. At least one object 301 may include object 301 u 1, object 301 u 2, \8230, object 301 u m, \8230, and object 301 u m. M may be an integer greater than or equal to 1, M ∈ {1,2, \8230; (M-1), M }.
After at least one object 301 is determined, location information 302 _1corresponding to object 301_1, location information 302_2, · corresponding to object 301_2, location information 302_m, \8230correspondingto object 301_m, and location information 302 _mcorresponding to object 301 _mmay be determined, respectively.
After determining the position information corresponding to each of the at least one object 301, the object verification instruction 303 may be generated based on the position information 302 u 1, 302 u 2, 8230, 302 u m, 8230, and 302 u m.
According to an embodiment of the present disclosure, the target object verification instruction may be generated as follows.
And in response to detecting that the target object verification operation initiated by the user by using the remote operation platform, determining the sub-label information and the target position information corresponding to the target object. And generating a target object verification instruction according to the sub-label information and the target position information corresponding to the target object.
According to the embodiment of the disclosure, a user can log in the remote operation platform and click and select a target object in at least one object. In response to detecting a target object verification operation initiated by a user using the remote operation platform, sub-tag information and target location information corresponding to the target object may be determined. For example, the user may select a target tote in the at least one tote box, and may determine the sub-label information and the target location information of the target tote box according to the location of the target tote box in the physical warehouse.
According to the embodiment of the disclosure, the sub-tag information and the target position information corresponding to the target object are obtained. Thereafter, a target object verification instruction may be generated based on the sub-tag information and the target location information corresponding to the target object. The target object verification instructions may include video-check instructions. After the target object verification instruction is generated, the target object verification instruction may be sent to the internet of things platform, so that the internet of things platform forwards the target object verification instruction to the device management platform.
Fig. 3B schematically illustrates an example schematic diagram of a process of generating target object validation instructions according to an embodiment of this disclosure.
As shown in FIG. 3B, in 300B, at least one object may include object 3041, object 3042, \8230, object 304N, \8230, object 304N. N may be an integer greater than or equal to 1, N ∈ {1,2, \8230; (N-1), N }. In response to detecting a target object verification operation initiated by a user using the remote operation platform, a target object 305 may be determined among the at least one object.
After determining the target object 305, the sub-tag information 306 and the target location information 307 corresponding to the target object 305 may be determined from the target object 305.
After determining the sub-tag information 306 and the target location information 307, target object validation instructions 308 may be generated based on the sub-tag information 306 and the target location information 307 corresponding to the target object 305.
According to the embodiment of the present disclosure, verifying the target object according to the sub-tag information and the sub-image information corresponding to the target object, and obtaining the verification result may include the following operations.
And determining the number of preset sub-objects corresponding to the sub-label information according to the sub-label information. And determining the actual number of the sub-objects corresponding to the sub-image information according to the sub-image information. And determining a first verification result according to the preset sub-object quantity and the actual sub-object quantity. And under the condition that the first verification result represents that the number of the preset sub-objects and the number of the actual sub-objects meet the first preset condition, performing integrity verification on the target object to obtain a second verification result.
According to an embodiment of the present disclosure, the first verification result may be used to represent whether the preset sub-object number and the actual sub-object number satisfy a first preset condition. The first preset condition may be set according to an actual service requirement, and is not limited herein. For example, the first preset condition may include that the preset number of sub-objects and the actual number of sub-objects are equal. Alternatively, the first preset condition may include that a difference between the preset sub-object number and the actual sub-object number is less than or equal to a preset threshold. The preset threshold may be set to 1.
According to the embodiment of the disclosure, under the condition that the first verification result represents that the preset sub-object number and the actual sub-object number do not meet the first preset condition, first early warning information can be output. And under the condition that the first verification result represents that the number of the preset sub-objects and the number of the actual sub-objects meet the first preset condition, performing integrity verification on the target object to obtain a second verification result. The second verification result may be used to characterize whether the outer surface of the target object is intact. The specific mode of integrity verification may be set according to actual service requirements, and is not limited herein. For example, integrity verification may include confirming whether the packaging of the target object is complete.
According to an embodiment of the present disclosure, the object verification method 200 may further include the following operations.
And outputting early warning information under the condition that the verification result represents that the target object is not verified. And under the condition that the verification result represents that the target object passes the verification, the verification result, the sub-label information corresponding to the target object and the sub-image information are stored in a database in an associated manner.
According to an embodiment of the present disclosure, the verification result may be used to characterize whether the target object passes the verification. And under the condition that the verification result represents that the target object is not verified, outputting early warning information. The warning information may be "please notice: target object a failed verification ". The early warning information can be displayed to the staff, so that the staff can further check the target object which is possibly abnormal according to the early warning information.
According to the embodiments of the present disclosure, since the first verification result is determined according to the preset number of sub-objects and the actual number of sub-objects, the first verification result enables verification of the number of sub-objects with respect to the target object. In addition, the second verification result is obtained by verifying the integrity of the target object under the condition that the first verification result represents the preset sub-object number and the actual sub-object number meets the first preset condition, so that the second verification result can verify the object integrity of the target object. On the basis, the verification result can reflect the number of the sub-objects and the integrity of the object at the same time, so that the accuracy of object verification is improved.
Fig. 4 schematically shows an example schematic diagram of an object verification process according to an embodiment of the disclosure.
As shown in fig. 4, in 400, after the tag information and the image information from the internet of things platform are acquired, sub-tag information 402 and sub-image information 403 corresponding to a target object 401 may be determined.
After determining the sub tag information 402 and the sub image information 403, a preset number of sub objects 404 corresponding to the sub tag information 402 may be determined according to the sub tag information 402. From the sub-image information 403, the actual number of sub-objects 405 corresponding to the sub-image information 403 is determined.
After determining the preset number of sub-objects 404 and the actual number of sub-objects 405, a first verification result 406 may be determined according to the preset number of sub-objects 404 and the actual number of sub-objects 405. After obtaining the first verification result 406, operation S410 may be performed.
In operation S410, a first verification result represents that the preset sub-object number and the actual sub-object number satisfy a first preset condition? If not, early warning information 409 can be output.
If yes, the integrity of the target object is verified, and a second verification result 407 is obtained. After obtaining the second verification result 407, S420 may be performed.
In operation S420, is the second verification result characteristic that the target object is verified? If not, early warning information 409 can be output.
If yes, the first verification result 406, the second verification result 407, the sub-tag information 402 corresponding to the target object 401, and the sub-image information 403 are stored in the database 408 in association with each other.
The above is only an exemplary embodiment, but not limited thereto, and other object verification methods known in the art may be included, as long as the efficiency of object verification can be improved and the accuracy of vault management can be guaranteed.
Fig. 5 schematically shows a flow chart of an object verification method according to another embodiment of the present disclosure.
As shown in fig. 5, the object authentication method includes operations S510 to S540.
In operation S510, in response to receiving an object verification instruction from an internet of things platform, tag information is obtained according to the object verification instruction, where the object verification instruction includes at least one object, and the tag information includes sub-tag information corresponding to each of the at least one object.
In operation S520, the tag information is sent to the internet of things platform.
In operation S530, in response to receiving a target object verification instruction from the internet of things platform, image information is acquired according to the target object verification instruction, where the target object verification instruction includes a target object, the target object belongs to at least one object, and the image information includes sub-image information corresponding to the target object.
In operation S540, the image information is sent to the internet of things platform, so that the remote operation platform connected to the internet of things platform verifies the target object according to the sub-tag information and the sub-image information.
According to an embodiment of the present disclosure, the object verification method 500 may be applied to a device management platform. The equipment management platform can be connected with the Internet of things platform.
According to embodiments of the present disclosure, a device management platform may be used to manage a target device. The target device may include at least one of: the system comprises a three-dimensional shelf, a turnover box, a rectangular Robot (Cartesian Robot), a Mechanical Arm (Mechanical Arm), an automatic navigation device (AGV), a Personal Digital Assistant (PDA) image acquisition device and a radio frequency device.
According to an embodiment of the disclosure, in response to receiving an object verification instruction from an internet of things platform, an equipment management platform may obtain tag information from a first data source. The first data source may include at least one of: a local database, a cloud database, and network resources. For example, a data interface may be invoked. Tag information is obtained from a first data source using a data interface. Alternatively, the device management platform may collect tag information in real-time with the first target device. After the device management platform obtains the tag information, the tag information can be sent to the internet of things platform, so that the remote operation platform can conveniently obtain the tag information from the internet of things platform.
According to an embodiment of the disclosure, in response to receiving a target object verification instruction from the internet of things platform, the device management platform may obtain image information from the second data source. For example, a data interface may be invoked. And acquiring the image information from the second data source by using the data interface. Alternatively, the device management platform may capture image information in real-time with the second device. After the equipment management platform obtains the image information, the image information can be sent to the Internet of things platform, so that the remote operation platform can obtain the image information from the Internet of things platform.
According to the embodiments of the present disclosure, since the tag information is acquired according to the object verification instruction, sub-tag information corresponding to each of the at least one object can be included, thereby improving the efficiency of tag information acquisition. Since the image information is acquired according to the target object authentication instruction, the sub-image information corresponding to the target object can be included, thereby improving the efficiency of image information acquisition. In addition, because the remote operation platform and the equipment management platform are managed in a unified mode based on the Internet of things platform, the efficiency and the safety of information transmission can be guaranteed, the efficiency of object verification is improved, and the accuracy of vault management is guaranteed.
Referring now to fig. 6A, 6B, and 7, an object authentication method 500 according to an embodiment of the invention is further described.
According to an embodiment of the present disclosure, the first target device includes a radio frequency identification device, and the sub-tag information corresponding to each of the at least one object includes radio frequency identification tag information.
According to an embodiment of the present disclosure, the second target device includes an image pickup device, and the sub-image information corresponding to the target object includes at least one of two-dimensional image information and three-dimensional image information.
According to an embodiment of the disclosure, in response to receiving an object verification instruction from an internet of things platform, acquiring tag information according to the object verification instruction may include the following operations.
And determining position information corresponding to each of the at least one object according to the object verification instruction. And acquiring sub-tag information corresponding to the at least one object by using the first target device according to the position information corresponding to the at least one object.
According to the embodiment of the disclosure, after receiving the object verification instruction, the device management platform may determine at least one object in the object verification instruction according to the object verification instruction. According to the at least one object, position information corresponding to each of the at least one object is determined. After obtaining the location information corresponding to each of the at least one object, the first target device may be utilized to perform tag collection on the location corresponding to the location information to obtain sub-tag information corresponding to each of the at least one object. The first target device may comprise a radio frequency identification device. The sub-tag information corresponding to each of the at least one object may include a radio frequency identification tag.
According to embodiments of the present disclosure, radio frequency identification technology may include radio frequency identification readers and radio frequency identification tags. Radio frequency identification tags may include active tags and passive tags. A binary code for identifying at least one object may be written to the rfid tag and the rfid tag may be attached to the corresponding object to complete the matching of the rfid tag and the object.
According to the embodiment of the disclosure, taking the sub-tag information as the radio frequency identification tag as an example, the device management platform may drive the truss robot to move to the three-dimensional shelf corresponding to the at least one object, and perform radio frequency identification scanning on the at least one object by using the radio frequency device, so as to obtain the sub-tag information corresponding to the at least one object. After the sub-tag information corresponding to the at least one object is obtained, the sub-tag information corresponding to the at least one object may be sent to the internet of things platform, so that the internet of things platform forwards the sub-tag information corresponding to the at least one object to the remote operation platform.
Fig. 6A schematically illustrates an example schematic diagram of a process of obtaining tag information according to an embodiment of the disclosure.
As shown in fig. 6A, in 600A, in response to receiving an object verification instruction 601, location information corresponding to each of at least one object may be determined. At least one of the position information may include position information 6011, position information 6012, \8230;, position information 601P, \8230;, and position information 601P. P may be an integer greater than or equal to 1, P ∈ {1,2, \8230; (P-1), P }.
After determining the location information corresponding to each of the at least one object, the first target device may be used to acquire the sub-tag information 6021 from the location information 6011, the sub-tag information 6022, \8230fromthe location information 6012, the sub-tag information 602P, \8230fromthe location information 601P, and the sub-tag information 602P from the location information 601P.
After obtaining the sub-tag information corresponding to each of the at least one object, the tag information 603 may be determined according to the sub-tag information 6021, the sub-tag information 6022, \8230, the sub-tag information 602P, \8230, and the sub-tag information 602P.
According to an embodiment of the disclosure, in response to receiving a target object verification instruction from an internet of things platform, acquiring image information according to the target object verification instruction may include the following operations.
And determining the sub-label information and the target position information corresponding to the target object according to the target object verification instruction. And acquiring sub-image information corresponding to the target object by using the second target equipment according to the sub-label information and the target position information.
According to an embodiment of the present disclosure, the second target device may comprise an image acquisition device. The sub-image information corresponding to the target object may include at least one of two-dimensional image information and three-dimensional image information.
According to the embodiment of the disclosure, the equipment management platform can drive the truss robot to convey the target object from the stereoscopic shelf to the inspection table. Sub-image information corresponding to the target object may be acquired using a second target device. After obtaining the sub-image information, the device management platform may drive the truss robot to transport the target object from the inspection station back to the stereoscopic shelf. The equipment management platform can send the subimage information to the Internet of things platform in real time so that the Internet of things platform can send the subimage information to the remote operation platform conveniently.
According to the embodiment of the disclosure, since the sub-label information is acquired according to the position information corresponding to each of the at least one object by using the first target device, and the sub-image information is acquired according to the sub-label information and the target position information by using the second target device, a quick response of object verification is realized, and thus the efficiency of vault management is ensured.
Fig. 6B schematically illustrates an example schematic diagram of a process of acquiring image information according to an embodiment of the disclosure.
As shown in fig. 6B, in 600B, in response to receiving the target object verification instruction 604 from the internet of things platform, sub-tag information 605 and target location information 606 corresponding to the target object may be determined according to the target object verification instruction 604.
After determining the sub-label information 605 and the target location information 606, sub-image information 607 corresponding to the target object may be collected from the sub-label information 605 and the target location information 606 using a second target device.
Fig. 7 schematically shows an example schematic diagram of an object verification process according to another embodiment of the present disclosure.
As shown in fig. 7, in 700, operations S701 to S717 schematically show a schematic diagram of the object authentication process.
In operation S701, the remote operation platform detects an object verification instruction.
In operation S702, the remote operation platform sends the object verification instruction to the internet of things platform.
In operation S703, the internet of things platform sends the object verification instruction to the device management platform.
In operation S704, the device management platform receives an object verification instruction.
In operation S705, the device management platform acquires tag information according to the object verification instruction.
In operation S706, the device management platform sends the tag information to the internet of things platform.
In operation S707, the internet of things platform sends the tag information to the remote operation platform.
In operation S708, the remote operation platform acquires tag information from the internet of things platform.
In operation S709, the remote operation platform detects a target object verification instruction.
In operation S710, the remote operation platform sends the target object verification instruction to the internet of things platform.
In operation S711, the internet of things platform sends the target object verification instruction to the device management platform.
In operation S712, the device management platform receives a target object verification instruction.
In operation S713, the device management platform acquires image information according to the target object verification instruction.
In operation S714, the device management platform sends the image information to the internet of things platform.
In operation S715, the internet of things platform sends the image information to the remote operation platform.
In operation S716, the remote operation platform acquires image information from the internet of things platform.
In operation S717, the remote operation platform verifies the target object according to the sub-tag information and the sub-image information corresponding to the target object, and obtains a verification result.
The above is only an exemplary embodiment, but not limited thereto, and other object verification methods known in the art may be included, as long as the efficiency of object verification can be improved and the accuracy of vault management can be guaranteed.
Fig. 8 schematically shows a block diagram of an object authentication apparatus according to an embodiment of the present disclosure.
As shown in fig. 8, the object authentication apparatus 800 may include a first transmitting module 810, a first obtaining module 820, a second transmitting module 830, a second obtaining module 840, and an authentication module 850.
A first sending module 810, configured to send an object verification instruction to the internet of things platform in response to detecting the object verification instruction, where the object verification instruction includes at least one object.
The first obtaining module 820 is configured to obtain tag information from an internet of things platform, where the tag information includes sub-tag information corresponding to at least one object.
The second sending module 830 is configured to send the target object verification instruction to the internet of things platform in response to detecting the target object verification instruction, where the target object verification instruction includes a target object, and the target object belongs to at least one object.
The second obtaining module 840 is configured to obtain image information from the internet of things platform, where the image information includes sub-image information corresponding to the target object.
And the verification module 850 is configured to verify the target object according to the sub-tag information and the sub-image information corresponding to the target object, so as to obtain a verification result.
According to the embodiment of the present disclosure, the object verification apparatus 800 may be applied to a remote operation platform, and the remote operation platform is connected to an internet of things platform.
According to an embodiment of the present disclosure, the object verification instruction may be generated as follows.
In response to detecting an object verification operation initiated by a user using the remote operation platform, determining location information corresponding to each of the at least one object. And generating an object verification instruction according to the position information corresponding to each of the at least one object.
According to an embodiment of the present disclosure, the target object verification instruction may be generated as follows.
And in response to detecting that the target object verification operation initiated by the user by using the remote operation platform, determining sub-tag information and target position information corresponding to the target object. And generating a target object verification instruction according to the sub-label information and the target position information corresponding to the target object.
According to an embodiment of the present disclosure, the object authentication apparatus 800 may further include a first determination module, a second determination module, and a first storage module.
The first determining module is used for determining the preset number of the sub-objects corresponding to the object aiming at each object in at least one object.
And the second determining module is used for determining the actual position information of the object in the physical storehouse.
And the first storage module is used for associating and storing the sub-label information corresponding to the object and the preset number of the sub-objects in a pre-established virtual warehouse according to the actual position information, wherein the virtual warehouse corresponds to the entity warehouse.
According to an embodiment of the present disclosure, the verification module 850 may include a first determination unit, a second determination unit, a third determination unit, and a verification unit.
And the first determining unit is used for determining the number of preset sub-objects corresponding to the sub-label information according to the sub-label information.
And the second determining unit is used for determining the number of the actual sub-objects corresponding to the sub-image information according to the sub-image information.
And the third determining unit is used for determining a first verification result according to the preset sub-object number and the actual sub-object number.
And the verification unit is used for verifying the integrity of the target object to obtain a second verification result under the condition that the first verification result represents the number of the preset sub-objects and the number of the actual sub-objects meet the first preset condition.
According to an embodiment of the present disclosure, the object authentication apparatus 800 may further include an output module and a second storage module.
And the output module is used for outputting the early warning information under the condition that the verification result represents that the target object is not verified.
And the second storage module is used for storing the verification result, the sub-label information corresponding to the target object and the sub-image information in a database in an associated manner under the condition that the verification result represents that the target object passes the verification.
Fig. 9 schematically shows a block diagram of an object authentication apparatus according to another embodiment of the present disclosure.
As shown in fig. 9, the object authentication apparatus 900 may include a third acquiring module 910, a third transmitting module 920, a fourth acquiring module 930, and a fourth transmitting module 940.
The third obtaining module 910 is configured to, in response to receiving an object verification instruction from the internet of things platform, obtain tag information according to the object verification instruction, where the object verification instruction includes at least one object, and the tag information includes sub-tag information corresponding to each of the at least one object.
And a third sending module 920, configured to send the tag information to the internet of things platform.
A fourth obtaining module 930, configured to, in response to receiving a target object verification instruction from the internet of things platform, obtain image information according to the target object verification instruction, where the target object verification instruction includes a target object, the target object belongs to at least one object, and the image information includes sub-image information corresponding to the target object.
The fourth sending module 940 is configured to send the image information to the internet of things platform, so that a remote operation platform connected to the internet of things platform verifies the target object according to the sub-tag information and the sub-image information.
According to an embodiment of the present disclosure, the object verification apparatus 900 may be applied to a device management platform, and the device management platform is connected to an internet of things platform.
According to an embodiment of the present disclosure, the third obtaining module 910 may include a fourth determining unit and a obtaining unit.
And a fourth determining unit, configured to determine, according to the object verification instruction, location information corresponding to each of the at least one object.
An obtaining unit, configured to obtain, by using the first target device, sub-tag information corresponding to each of the at least one object according to the position information corresponding to each of the at least one object.
According to an embodiment of the present disclosure, the fourth obtaining module 930 may include a fifth determining unit and an acquiring unit.
And the fifth determining unit is used for determining the sub-label information and the target position information corresponding to the target object according to the target object verification instruction.
And the acquisition unit is used for acquiring sub-image information corresponding to the target object according to the sub-label information and the target position information by using the second target equipment.
According to an embodiment of the present disclosure, the first target device includes a radio frequency identification device, and the sub-tag information corresponding to each of the at least one object includes radio frequency identification tag information.
According to an embodiment of the present disclosure, the second target device includes an image pickup device, and the sub-image information corresponding to the target object includes at least one of two-dimensional image information and three-dimensional image information.
Any number of modules, sub-modules, units, sub-units, or at least part of the functionality of any number thereof according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, and sub-units according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in any other reasonable manner of hardware or firmware by integrating or packaging a circuit, or in any one of or a suitable combination of software, hardware, and firmware implementations. Alternatively, one or more of the modules, sub-modules, units, sub-units according to embodiments of the disclosure may be at least partially implemented as a computer program module, which when executed may perform the corresponding functions.
For example, any plurality of the modules including the first sending module 810, the first obtaining module 820, the second sending module 830, the second obtaining module 840 and the verifying module 850 may be combined and implemented in one module/unit/sub-unit, or any one of the modules/units/sub-units may be split into a plurality of modules/units/sub-units. Alternatively, at least part of the functionality of one or more of these modules/units/sub-units may be combined with at least part of the functionality of other modules/units/sub-units and implemented in one module/unit/sub-unit. According to an embodiment of the present disclosure, at least one of the modules including the first sending module 810, the first obtaining module 820, the second sending module 830, the second obtaining module 840 and the verifying module 850 may be implemented at least partially as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented by hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or implemented by any one of three implementations of software, hardware and firmware, or any suitable combination of any several of them. Alternatively, at least one of the modules including the first sending module 810, the first obtaining module 820, the second sending module 830, the second obtaining module 840 and the verifying module 850 may be at least partially implemented as a computer program module, which when executed, may perform a corresponding function.
It should be noted that the object verification device portion applied to the remote operation platform in the embodiment of the present disclosure corresponds to the object verification method portion applied to the remote operation platform in the embodiment of the present disclosure, and the description of the object verification device portion applied to the remote operation platform specifically refers to the object verification method portion applied to the remote operation platform, and is not described herein again.
For example, any plurality of the third obtaining module 910, the third sending module 920, the fourth obtaining module 930, and the fourth sending module 940 may be combined into one module/unit/sub-unit to be implemented, or any one of the modules/units/sub-units may be split into a plurality of modules/units/sub-units. Alternatively, at least part of the functionality of one or more of these modules/units/sub-units may be combined with at least part of the functionality of other modules/units/sub-units and implemented in one module/unit/sub-unit. According to an embodiment of the present disclosure, at least one of the third obtaining module 910, the third sending module 920, the fourth obtaining module 930, and the fourth sending module 940 may be implemented at least partially as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented by hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or implemented by any one of three implementations of software, hardware, and firmware, or implemented by a suitable combination of any of them. Alternatively, at least one of the third obtaining module 910, the third sending module 920, the fourth obtaining module 930 and the fourth sending module 940 may be at least partially implemented as a computer program module, which, when executed, may perform a corresponding function.
It should be noted that, the object verification apparatus part applied to the device management platform in the embodiment of the present disclosure corresponds to the object verification method part applied to the device management platform in the embodiment of the present disclosure, and the description of the object verification apparatus part applied to the device management platform specifically refers to the object verification method part applied to the device management platform, and is not described herein again.
Fig. 10 schematically shows a block diagram of an electronic device adapted to implement a method of object authentication according to an embodiment of the present disclosure. The electronic device shown in fig. 10 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 10, the computer electronic device 1000 according to the embodiment of the present disclosure includes a processor 1001 which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 1002 or a program loaded from a storage section 1009 into a Random Access Memory (RAM) 1003. Processor 1001 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 1001 may also include on-board memory for caching purposes. The processor 1001 may include a single processing unit or multiple processing units for performing different actions of a method flow according to embodiments of the present disclosure.
In the RAM 1003, various programs and data necessary for the operation of the electronic apparatus 1000 are stored. The processor 1001, ROM 1002, and RAM 1003 are connected to each other by a bus 1004. The processor 1001 performs various operations of the method flow according to the embodiments of the present disclosure by executing programs in the ROM 1002 and/or the RAM 1003. Note that the programs may also be stored in one or more memories other than the ROM 1002 and the RAM 1003. The processor 1001 may also perform various operations of the method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.
Electronic device 1000 may also include an input/output (I/O) interface 1005, the input/output (I/O) interface 1005 also being connected to bus 1004, according to an embodiment of the present disclosure. Electronic device 1000 may also include one or more of the following components connected to I/O interface 1005: an input portion 1006 including a keyboard, a mouse, and the like; an output section 1007 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 1008 including a hard disk and the like; and a communication section 1009 including a network interface card such as a LAN card, a modem, or the like. The communication section 1009 performs communication processing via a network such as the internet. The driver 1010 is also connected to the I/O interface 1005 as necessary. A removable medium 1011 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 1010 as necessary, so that a computer program read out therefrom is mounted into the storage section 1008 as necessary.
According to an embodiment of the present disclosure, the method flow according to an embodiment of the present disclosure may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable storage medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication part 1009 and/or installed from the removable medium 1011. The computer program performs the above-described functions defined in the system of the embodiment of the present disclosure when executed by the processor 1001. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist alone without being assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement a method according to an embodiment of the disclosure.
According to an embodiment of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium. Examples may include, but are not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
For example, according to embodiments of the present disclosure, a computer-readable storage medium may include the ROM 1002 and/or the RAM 1003 described above and/or one or more memories other than the ROM 1002 and the RAM 1003.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the method provided by the embodiments of the present disclosure, when the computer program product is run on an electronic device, the program code being adapted to cause the electronic device to carry out the object authentication method provided by the embodiments of the present disclosure.
When executed by the processor 1001, performs the above-described functions defined in the system/apparatus of the embodiments of the present disclosure. The systems, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In one embodiment, the computer program may be hosted on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted in the form of a signal on a network medium, distributed, downloaded and installed via the communication part 1009, and/or installed from the removable medium 1011. The computer program containing program code may be transmitted using any suitable network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In accordance with embodiments of the present disclosure, program code for executing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, these computer programs may be implemented using high level procedural and/or object oriented programming languages, and/or assembly/machine languages. The programming language includes, but is not limited to, programming languages such as Java, C + +, python, the "C" language, or the like. The program code may execute entirely on the user computing device, partly on the user device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
The embodiments of the present disclosure are described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the disclosure, and these alternatives and modifications are intended to fall within the scope of the disclosure.

Claims (15)

1. An object verification method is applied to a remote operation platform, the remote operation platform is connected with an Internet of things platform, and the method comprises the following steps:
in response to detecting an object verification instruction, sending the object verification instruction to the internet of things platform, wherein the object verification instruction comprises at least one object;
acquiring label information from the Internet of things platform, wherein the label information comprises sub-label information corresponding to the at least one object;
in response to detecting a target object verification instruction, sending the target object verification instruction to the internet of things platform, wherein the target object verification instruction comprises a target object, and the target object belongs to the at least one object;
acquiring image information from the Internet of things platform, wherein the image information comprises sub-image information corresponding to the target object; and
and verifying the target object according to the sub-label information and the sub-image information corresponding to the target object to obtain a verification result.
2. The method of claim 1, wherein the object verification instructions are generated by:
in response to detecting an object verification operation initiated by a user using the remote operation platform, determining location information corresponding to each of the at least one object; and
and generating the object verification instruction according to the position information corresponding to the at least one object.
3. The method of claim 2, wherein the target object validation instruction is generated by:
in response to detecting that a target object verification operation initiated by a user by using the remote operation platform, determining the sub-tag information and the target position information corresponding to the target object; and
and generating the target object verification instruction according to the sub-label information and the target position information corresponding to the target object.
4. The method of claim 1, further comprising:
for each of the at least one object,
determining the number of preset sub-objects corresponding to the object;
determining actual position information of the object in an entity warehouse; and
and associating and storing the sub-label information corresponding to the object and the preset number of sub-objects in a pre-established virtual warehouse according to the actual position information, wherein the virtual warehouse corresponds to the entity warehouse.
5. The method of claim 4, wherein the verifying the target object according to the sub-label information and the sub-image information corresponding to the target object, and obtaining a verification result comprises:
determining the number of the preset sub-objects corresponding to the sub-label information according to the sub-label information;
determining the actual sub-object number corresponding to the sub-image information according to the sub-image information;
determining a first verification result according to the preset sub-object quantity and the actual sub-object quantity; and
and under the condition that the first verification result represents that the preset sub-object number and the actual sub-object number meet a first preset condition, performing integrity verification on the target object to obtain a second verification result.
6. The method according to any one of claims 1 to 5, further comprising, after the target object is verified according to the sub-label information and the sub-image information corresponding to the target object, obtaining a verification result:
outputting early warning information under the condition that the verification result represents that the target object is not verified; and
and under the condition that the verification result represents that the target object passes the verification, the verification result, the sub-label information and the sub-image information corresponding to the target object are stored in a database in an associated manner.
7. An object verification method is applied to a device management platform, the device management platform is connected with an Internet of things platform, and the method comprises the following steps:
in response to receiving an object verification instruction from the internet of things platform, obtaining tag information according to the object verification instruction, wherein the object verification instruction comprises at least one object, and the tag information comprises sub-tag information corresponding to the at least one object;
sending the label information to the Internet of things platform;
in response to receiving a target object verification instruction from the internet of things platform, acquiring image information according to the target object verification instruction, wherein the target object verification instruction comprises a target object, the target object belongs to the at least one object, and the image information comprises sub-image information corresponding to the target object; and
and sending the image information to the Internet of things platform so that a remote operation platform connected with the Internet of things platform can verify the target object according to the sub-label information and the sub-image information.
8. The method of claim 7, wherein the in response to receiving an object authentication directive from the internet of things platform, obtaining tag information according to the object authentication directive comprises:
according to the object verification instruction, determining position information corresponding to each object; and
and acquiring sub-label information corresponding to the at least one object according to the position information corresponding to the at least one object by using the first target equipment.
9. The method of claim 8, wherein the in response to receiving a target object verification instruction from the internet of things platform, obtaining image information according to the target object verification instruction comprises:
determining the sub-label information and the target position information corresponding to the target object according to the target object verification instruction; and
and acquiring sub-image information corresponding to the target object by using second target equipment according to the sub-label information and the target position information.
10. The method of claim 9, wherein the first target device comprises a radio frequency identification device, the sub-tag information corresponding to each of the at least one object comprises radio frequency identification tag information; and
wherein the second target device comprises an image acquisition device, and the sub-image information corresponding to the target object comprises at least one of two-dimensional image information and three-dimensional image information.
11. An object verification device is applied to a remote operation platform, the remote operation platform is connected with an Internet of things platform, and the device comprises:
the system comprises a first sending module, a second sending module and a third sending module, wherein the first sending module is used for responding to the detection of an object verification instruction and sending the object verification instruction to the Internet of things platform, and the object verification instruction comprises at least one object;
the system comprises a first obtaining module, a second obtaining module and a third obtaining module, wherein the first obtaining module is used for obtaining label information from the Internet of things platform, and the label information comprises sub-label information corresponding to at least one object;
a second sending module, configured to send, in response to detecting a target object verification instruction, the target object verification instruction to the internet of things platform, where the target object verification instruction includes a target object, and the target object belongs to the at least one object;
the second acquisition module is used for acquiring image information from the platform of the Internet of things, wherein the image information comprises sub-image information corresponding to the target object; and
and the verification module is used for verifying the target object according to the sub-label information and the sub-image information corresponding to the target object to obtain a verification result.
12. An object verification device is applied to an equipment management platform, the equipment management platform is connected with an Internet of things platform, and the device comprises:
a third obtaining module, configured to, in response to receiving an object verification instruction from the internet of things platform, obtain tag information according to the object verification instruction, where the object verification instruction includes at least one object, and the tag information includes sub-tag information corresponding to each of the at least one object;
the third sending module is used for sending the label information to the Internet of things platform;
a fourth obtaining module, configured to, in response to receiving a target object verification instruction from the internet of things platform, obtain image information according to the target object verification instruction, where the target object verification instruction includes a target object, the target object belongs to the at least one object, and the image information includes sub-image information corresponding to the target object; and
and the fourth sending module is used for sending the image information to the Internet of things platform so that a remote operation platform connected with the Internet of things platform can verify the target object according to the sub-label information and the sub-image information.
13. An electronic device, comprising:
one or more processors;
a memory to store one or more instructions that,
wherein the one or more instructions, when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-6 or claims 7-10.
14. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to implement the method of any one of claims 1 to 6 or claims 7 to 10.
15. A computer program product comprising computer executable instructions for implementing the method of any one of claims 1 to 6 or claims 7 to 10 when executed.
CN202211616751.7A 2022-12-13 2022-12-13 Object verification method and device, electronic equipment and computer-readable storage medium Pending CN115880045A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211616751.7A CN115880045A (en) 2022-12-13 2022-12-13 Object verification method and device, electronic equipment and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211616751.7A CN115880045A (en) 2022-12-13 2022-12-13 Object verification method and device, electronic equipment and computer-readable storage medium

Publications (1)

Publication Number Publication Date
CN115880045A true CN115880045A (en) 2023-03-31

Family

ID=85753825

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211616751.7A Pending CN115880045A (en) 2022-12-13 2022-12-13 Object verification method and device, electronic equipment and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN115880045A (en)

Similar Documents

Publication Publication Date Title
US20220277207A1 (en) Novel autonomous artificially intelligent system to predict pipe leaks
US10043151B1 (en) Locker-based logistics management system
US11645612B2 (en) Locker-based logistics management system with dynamic and real-time addressing
US10601840B2 (en) Security determination
CN111427971B (en) Business modeling method, device, system and medium for computer system
US10943211B2 (en) Matrix traversal based on hierarchies
WO2021196836A1 (en) Method and apparatus for positioning express parcel
CN115983766A (en) Object position detection method and device, electronic equipment and readable storage medium
CN115880045A (en) Object verification method and device, electronic equipment and computer-readable storage medium
US11669436B2 (en) System for providing interactive tools for design, testing, and implementation of system architecture
EP3427116B1 (en) Method and system of analyzing and controlling a cold chain system
CN114969059B (en) Method and device for generating order information, electronic equipment and storage medium
US11030506B2 (en) Multi-tag encoding for reducing tag tampering in instant checkout
US11847912B1 (en) Systems and methods for generating traffic work zones
US20240037196A1 (en) System and method for interconnection, translation and transition between disparate digital ecosystems
US20220318753A1 (en) System and method for performing analysis and generating remediation estimations for user interfaces associated with software applications
US20240037486A1 (en) Safeguarding High Value Assets using Artificial Intelligence
US20210243122A1 (en) System and method for autopartitioning and processing electronic resources
CN111737509A (en) Information processing method, device, system, computer readable storage medium
CN116089411A (en) Data checking method, device, equipment and storage medium
CN117726458A (en) Information processing method, device, equipment and storage medium
CN115760013A (en) Operation and maintenance model construction method and device, electronic equipment and storage medium
CN117273862A (en) Order processing method and device
CN116308747A (en) Method, device, electronic equipment, medium and program product for managing trusted service
CN115840730A (en) File verification method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination