五、新型說明: f新型所屬之技術領域】 -種雲端服務管理裝置,特別是—種透過行 〜 證並啟動管理之雲端服務管理裝置。 裒置執仃遇 【先前技術】 先前技術中’ -般車隊欲瞭解目前執行任 透過裝置於各台車上之衛星定位系統。告客f f况,大都 運送情況,或是臨時更改運送地,大都^過中 2查詢传並藉由*央主機系統之人員連絡執行任務 車輛,以傳達客戶變更之需求。 于應 =目前車狀巾央主機純之人員麟24小時 if犬發事件斜央主機系統之人員不在位置上,導致客戶^ =無法取得聯繫,而無法得知目前貨物在“ 皁輛上,或疋遨有哪些空餘車輛可提供調度。 一 管理3身iffff接到訂單,而需要於晚上送貨時,由於 二ΐί”24小時之管理人員,因此在m兄m 員取得聯繫,因此亦無法臨時調度車輛協助運 管理客戶巡查上及聯絡上之方便性,以及車隊與 聯調度’使能夠快速且有效地實施應變,如何 【新型内容】 山有鑑於此,本創作提出一種雲端服務管理裝置,包含—雲 =主,:^ 3—雲端儲存模組;複數行動裝置,分別裝設於車 母行動裝置包含:無線傳輸模組,與雲端主機連線;認 =置二端琳及定位模組,依據車 ^為資訊至雲端主機心 至雲端主機而儲存於雲端儲存模^贼置讀任務貝訊傳运 第-包含第—儲槪组與第二儲存模組, 資訊 储存各車輛之位置資訊’第二儲存模組儲存任務 置資^予管二任務貧訊後,以行動裝置持續傳送位 主機時,控制模組ί生斷傳送位置資訊予管理者 輛的位卜任務資訊包含預定路徑,指定之車 者,異常事件資祝^二路搜,控制模組產生異常事件資訊。再 而管理者主機f1^3/丁動裝置所傳送的最後一個位置資訊。 者主機更包含路徑_龜,規_定路徑。 點,宜内$1:^,中詳細敛述本創作之詳細特徵以及優 並據以實施,侧者瞭解本創作之技術内容 圖書所揭露之内容、申請專利範圍及 優點。u相關技藝者可輕易地理解本創作相關之目的及 【實施方式】 (-),為梢作魏贿管縣置之配置圖 300。 右而主機100、複數行動裝置200及管理者主機 機,=主ί^0 ’為用以儲存資料並能加以讀取資料之主 云知主機100可利用連線之模式,透過不同通訊協 ϊϋίί路連接至其他物件’以傳送至雲端主機刚健存 =亦月b至雲端主機刚讀取所儲存之資料。其中,拖 更具有雲端儲存模組110,例如快閃記憶體或是硬碟等。 切行較佳地可為智慧型手機,但本創作並非以此 例3星定位系統。行動裝置200可分別裝: ^其中,無線傳輸模組·可區分為兩;目 工余1 $為電信、網路模式210,亦即以一般電信線路作為^ 網路模式210包含第三代_通訊技術 内 Ϊ下仃分板接人技術(3冲,利用3G或3.5G等既有之通訊= ^ ^行城置速撥奴方式連接於電侧絡,行動農置 先經由區域基地台220接收’再轉接至雲端主機觸連 請參_ 2騎示,為本辦雲端服辭理裝置之配 (^)。無線傳輸模組260亦可透過區域無線通訊模式24〇之方 >連泉其中,區域然線通訊模式240較佳地可為藍芽 峨赠㊄保真(Wi_F批通财^,但本創作並非以 ^為限。透過此區域無線通訊模< 24〇之方式連線,而愈本 作之雲端主機100連線。 請參閱第3圖所示,為本創作行動裝置之示意圖。行動裝 置2〇〇具有認證模組23〇,傳送認證資料25〇而登入雲端主^ 且③證模組23G可為密碼輸人或是虹膜辨識及臉孔辨 二7。例如,以智慧型手機透過輸入使用者自訂之密碼或是 管理者所給予之密碼而登入雲端主機100。當行動裝置透過盔 =專輸模組26〇與雲駐機KK)相互連雜,藉由認證模組 230之運作而執行認證資料250。 —,參閱第4圖所示,為本創作認證資料之示意圖。本創作 藉由。心戍模組230傳送認證資料250。當使用者傳送認證資料 M440494 250至雲端主機100確認後,方可登入雲端主機。其中, 認證模組230所傳送之認證資料25〇包含密碼檢核,當行動裝 置200與云知主機1〇〇連線後,使用者執行透過電信網路模式 210—’或是區域無線通訊模式240,經由認證模組23〇輸入認 證資料=50 ’例如以數字輸入做出密碼檢核之驗證,以確保使 用者之貧格及S份顧。基此,制者得輸人保全端所給予之 權限密碼,亦或經由使用者自行設定之密碼,待輸入完畢通過 密碼檢核之驗證後’才得以登入雲端主機觸。惟前所述之穷 瑪檢核輸人密碼為僅為舉例,密碼檢核之方式更可為其他方& 檢驗,本創作並非以此為限。 —此外,本創作之認證資料250更可包含影像通話查證。當 =動裝置200與雲端主機1〇〇相互連線後,使用者傳送認證資 250 ’並且透過認證模組23〇執行影像通話查證,亦 用^與雲端主機100經由影像通話連線,使雲端主機⑽之管 =確認個者雜,村透過行誠置勸 而確保使用者之資格及她。惟影像= 之方式並非以此為限。縱上所述,認證資料謂並非僅以穷 碼檢核或是影像通話查證,本創作所述僅為舉例,認證^ ’更可透過其他織之方式而確認使时之資格及身份。/ 次姐ΐί ’認證模,组230更可設定於預設時間内自動傳送認證 】;斗❿登人雲端主機卿’ ^超過預設時間時登出^主 400 ^ 31〇。再者,本創作更具有帳務模組 帳矛力杈,,且310此依據登入時間計算監控費用。1 於二帳務模組310可設置於雲端主機1〇0,;可設置 並非與订純置200二者同時設置,本創作 280,能 再請參閱第3圖,行動裝置200更具有定位模組 6 M440494 依據車辆之不同位, 由無線傳輪模組260傳訊。自登入雲端主機100後經 端儲存模組】】〇。 、 貧訊至雲端主機100而錯存於雲 者主;Ϊ:弟』=端==管理者主機之示意圖。管理 發送任務資訊至指取得各車輛之位置資訊而 以行動裝置200持續^==1 且i10。基此,每台車輛能 為所指定之車輛。 置負訊決定其中一台車輛 存模組存J端主機之示意圖。雲端儲 則用以儲存任務資訊車輛之位置减’第二儲存模組出 $ “當管f者主機300發送任務資訊時,能指定接受任務資1 =當所指定之車她細務資訊後,所指== 仃動虞置200持續傳送位置資訊予管乂 200 ^^接收職不良、故障或是其他磁場干擾等,使得位 貝訊热法順利傳运,則控制模组33〇將產生異常事件資訊。 ^如,,務資訊可包含車辅之預定到達時間,倘若指定之 ft於?定到達時間内抵達目的地,則控制模組330將產生 異*事件f訊。其中’任務資訊更可包含預定路徑,指定之 輛的位置貢訊倘若未在預^路徑内,則控制模組33G同樣 生異常事件資訊’基此’管理者主機更具有路徑規劃模組 340,來規劃此預定路徑。而當控制模組33〇產生異常事件 訊時’此異常事件資訊將包含行動裝置2〇〇所傳送的最後一個 7 财40494 位置資訊。控制模組330再將 ,,動裝置20。,使得其他車得:車 速進行救援或料 _取近之〃他車輛,得以他 再請參閱第3圖,每一行動梦 270,管理者主機3⑼更具亍動通訊模組 通訊模組270與管理者通訊咖透過行動 通酿组27°能接收G並; 訊^ 亦接收管理者通訊模、组320所傳逆之整立 二動通訊模Μ 27。亦可接收影 ^者, 320,同時接收管理者通訊模組汹所傳送之^者通訊%組 此外’行動裳置200更具有記錄模*且29〇 3程。以及防盜模組500,價測是否發移動 如車輛遭受異物侵入,或是震動 吊=,例 侵入等等。基此,防盡模纽5〇〇異常影像 置510可為警示燈或是剩 八‘^裝置5!〇 ’誓示裝 警示裝置胸_告,例如騎件時, 模組傳ϊίίί舆主機連線’以及認證 主機取得她德理者 時調度車娜财送t贼約臨 用以技術内容已經以較佳實施例揭露如上,然心韭 所作此U作’任何熟習此技藝者’在不脫離本創作一·袖 _之保4㈣視伽之帽專利翻所界定者2準口此本 M440494 【圖式簡單說明】 第1圖為本創作雲端服務管理裝置之配置圖(一)。 第2圖為本創作雲端服務管理裝置之配置圖(二)。 第3圖為本創作行動裝置之示意圖。 第4圖為本創作認證資料之示意圖。 第5圖為本創作管理者主機之示意圖。 第6圖為本創作雲端主機之示意圖。 【主要元件符號說明】 100 雲端主機 110 雲端儲存模組 111 第一儲存模組 112 第二儲存模組 200 行動裝置 210 電信網路模式 220 區域基地台 230 認證模組 240 區域無線通訊模式 250 §忍證貧料 260 無線傳輸模組 270 行動通訊模組 280 定位模組 290 記錄模組 9 M440494 300 管理者i機 310 帳務模組 320 管理者通訊模組 330 控制模組 400 計時模組 500 防盜模組 510 警示裝置V. New description: f The new technology field belongs to the cloud technology management device, especially the cloud service management device that passes the management and starts management.先前 仃 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 【 The slogan f, the majority of the delivery situation, or temporarily change the delivery location, most of them pass through the 2 queries and communicate with the personnel of the * central host system to carry out the task of the vehicle to convey the needs of customer changes. Yu Ying = the current car-shaped towel central host pure staff Lin 24 hours if the dog incident event oblique host system personnel are not in position, resulting in customers ^ = can not get in touch, but can not know the current goods on the soap, or哪些Which spare vehicles can provide dispatch. A management 3 body iffff receives the order, but needs to be delivered at night, due to the 24-hour management staff, so the m brothers get in touch, so can not be temporary Dispatching the vehicle to assist the management of the customer on the inspection and the convenience of contact, as well as the fleet and joint dispatch 'to enable rapid and effective implementation of the response, how to [new content] Mountain, in view of this, this creation proposes a cloud service management device, including - cloud = main, : ^ 3 - cloud storage module; multiple mobile devices, respectively installed in the car mobile device includes: wireless transmission module, connected with the cloud host; recognize = set two endliner and positioning module, According to the car ^ for information to the cloud host to the cloud host and stored in the cloud storage module ^ thief reading task Beixun transport - including the first - storage group and the second storage module, information The location information of each vehicle is stored. 'The second storage module storage task is funded. After the second task is saved, the control module ί transmits the position information to the manager's position. The mission information includes the scheduled route, the designated vehicle, the abnormal event, and the control module generates abnormal event information. Then, the manager's host f1^3/the last position information transmitted by the device. The host also contains the path _ turtle, the rule _ fixed path. Point, within the appropriate $1: ^, the details of the creation of the details of the creation and the advantages of the implementation, the side to understand the technical content of the creation of the book, the scope of the patent application and advantages. u related artisans can easily understand the purpose of this creation and the [Implementation] (-), which is the configuration diagram of Wei Juxi County. Right, the host 100, the plurality of mobile devices 200, and the administrator host machine, = the main ί^0 'is the main cloud knowledge host 100 for storing data and being able to read the data, and the connection mode can be utilized through different communication protocols ί ί The road is connected to other objects' to be transmitted to the cloud host. Just keep storing=Yueyue b to the cloud host just read the stored data. Among them, the drag has a cloud storage module 110, such as a flash memory or a hard disk. The cut is preferably a smart phone, but this creation is not a 3 star positioning system. The mobile device 200 can be separately installed: ^ wherein the wireless transmission module can be divided into two; the remaining 1$ is the telecommunication, network mode 210, that is, the general telecommunication line is used as the ^ network mode 210, including the third generation_communication Intra-technical technology, sub-board access technology (3 rush, using 3G or 3.5G and other existing communications = ^ ^ City speed set-up mode is connected to the electric side network, the action farmer first receives via the regional base station 220 'Re-transfer to the cloud host to contact _ 2 riding, for the cloud service commemorative device (^). The wireless transmission module 260 can also pass the regional wireless communication mode 24 〇方 > The regional serial communication mode 240 can preferably be a five-fidelity for the Bluetooth (Wi_F batch pass), but the creation is not limited to ^. Through this area wireless communication mode < 24〇 way, The more the cloud host 100 is connected. Please refer to Figure 3 for a schematic diagram of the authoring mobile device. The mobile device 2 has an authentication module 23〇, which transmits the authentication data 25〇 and logs into the cloud master ^ The 3 module module 23G can be password input or iris recognition and face recognition. For example, The smart phone is logged into the cloud host 100 by inputting a user-defined password or a password given by the administrator. When the mobile device is connected to the cloud KK via the helmet=special transmission module 26, by authentication The authentication module 250 is executed by the operation of the module 230. -, as shown in Fig. 4, is a schematic diagram of the creation authentication material. The creation is performed by the heartbeat module 230. When the user transmits the authentication material M440494 After the confirmation to the cloud host 100 is completed, the cloud host can be logged in. The authentication data transmitted by the authentication module 230 includes a password check. After the mobile device 200 is connected to the cloud host, the user performs the operation. Through the telecommunication network mode 210-' or the regional wireless communication mode 240, the authentication data is input via the authentication module 23=50', for example, the verification of the password check is performed by digital input to ensure the user's poor and S-parts. Gu. Based on this, the system has to lose the password given by the person in charge, or through the password set by the user. After the password is verified, the user can log in to the cloud master. The machine is touched. However, the previously described poor horse check-in password is only an example, and the password check method can be used for other parties & inspections. This creation is not limited to this. - In addition, the certification information of this creation The 250 may further include an image call verification. After the mobile device 200 and the cloud host 1 are connected to each other, the user transmits the authentication resource 250' and performs image call verification through the authentication module 23, and also uses the cloud host 100. Through the video call connection, the cloud host (10) can be confirmed by the manager. The village can ensure the user's qualifications and her through the advice of the company. However, the image = is not limited to this. The data is not only checked by poor code or video call. The description of this book is only an example. The certification can be used to confirm the eligibility and identity of the time. /Second sister ΐί ‘authentication mode, group 230 can be set to automatically transmit authentication within the preset time 】; ❿ ❿ ❿ 云 云 ’ ’ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ 超过 超过 超过 超过 超过 超过Moreover, the creation has a billing module, and 310 calculates the monitoring fee based on the login time. 1 The second account module 310 can be set in the cloud host 1〇0, and can be set not simultaneously with the order setting 200, the creation 280, can refer to FIG. 3 again, the mobile device 200 has a positioning mode. Group 6 M440494 is transmitted by wireless transmission module 260 depending on the location of the vehicle. After logging in to the cloud host 100, the terminal storage module]] 〇. , poor news to the cloud host 100 and lost in the cloud owner; Ϊ: brother 』 = end == manager host schematic. The management sends the task information to obtain the location information of each vehicle, and the mobile device 200 continues ^==1 and i10. Based on this, each vehicle can be the designated vehicle. The negative signal determines the schematic diagram of one of the vehicle storage modules stored in the J terminal. The cloud storage is used to store the location of the mission information vehicle minus the second storage module. "When the host device 300 sends the mission information, it can specify the task to be accepted. 1 = When the specified vehicle is her detailed information, Refers to == 仃 虞 200 200 continues to transmit position information to the tube ^ 200 ^ ^ receiving job defects, faults or other magnetic field interference, etc., so that the Beibei thermal method is successfully transported, the control module 33 〇 will generate an abnormality Event information. ^,, the service information may include the scheduled arrival time of the vehicle, and if the specified ft arrives at the destination within the scheduled arrival time, the control module 330 will generate an event*. The predetermined path may be included, and if the location of the designated vehicle is not in the pre-path, the control module 33G also generates an abnormal event information, and the administrator host further has a path planning module 340 to plan the predetermined path. And when the control module 33 generates an abnormal event message, the abnormal event information will include the last 74040 position information transmitted by the mobile device 2. The control module 330 will, again, move the device 20. Other cars: speed to rescue or material _ get close to his vehicle, so he can refer to Figure 3, each action dream 270, the administrator host 3 (9) is more swaying communication module communication module 270 and the manager The communication coffee can receive G through the action brewing group 27°; the communication also receives the manager communication module, and the group 320 reverses the standing two-motion communication module 27. It can also receive the image, 320, and receive management at the same time. The communication module transmits the group of % communication. In addition, the 'action slot 200 has a recording mode* and 29〇3 steps. And the anti-theft module 500, whether the price is measured, such as the vehicle is subjected to foreign matter intrusion, or vibration. Hang =, case intrusion, etc. Based on this, the anti-make button 5 〇〇 abnormal image set 510 can be a warning light or the remaining eight '^ device 5! 〇 誓 装 装 警 警 警 , , , , , , , , module transmission ϊ ί ί 舆 舆 舆 舆 以及 以及 以及 以及 以及 以及 以及 以及 以及 以及 以及 以及 以及 认证 认证 认证 认证 认证 认证 认证 认证 认证 认证 认证 舆 舆 舆 舆 舆 舆 舆 舆 舆 舆 舆 舆 舆 舆 舆 舆 舆 舆 舆Those who are familiar with this artist's are not out of this creation. The cap patent definition is defined as 2 the port M440494 [Simple description of the figure] The first picture is the configuration diagram of the creation cloud service management device (1). The second picture is the configuration diagram of the creation cloud service management device (2) Fig. 3 is a schematic diagram of the creation mobile device. Fig. 4 is a schematic diagram of the creation authentication data. Fig. 5 is a schematic diagram of the creation manager host. Fig. 6 is a schematic diagram of the creation cloud host. DESCRIPTION OF REFERENCE NUMERALS 100 cloud host 110 cloud storage module 111 first storage module 112 second storage module 200 mobile device 210 telecommunication network mode 220 regional base station 230 authentication module 240 regional wireless communication mode 250 § forbearance 260 Wireless transmission module 270 Mobile communication module 280 Positioning module 290 Recording module 9 M440494 300 Manager i machine 310 Accounting module 320 Manager communication module 330 Control module 400 Timing module 500 Anti-theft module 510 Warning Device