CN116721488A - Method for identifying article, article identification system and article identification platform - Google Patents

Method for identifying article, article identification system and article identification platform Download PDF

Info

Publication number
CN116721488A
CN116721488A CN202311006765.1A CN202311006765A CN116721488A CN 116721488 A CN116721488 A CN 116721488A CN 202311006765 A CN202311006765 A CN 202311006765A CN 116721488 A CN116721488 A CN 116721488A
Authority
CN
China
Prior art keywords
internet
things lock
things
lock
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311006765.1A
Other languages
Chinese (zh)
Other versions
CN116721488B (en
Inventor
张雨廷
林志标
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongxi Chuanzhi Technology Co ltd
Fujian University Of Science And Technology
Original Assignee
Zhongxi Chuanzhi Technology Co ltd
Fujian University Of Science And Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongxi Chuanzhi Technology Co ltd, Fujian University Of Science And Technology filed Critical Zhongxi Chuanzhi Technology Co ltd
Priority to CN202311006765.1A priority Critical patent/CN116721488B/en
Publication of CN116721488A publication Critical patent/CN116721488A/en
Application granted granted Critical
Publication of CN116721488B publication Critical patent/CN116721488B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B7/00Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00
    • G08B7/06Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems

Abstract

The embodiment of the application provides a method for identifying an article, an article identification system and an article identification platform, and relates to the technical field of the Internet of things. The target internet of things lock outputs prompt information based on the internet of things lock prompt request, so that a user can quickly find a target object in a plurality of objects according to the identification response, and meanwhile, the attribution of the target object can be determined based on the identification response, and the accuracy of judging the object attribution problem by a supervisor is improved.

Description

Method for identifying article, article identification system and article identification platform
Technical Field
The application relates to the technical field of the internet of things, in particular to a method for identifying an article, an article identification system and an article identification platform.
Background
Personal items need to be regulated because they are placed in public places (e.g., trunk in a trunk, airline baggage check, hotel baggage check), and when a user needs to retrieve his personal items, due to the numerous items, it is difficult for the regulator to quickly and accurately locate the target item among the numerous items, nor is it possible to identify whether the personal item is truly owned by the user.
At present, paper labels are adopted for the managed articles, after relevant information is written on the paper labels, the paper labels are attached to a suitcase or are tied to the suitcase by ropes, and the method has the following defects: when the staff of the supervision party is replaced, misjudgment can occur when the identity of the host is identified; when the luggage or the articles are too many, the staff can not find the corresponding articles in the articles quickly; when the article is transported in different places, the paper label is easy to lose and damage, so that difficulty occurs in judging the attribution of the article; meanwhile, most paper labels cannot be reused, and a large amount of resources are consumed.
Therefore, how to improve the accuracy of the judgment of the attribution of the article and to improve the problem that the article is difficult to find quickly are the problems to be solved in the current urgent need.
Disclosure of Invention
The embodiment of the application provides a method for identifying an article, which is applied to an article identification system, wherein the article identification system comprises an article identification platform, a terminal and an internet of things lock, the article identification platform is respectively in communication connection with the terminal and the internet of things lock, and the internet of things lock is used for locking the article, and the method comprises the following steps:
the terminal responds to a first user operation, generates an internet of things lock identification request and sends the internet of things lock identification request to the article identification platform;
The article identification platform determines a target internet of things lock based on the internet of things lock identification request, wherein the target internet of things lock is an internet of things lock pre-bound with the terminal;
the article identification platform generates an internet of things lock prompt request based on the internet of things lock identification request, and sends the internet of things lock prompt request to the target internet of things lock;
the target internet of things lock outputs prompt information based on the internet of things lock prompt request, wherein the prompt information is used for indicating the position of the object locked by the internet of things lock and is also used for indicating that the object locked by the internet of things lock has a home relation with the terminal.
In an optional embodiment, before the step of generating the internet of things lock identification request by the terminal in response to the first user operation, the method further includes:
the terminal acquires target internet of things lock information of the target internet of things lock;
the terminal generates a binding request based on the target internet of things lock information and sends the binding request to the article identification platform, wherein the binding request comprises the target internet of things lock information and terminal information of the terminal;
and the object identification platform binds and stores the target internet of things lock information and the terminal information.
In an optional embodiment, the terminal obtains target internet of things lock information of the target internet of things lock, including:
the terminal establishes near field communication with the internet of things lock;
the terminal responds to a second user operation, generates an information acquisition request, and sends the information acquisition request to the target internet of things lock based on the near field communication;
and the terminal receives the target internet of things lock information sent by the target internet of things lock based on the near field communication.
In an optional embodiment, the terminal obtains target internet of things lock information of the target internet of things lock, including:
the terminal acquires a two-dimensional code image; the two-dimensional code image carries target internet of things lock information corresponding to the target internet of things lock;
and the terminal identifies the two-dimensional code image to obtain the target object interlocking information of the target internet of things lock.
In an alternative embodiment, the method further comprises:
the terminal responds to a third user operation, generates an unlocking request and sends the unlocking request to the article identification platform;
the article identification platform receives the unlocking request and determines the target internet of things lock based on the unlocking request;
The article identification platform sends the unlocking request to the target internet of things lock;
and the target internet of things lock responds to the unlocking request and executes unlocking action.
In an alternative embodiment, the target internet of things lock responds to the unlocking request to perform an unlocking action, including:
under the condition that the target internet of things lock meets a preset unlocking condition, responding to the unlocking request, and executing an unlocking action;
acquiring an unlocking key from the terminal under the condition that the target internet of things lock does not meet the preset unlocking condition, and executing unlocking action under the condition that the unlocking key is consistent with the preset key; or under the condition that the target internet of things lock does not meet the preset unlocking condition, obtaining a forced unlocking instruction sent by the article identification platform, and executing an unlocking action according to the forced unlocking instruction, wherein the forced unlocking instruction is determined after the article identification platform verifies that the forced unlocking request sent by the terminal passes.
In an optional embodiment, the target internet of things lock stores terminal information of a terminal bound with the target internet of things lock in advance, and the target internet of things lock outputs prompt information based on the internet of things prompt request, including:
The target internet of things lock compares pre-stored terminal information with terminal information carried in an internet of things prompt request;
outputting prompt information under the condition that the pre-stored terminal information is consistent with the terminal information carried in the prompt request of the Internet of things.
In an optional embodiment, the generating, by the terminal, an internet of things lock identification request in response to a first user operation includes:
the terminal responds to a first user operation to obtain target audio information and/or target luminous information selected by a user based on the first user operation, wherein the target luminous information comprises at least one of target luminous color, flickering frequency and target luminous brightness;
and the terminal generates an Internet of things lock identification request based on the target audio information and/or the target luminous information.
In an optional embodiment, the target internet of things lock includes a sound module and/or a light module, and the target internet of things lock outputs a prompt message based on the internet of things lock prompt request, including:
the target internet of things lock controls the sound module to play audio according to the target audio information based on the internet of things lock prompt request; and/or the number of the groups of groups,
the target internet of things lock is based on the internet of things lock prompt request, and the light-emitting module is controlled to emit light according to the target light-emitting information.
According to a second aspect of the embodiment of the present application, there is provided a method for identifying an article, where the method is applied to an article identification platform, the article identification platform is respectively connected with a terminal and an internet of things lock in a communication manner, and the internet of things lock is used for locking an article, and the method includes:
receiving an internet of things lock identification request generated and sent by the terminal in response to a first user operation;
determining a target internet of things lock based on the internet of things lock identification request;
and sending the internet of things identification request to the target internet of things lock so that the target internet of things lock outputs prompt information based on the internet of things lock prompt request.
According to a third aspect of an embodiment of the present application, there is provided a method for identifying an article, the method being applied to an internet of things lock, the internet of things lock being communicatively connected to an article identification platform, the article identification platform being also communicatively connected to a terminal, the internet of things lock being used for locking an article, the method comprising:
acquiring an internet of things lock prompt request sent by the article identification platform, wherein the internet of things prompt request is generated by the article identification platform based on the internet of things lock identification request sent by the terminal;
And outputting prompt information based on the prompt request of the Internet of things lock, wherein the prompt information is used for indicating the position of the object locked by the Internet of things lock and also used for indicating that the object locked by the Internet of things lock has an attribution relation with the terminal.
According to a fourth aspect of the embodiment of the application, there is provided an article identification system, which comprises an article identification platform, a terminal and an internet of things lock, wherein the article identification platform is respectively in communication connection with the terminal and the internet of things lock, and the internet of things lock is used for locking articles;
the terminal is used for responding to a first user operation, generating an internet of things lock identification request and sending the internet of things lock identification request to the article identification platform;
the article identification platform is used for determining a target internet of things lock based on the internet of things lock identification request, wherein the target internet of things lock is an internet of things lock pre-bound with the terminal;
the article identification platform is used for generating an Internet of things lock prompt request based on the Internet of things lock identification request and sending the Internet of things lock prompt request to the target Internet of things lock;
the target internet of things lock is used for outputting prompt information based on the internet of things lock prompt request.
According to a fifth aspect of the embodiments of the present application, there is provided an article identification platform, the article identification platform being communicatively connected to a terminal and an internet of things lock, respectively, the internet of things lock being used for locking articles, the article identification platform comprising:
the receiving module is used for receiving an internet of things lock identification request generated and sent by the terminal in response to the first user operation;
the identification module is used for determining a target internet of things lock based on the internet of things lock identification request, wherein the target internet of things lock is an internet of things lock pre-bound with the terminal;
and the sending module is used for sending the internet of things identification request to the target internet of things lock so that the target internet of things lock outputs prompt information based on the internet of things lock prompt request.
According to a sixth aspect of embodiments of the present application, there is provided a readable storage medium having stored therein a computer program which when executed implements a method of identifying an item as described by a merchant.
The embodiment of the application provides a method for identifying an article, an article identification system and an article identification platform, wherein the method initiates an internet of things lock identification request to the article identification platform through a terminal, and after the article identification platform determines a target internet of things lock pre-bound with the terminal based on the internet of things lock identification request, an internet of things lock prompt request is generated based on the internet of things lock identification request and is sent to the target internet of things lock; the target internet of things lock outputs prompt information based on the internet of things lock prompt request, so that a user can quickly find a target object in a plurality of objects according to the identification response, and meanwhile, the attribution of the target object can be determined based on the identification response, and the accuracy of judging the object attribution problem by a supervisor is improved.
In order to make the above objects, features and advantages of the present application more comprehensible, several embodiments accompanied with figures are described in detail below.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
FIG. 1 is a schematic illustration of an article identification system according to an embodiment of the present application;
FIG. 2 is a flow chart of a method for identifying an article according to an embodiment of the present application;
FIG. 3 is one of the interactive flowcharts provided in the embodiments of the present application;
FIG. 4 is a second flow chart of a method for identifying an article according to an embodiment of the present application;
FIG. 5 is a second flowchart of an interaction according to an embodiment of the present application;
FIG. 6 is a third flowchart of an interaction provided by an embodiment of the present application;
FIG. 7 is a functional block diagram of an article identification platform according to an embodiment of the present application;
fig. 8 is a block diagram of a structural module of an internet of things lock according to an embodiment of the present application.
Icon: 100-an item identification system; 110-an item identification platform; a 111-receiving module; 112-an identification module; 113-a transmitting module; 120-terminal; 130-an internet of things lock, 131-an internet of things lock body; 132-a controller; 133-a reminder component; 134-communication device.
Detailed Description
The scheme in the embodiment of the application can be realized by adopting various computer languages, such as Java, C, C++, javaScript of an object-oriented programming language, and the like.
The above prior art solutions have all the drawbacks that the applicant has obtained after practice and careful study, and therefore the discovery process of the above problems and the solutions presented in the following embodiments of the present application for the above problems should be all contributions to the present application by the applicant in the process of the present application.
In order to make the technical solutions and advantages of the embodiments of the present application more apparent, the following detailed description of exemplary embodiments of the present application is provided in conjunction with the accompanying drawings, and it is apparent that the described embodiments are only some embodiments of the present application and not exhaustive of all embodiments. It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other.
As described in the background art, currently, a paper label is mostly used for a managed article, after relevant information is written on the paper label, the paper label is attached to a suitcase or is tied to the suitcase by a rope, and the method has the following disadvantages: when the staff of the supervision party is replaced, misjudgment can occur when the identity of the host is identified; when the luggage or the articles are too many, the staff can not find the corresponding articles in the articles quickly; when the article is transported in different places, the paper label is easy to lose and damage, so that difficulty occurs in judging the attribution of the article; meanwhile, most paper labels cannot be reused, and a large amount of resources are consumed.
Therefore, how to improve the accuracy of the judgment of the attribution of the article and to improve the problem that the article is difficult to find quickly are the problems to be solved in the current urgent need.
In order to improve the problems, the embodiment of the application provides a method for identifying an article, which comprises the steps that an article identification platform initiates an internet of things lock identification request to an article identification platform through a terminal, after the article identification platform determines a target internet of things lock pre-bound with the terminal based on the internet of things lock identification request, an internet of things lock prompt request is generated based on the internet of things lock identification request, and the internet of things lock prompt request is sent to the target internet of things lock; the target internet of things lock outputs prompt information based on the internet of things lock prompt request, so that accuracy of judging the object attribution problem can be improved, and meanwhile, the target object can be quickly found out from a plurality of objects, and the scheme is explained in detail below.
Referring to fig. 1, fig. 1 is a schematic diagram of an article identification system 100 according to an embodiment of the present application, where the article identification system 100 includes an article identification platform 110, a terminal 120, and an internet of things lock 130, and the article identification platform 110 is respectively in communication connection with the terminal 120 and the internet of things lock 130, and the internet of things lock 130 is used for locking articles.
The item identification platform 110 may include one or more servers.
Specifically, referring to fig. 2, fig. 2 is a schematic flow chart of a method for identifying an article according to an embodiment of the present application, and the article identification system 100 shown in fig. 1 will implement identification of a target article through the internet of things lock 130 through S400-S700, and the specific flow chart shown in fig. 2 will be described in detail below.
S400, the terminal 120 responds to the first user operation, generates an Internet of things lock identification request, and sends the Internet of things lock identification request to the article identification platform 110.
Optionally, the terminal 120 may be a mobile terminal 120 such as a smart phone, a computer, a tablet, etc., and the user initiates an internet of things lock identification request from the terminal 120 to the article identification platform 110 through a display interface of the terminal 120, and optionally, the internet of things lock identification request may carry terminal information of the terminal 120, such as a terminal ID, a mobile phone number bound to the terminal 120, or user account information of a current user logged in at the terminal 120.
S500, the object identification platform 110 requests a target internet of things lock based on internet of things lock identification, wherein the target internet of things lock is an internet of things lock pre-bound with the terminal 120.
As one possible implementation, the item identification platform 110 stores binding information of the internet of things lock 130 that locks the item before the terminal 120 is separated from the item. Where possible, the terminal 120 may establish a near field communication connection with the internet of things lock 130.
The article identification platform 110 stores binding information of the internet of things lock 130 for locking the article before the terminal 120 is separated from the article, taking the terminal information of the terminal 120 as a terminal ID, and taking the internet of things lock information of the internet of things lock 130 as an example, the binding information can be shown in the following table.
TABLE 1
It should be noted that, whether the binding column is "1" indicates that the binding relationship exists between the terminal 120 and the internet of things lock 130, and whether the binding column is "0" indicates that the binding relationship exists between the terminal 120 and the internet of things lock 130, and the current state is an unbinding state.
As shown in table 1, the terminal US123 has a binding relationship with the internet of things lock WLW111, the terminal US383 has a binding relationship with the internet of things lock WLW132, and the binding time is 2022, 1 month and 1 day, and the unbinding time is 2022, 1 month and 2 days.
Based on the binding relationship, the article identification platform 110 may determine, based on the internet of things lock identification request and the pre-stored binding information, that the target internet of things lock bound with the terminal 120 is WLW111 if the terminal ID carried in the internet of things lock identification request is US 123.
Optionally, the binding relationship may further include other information, such as a mobile phone number bound to the terminal 120, a departure place, an arrival time, an internet of things lock state, etc. of a vehicle on which the user is riding.
Optionally, the article identification platform 110 may further determine, based on the binding time and the current time, a time when the terminal 120 and the internet of things lock 130 are bound, and if the time is greater than a certain preset threshold (for example, 24 hours), the article identification platform 110 may send a prompt message to the terminal 120, so as to avoid that the user forgets to take the personal article.
As another optional implementation manner, the internet of things lock identification request carries target internet of things lock information of a target internet of things lock pre-bound with the terminal, for example, an internet of things lock ID, an internet of things lock access network number, and the like.
Therefore, the binding relation can be not stored in the article identification platform, and the target internet of things lock can be determined directly based on the target internet of things lock information carried in the internet of things lock identification request.
S600, the article identification platform 110 generates an Internet of things lock prompt request based on the Internet of things lock identification request and sends the Internet of things lock prompt request to the target Internet of things lock.
After the internet of things identification platform 110 confirms the target internet of things lock according to the internet of things lock identification request, the internet of things identification request is sent to the target internet of things lock, and it can be understood that the internet of things identification request sent by the terminal 120 can be directly forwarded to the target internet of things lock by the internet of things identification platform 110, and also an internet of things lock prompt request can be generated based on other information carried by the internet of things identification request, and the internet of things lock prompt request is sent to the target internet of things lock.
S700, the target internet of things lock outputs prompt information based on the internet of things lock prompt request, wherein the prompt information is used for indicating the position of the object locked by the internet of things lock and also used for indicating that the object locked by the internet of things lock has a attribution relation with the terminal.
As an optional implementation mode, the target internet of things lock can directly output prompt information after receiving the internet of things identification request.
As another optional implementation manner, the target internet of things lock may also store the terminal information of the bound terminal 120 in advance, compare the pre-stored terminal information with the terminal information carried in the internet of things identification request, and output the prompt information when the pre-stored terminal information is consistent with the terminal information carried in the internet of things identification request, otherwise, not output the prompt information.
Optionally, the target internet of things lock may include at least one of a sound module and a light module.
For example, the target internet of things lock may only include a light emitting module, and after receiving the internet of things identification request, the target internet of things lock controls the light emitting module to emit light, for example, green light may be emitted, so that the supervisor can confirm that the object in which the target internet of things lock is located is the target object of the user.
For another example, when there are more users, the target internet of things lock may further include a sound module and a light module in order to facilitate the user to quickly find the object belonging to the user.
The user may operate in an operation page displayed by the terminal 120, select a target audio, a target light emitting color, a flicker frequency, and a target light emitting brightness to be played, and the terminal 120 generates an internet of things lock identification request based on the target audio information and/or the target light information.
After the target internet of things lock receives the internet of things identification request, the control light-emitting module emits light according to the target light-emitting color, the flashing frequency and the target light-emitting brightness, the sound module plays target audio, so that a user can quickly find out the object according to the target audio, the target light-emitting color, the flashing frequency and the brightness in a plurality of objects, and a supervisor can determine that the object in which the target internet of things lock is located is the target object of the user.
In the following, a possible implementation scenario is given in connection with the above scheme, for example, when the user a wants to take a flight from beijing to dues, and takes a baggage for delivery, the user a can bind the terminal 120 (the terminal ID is US 123) used by the user and the internet of things lock 130 (the internet of things lock ID is WLW 111) issued by the airport in advance, and after binding, the internet of things platform stores the binding relationship between the terminal 120 with the terminal ID of US123 and the internet of things lock ID is WLW 111.
When the user a arrives at the achievement, the user a can operate in an operation page displayed by the terminal 120, select a target audio frequency, a target light emitting color, a flicker frequency and a target light emitting brightness to be played, the terminal 120 generates an internet of things lock identification request based on target audio information and target light information, and of course, the internet of things lock identification request also carries a terminal ID, the terminal 120 sends the internet of things lock identification request to the article identification platform 110, the article identification platform 110 determines that the target internet of things lock is WLW111 based on the terminal ID and the binding relationship, then sends the internet of things lock identification request to the target internet of things lock, and after the target internet of things lock receives the internet of things identification request, the light emitting module is controlled to emit light according to the target light emitting color, the flicker frequency and the target light emitting brightness.
Therefore, the user can quickly find out the object according to the target audio frequency, the target luminous color, the flashing frequency and the brightness in a plurality of objects, and the supervision party can determine that the object where the target internet of things lock is located belongs to the user.
Referring to fig. 3, fig. 3 is one of the interactive flowcharts provided in the embodiment of the present application, and as shown in fig. 3, the method for identifying an article provided in the embodiment of the present application initiates an internet of things lock identification request to the article identification platform 110 through the terminal 120; after the article identification platform 110 determines the target internet of things lock pre-bound with the terminal 120 based on the internet of things lock identification request, generating an internet of things lock prompt request based on the internet of things lock identification request, and sending the internet of things lock prompt request to the target internet of things lock; the target internet of things lock outputs prompt information based on the internet of things identification request to complete target article identification, so that the accuracy of judging the attribution problem of articles can be improved, and meanwhile, the target articles can be quickly found out from a plurality of articles.
In addition, as shown in fig. 3, after the internet of things lock outputs the prompt message, a response can also be returned to the article identification platform, so that the article identification platform forwards the returned response to the terminal, and the user is reminded that the internet of things lock has been opened.
Referring to fig. 4 and fig. 5 in combination, fig. 4 is a second flowchart of a method for identifying an article according to an embodiment of the present application, fig. 5 is a second flowchart of an interaction method according to an embodiment of the present application, and before identifying an article, the article identification system 100 further implements binding between the terminal 120 and the internet of things lock 130 through S100-S300, and the specific flowchart shown in fig. 3 is described in detail below.
S100, the terminal 120 acquires target Internet of things lock information of the target Internet of things lock.
It may be appreciated that the target internet of things lock information may be an internet of things lock ID.
As an alternative embodiment, the terminal 120 may generate an information acquisition request in response to the second user operation, and send the information acquisition request to the target internet of things lock to acquire the internet of things lock ID. The target internet of things lock sends pre-stored target internet of things lock information to the terminal 120 based on the information acquisition request, the target internet of things lock information can be stored in a storage module included in the target internet of things lock in advance, and the terminal 120 acquires the target internet of things lock information, namely, the terminal acquires the internet of things lock ID returned by the internet of things lock.
As another implementation, the target internet of things lock may also be posted with identification information, such as a two-dimensional code. The terminal acquires a two-dimensional code image; the two-dimensional code image carries target internet of things lock information corresponding to the target internet of things lock, and the terminal identifies the two-dimensional code image to obtain target object interlocking information of the target internet of things lock.
Optionally, the two-dimensional code image may be attached to the target internet of things lock, or provided by a supervisor, and the terminal 120 may obtain the target object interlocking information of the target internet of things lock by identifying the two-dimensional code.
In this way, the terminal 120 may acquire the ID of the internet of things lock of the target internet of things lock after establishing near field communication with the target internet of things lock, and may also acquire the ID of the internet of things lock of the target internet of things lock by identifying the two-dimensional code posted on the target internet of things lock.
S200, the terminal 120 generates a binding request based on the target Internet of things lock information, and sends the binding request to the article identification platform 110, wherein the binding request comprises the target Internet of things lock information and terminal information of the terminal 120.
It will be appreciated that the terminal information may include a terminal ID, a mobile phone number bound to the terminal 120, or user account information of a current user logged in at the terminal 120.
S300, the object identification platform 110 binds and stores the target internet of things lock information and the terminal information.
In the following, a possible implementation scenario is given in combination with the above steps, for example, when the user a wants to take a flight from Beijing to the origin, and when the user a consigns the baggage, the terminal 120 (the terminal ID is US 123) scans the two-dimension code carried on the internet of things lock 130 (the internet of things lock ID is WLW 111) issued by the airport, after the internet of things lock ID carried by the two-dimension code is obtained, the terminal 120 sends the internet of things lock ID including the terminal ID and the internet of things lock ID to the article identification platform 110, so that the article identification platform 110 binds the terminal 120 and the internet of things lock 130 held by the user a based on the terminal ID and the internet of things lock ID, and stores a binding relation, and after the binding is completed, the user a can lock the internet of things lock 130 on the own article. As shown in fig. 5, after the binding is stored, the item identification platform may also return a response to the terminal to inform the user that the binding between the terminal and the internet of things lock has been completed.
According to the embodiment of the application, the binding relation is obtained and stored by pre-binding the terminal information of the terminal 120 and the Internet of things lock information of the Internet of things lock 130, so that a target object can be conveniently and quickly found based on the binding relation, and the accuracy of judging the object attribution problem is improved.
Further, when a user takes his or her own item, the item identification system 100 may unlock by the following steps. The specific flow of unlocking the item identification platform 110 is described in detail below.
The terminal 120 generates an unlocking request in response to the third user operation, and transmits the unlocking request to the article identification platform 110.
The item identification platform 110 receives the unlock request and determines a target internet of things lock based on the unlock request and the binding information. Optionally, the unlocking request includes terminal information of the terminal 120.
The article identification platform sends an unlocking request to the target internet of things lock, and the target internet of things lock responds to the unlocking request to execute unlocking actions.
For example, the user a clicks an unlocking button on an operation page displayed by the terminal 120 (the terminal ID is US 123), the terminal 120 responds to the operation to generate an unlocking request, and sends the unlocking request to the article identification platform 110, the article identification platform 110 determines that the ID of the internet of things lock of the target internet of things lock bound with the terminal ID is US123 is WLW111 according to the binding information, and sends the unlocking request to the target internet of things lock of which the ID of the internet of things lock is WLW111, so that the target internet of things lock is unlocked.
In addition, it can be understood that the locking process of the internet of things lock 130 can also adopt the same control principle as the unlocking process, and the detailed description is omitted here.
Optionally, after the lock 130 of the internet of things completes the unlocking or locking action, the lock state information may be further sent to the article identification platform, where the lock state information characterizes whether the current lock of the internet of things is in the unlocking state or the locking state, and the article identification platform updates the state information of the lock of the internet of things based on the lock state information, so that the article identification platform tracks and monitors the state information of the lock of the internet of things, and improves the use security of the lock of the internet of things.
Further, in the practical application of the internet of things lock 130, there is a possibility that other people acquire the terminal information and the internet of things lock information through illegal means, so that the things of other people are taken away and the internet of things lock 130 is opened. In order to improve the problem, the user may also limit the preset time length of locking or the place of unlocking the internet of things lock 130 through the terminal 120, and when the actual time length of locking of the internet of things lock 130 exceeds the preset time length or the unlocking place exceeds the preset place range, the user cannot unlock through the terminal information or the internet of things lock information, and only the terminal 120 can output the unlocking key or adopt the unlocking instruction with higher authority to unlock the internet of things lock. This will be described in detail below.
And under the condition that the target internet of things lock meets the preset unlocking condition, responding to the unlocking request and executing the unlocking action.
Under the condition that the target internet of things lock does not meet the preset unlocking condition, an unlocking key from the terminal is obtained, and under the condition that the unlocking key is consistent with the preset key, unlocking action is executed.
Or, if the target internet of things lock does not meet the preset unlocking condition, obtaining a forced unlocking instruction sent by the article identification platform 110, and executing an unlocking action according to the forced unlocking instruction, wherein the forced unlocking instruction is determined after the article identification platform verifies that the forced unlocking request sent by the terminal 120 passes.
The preset unlocking condition may be that the locking duration of the target internet of things lock is less than a preset duration, or that the position of the terminal 120 is located in a preset location range, the user may set the preset duration through the terminal 120, and the preset location range is set through the terminal 120, where the preset duration may be a duration preset by the user through the terminal 120, for example, 10 minutes, 20 minutes, 1 hour, and 1 day. The preset location range may be any point, for example, within a hotel where the user is located, within an airport where the user is going to.
That is, as an optional implementation manner, the target internet of things lock may acquire a closing time period, compare the closing time period with a preset time period, and respond to the unlocking request to execute the unlocking action when the closing time period is less than the preset time period.
When the lock closing time period is longer than or equal to the preset time period, an unlocking key from the terminal 120 is acquired, and when the unlocking key is consistent with the preset key, an unlocking action is performed.
Or, when the unlocking location exceeds the preset location range, the unlocking key from the terminal 120 is obtained, and the unlocking action is performed if the unlocking key is consistent with the preset key.
As another optional implementation manner, in the case that the lock closing time period is greater than or equal to the preset time period (or when the unlocking location exceeds the preset location range), a forced unlocking instruction sent by the article identification platform 110 may be obtained, and the unlocking action is performed according to the forced unlocking instruction, where the forced unlocking instruction is determined after the article identification platform verifies that the forced unlocking request sent by the terminal passes.
The method for verifying the forced unlocking request sent by the terminal by the article identification platform 110 may be to obtain the biometric information (such as face information, fingerprint information, iris information, etc.) sent by the terminal, and perform verification and comparison with the pre-stored biometric information.
The locking duration can be determined by the locking record and the current time, the unlocking key can be a password preset by a user through the terminal and stored in the target internet of things lock bound with the terminal 120 as a pre-stored password, so that when the internet of things lock 130 does not meet the preset unlocking condition, the lock cannot be unlocked through terminal information or internet of things lock information, and only the terminal 120 can output the key or adopt a higher-authority unlocking instruction to unlock the internet of things lock 130, so that other people cannot unlock the internet of things lock 130 even acquire the terminal information and the internet of things lock information through illegal ways, and the security of the article is improved.
Meanwhile, the unlocking and locking of the internet of things lock 130 can be realized through the control terminal 120, manual operation of a user is not needed, and convenience in using the internet of things lock 130 is improved.
Further, after the internet of things lock 130 is unlocked, the user may unbind the binding relationship between the terminal 120 and the internet of things lock 130, return the internet of things lock 130 to the supervisor, and the process of the article identification system 100 for unbinding the terminal 120 and the internet of things lock 130 may be implemented by the following steps.
The terminal 120 generates and sends an unbinding request to the item identification platform 110, where the unbinding request includes terminal information and target internet of things lock information of the target internet of things lock.
The item identification platform 110 unbinds the binding relationship of the terminal 120 and the target internet of things lock based on the terminal information and the target internet of things lock.
Referring to fig. 6, fig. 6 is a third interactive flowchart provided in an embodiment of the present application. It may be appreciated that the terminal 120 may automatically generate an unbinding request after the target internet of things lock is unlocked, or may receive an unbinding operation of a user, generate an unbinding request, send the unbinding request to the article identification platform, and return a response to the terminal after the article identification platform unbinding, so as to inform the user that the terminal and the internet of things lock are in an unbinding state.
Meanwhile, when the binding relationship between the terminal 120 and the target internet of things lock is released, the article identification platform 110 may change whether the binding identifier in the binding relationship is changed from "1" to "0", or may directly delete the corresponding information such as the terminal ID and the internet of things lock ID, so as to release the binding relationship.
Based on the same inventive concept, the embodiment of the application also provides a method for identifying an article, the method is applied to the article identification platform 110, the article identification platform 110 is respectively in communication connection with the terminal 120 and the internet of things lock 130, the internet of things lock 130 is used for locking the article, and the method comprises the following steps:
the receiving terminal 120 generates and transmits an internet of things lock identification request in response to the first user operation.
The target internet of things lock is determined based on the internet of things lock identification request and the binding information, wherein the target internet of things lock is the internet of things lock 130 pre-bound with the terminal 120.
And sending an Internet of things identification request to the target Internet of things lock so that the target Internet of things lock outputs prompt information based on the Internet of things lock prompt request.
It will be appreciated that the principle of the method for identifying an article is similar to that shown in fig. 2-3 and is not described in detail herein.
Referring to fig. 7, fig. 7 is a functional block diagram of an article identification platform 110 according to an embodiment of the present application. The article identification platform 110 is connected with the terminal 120 and the internet of things lock 130 in a communication manner, the internet of things lock 130 is used for locking articles, and the article identification platform 110 comprises:
the receiving module 111 is configured to receive an internet of things lock identification request generated and sent by the terminal 120 in response to the first user operation.
The identification module 112 is configured to determine a target internet of things lock based on the internet of things lock identification request, where the target internet of things lock is an internet of things lock that is pre-bound with the terminal.
And the sending module 113 is configured to send an internet of things identification request to a target internet of things lock, so that the target internet of things lock outputs prompt information based on the internet of things lock prompt request.
It should be understood that the object recognition platform 110 is the object recognition platform 110 in the object recognition system 100 shown in fig. 1, and the principle of object recognition is similar to that shown in fig. 2-3, and will not be described herein.
Based on the same inventive concept, the embodiment of the application also provides a method for identifying an article, the method is applied to the internet of things lock 130, the internet of things lock 130 is in communication connection with the article identification platform 110, the article identification platform 110 is also in communication connection with the terminal 120, the internet of things lock 130 is used for locking the article, and the method comprises:
the internet of things lock 130 outputs prompt information based on the internet of things lock prompt request sent by the item identification platform. The internet of things prompt request is generated by the article identification platform based on the internet of things lock identification request sent by the terminal 120.
Referring to fig. 8 in combination, fig. 8 is a block diagram of a structural module of an internet of things lock according to an embodiment of the present application.
The internet of things lock 130 comprises an internet of things lock body 131, a controller 132, a prompt component 133 and a communication device 134, wherein the prompt component 133, the controller 132 and the communication device 134 are contained in a containing cavity of the internet of things lock body 131, the prompt component 133 and the communication device 134 are respectively electrically connected with the controller 132, and the communication device 134 is in communication connection with the article identification platform 110.
The communication device 134 is configured to receive a prompt signal from the article identification platform and send the prompt signal to the controller 132, where the prompt signal characterizes the article identification platform 110 that the internet of things lock 130 is successfully identified.
The controller 132 is configured to control the prompt component 133 to issue a prompt message based on the prompt signal.
The shape of the lock body 131 of the internet of things can be a cylinder, and also can be a cuboid, a cube, a spheroid or other irregular body.
The communication device 134 may provide wireless communication devices including 2G/3G/4G/5G, etc. that are applied to the internet of things lock 130. The communication device 134 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA), etc. The communication device 134 may receive electromagnetic waves from an antenna, filter, amplify, etc., the received electromagnetic waves, and transmit to a modem processor for demodulation.
The communication device may employ communication components of the type SIM900A, USR, M35 GPRS.
The controller 132 may be an integrated circuit chip having signal processing capabilities. For example, the controller 132 may be a general-purpose processor including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; but also Digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components. The general purpose processor may be a microprocessor or the controller 132 may be any conventional processor or the like.
For example, the controller 132 may employ a single chip microcomputer with the model numbers 89C51, STC89C51, and 89C2051 as the processor, and the controller 132 may employ FPGA chips with the model numbers XILINX VIRTEX, stratix 10, cyclone V, and the like.
The article identification platform can pre-store binding information of the internet of things lock 130 locked and hung on the article before the terminal is separated from the article, and the internet of things lock 130 can be locked and hung on the article when in use.
In combination with the above scheme, a possible real-time scenario is given below, for example, when the user a wants to take a flight from Beijing to the origin, and the user a holds the baggage, the user a can bind the terminal with the internet of things lock 130 issued by the airport in advance, and the binding relationship between the terminal and the internet of things lock 130 is stored in the article identification platform after binding.
When the user A arrives at the achievement, the user A can operate in an operation picture displayed by the terminal to generate an Internet of things lock identification request, the terminal sends the Internet of things lock identification request to the article identification platform, the article identification platform carries out Internet of things lock identification based on the binding relation and the Internet of things lock identification request, a prompt signal is generated when the identification is successful, the prompt signal is sent to the communication device 134, the communication device 134 sends the prompt signal to the controller 132, and the controller 132 controls the prompt component 133 to send prompt information based on the prompt signal.
In this way, the user can quickly find the own article from the plurality of articles according to the prompt information, and the supervisor can determine that the article where the internet of things lock 130 is located belongs to the user, so that the accuracy of the article attribution problem is improved.
It will be appreciated that the principle of the method for identifying an article is similar to that shown in fig. 2-3 and is not described in detail herein.
The embodiment of the application also provides a readable storage medium, wherein a computer program is stored in the readable storage medium, and the computer program is executed to realize the steps of the method for identifying the article.
In summary, according to the method for identifying the object, the object identification system and the object identification platform provided by the embodiment of the application, the object identification platform initiates an internet of things lock identification request to the object identification platform through the terminal, and after determining a target internet of things lock pre-bound with the terminal based on the internet of things lock identification request, the object identification platform generates an internet of things lock prompt request based on the internet of things lock identification request and sends the internet of things lock prompt request to the target internet of things lock; the target internet of things lock outputs prompt information based on the internet of things lock prompt request, so that a user can quickly find a target object in a plurality of objects according to the identification response, and meanwhile, the attribution of the target object can be determined based on the identification response, and the accuracy of judging the object attribution problem by a supervisor is improved.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present application without departing from the spirit or scope of the application. Thus, it is intended that the present application also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (14)

1. The utility model provides a method of discernment article, characterized in that is applied to article identification system, article identification system includes article identification platform, terminal and thing networking lock, article identification platform respectively with terminal with thing networking lock communication connection, thing networking lock is used for hasp article, the method includes:
the terminal responds to a first user operation, generates an internet of things lock identification request and sends the internet of things lock identification request to the article identification platform;
the article identification platform determines a target internet of things lock based on the internet of things lock identification request, wherein the target internet of things lock is an internet of things lock pre-bound with the terminal;
the article identification platform generates an internet of things lock prompt request based on the internet of things lock identification request, and sends the internet of things lock prompt request to the target internet of things lock;
The target internet of things lock outputs prompt information based on the internet of things lock prompt request, wherein the prompt information is used for indicating the position of the object locked by the internet of things lock and is also used for indicating that the object locked by the internet of things lock has a home relation with the terminal.
2. The method of identifying an item of claim 1, wherein prior to the step of the terminal generating the internet of things lock identification request in response to a first user operation, the method further comprises:
the terminal acquires target internet of things lock information of the target internet of things lock;
the terminal generates a binding request based on the target internet of things lock information and sends the binding request to the article identification platform, wherein the binding request comprises the target internet of things lock information and terminal information of the terminal;
and the object identification platform binds and stores the target internet of things lock information and the terminal information.
3. The method for identifying an article according to claim 2, wherein the terminal obtains target internet of things lock information of the target internet of things lock, comprising:
the terminal establishes near field communication with the internet of things lock;
The terminal responds to a second user operation, generates an information acquisition request, and sends the information acquisition request to the target internet of things lock based on the near field communication;
and the terminal receives the target internet of things lock information sent by the target internet of things lock based on the near field communication.
4. The method for identifying an article according to claim 2, wherein the terminal obtains target internet of things lock information of the target internet of things lock, comprising:
the terminal acquires a two-dimensional code image; the two-dimensional code image carries target internet of things lock information corresponding to the target internet of things lock;
and the terminal identifies the two-dimensional code image to obtain the target object interlocking information of the target internet of things lock.
5. The method of identifying an item of claim 1, further comprising:
the terminal responds to a third user operation, generates an unlocking request and sends the unlocking request to the article identification platform;
the article identification platform receives the unlocking request and determines the target internet of things lock based on the unlocking request;
the article identification platform sends the unlocking request to the target internet of things lock;
And the target internet of things lock responds to the unlocking request and executes unlocking action.
6. The method of identifying an item of claim 5, wherein the target internet of things lock performs an unlocking action in response to the unlocking request, comprising:
under the condition that the target internet of things lock meets a preset unlocking condition, responding to the unlocking request, and executing an unlocking action;
acquiring an unlocking key from the terminal under the condition that the target internet of things lock does not meet the preset unlocking condition, and executing unlocking action under the condition that the unlocking key is consistent with the preset key; or under the condition that the target internet of things lock does not meet the preset unlocking condition, obtaining a forced unlocking instruction sent by the article identification platform, and executing an unlocking action according to the forced unlocking instruction, wherein the forced unlocking instruction is determined after the article identification platform verifies that the forced unlocking request sent by the terminal passes.
7. The method for identifying an article according to claim 1, wherein the target internet of things lock stores terminal information of a terminal bound thereto in advance, and the target internet of things lock outputs prompt information based on the internet of things prompt request, comprising:
The target internet of things lock compares pre-stored terminal information with terminal information carried in an internet of things prompt request;
outputting prompt information under the condition that the pre-stored terminal information is consistent with the terminal information carried in the prompt request of the Internet of things.
8. The method of identifying an item of claim 1, wherein the terminal generating an internet of things lock identification request in response to a first user operation comprises:
the terminal responds to a first user operation to obtain target audio information and/or target luminous information selected by a user based on the first user operation, wherein the target luminous information comprises at least one of target luminous color, flickering frequency and target luminous brightness;
and the terminal generates an Internet of things lock identification request based on the target audio information and/or the target luminous information.
9. The method of claim 8, wherein the target internet of things lock comprises a sound module and/or a light module, wherein the target internet of things lock outputs a prompt message based on the internet of things lock prompt request, comprising:
the target internet of things lock controls the sound module to play audio according to the target audio information based on the internet of things lock prompt request; and/or the number of the groups of groups,
The target internet of things lock is based on the internet of things lock prompt request, and the light-emitting module is controlled to emit light according to the target light-emitting information.
10. The method for identifying the article is characterized by being applied to an article identification platform, wherein the article identification platform is respectively in communication connection with a terminal and an internet of things lock, and the internet of things lock is used for locking the article, and the method comprises the following steps:
receiving an internet of things lock identification request generated and sent by the terminal in response to a first user operation;
determining a target internet of things lock based on the internet of things lock identification request;
and sending the internet of things identification request to the target internet of things lock so that the target internet of things lock outputs prompt information based on the internet of things lock prompt request.
11. The method for identifying the article is characterized by being applied to an internet of things lock, wherein the internet of things lock is in communication connection with an article identification platform, the article identification platform is also in communication connection with a terminal, and the internet of things lock is used for locking the article, and the method comprises the following steps:
acquiring an internet of things lock prompt request sent by the article identification platform, wherein the internet of things prompt request is generated by the article identification platform based on the internet of things lock identification request sent by the terminal;
And outputting prompt information based on the prompt request of the Internet of things lock, wherein the prompt information is used for indicating the position of the object locked by the Internet of things lock and also used for indicating that the object locked by the Internet of things lock has an attribution relation with the terminal.
12. The article identification system is characterized by comprising an article identification platform, a terminal and an internet of things lock, wherein the article identification platform is respectively in communication connection with the terminal and the internet of things lock, and the internet of things lock is used for locking articles;
the terminal is used for responding to a first user operation, generating an internet of things lock identification request and sending the internet of things lock identification request to the article identification platform;
the article identification platform is used for determining a target internet of things lock based on the internet of things lock identification request, wherein the target internet of things lock is an internet of things lock pre-bound with the terminal;
the article identification platform is used for generating an Internet of things lock prompt request based on the Internet of things lock identification request and sending the Internet of things lock prompt request to the target Internet of things lock;
the target internet of things lock is used for outputting prompt information based on the internet of things lock prompt request.
13. The utility model provides an article identification platform, its characterized in that, article identification platform respectively with terminal and thing networking lock communication connection, thing networking lock is used for hasp article, article identification platform includes:
the receiving module is used for receiving an internet of things lock identification request generated and sent by the terminal in response to a first user operation;
the identification module is used for determining a target internet of things lock based on the internet of things lock identification request, wherein the target internet of things lock is an internet of things lock pre-bound with the terminal;
and the sending module is used for sending the internet of things identification request to the target internet of things lock so that the target internet of things lock outputs prompt information based on the internet of things lock prompt request.
14. A readable storage medium, characterized in that the readable storage medium has stored therein a computer program which, when executed, implements the method of identifying an item according to any one of claims 1-9;
alternatively, the computer program when executed implements the method of identifying an item of claim 10;
alternatively, the computer program when executed implements the method of identifying an item of claim 11.
CN202311006765.1A 2023-08-11 2023-08-11 Method for identifying article, article identification system and article identification platform Active CN116721488B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311006765.1A CN116721488B (en) 2023-08-11 2023-08-11 Method for identifying article, article identification system and article identification platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311006765.1A CN116721488B (en) 2023-08-11 2023-08-11 Method for identifying article, article identification system and article identification platform

Publications (2)

Publication Number Publication Date
CN116721488A true CN116721488A (en) 2023-09-08
CN116721488B CN116721488B (en) 2023-12-19

Family

ID=87868397

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311006765.1A Active CN116721488B (en) 2023-08-11 2023-08-11 Method for identifying article, article identification system and article identification platform

Country Status (1)

Country Link
CN (1) CN116721488B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190005741A1 (en) * 2017-05-01 2019-01-03 United States Postal Service Induction unit and label generator
WO2020001288A1 (en) * 2018-06-27 2020-01-02 菜鸟智能物流控股有限公司 Storage cabinet control system, storage cabinet control method and cabinet lock
CN110852817A (en) * 2018-07-27 2020-02-28 陈圣局 Shared case management method, system, platform, cloud server and cabinet
WO2020103563A1 (en) * 2018-11-22 2020-05-28 阿里巴巴集团控股有限公司 Payment method and apparatus for device
CN111599042A (en) * 2020-04-28 2020-08-28 深圳易马达科技有限公司 Unlocking method, self-service storage device, terminal equipment, server and system
US20210056788A1 (en) * 2018-08-09 2021-02-25 Lingdong Technology (Beijing) Co. Ltd Luggage delivery system
US20210082211A1 (en) * 2018-06-01 2021-03-18 Beijing Didi Infinity Technology And Development Co., Ltd. Systems and methods for managing an item
CN113903121A (en) * 2021-09-23 2022-01-07 无锡宇宁智能科技有限公司 5G Internet of things terminal and communication method thereof
CN114553592A (en) * 2022-03-23 2022-05-27 深圳市美科星通信技术有限公司 Method, equipment and storage medium for equipment identity verification
WO2022262377A1 (en) * 2021-06-15 2022-12-22 上海商汤智能科技有限公司 Display method and apparatus, and device, computer-readable storage medium and computer program

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190005741A1 (en) * 2017-05-01 2019-01-03 United States Postal Service Induction unit and label generator
US20210082211A1 (en) * 2018-06-01 2021-03-18 Beijing Didi Infinity Technology And Development Co., Ltd. Systems and methods for managing an item
WO2020001288A1 (en) * 2018-06-27 2020-01-02 菜鸟智能物流控股有限公司 Storage cabinet control system, storage cabinet control method and cabinet lock
CN110852817A (en) * 2018-07-27 2020-02-28 陈圣局 Shared case management method, system, platform, cloud server and cabinet
US20210056788A1 (en) * 2018-08-09 2021-02-25 Lingdong Technology (Beijing) Co. Ltd Luggage delivery system
WO2020103563A1 (en) * 2018-11-22 2020-05-28 阿里巴巴集团控股有限公司 Payment method and apparatus for device
CN111599042A (en) * 2020-04-28 2020-08-28 深圳易马达科技有限公司 Unlocking method, self-service storage device, terminal equipment, server and system
WO2021218165A1 (en) * 2020-04-28 2021-11-04 深圳易马达科技有限公司 Unlocking method, self-service locker, terminal device, server, and system
WO2022262377A1 (en) * 2021-06-15 2022-12-22 上海商汤智能科技有限公司 Display method and apparatus, and device, computer-readable storage medium and computer program
CN113903121A (en) * 2021-09-23 2022-01-07 无锡宇宁智能科技有限公司 5G Internet of things terminal and communication method thereof
CN114553592A (en) * 2022-03-23 2022-05-27 深圳市美科星通信技术有限公司 Method, equipment and storage medium for equipment identity verification

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
孙立天: "航空旅客行李跟踪方法研究", 中国优秀硕士学位论文全文数据库 工程科技Ⅱ辑, no. 2, pages 031 - 1396 *
覃超妹: "基于蓝牙模块的自动跟踪智能行李箱系统", 现代信息科技, vol. 4, no. 6, pages 150 - 155 *

Also Published As

Publication number Publication date
CN116721488B (en) 2023-12-19

Similar Documents

Publication Publication Date Title
US11509475B2 (en) Method and apparatus for obtaining multiple user credentials
CN104428781B (en) The method for activating content
US10475266B2 (en) Lock control device, information processing method, program, and communication terminal
CN107578503B (en) Method for unlocking, unlocking terminal and the smart lock of shared vehicle
US9984524B2 (en) Systems and methods for remote access rights and verification
CN104246529B (en) Wireless identification emitter is positioned using short-distance wireless broadcast
US9762564B1 (en) Acquiring client device data
WO2020000894A1 (en) Access control management method and system, and related devices
CN106575454A (en) System and method for facilitating user access to vehicles based on biometric information
TW200905614A (en) Method and system for monitoring forestry products
CN106097504A (en) The implementation method that a kind of hotel moves in voluntarily
KR101507594B1 (en) Security entrance system using Identification means and Operating Method thereof
CN110276859B (en) Lock control method and system
WO2012174590A1 (en) Digital identification device for vehicles
WO2020001288A1 (en) Storage cabinet control system, storage cabinet control method and cabinet lock
CN109544746A (en) A kind of community's access control system control method and its device
US11546728B2 (en) Methods and apparatus for presence sensing reporting
US20240129708A1 (en) Authenticated health credential access methods and apparatus
CN107886602A (en) A kind of method for unlocking and system
US20070234066A1 (en) Biometric identification device providing format conversion functionality and method for implementing said functionality
CN107622547A (en) Method, apparatus, storage medium and the computer equipment that terminal is unlocked
CN104851207B (en) A kind of article access system, method and relevant device
CN116721488B (en) Method for identifying article, article identification system and article identification platform
US20190274044A1 (en) User validation system utilizing symbolic or pictographic representations of validation codes
CN110781474A (en) Automatic card claim device and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant