CN117313769A - Anti-loss method, device, equipment and medium based on RFID - Google Patents

Anti-loss method, device, equipment and medium based on RFID Download PDF

Info

Publication number
CN117313769A
CN117313769A CN202311235754.0A CN202311235754A CN117313769A CN 117313769 A CN117313769 A CN 117313769A CN 202311235754 A CN202311235754 A CN 202311235754A CN 117313769 A CN117313769 A CN 117313769A
Authority
CN
China
Prior art keywords
rfid
target area
target
rfid reader
writer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311235754.0A
Other languages
Chinese (zh)
Inventor
邓永春
蒋志平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Weican Technology Co ltd
Original Assignee
Hangzhou Weican Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Weican Technology Co ltd filed Critical Hangzhou Weican Technology Co ltd
Priority to CN202311235754.0A priority Critical patent/CN117313769A/en
Publication of CN117313769A publication Critical patent/CN117313769A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)

Abstract

The invention relates to the technical field of safety protection, and provides an anti-loss method, device, equipment and medium based on RFID, which can start an RFID reader-writer which is deployed in advance in a target area to monitor the target area in real time so as to realize all-weather safety protection of the target area.

Description

Anti-loss method, device, equipment and medium based on RFID
Technical Field
The present invention relates to the field of security protection technologies, and in particular, to an RFID-based anti-loss method, apparatus, device, and medium.
Background
In the prior art, related articles such as files and the like need to be stored in a key way, and loss is prevented, otherwise, the security of confidential data can be influenced.
Once data is lost due to improper storage, a significant safety hazard may be created.
Disclosure of Invention
In view of the foregoing, it is desirable to provide an RFID-based anti-loss method, apparatus, device, and medium that can effectively prevent items from being lost based on RFID technology.
An RFID-based anti-loss method, the RFID-based anti-loss method comprising:
responding to an anti-loss detection instruction of a target area, and starting an RFID reader-writer which is deployed in advance in the target area to monitor the target area in real time;
when the RFID reader-writer monitors that an object is delivered from the target area, determining the monitored object as a target object;
detecting whether the target object is abnormal in ex-warehouse;
and when the target object is abnormal in delivery, sending out alarm information.
According to a preferred embodiment of the present invention, before the starting of the pre-deployed RFID reader in the target area to monitor the target area in real time, the method further includes:
and deploying the RFID reader-writer at each outlet and inlet of the target area.
According to a preferred embodiment of the present invention, before the starting of the pre-deployed RFID reader in the target area to monitor the target area in real time, the method further includes:
generating an RFID tag for each object;
binding the RFID tag of each object with each corresponding object to obtain binding data;
recording the binding data;
acquiring a storage area allocated by each object in the target area;
when detecting that an object is stored in the corresponding storage area, recording the detected object according to the binding data, and configuring the state of the detected object as a library state.
According to a preferred embodiment of the present invention, the starting the pre-deployed RFID reader-writer in the target area to monitor the target area in real time includes:
reading the RFID label of each object which is delivered from the target area based on the RFID reader-writer to obtain delivery registration of each object;
and monitoring each object in real time according to the ex-warehouse registration of each object.
According to a preferred embodiment of the present invention, the detecting whether the target object is out of stock comprises:
when the target object has a ex-warehouse registration, determining that the target object is not abnormal in ex-warehouse; or alternatively
And when the target object has no ex-warehouse registration, determining that the target object is abnormal in ex-warehouse.
According to a preferred embodiment of the present invention, the sending out the alarm information includes:
acquiring an RFID reader-writer monitoring the target object as a target RFID reader-writer;
acquiring a preconfigured alarm mode corresponding to the target RFID reader-writer and an image acquisition device associated with the target RFID reader-writer;
acquiring multimedia data acquired by the image acquisition device;
and alarming based on the alarming mode, and displaying the multimedia data on a configuration alarming interface.
According to a preferred embodiment of the present invention, after the alarm information is sent out, the method further includes:
generating an alarm record according to the alarm information;
and displaying the alarm record on a configuration alarm interface.
An RFID-based anti-loss device, the RFID-based anti-loss device comprising:
the monitoring unit is used for responding to an anti-loss detection instruction of a target area and starting an RFID reader-writer which is deployed in advance in the target area to monitor the target area in real time;
a determining unit configured to determine, when it is monitored by the RFID reader that an object is coming out of the target area, the monitored object as a target object;
the detection unit is used for detecting whether the target object is abnormal in delivery;
and the alarm unit is used for sending alarm information when the target object is abnormal in delivery.
A computer device, the computer device comprising:
a memory storing at least one instruction; a kind of electronic device with high-pressure air-conditioning system
And the processor executes the instructions stored in the memory to realize the RFID-based anti-loss method.
A computer-readable storage medium having stored therein at least one instruction that is executed by a processor in a computer device to implement the RFID-based anti-loss method.
According to the technical scheme, the RFID reader-writer which is deployed in advance in the target area can be started to monitor the target area in real time, so that all-weather safety protection of the target area is realized, when the RFID reader-writer monitors that a target object is delivered from the target area, whether the target object is delivered abnormally is detected, and when the target object is delivered abnormally, alarm information is sent out, and further, automatic and effective anti-lost detection of all objects in the target area is realized based on an RFID technology, and loss caused by article loss is avoided.
Drawings
FIG. 1 is a flow chart of a preferred embodiment of the RFID-based anti-loss method of the present invention.
Fig. 2 is a functional block diagram of a preferred embodiment of the RFID-based anti-loss device of the present invention.
Fig. 3 is a schematic structural diagram of a computer device implementing a preferred embodiment of the RFID-based anti-loss method of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in detail with reference to the accompanying drawings and specific embodiments.
FIG. 1 is a flow chart of a preferred embodiment of the RFID-based anti-loss method of the present invention. The order of the steps in the flowchart may be changed and some steps may be omitted according to various needs.
The RFID-based anti-loss method is applied to one or more computer devices, wherein the computer device is a device capable of automatically performing numerical calculation and/or information processing according to preset or stored instructions, and the hardware comprises, but is not limited to, a microprocessor, an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), a programmable gate array (Field-Programmable Gate Array, FPGA), a digital processor (Digital Signal Processor, DSP), an embedded device and the like.
The computer device may be any electronic product that can interact with a user in a human-computer manner, such as a personal computer, tablet computer, smart phone, personal digital assistant (Personal Digital Assistant, PDA), game console, interactive internet protocol television (Internet Protocol Television, IPTV), smart wearable device, etc.
The computer device may also include a network device and/or a user device. Wherein the network device includes, but is not limited to, a single network server, a server group composed of a plurality of network servers, or a Cloud based Cloud Computing (Cloud Computing) composed of a large number of hosts or network servers.
The server may be an independent server, or may be a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communications, middleware services, domain name services, security services, content delivery networks (Content Delivery Network, CDN), and basic cloud computing services such as big data and artificial intelligence platforms.
Among these, artificial intelligence (Artificial Intelligence, AI) is the theory, method, technique and application system that uses a digital computer or a digital computer-controlled machine to simulate, extend and extend human intelligence, sense the environment, acquire knowledge and use knowledge to obtain optimal results.
Artificial intelligence infrastructure technologies generally include technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and other directions.
The network in which the computer device is located includes, but is not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a virtual private network (Virtual Private Network, VPN), and the like.
S10, responding to an anti-loss detection instruction of a target area, and starting an RFID (Radio Frequency Identification, radio frequency identification technology) reader-writer which is pre-deployed in the target area to monitor the target area in real time.
In this embodiment, when a preset voice is detected or a configuration key is detected to be triggered, it is determined that the loss prevention detection instruction is received.
The preset voice can be configured according to user habits, such as 'starting a loss prevention detection task'.
The configuration key may be a virtual key or an entity key, which is not limited by the present invention.
The target area may be an area storing case related articles such as a case, for example, a case management room.
In this embodiment, before the starting the pre-deployed RFID reader in the target area to monitor the target area in real time, the method further includes:
and deploying the RFID reader-writer at each outlet and inlet of the target area.
In the above embodiment, by disposing the RFID readers at the respective entrances and exits of the target area, the relevant information can be obtained at the first time when the objects (such as files) are put in and put out, so that the objects in and put out of the target area can be effectively monitored and managed.
In this embodiment, before the starting the pre-deployed RFID reader in the target area to monitor the target area in real time, the method further includes:
generating an RFID tag for each object;
binding the RFID tag of each object with each corresponding object to obtain binding data;
recording the binding data;
acquiring a storage area allocated by each object in the target area;
when detecting that an object is stored in the corresponding storage area, recording the detected object according to the binding data, and configuring the state of the detected object as a library state.
Wherein the state of the detected object may be configured as the in-library state according to a pre-configured state code, for example: the status code of the detected object may be configured to be 01 in the ajgzt field of the corresponding database to indicate that the detected object is in the in-library status.
Through the embodiment, the objects can be subjected to warehouse-in processing in advance, the warehouse-in state is recorded, and a basis is provided for the warehouse-out of the subsequent objects.
In this embodiment, the starting the pre-deployed RFID reader-writer in the target area to monitor the target area in real time includes:
reading the RFID label of each object which is delivered from the target area based on the RFID reader-writer to obtain delivery registration of each object;
and monitoring each object in real time according to the ex-warehouse registration of each object.
In the above embodiment, when there is an object to be checked out in the target area, the check-out registration of the object is generated in advance, and only the object with the check-out registration can be checked out, otherwise, the check-out is not allowed, based on which, each object can be monitored in real time according to the check-out registration of each object, so as to determine whether the object is checked out normally.
S11, when the RFID reader-writer monitors that an object is out of the warehouse from the target area, determining the monitored object as a target object.
For example: and the RFID reader-writer can scan the RFID label attached to the monitored object, and the object to be delivered is determined according to the scanning result to be used as the target object.
S12, detecting whether the target object is abnormal in ex-warehouse.
In this embodiment, the detecting whether the target object is out of stock includes:
when the target object has a ex-warehouse registration, determining that the target object is not abnormal in ex-warehouse; or alternatively
And when the target object has no ex-warehouse registration, determining that the target object is abnormal in ex-warehouse.
Through the embodiment, whether the target object is abnormal in delivery or not can be automatically detected based on the RFID technology, manual judgment is not needed, labor cost is effectively saved, and judgment errors caused by human errors are avoided.
S13, when the target object is abnormal in delivery, sending out alarm information.
In this embodiment, the sending the alarm information includes:
acquiring an RFID reader-writer monitoring the target object as a target RFID reader-writer;
acquiring a preconfigured alarm mode corresponding to the target RFID reader-writer and an image acquisition device associated with the target RFID reader-writer;
acquiring multimedia data acquired by the image acquisition device;
and alarming based on the alarming mode, and displaying the multimedia data on a configuration alarming interface.
The alarm mode can comprise alarm duration, alarm bell, alarm light and the like. For example: the alarm can be adopted to flash in red, and give out drip sound to alarm for 30 seconds, and after the alarm lasts for 30 seconds, the alarm is ended.
The image acquisition device can be a camera or the like deployed in the target area.
Wherein the multimedia data may include video data or the like. By collecting video data, track video of the whole process can be provided to be used as an effective judging basis for whether abnormality and loss occur.
In this embodiment, after the sending out the alarm information, the method further includes:
generating an alarm record according to the alarm information;
and displaying the alarm record on a configuration alarm interface.
Through the embodiment, the history alarm records are intuitively displayed for viewing and can be used as the basis for subsequent case analysis.
According to the technical scheme, the RFID reader-writer which is deployed in advance in the target area can be started to monitor the target area in real time, so that all-weather safety protection of the target area is realized, when the RFID reader-writer monitors that a target object is delivered from the target area, whether the target object is delivered abnormally is detected, and when the target object is delivered abnormally, alarm information is sent out, and further, automatic and effective anti-lost detection of all objects in the target area is realized based on an RFID technology, and loss caused by article loss is avoided.
FIG. 2 is a functional block diagram of a preferred embodiment of the RFID-based anti-loss device of the present invention. The RFID-based loss prevention device 11 includes a monitoring unit 110, a determining unit 111, a detecting unit 112, and an alarm unit 113. The module/unit referred to in the present invention refers to a series of computer program segments, which are stored in a memory, capable of being executed by a processor and of performing a fixed function. In the present embodiment, the functions of the respective modules/units will be described in detail in the following embodiments.
The monitoring unit 110 is configured to, in response to an anti-loss detection instruction for a target area, start an RFID (Radio Frequency Identification, radio frequency identification technology) reader-writer deployed in advance in the target area to monitor the target area in real time.
In this embodiment, when a preset voice is detected or a configuration key is detected to be triggered, it is determined that the loss prevention detection instruction is received.
The preset voice can be configured according to user habits, such as 'starting a loss prevention detection task'.
The configuration key may be a virtual key or an entity key, which is not limited by the present invention.
The target area may be an area storing case related articles such as a case, for example, a case management room.
In this embodiment, before the pre-deployed RFID reader-writer in the target area is started to monitor the target area in real time, the RFID reader-writer is deployed at each exit and entrance of the target area.
In the above embodiment, by disposing the RFID readers at the respective entrances and exits of the target area, the relevant information can be obtained at the first time when the objects (such as files) are put in and put out, so that the objects in and put out of the target area can be effectively monitored and managed.
In this embodiment, before the RFID reader-writer deployed in advance in the target area is started to monitor the target area in real time, an RFID tag of each object is generated;
binding the RFID tag of each object with each corresponding object to obtain binding data;
recording the binding data;
acquiring a storage area allocated by each object in the target area;
when detecting that an object is stored in the corresponding storage area, recording the detected object according to the binding data, and configuring the state of the detected object as a library state.
Wherein the state of the detected object may be configured as the in-library state according to a pre-configured state code, for example: the status code of the detected object may be configured to be 01 in the ajgzt field of the corresponding database to indicate that the detected object is in the in-library status.
Through the embodiment, the objects can be subjected to warehouse-in processing in advance, the warehouse-in state is recorded, and a basis is provided for the warehouse-out of the subsequent objects.
In this embodiment, the monitoring unit 110 starts the pre-deployed RFID reader-writer in the target area to monitor the target area in real time, including:
reading the RFID label of each object which is delivered from the target area based on the RFID reader-writer to obtain delivery registration of each object;
and monitoring each object in real time according to the ex-warehouse registration of each object.
In the above embodiment, when there is an object to be checked out in the target area, the check-out registration of the object is generated in advance, and only the object with the check-out registration can be checked out, otherwise, the check-out is not allowed, based on which, each object can be monitored in real time according to the check-out registration of each object, so as to determine whether the object is checked out normally.
The determining unit 111 is configured to determine, when it is monitored by the RFID reader/writer that there is an object coming out of the target area, the monitored object as a target object.
For example: and the RFID reader-writer can scan the RFID label attached to the monitored object, and the object to be delivered is determined according to the scanning result to be used as the target object.
The detecting unit 112 is configured to detect whether the target object is abnormal in delivery.
In this embodiment, the detecting unit 112 detects whether the target object is out of stock in an abnormal manner, including:
when the target object has a ex-warehouse registration, determining that the target object is not abnormal in ex-warehouse; or alternatively
And when the target object has no ex-warehouse registration, determining that the target object is abnormal in ex-warehouse.
Through the embodiment, whether the target object is abnormal in delivery or not can be automatically detected based on the RFID technology, manual judgment is not needed, labor cost is effectively saved, and judgment errors caused by human errors are avoided.
The alarm unit 113 is configured to send alarm information when the target object goes out of the warehouse and is abnormal.
In this embodiment, the sending the alarm information includes:
acquiring an RFID reader-writer monitoring the target object as a target RFID reader-writer;
acquiring a preconfigured alarm mode corresponding to the target RFID reader-writer and an image acquisition device associated with the target RFID reader-writer;
acquiring multimedia data acquired by the image acquisition device;
and alarming based on the alarming mode, and displaying the multimedia data on a configuration alarming interface.
The alarm mode can comprise alarm duration, alarm bell, alarm light and the like. For example: the alarm can be adopted to flash in red, and give out drip sound to alarm for 30 seconds, and after the alarm lasts for 30 seconds, the alarm is ended.
The image acquisition device can be a camera or the like deployed in the target area.
Wherein the multimedia data may include video data or the like. By collecting video data, track video of the whole process can be provided to be used as an effective judging basis for whether abnormality and loss occur.
In this embodiment, after the alarm information is sent out, an alarm record is generated according to the alarm information;
and displaying the alarm record on a configuration alarm interface.
Through the embodiment, the history alarm records are intuitively displayed for viewing and can be used as the basis for subsequent case analysis.
According to the technical scheme, the RFID reader-writer which is deployed in advance in the target area can be started to monitor the target area in real time, so that all-weather safety protection of the target area is realized, when the RFID reader-writer monitors that a target object is delivered from the target area, whether the target object is delivered abnormally is detected, and when the target object is delivered abnormally, alarm information is sent out, and further, automatic and effective anti-lost detection of all objects in the target area is realized based on an RFID technology, and loss caused by article loss is avoided.
Fig. 3 is a schematic structural diagram of a computer device according to a preferred embodiment of the present invention for implementing an RFID-based anti-loss method.
The computer device 1 may comprise a memory 12, a processor 13 and a bus, and may further comprise a computer program, such as an RFID-based anti-loss program, stored in the memory 12 and executable on the processor 13.
It will be appreciated by those skilled in the art that the schematic diagram is merely an example of the computer device 1 and does not constitute a limitation of the computer device 1, the computer device 1 may be a bus type structure, a star type structure, the computer device 1 may further comprise more or less other hardware or software than illustrated, or a different arrangement of components, for example, the computer device 1 may further comprise an input-output device, a network access device, etc.
It should be noted that the computer device 1 is only used as an example, and other electronic products that may be present in the present invention or may be present in the future are also included in the scope of the present invention by way of reference.
The memory 12 includes at least one type of readable storage medium including flash memory, a removable hard disk, a multimedia card, a card memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, etc. The memory 12 may in some embodiments be an internal storage unit of the computer device 1, such as a removable hard disk of the computer device 1. The memory 12 may in other embodiments also be an external storage device of the computer device 1, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the computer device 1. Further, the memory 12 may also include both an internal storage unit and an external storage device of the computer device 1. The memory 12 may be used not only for storing application software installed in the computer device 1 and various types of data, such as codes of RFID-based loss prevention programs, but also for temporarily storing data that has been output or is to be output.
The processor 13 may be comprised of integrated circuits in some embodiments, for example, a single packaged integrated circuit, or may be comprised of multiple integrated circuits packaged with the same or different functions, including one or more central processing units (Central Processing unit, CPU), microprocessors, digital processing chips, graphics processors, a combination of various control chips, and the like. The processor 13 is a Control Unit (Control Unit) of the computer device 1, connects the respective components of the entire computer device 1 using various interfaces and lines, executes various functions of the computer device 1 and processes data by running or executing programs or modules stored in the memory 12 (for example, executing an RFID-based loss prevention program or the like), and calling data stored in the memory 12.
The processor 13 executes the operating system of the computer device 1 and various types of applications installed. The processor 13 executes the application program to implement the steps of the various RFID-based loss prevention method embodiments described above, such as the steps shown in fig. 1.
Illustratively, the computer program may be partitioned into one or more modules/units that are stored in the memory 12 and executed by the processor 13 to complete the present invention. The one or more modules/units may be a series of computer readable instruction segments capable of performing the specified functions, which instruction segments describe the execution of the computer program in the computer device 1. For example, the computer program may be divided into a monitoring unit 110, a determining unit 111, a detecting unit 112, an alarm unit 113.
The integrated units implemented in the form of software functional modules described above may be stored in a computer readable storage medium. The software functional module is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a computer device, or a network device, etc.) or a processor (processor) to execute portions of the RFID-based anti-loss method according to the embodiments of the present invention.
The modules/units integrated in the computer device 1 may be stored in a computer readable storage medium if implemented in the form of software functional units and sold or used as separate products. Based on this understanding, the present invention may also be implemented by a computer program for instructing a relevant hardware device to implement all or part of the procedures of the above-mentioned embodiment method, where the computer program may be stored in a computer readable storage medium and the computer program may be executed by a processor to implement the steps of each of the above-mentioned method embodiments.
Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory, or the like.
Further, the computer-readable storage medium may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created from the use of blockchain nodes, and the like.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and the like. The Blockchain (Blockchain), which is essentially a decentralised database, is a string of data blocks that are generated by cryptographic means in association, each data block containing a batch of information of network transactions for verifying the validity of the information (anti-counterfeiting) and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, an application services layer, and the like.
The bus may be a peripheral component interconnect standard (peripheral component interconnect, PCI) bus or an extended industry standard architecture (extended industry standard architecture, EISA) bus, among others. The bus may be classified as an address bus, a data bus, a control bus, etc. For ease of illustration, only one straight line is shown in fig. 3, but not only one bus or one type of bus. The bus is arranged to enable a connection communication between the memory 12 and at least one processor 13 or the like.
Although not shown, the computer device 1 may further comprise a power source (such as a battery) for powering the various components, preferably the power source may be logically connected to the at least one processor 13 via a power management means, whereby the functions of charge management, discharge management, and power consumption management are achieved by the power management means. The power supply may also include one or more of any of a direct current or alternating current power supply, recharging device, power failure detection circuit, power converter or inverter, power status indicator, etc. The computer device 1 may further include various sensors, bluetooth modules, wi-Fi modules, etc., which will not be described in detail herein.
Further, the computer device 1 may also comprise a network interface, optionally comprising a wired interface and/or a wireless interface (e.g. WI-FI interface, bluetooth interface, etc.), typically used for establishing a communication connection between the computer device 1 and other computer devices.
The computer device 1 may optionally further comprise a user interface, which may be a Display, an input unit, such as a Keyboard (Keyboard), or a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch, or the like. The display may also be referred to as a display screen or display unit, as appropriate, for displaying information processed in the computer device 1 and for displaying a visual user interface.
It should be understood that the embodiments described are for illustrative purposes only and are not limited to this configuration in the scope of the patent application.
Fig. 3 shows only a computer device 1 with components 12-13, it being understood by those skilled in the art that the structure shown in fig. 3 is not limiting of the computer device 1 and may include fewer or more components than shown, or may combine certain components, or a different arrangement of components.
In connection with fig. 1, the memory 12 in the computer device 1 stores a plurality of instructions to implement an RFID-based anti-loss method, which the processor 13 may execute to implement:
responding to an anti-loss detection instruction of a target area, and starting an RFID reader-writer which is deployed in advance in the target area to monitor the target area in real time;
when the RFID reader-writer monitors that an object is delivered from the target area, determining the monitored object as a target object;
detecting whether the target object is abnormal in ex-warehouse;
and when the target object is abnormal in delivery, sending out alarm information.
Specifically, the specific implementation method of the above instructions by the processor 13 may refer to the description of the relevant steps in the corresponding embodiment of fig. 1, which is not repeated herein.
The data in this case were obtained legally.
In the several embodiments provided in the present invention, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is merely a logical function division, and there may be other manners of division when actually implemented.
The invention is operational with numerous general purpose or special purpose computer system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like. The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The modules described as separate components may or may not be physically separate, and components shown as modules may or may not be physical units, may be located in one place, or may be distributed over multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional module in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units can be realized in a form of hardware or a form of hardware and a form of software functional modules.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof.
The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
Furthermore, it is evident that the word "comprising" does not exclude other elements or steps, and that the singular does not exclude a plurality. The units or means stated in the invention may also be implemented by one unit or means, either by software or hardware. The terms first, second, etc. are used to denote a name, but not any particular order.
Finally, it should be noted that the above-mentioned embodiments are merely for illustrating the technical solution of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications and equivalents may be made to the technical solution of the present invention without departing from the spirit and scope of the technical solution of the present invention.

Claims (10)

1. An RFID-based anti-loss method, comprising:
responding to an anti-loss detection instruction of a target area, and starting an RFID reader-writer which is deployed in advance in the target area to monitor the target area in real time;
when the RFID reader-writer monitors that an object is delivered from the target area, determining the monitored object as a target object;
detecting whether the target object is abnormal in ex-warehouse;
and when the target object is abnormal in delivery, sending out alarm information.
2. The RFID-based anti-loss method of claim 1, wherein before the starting of the pre-deployed RFID reader in the target area to monitor the target area in real time, the method further comprises:
and deploying the RFID reader-writer at each outlet and inlet of the target area.
3. The RFID-based anti-loss method of claim 1, wherein before the starting of the pre-deployed RFID reader in the target area to monitor the target area in real time, the method further comprises:
generating an RFID tag for each object;
binding the RFID tag of each object with each corresponding object to obtain binding data;
recording the binding data;
acquiring a storage area allocated by each object in the target area;
when detecting that an object is stored in the corresponding storage area, recording the detected object according to the binding data, and configuring the state of the detected object as a library state.
4. The RFID-based anti-loss method of claim 1, wherein the enabling of the pre-deployed RFID reader in the target area to monitor the target area in real time comprises:
reading the RFID label of each object which is delivered from the target area based on the RFID reader-writer to obtain delivery registration of each object;
and monitoring each object in real time according to the ex-warehouse registration of each object.
5. The RFID-based anti-loss method of claim 1, wherein the detecting whether the target object is out of stock anomaly comprises:
when the target object has a ex-warehouse registration, determining that the target object is not abnormal in ex-warehouse; or alternatively
And when the target object has no ex-warehouse registration, determining that the target object is abnormal in ex-warehouse.
6. The RFID-based anti-loss method of claim 1, wherein the issuing the alarm information includes:
acquiring an RFID reader-writer monitoring the target object as a target RFID reader-writer;
acquiring a preconfigured alarm mode corresponding to the target RFID reader-writer and an image acquisition device associated with the target RFID reader-writer;
acquiring multimedia data acquired by the image acquisition device;
and alarming based on the alarming mode, and displaying the multimedia data on a configuration alarming interface.
7. The RFID-based anti-loss method of claim 1, wherein after the issuing of the alarm information, the method further comprises:
generating an alarm record according to the alarm information;
and displaying the alarm record on a configuration alarm interface.
8. An RFID-based anti-loss device, the RFID-based anti-loss device comprising:
the monitoring unit is used for responding to an anti-loss detection instruction of a target area and starting an RFID reader-writer which is deployed in advance in the target area to monitor the target area in real time;
a determining unit configured to determine, when it is monitored by the RFID reader that an object is coming out of the target area, the monitored object as a target object;
the detection unit is used for detecting whether the target object is abnormal in delivery;
and the alarm unit is used for sending alarm information when the target object is abnormal in delivery.
9. A computer device, the computer device comprising:
a memory storing at least one instruction; a kind of electronic device with high-pressure air-conditioning system
A processor executing instructions stored in the memory to implement the RFID-based anti-loss method of any one of claims 1 to 7.
10. A computer-readable storage medium, characterized by: the computer-readable storage medium having stored therein at least one instruction for execution by a processor in a computer device to implement the RFID-based anti-loss method of any of claims 1-7.
CN202311235754.0A 2023-09-22 2023-09-22 Anti-loss method, device, equipment and medium based on RFID Pending CN117313769A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311235754.0A CN117313769A (en) 2023-09-22 2023-09-22 Anti-loss method, device, equipment and medium based on RFID

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311235754.0A CN117313769A (en) 2023-09-22 2023-09-22 Anti-loss method, device, equipment and medium based on RFID

Publications (1)

Publication Number Publication Date
CN117313769A true CN117313769A (en) 2023-12-29

Family

ID=89273065

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311235754.0A Pending CN117313769A (en) 2023-09-22 2023-09-22 Anti-loss method, device, equipment and medium based on RFID

Country Status (1)

Country Link
CN (1) CN117313769A (en)

Similar Documents

Publication Publication Date Title
CN111949708B (en) Multi-task prediction method, device, equipment and medium based on time sequence feature extraction
CN112559535A (en) Multithreading-based asynchronous task processing method, device, equipment and medium
CN111950621A (en) Target data detection method, device, equipment and medium based on artificial intelligence
CN111221722B (en) Behavior detection method, behavior detection device, electronic equipment and storage medium
CN112700261B (en) Method, device, equipment and medium for detecting single file of brushing on basis of suspicious communities
CN112287318A (en) Cross-application program login method, device, equipment and medium
CN117313769A (en) Anti-loss method, device, equipment and medium based on RFID
CN115147031B (en) Clearing workflow execution method, device, equipment and medium
CN115101152A (en) Sample priority switching method, device, equipment and medium
CN114547696A (en) File desensitization method and device, electronic equipment and storage medium
CN114399397A (en) Renewal tracking method, device, equipment and medium
CN114185776A (en) Big data point burying method, device, equipment and medium for application program
CN114185502A (en) Log printing method, device, equipment and medium based on production line environment
CN112785811A (en) Video-based safety monitoring method and safety monitoring device
CN117576721A (en) Visitor management method, device, equipment and medium for appointed personnel
CN117316359B (en) Blood detection process tracking method, device, equipment and medium
CN117271639A (en) Blood sample detection data storage method, device, equipment and medium
CN116306591B (en) Flow form generation method, device, equipment and medium
CN116225789B (en) Transaction system backup capability detection method, device, equipment and medium
CN117151955A (en) Traffic case processing state tracking method, device, equipment and medium
CN117151641A (en) Task tracking method, device, equipment and medium based on in-area personnel management
CN116976821B (en) Enterprise problem feedback information processing method, device, equipment and medium
CN116994279A (en) Invoice data acquisition method, invoice data acquisition device, invoice data acquisition equipment and invoice data acquisition medium
CN117952076A (en) Recording material generation method, device, equipment and medium for personnel inquiry process
CN117573217A (en) Personnel inquiry task execution method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination