WO2019052312A1 - 电子关锁设备以及进行货厢查验的方法 - Google Patents

电子关锁设备以及进行货厢查验的方法 Download PDF

Info

Publication number
WO2019052312A1
WO2019052312A1 PCT/CN2018/101287 CN2018101287W WO2019052312A1 WO 2019052312 A1 WO2019052312 A1 WO 2019052312A1 CN 2018101287 W CN2018101287 W CN 2018101287W WO 2019052312 A1 WO2019052312 A1 WO 2019052312A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic lock
communication
communication unit
electronic
event
Prior art date
Application number
PCT/CN2018/101287
Other languages
English (en)
French (fr)
Inventor
康克军
陈志强
苗齐田
李元景
吴相豪
刘世国
Original Assignee
同方威视技术股份有限公司
清华大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 同方威视技术股份有限公司, 清华大学 filed Critical 同方威视技术股份有限公司
Publication of WO2019052312A1 publication Critical patent/WO2019052312A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B47/0001Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof
    • E05B47/0012Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof with rotary electromotors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0048Circuits, feeding, monitoring
    • E05B2047/0057Feeding
    • E05B2047/0058Feeding by batteries
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0048Circuits, feeding, monitoring
    • E05B2047/0067Monitoring
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00634Power supply for the lock
    • G07C2009/00642Power supply for the lock by battery
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C2009/0092Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for cargo, freight or shipping containers and applications therefore in general
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Definitions

  • the present disclosure relates to the field of logistics supervision, and in particular to an electronic locking device and a method for performing cargo compartment inspection.
  • Locking eg, mechanical and electronic locking
  • Locking is often used to achieve lock monitoring of the door of the cargo compartment.
  • the safety of mechanical locking and the cost and performance of related electronic locking are difficult to meet. Requirements for use (especially for long-distance, long-term cross-border logistics).
  • an electronic lockout device includes: a first communication unit configured to communicate with the terminal device through the first communication; a memory to store the initial inspection image; and a processor configured to pass the first communication unit with the electronic lock device
  • the first communication unit is controlled to transmit the initial inspection image to the inspection terminal device when the terminal device connection is checked.
  • the first communication is one of Bluetooth communication, near field communication, and radio frequency identification communication.
  • the electronic lockout device further includes an event detecting unit for detecting a security event of the electronically locked device and generating an event notification when the security event is detected.
  • the processor is further configured to receive the event notification, and record event information in the memory based on the event notification.
  • the processor is further configured to control the first communication unit to send the event information record to the verification terminal device when the electronic lock device is connected to the verification terminal device through the first communication unit.
  • the electronic lockout device further includes: a second communication unit that communicates with the server through mobile communication.
  • the processor is further configured to control the second communication unit to send location information of the electronically locked device to the server.
  • the processor is further configured to control the second communication unit to send alarm information to the server upon receiving the event notification.
  • the initial inspection image is obtained from the terminal device by the first communication unit and/or the OTG connection.
  • the electronic lockout device further includes a decapsulation structure.
  • the decapsulation structure includes a combination of a linear motor and a slider.
  • the electronic lockout device further includes a positioning unit.
  • the positioning unit obtains location information and orientation information about the base station from the second communication unit, and determines a location of the electronic lockout device based on the location information and the orientation information.
  • the electronic lockout device further includes a battery unit and a battery disassembly monitoring unit.
  • the battery unit is detachable.
  • the battery disassembly monitoring unit monitors disassembly of the battery unit.
  • the battery disassembly monitoring unit is a photodetector or a position detector.
  • the method includes obtaining an initial inspection image from the electronic lockout device, acquiring an instant inspection image of the cargo compartment, and comparing the initial inspection image with the immediate inspection image. Wherein, when the result of the comparison is consistent, it is determined that the cargo compartment passes the inspection.
  • the method further comprises obtaining an event information record from the electronically locked device. Wherein, when the event information record is empty, it is determined that the cargo compartment passes the inspection. The step of obtaining the initial inspection image and/or logistics information is triggered when the event information record is not empty.
  • the method further comprises obtaining an alert record from the server regarding the electronically locked device. Wherein, when the alarm record is empty, it is determined that the cargo compartment passes the inspection, and when the alarm record is not empty, the step of acquiring the initial inspection image and/or logistics information is triggered.
  • the obtaining, by the server, the alarm record about the electronic lock device comprises: obtaining identification information of the electronic lock device; using the identification information, performing an alarm record query to the server; Receive query results from the server.
  • an unpacking check prompt is triggered.
  • Figure 1 shows a logistics scenario for a cargo compartment that is sealed using an electronic lockout device.
  • FIG. 2 shows a schematic view of the appearance of an electronic lock device according to an embodiment of the present disclosure.
  • FIG. 3 illustrates a structural block diagram of an electronic lock device in accordance with an embodiment of the present disclosure.
  • FIG. 4 shows a flow chart of a method of inspecting a cargo compartment that is sealed by an electronic lockout device in accordance with an embodiment of the present disclosure.
  • Figure 1 shows a logistics scenario 100 of a cargo compartment that is sealed using an electronic lockout device.
  • the scenario 100 is divided into two phases: a sealing phase and a verification phase.
  • the sealing is performed by the electronic locking device 120 on the box door of the cargo compartment 110.
  • the electronic lock device 120 communicates with the terminal device 130, and the terminal device 130 communicates with the server 140.
  • the electronic lockout device 120 can communicate directly with the server 140.
  • the electronic lockout device 120 can be an electronic lockout device 300 in accordance with an embodiment of the present disclosure, which will be described in greater detail below in connection with FIG.
  • FIG. 2 shows an exemplary schematic appearance of an electronic lockout device 120.
  • the electronic lock device 120 includes two parts, a lock lever and a lock body, and the electronic lock device 120 is locked in the use by the lock lever passing through the buckle or the lock hole of the cargo door.
  • the lock lever can be made of a flexible material having a diameter on the order of millimeters, such as about 5 mm, for greater flexibility.
  • the unique identifier, barcode or two-dimensional code of the electronic lock device 120 is printed on the lock body, so that the terminal device 130, 150 can obtain the identification information of the electronic lock device 120 by scanning or inputting. It should be understood that the appearance of the electronic lockout device 120 of FIG. 2 is merely exemplary, and in other embodiments of the present disclosure, the electronic lockout device 120 may also have any other possible appearance structure.
  • the electronic lock device 120 in the present application is realized by a linear motor plus a slider (similar to the manner of a mechanical jack). This approach enables higher energy conversion efficiencies, ie electrodes of the same power can output more force. Thereby, the stability of the unsealing seal can be ensured even at a low temperature.
  • Terminal device 130 may also be referred to as a sealed terminal device 130, which may be any type of mobile or wired terminal, such as a smart phone, tablet, laptop, or the like.
  • the terminal device 130 communicates with the electronic lock device 120 through a specific communication method.
  • the communication method is a low power, low cost or short range communication method such as Bluetooth, near field communication, radio frequency identification, and the like.
  • the terminal device 130 is also capable of scanning a barcode, a two-dimensional code or an identifier on the electronic lock device 120 to obtain identification information of the electronic lock device 120.
  • the terminal device 130 also has an on-the-go (OTG) function so that data can be directly transferred between the terminal device 130 and the electronically-locked device 120 through the OTG interface, such as writing and reading of image data. take.
  • OTG on-the-go
  • Server 140 can be a cloud server or any other type of server system capable of carrying data.
  • the server 140 communicates with the terminal device 130 by means of mobile communication, such as 2G, 3G, 4G or 5G cellular communication, WiFi communication, and the like.
  • mobile communication such as 2G, 3G, 4G or 5G cellular communication, WiFi communication, and the like.
  • the server 140 can also directly communicate with the electronic lock device 120 through the various mobile communication methods described above.
  • the electronic lockout device 120 is activated or initialized.
  • the logistics information may be obtained from a customs declaration or an official logistics system.
  • the key information (for example, a password) generated for the current application of the electronic lock device 120 is acquired from the server 140, and the key information is written into the electronic lock device 120.
  • the electronic lock device 120 may be in a sleep state when the location information is not reported.
  • the logistics process enters the inspection phase.
  • the cargo compartment 110 is inspected by interaction of the terminal device 150 with the electronic lockout device 120 (i.e., whether the cargo compartment 110 has been opened or damaged).
  • the electronic lock device 120 communicates with the terminal device 150, and the terminal device 150 communicates with the server 140.
  • the electronic lockout device 120 can communicate directly with the server 140.
  • Terminal device 150 may also be referred to as verification terminal device 150, which may be any type of mobile or wired terminal, such as a smart phone, tablet, laptop, or the like.
  • the terminal device 150 communicates with the electronic lock device 120 through a specific communication method.
  • the communication method is a low power, low cost or short range communication method such as Bluetooth, near field communication, radio frequency identification, and the like.
  • the terminal device 150 is also capable of scanning a barcode, a two-dimensional code or an identifier on the electronically-locked device 120 to obtain identification information of the electronically-locked device 120.
  • the terminal device 150 also has a USB interface of an OTG (on-the-go) function, so that data can be directly transmitted between the terminal device 150 and the electronic lock device 120 through the USB interface, such as image data. Write and read.
  • FIG. 3 shows a block diagram of the structure of an electronic lockout device 300 in accordance with an embodiment of the present disclosure.
  • the electronic lockout device 300 can be used as the electronic lockout device 120 in the scene shown in FIG.
  • the electronic lockout device 300 includes a first communication unit 310, a memory 320, a processor 330, and an event detection unit 340.
  • event detection unit 340 is shown by dashed lines, which indicates that event detection unit 340 is not a necessary component, and in some embodiments of the present disclosure, event detection unit 340 may be omitted.
  • the first communication unit 310 is configured to communicate with a terminal device (such as the terminal device 130, 150 in FIG. 1) through the first communication.
  • the first communication is a low power, low cost or short-range communication method, such as Bluetooth, near field communication, radio frequency identification, and the like.
  • the first communication unit 310 is in a sleep state when not in operation.
  • the first communication unit can be activated by touch activation (such as a button on the touch) or signaling activation (by sending an activation command to the electronic lock device 300, which can be a request to send or receive) 310 is activated from sleep state.
  • the first communication unit 310 returns to the sleep state if it does not work for a first threshold time (such as 10 minutes).
  • Memory 320 can be any type of data storage unit that is used to store an initial inspection image.
  • the initial inspection image may be obtained from a sealed terminal device (e.g., terminal device 130) via the first communication unit and/or OTG connection.
  • the memory 320 is also used to store logistics information, event information records (as described below), and the like.
  • Processor 330 can be any type of processing unit.
  • the processor 330 is configured to control the first communication unit 310 to transmit the initial inspection image to the verification terminal device 150 when the electronic lock device 300 is connected to the verification terminal device (eg, the terminal device 150) through the first communication unit 310.
  • the processor 330 is further configured to control the first communication unit 310 to receive from the sealed terminal device 130 when the electronic lock device 300 is connected to the terminal device (eg, the terminal device 130) through the first communication unit 310. Initially check the image.
  • the event detecting unit 340 is configured to detect a security event of the electronic lock device 300 and generate an event notification when a security event is detected.
  • Security events include, for example, the electronic lockout device 300 is turned off, the electronic lockout device 300 is broken, and the like.
  • the event detecting unit 340 can be implemented as a detecting circuit, and an open circuit due to the opening or being broken of the lock causes a significant abrupt change in the parameters of the detecting circuit, so that the event detecting unit determines that a security event has occurred.
  • a separate switch unit can be provided for event detection unit 340. When the switch unit is turned on, the event detecting unit 340 is powered on and can be in an active state to detect a security event during the logistics.
  • the event detecting unit 340 When the switch unit is turned off, the event detecting unit 340 is not energized and thus is not in an active state.
  • the switch unit can be controlled by encryption, fingerprint or other means of encryption.
  • the checker or the receiver has the encryption control for the switch unit, the working state of the switch unit can be released, thereby preventing the normal unblocking process from triggering an alarm.
  • the processor 330 is further configured to receive the event notification and record the event information in the memory 320 based on the event notification.
  • the event notification may include an event type, such as a lock open or a lock break.
  • the event information may include an event type indicated in the event notification, and may also include an event time, an event location, and the like.
  • the processor 330 is further configured to control the first communication unit 310 to send the event information record to the verification terminal when the electronic lock device 300 is connected to the verification terminal device (for example, the terminal device 150) through the first communication unit 310. device.
  • electronic lockout device 300 also includes a second communication unit.
  • the second communication unit communicates with the server through mobile communication, such as 2G, 3G, 4G or 5G cellular communication, WiFi communication, and the like.
  • the processor 330 is further configured to control the second communication unit to send the location information of the electronic lock device 300 to the server (eg, the server 140).
  • the processor 330 is further configured to control the second communication unit to send the alarm information to the server when the event notification is received.
  • the positioning unit is implemented as a satellite positioning unit that positions the electronic lockout device 300 via a satellite positioning system such as a GPS system or a Beidou system.
  • a satellite positioning system such as a GPS system or a Beidou system.
  • the positioning unit further includes a base station positioning module that obtains location information and location information and the like about the base station from the second communication unit, and locates the electronic lock device 300 based on the information.
  • the positioning can be achieved by, for example, a triangulation method. Compared with satellite positioning, base station positioning will reduce the power consumption level to some extent.
  • the battery unit is detachable to accommodate the need to charge or replace a battery during long distance transportation such as "One Belt, One Road.”
  • a battery disassembly monitoring unit can also be provided for monitoring the occurrence of battery disassembly.
  • the battery disassembly monitoring unit can be implemented by a photodetector or a position detector. When the system does not receive an instruction to allow disassembly, if the battery is removed from its installation position, the battery disassembly monitoring unit triggers the alarm unit to alert.
  • the electronic lock device 300 can communicate with the terminal device by using the low power consumption first communication unit 310, and can extend the use time of the electronic lock device for up to 20 days.
  • the electronic lockout apparatus 300 according to an embodiment of the present disclosure can be better adapted to cross-border long-distance logistics between countries such as the "Belt and Road” initiative.
  • FIG. 4 shows a flow diagram of a method 400 of inspecting a cargo compartment that is sealed by an electronic lockout device, such as electronic lockout device 300, in accordance with an embodiment of the present disclosure.
  • the method 400 can be performed by a verification terminal device, such as the terminal device 150, or by other suitable wired or wireless device.
  • step S410 in which an event information record is obtained from an electronic lockout device.
  • decision step S420 it is determined whether the event information record is empty. When the event information record is empty, method 400 proceeds to the end node and the check passes. When the event information record is not empty, the method 400 proceeds to step S430, where an initial inspection image is obtained from the electronic lockout device.
  • step S440 an immediate inspection image of the cargo compartment is acquired.
  • step S450 the initial inspection image and the instant inspection image are compared.
  • decision step S460 it is determined whether the results of the comparison are consistent. When the comparison results are consistent, method 400 proceeds to the end node and the check passes. When the result of the comparison is inconsistent, step S470 is performed to trigger the unpacking check prompt. The inspectors are then checked out of the box.
  • steps S410 and S420, etc. are shown by dashed lines, which means that these steps are not necessary, and in some embodiments of the present disclosure, these steps may be omitted.
  • an event information record is acquired from the electronic lock device.
  • the event information is information about a security event that has occurred after the electronic lock device is applied, and may include content types, event times, event locations, and the like.
  • the event information reflects whether the safety of the electronic locking device has been damaged or released during the period from the sealing to the inspection. If it is determined that the safety has been guaranteed, the cargo compartment can be directly considered to pass the inspection and release. That is, in step S420, if it is judged that the event information is recorded as empty, the method 400 ends the end node (it is considered that the check passes).
  • the method 400 may also obtain an alarm record for the electronically locked device from the server. Similarly, when the alarm record is empty, it is determined that the cargo compartment passes the inspection. When the alarm record is not empty, proceed to the next step.
  • obtaining an alarm record about the electronic lockout device from a server includes: obtaining identification information of the electronic lockout device; using the identification information, performing an alarm record query to the server; and a slave server Receive the query results.
  • step S420 if it is determined that the event information record is not empty (ie, the security of the electronic lock device may be corrupted during the period of time until the check is performed), the method 400 proceeds to steps S430 and S440, where In these two steps, the initial inspection image is acquired from the electronic lock device and the instant inspection image of the cargo compartment is collected.
  • S430 is shown in FIG. 4 as being located before S440, it should be understood that this is merely an example, and in other embodiments, S440 may be located before S430, or both may be performed in parallel.
  • step S450 the initial inspection image and the immediate inspection image are compared.
  • the comparison may be achieved by a graphical comparison in units of pixels or other image units (implemented by a processor executing a particular graphics comparison program) or by manual mapping.
  • step S460 it is determined whether the results of the comparison are consistent. If the comparison results are consistent, then method 400 proceeds to the end node and the check passes. If the comparison result is inconsistent, step S470 is performed to prompt the worker to perform the unpacking check.
  • the efficiency of the inspection can be greatly improved while ensuring the accuracy of the inspection, and can be better applied to the development of cross-border logistics between countries involved in the “Belt and Road” initiative.
  • the terminal device wants to read and write images or event records in the electronic lock device, it may need to log in to the logistics platform on the server for identity confirmation.
  • the key set in the electronic lock device is then obtained from the server, and then the electronic lock device is operated by the key.
  • the embodiments of the present disclosure may include such content, and the above description is omitted in order to highlight the focus of the embodiments of the present disclosure.
  • aspects of the embodiments disclosed herein may be implemented in an integrated circuit as a whole or in part, as one or more of one or more computers running on one or more computers.
  • a computer program eg, implemented as one or more programs running on one or more computer systems
  • implemented as one or more programs running on one or more processors eg, implemented as one or One or more programs running on a plurality of microprocessors, implemented as firmware, or substantially in any combination of the above, and those skilled in the art, in accordance with the present disclosure, will be provided with design circuitry and/or write software and / or firmware code capabilities.
  • signal bearing media include, but are not limited to, recordable media such as floppy disks, hard drives, compact disks (CDs), digital versatile disks (DVDs), digital tapes, computer memories, and the like; and transmission-type media such as digital and / or analog communication media (eg, fiber optic cable, waveguide, wired communication link, wireless communication link, etc.).

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Evolutionary Biology (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Development Economics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Computation (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Alarm Systems (AREA)
  • Lock And Its Accessories (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

一种电子关锁设备及进行货厢查验的方法。电子关锁设备(300)包括:第一通信单元(310),用于通过第一通信与终端设备进行通信;存储器(320),用于存储初始查验图像;处理器(330),用于在电子关锁设备(300)通过第一通信单元(310)与查验终端设备连接时控制第一通信单元(310)将初始查验图像发送到查验终端设备。其中,第一通信是蓝牙通信、近场通信、射频识别通信之一。

Description

电子关锁设备以及进行货厢查验的方法
相关申请的交叉引用
本申请要求于2017年9月18日提交的、申请号为201710841212.6的中国专利申请的优先权,其全部内容通过引用并入本申请中。
技术领域
本公开涉及物流监管领域,具体地涉及一种电子关锁设备以及进行货厢查验的方法。
背景技术
在物流运输或海关通关查验等领域中,需要防止所运输的或待查验的货厢(例如,集装箱)在未经允许的情况下被非法打开,从而保证货厢运输的安全性并保障海关通关查验的监管作用,不给不法分子可乘之机。通常使用关锁(例如,机械关锁和电子关锁)来实现对货厢的箱门的锁闭监控,然而,机械关锁的安全性以及相关技术电子关锁的成本和性能都难以满足实际使用(尤其是远距离、长时间的跨境物流运输)的要求。
因此,需要一种更为便捷、安全且成本较低的电子关锁设备。
发明内容
根据本公开的一个方面,提出了一种电子关锁设备。所述电子关锁设备包括:第一通信单元,用于通过第一通信与终端设备进行通信;存储器,用于存储初始查验图像;处理器,用于在电子关锁设备通过第一通信单元与查验终端设备连接时控制第一通信单元将所述初始查验图像发送到查验终端设备。所述第一通信是蓝牙通信、近场通信、射频识别通信之一。
在一个实施例中,所述电子关锁设备还包括:事件检测单元,用于检测电子关锁设备的安全事件,并在检测到安全事件时产生事件通知。其中,所述处理器还用于接收所述事件通知,并基于所述事件通知在所述存储器中对事件信息进行记录。此外,所述处理器还用于在电子关锁设备通过第一通信单元与查验终端设备连接时控制第一通信单元将事件信息记录发送到查验终端设备。
在一个实施例中,所述的电子关锁设备还包括:第二通信单元,通过移动通信与服务器进行通信。其中,所述处理器还用于控制所述第二通信单元向所述服务器发送所述电子关锁设备的位置信息。
在一个实施例中,所述处理器还用于在接收到所述事件通知时控制所述第二通信单元向服务器发送报警信息。
在一个实施例中,所述初始查验图像是通过所述第一通信单元和/或OTG连接从施封终端设备获得的。
在一个实施例中,所述电子关锁设备还包括施解封结构。该施解封结构包括直线电机和滑块的组合。
在一个实施例中,所述电子关锁设备还包括定位单元。该定位单元从所述第二通信单元获得关于基站的位置信息和方位信息,并基于所述位置信息和方位信息确定所述电子关锁设备的位置。
在一个实施例中,所述电子关锁设备还包括电池单元和电池拆卸监控单元。所述电池单元是可拆卸的。所述电池拆卸监控单元对所述电池单元的拆卸进行监控。所述电池拆卸监控单元是光电检测器或位置检测器。
根据本公开的另一方面,还提出了一种对根据以上各实施例的电子关锁设备所施封的货厢进行查验的方法。所述方法包括:从所述电子关锁设备获取初始查验图像;采集所述货厢的即时查验图像;比较所述初始查验图像和所述即时查验图像。其中,当所述比较的结果为一致时,确定所述货厢通过查验。
在一个实施例中,所述方法还包括:从所述电子关锁设备获取事件信息记录。其中,当所述事件信息记录为空时,确定所述货厢通过查验。当所述事件信息记录不为空时,触发所述获取初始查验图像和/或物流信息的步骤。
在一个实施例中,所述方法还包括:从服务器获取关于所述电子关锁设备的报警记录。其中,当所述报警记录为空时,确定所述货厢通过查验,当所述报警记录不为空时,触发所述获取初始查验图像和/或物流信息的步骤。
在一个实施例中,所述从服务器获取关于所述电子关锁设备的报警记录包括:获得所述电子关锁设备的标识信息;利用所述标识信息,向所述服务器进行报警记录查询;以及从服务器接收查询结果。
在一个实施例中,当所述比较的结果为不一致时,触发开箱查验提示。
附图说明
图1示出了一种使用电子关锁设备施封的货厢的物流场景。
图2示出了根据本公开实施例的电子关锁设备的外观示意图。
图3示出了根据本公开实施例的电子关锁设备的结构框图。
图4示出了对根据本公开实施例的电子关锁设备所施封的货厢进行查验的方法的流程图。
具体实施方式
下面将详细描述本公开的具体实施例,应当注意,这里描述的实施例只用于举例说明,并不用于限制本公开。在以下描述中,为了提供对本公开的透彻理解,阐述了大量特定细节。然而,对于本领域普通技术人员显而易见的是:不必采用这些特定细节来实行本公开。在其他实例中,为了避免混淆本公开,未具体描述公知的电路、材料或方法。
在整个说明书中,对“一个实施例”、“实施例”、“一个示例”或“示例”的提及意味着:结合该实施例或示例描述的特定特征、结构或特性被包含在本公开至少一个实施例中。因此,在整个说明书的各个地方出现的短语“在一个实施例中”、“在实施例中”、“一个示例”或“示例”不一定都指同一实施例或示例。此外,可以以任何适当的组合和/或子组合将特定的特征、结构或特性组合在一个或多个实施例或示例中。此外,本领域普通技术人员应当理解,在此提供的附图都是为了说明的目的,并且附图不一定是按比例绘制的。这里使用的术语“和/或”包括一个或多个相关列出的项目的任何和所有组合。
以下参考附图对本公开进行具体描述。
首先,图1示出了一种使用电子关锁设备施封的货厢的物流场景100。
如图1所示,场景100分为两个阶段:施封阶段和查验阶段。
在施封阶段中,在货厢110的箱门上通过电子关锁设备120进行施封。电子关锁设备120与终端设备130进行通信,终端设备130与服务器140进行通信。在一个实施例中,电子关锁设备120可以与服务器140直接进行通信。
电子关锁设备120可以是下文将结合图3详述的根据本公开实施例的电子关锁设备300。图2示出了电子关锁设备120的一种示例性的示意外观。从外观上看,电子关锁设备120包括关锁杆和关锁主体两部分,在使用时通过将关锁杆穿 过货厢门的扣环或锁孔来讲电子关锁设备120锁附于货厢之上。关锁杆可以采用柔性材料制成,其直径为毫米量级,比如约5毫米,从而具有更强的适应性。关锁主体上印刷有电子关锁设备120的唯一标识符、条形码或二维码,从而可以使终端设备130、150通过扫码或输入来获取电子关锁设备120的标识信息。应该理解但是,图2中的电子关锁设备120的外观只是示例性的,在本公开的其他实施例中,电子关锁设备120还可以具有任何其他可行的外观结构。
在施解封原理方面,常规的施解封结构中使用旋转电极以及彼此配合的减速齿轮与齿条,这一方式在低温情况下会出现力矩变小的问题。基于此,本申请中的电子关锁设备120采用直线电机加滑块的方式来实现(其与机械千斤顶的方式类似)。这一方式能够实现更高的能量转换效率,即同样功率的电极能够输出更大的作用力。从而,即使在低温情况下,也能够保证施解封的稳定性。
终端设备130也可被称为施封终端设备130,其可以是任何类型的移动或有线终端,比如智能手机、平板电脑、笔记本电脑等。终端设备130通过特定的通信方式与电子关锁设备120进行通信。在一个实施例中,通信方式为低功耗、低成本或近距离通信方式,比如蓝牙、近场通信、射频识别等。终端设备130还能够对电子关锁设备120上的条形码、二维码或标识符进行扫描,以获取电子关锁设备120的标识信息。在一个实施例中,终端设备130还具有OTG(on-the-go)功能,从而可以通过OTG接口在终端设备130和电子关锁设备120之间直接传送数据,比如图像数据的写入和读取。
服务器140可以是云服务器或其他任何类型的能够承载数据的服务器系统。服务器140与终端设备130之间通过移动通信方式进行通信,比如2G、3G、4G或5G蜂窝通信、WiFi通信等。在电子关锁设备120中设置有移动通信单元的情况下,服务器140还可以通过上述各种移动通信方式与电子关锁设备120直接进行通信。
在施封阶段,示例性地,可以通过以下流程来进行施封,应该理解的是,以下流程只是为了便于理解,并不对本公开的实施例进行任何限制:
首先,激活或初始化电子关锁设备120。
然后,通过终端设备130获取货厢110的初始查验图像并将初始查验图像与物流信息等一起写入电子关锁设备120。其中所述物流信息可以是从报关单或官方物流系统获取的。
从服务器140获取针对电子关锁设备120的本次施封所生成的密钥信息(比如,密码),并将该秘钥信息写入电子关锁设备120内。
最后,使用电子关锁设备120锁闭货厢110的箱门,进行施封。
在施封完毕后,电子关锁设备120进行监管状态,随着货厢110的行进,电子关锁设备120可以向服务器140报告其位置信息。在一个实施例中,所述电子关锁设备120定时地向服务器140报告其位置信息。
在不上报位置信息时,所述电子关锁设备120可以处于休眠状态。
当货厢110行进到中间查验点或目的地时,所述物流流程进入到查验阶段。在该查验阶段,通过终端设备150与电子关锁设备120的交互来对货厢110进行查验(即,判断货厢110是否曾被打开或遭受破坏)。电子关锁设备120与终端设备150进行通信,终端设备150与服务器140进行通信。在一个实施例中,电子关锁设备120可以与服务器140直接进行通信。
终端设备150也可被称为查验终端设备150,其可以是任何类型的移动或有线终端,比如智能手机、平板电脑、笔记本电脑等。终端设备150通过特定的通信方式与电子关锁设备120进行通信。在一个实施例中,通信方式为低功耗、低成本或近距离通信方式,比如蓝牙、近场通信、射频识别等。终端设备150还能够对电子关锁设备120上的条形码、二维码或标识符进行扫描,以获取电子关锁设备120的标识信息。在一个实施例中,终端设备150还具有OTG(on-the-go)功能的USB接口,从而可以通过该USB接口在终端设备150和电子关锁设备120之间直接传送数据,比如图像数据的写入和读取。
后文中将结合图4详细地描述在查验阶段对货厢110进行查验的方法。
图3示出了根据本公开实施例的电子关锁设备300的结构框图。如上文所述,电子关锁设备300可以用作图1所示的场景中的电子关锁设备120。
从图3可见,所述电子关锁设备300包括第一通信单元310、存储器320、处理器330和事件检测单元340。在图3中,事件检测单元340通过虚线示出,这表示事件检测单元340并不是必要组件,在本公开的一些实施例中,可以将事件检测单元340省略。
第一通信单元310用于通过第一通信与终端设备(比如,图1中的终端设备130、150)进行通信。第一通信为低功耗、低成本或近距离通信方式,比如蓝牙、近场通信、射频识别等。
在一个实施例中,所述第一通信单元310在不工作时处于休眠状态。通过对电子关锁设备300进行触摸激活(比如触碰其上的按钮)或信令激活(通过向其发送激活指令,所述指令可以为进行发送或接收的请求),可以将第一通信单元310从休眠状态激活。此外,所述第一通信单元310在长达第一阈值时间(比如10分钟)没有进行工作的情况下,回复到休眠状态。
存储器320可以是任何类型的数据存储单元,其用于存储初始查验图像。所述初始查验图像可以是通过所述第一通信单元和/或OTG连接从施封终端设备(例如终端设备130)获得的。
在一个实施例中,所述存储器320还用于存储物流信息、事件信息记录(如下文所述)等。
处理器330可以是任何类型的处理单元。处理器330用于在电子关锁设备300通过第一通信单元310与查验终端设备(例如终端设备150)连接时控制第一通信单元310将所述初始查验图像发送到查验终端设备150。在一个实施例中,处理器330还用于在电子关锁设备300通过第一通信单元310与施封终端设备(例如终端设备130)连接时控制第一通信单元310从施封终端设备130接收初始查验图像。
事件检测单元340用于检测电子关锁设备300的安全事件,并在检测到安全事件时产生事件通知。安全事件包括,例如,电子关锁设备300被打开、电子关锁设备300被破坏等等。事件检测单元340可以实现为检测电路,由于关锁打开或被破坏而产生的断路会使检测电路的参数产生明显的突变,从而事件检测单元确定发生了安全事件。在一个实施例中,可以针对事件检测单元340设置单独的开关单元。当开关单元接通时,事件检测单元340才被通电并能够处于工作状态,以便在物流过程中检测安全事件。当开关单元关断时,事件检测单元340不被通电,从而不会处于工作状态。开关单元可以是通过密码、指纹或其他方式加密控制的。查验方或收货方在具有针对开关单元的加密控制时,可以解除开关单元的工作状态,从而避免正常的解封过程触发警报。
在一个实施例中,处理器330还用于接收所述事件通知,并基于所述事件通知在存储器320中对事件信息进行记录。所述事件通知可以包括事件类型,比如关锁打开或关锁破坏。所述事件信息可以包括事件通知中指示的事件类型,还可以包括事件时间、事件地点等。
在一个实施例中,处理器330还用于在电子关锁设备300通过第一通信单元310与查验终端设备(例如终端设备150)连接时控制第一通信单元310将事件信息记录发送到查验终端设备。
在一个实施例中,电子关锁设备300还包括第二通信单元。第二通信单元通过移动通信与服务器进行通信,比如2G、3G、4G或5G蜂窝通信、WiFi通信等。处理器330还用于控制第二通信单元向服务器(例如,服务器140)发送电子关锁设备300的位置信息。
在一个实施例中,处理器330还用于在接收到所述事件通知时控制第二通信单元向服务器发送报警信息。
应该理解的是,在电子关锁设备300中还可以包括其他的常用单元或模块,比如定位单元、电池单元和电源管理模块等。
在一个实施例中,所述定位单元实现为卫星定位单元,其通过GPS系统或北斗系统等卫星定位系统对电子关锁设备300进行定位。
在另一实施例中,所述定位单元还包括基站定位模块,其从第二通信单元获得关于基站的位置信息和方位信息等,并基于这些信息对电子关锁设备300进行定位。所述定位可以通过例如三角定位方法来实现。与卫星定位相比,基站定位会在一定程度上降低功耗水平。
在一个实施例中,所述电池单元是可拆卸的,以便于适应诸如“一带一路”的长距离运输过程中对电池进行充电或更换的需要。为了保证设备的安全性,还可设置电池拆卸监控单元,以用于对电池拆卸的发生进行监控。所述电池拆卸监控单元可以通过光电检测器或位置检测器来实现。当系统没有收到允许拆卸的指示时,如果电池从其安装位置卸下,则电池拆卸监控单元,触发警报单元进行警报。
电子关锁设备300通过使用低功耗的第一通信单元310来与终端设备进行通信,能够延长电子关锁设备的使用时长,可以长达20天。从而,根据本公开实 施例的电子关锁设备300能够更好地适用于诸如“一带一路”倡议所涉及的各个国家之间的跨境长距离物流。
图4示出了对根据本公开实施例的电子关锁设备(比如,电子关锁设备300)所施封的货厢进行查验的方法400的流程图。所述方法400可以由查验终端设备(比如终端设备150)执行或通过其他适当的有线或无线设备执行。
从图4可见,方法400开始于步骤S410,其中,从电子关锁设备获取事件信息记录。然后,在判断步骤S420中,确定事件信息记录是否为空。当事件信息记录为空时,方法400进行到结束节点,查验通过。当事件信息记录不为空时,方法400进行到步骤S430,其中,从电子关锁设备获取初始查验图像。接下来,在步骤S440中,采集货厢的即时查验图像。然后,在步骤S450中,对初始查验图像和即时查验图像进行比较。然后,在判断步骤S460中,确定比较的结果是否一致。当比较结果一致时,方法400进行到结束节点,查验通过。当比较的结果为不一致时,进行步骤S470,触发开箱查验提示。查验人员从而进行开箱查验。
在图4中,多个步骤(比如步骤S410和S420等)通过虚线示出,这表示这些步骤并不是必要的,在本公开的一些实施例中,可以省略这些步骤。
在步骤S410中,从电子关锁设备获取事件信息记录。如上文所述,事件信息是关于施封后电子关锁设备发生过的安全事件的信息,其可以包括事件类型、事件时间、事件地点等内容。事件信息反映了从施封到查验的这段时间内电子关锁设备的安全性是否受到过破坏或解除,如果确定其安全性一直得以保障,可以直接认为货厢通过查验,进行放行。即,在步骤S420中,如果判断事件信息记录为空,则方法400到结束节点结束(认为查验通过)。
在另一实施例中,作为步骤S410中从电子关锁设备获取事件信息记录的代替,所述方法400还可以从服务器获取关于电子关锁设备的报警记录。类似地,当所述报警记录为空时,则确定所述货厢通过查验。当报警记录不为空时,则继续进行后续步骤。
在一个实施例中,从服务器获取关于所述电子关锁设备的报警记录包括:获得所述电子关锁设备的标识信息;利用所述标识信息,向所述服务器进行报警记录查询;以及从服务器接收查询结果。
在步骤S420中,如果判断事件信息记录不为空(即,电子关锁设备的安全性在施封到查验的时间段内有可能受到了破坏),则方法400进行到步骤S430和S440,在这两个步骤中,分别从电子关锁设备获取初始查验图像以及采集货厢的即时查验图像。虽然图4中将S430示为位于S440之前,但应该理解的是,这只是一种示例,在其他实施例中,S440可以位于S430之前,或者二者可以并行地执行。
在步骤S450中,对初始查验图像和即时查验图像进行比较。所述比较可以是通过以像素或其他图像单元为单位进行的图形比较来实现的(通过处理器执行特定的图形比较程序来实现),也可以是通过人工判图来实现的。
在判断步骤S460中,确定比较的结果是否一致。如果比较结果一致,则方法400进行到结束节点,查验通过。如果比较结果不一致,则进行步骤S470,提示工作人员进行开箱查验。
通过方法400中的各个步骤,能够在保证查验准确率的情况下大大的提高查验效率,能够更好地适用于诸如“一带一路”倡议中涉及的各个国家之间跨境物流的发展。
在上文的描述中,没有对实际查验过程的所有细节加以描述,比如,终端设备要想读写电子关锁设备内的图像或者事件记录,可能需要先登陆服务器上的物流平台进行身份确认,然后从服务器获取电子关锁设备中所预先设置的密钥,之后凭借该密钥对电子关锁设备进行操作。但应该理解的是,本公开的实施例可以包括这些内容,上文的描述为了突出本公开实施例的重点,而对部分细节进行了省略。
以上的详细描述通过使用示意图、流程图和/或示例,已经阐述了众多实施例。在这种示意图、流程图和/或示例包含一个或多个功能和/或操作的情况下,本领域技术人员应理解,这种示意图、流程图或示例中的每一功能和/或操作可以通过各种结构、硬件、软件、固件或实质上它们的任意组合来单独和/或共同实现。在一个实施例中,本公开的实施例所述主题的若干部分可以通过专用集成电路(ASIC)、现场可编程门阵列(FPGA)、数字信号处理器(DSP)、或其他集成格式来实现。然而,本领域技术人员应认识到,这里所公开的实施例的一些方面在整体上或部分地可以等同地实现在集成电路中,实现为在一台或多台计算 机上运行的一个或多个计算机程序(例如,实现为在一台或多台计算机系统上运行的一个或多个程序),实现为在一个或多个处理器上运行的一个或多个程序(例如,实现为在一个或多个微处理器上运行的一个或多个程序),实现为固件,或者实质上实现为上述方式的任意组合,并且本领域技术人员根据本公开,将具备设计电路和/或写入软件和/或固件代码的能力。此外,本领域技术人员将认识到,本公开所述主题的机制能够作为多种形式的程序产品进行分发,并且无论实际用来执行分发的信号承载介质的具体类型如何,本公开所述主题的示例性实施例均适用。信号承载介质的示例包括但不限于:可记录型介质,如软盘、硬盘驱动器、紧致盘(CD)、数字通用盘(DVD)、数字磁带、计算机存储器等;以及传输型介质,如数字和/或模拟通信介质(例如,光纤光缆、波导、有线通信链路、无线通信链路等)。
虽然已参照几个典型实施例描述了本公开,但应当理解,所用的术语是说明和示例性、而非限制性的术语。由于本公开能够以多种形式具体实施而不脱离公开的精神或实质,所以应当理解,上述实施例不限于任何前述的细节,而应在随附权利要求所限定的精神和范围内广泛地解释,因此落入权利要求或其等效范围内的全部变化和改型都应为随附权利要求所涵盖。

Claims (13)

  1. 一种电子关锁设备,包括:
    第一通信单元,用于通过第一通信与终端设备进行通信;
    存储器,用于存储初始查验图像;
    处理器,用于在电子关锁设备通过第一通信单元与查验终端设备连接时控制第一通信单元将所述初始查验图像发送到查验终端设备,
    其中,所述第一通信是蓝牙通信、近场通信、射频识别通信之一。
  2. 根据权利要求1所述的电子关锁设备,还包括:
    事件检测单元,用于检测电子关锁设备的安全事件,并在检测到安全事件时产生事件通知,
    其中,所述处理器还用于接收所述事件通知,并基于所述事件通知在所述存储器中对事件信息进行记录,以及
    所述处理器还用于在电子关锁设备通过第一通信单元与查验终端设备连接时控制第一通信单元将事件信息记录发送到查验终端设备。
  3. 根据权利要求2所述的电子关锁设备,还包括:
    第二通信单元,通过移动通信与服务器进行通信,
    其中,所述处理器还用于控制所述第二通信单元向所述服务器发送所述电子关锁设备的位置信息。
  4. 根据权利要求3所述的电子关锁设备,其中,所述处理器还用于在接收到所述事件通知时控制所述第二通信单元向服务器发送报警信息。
  5. 根据权利要求3所述的电子关锁设备,其中,所述初始查验图像是通过所述第一通信单元和/或OTG连接从施封终端设备获得的。
  6. 根据权利要求1所述的电子关锁设备,还包括:施解封结构,该施解封结构包括直线电机和滑块的组合。
  7. 根据权利要求3所述的电子关锁设备,还包括:定位单元,从所述第二通信单元获得关于基站的位置信息和方位信息,以及基于所述位置信息和方位信息确定所述电子关锁设备的位置。
  8. 根据权利要求1所述的电子关锁设备,还包括:电池单元,所述电池单元是可拆卸的;以及
    电池拆卸监控单元,对所述电池单元的拆卸进行监控,
    所述电池拆卸监控单元是光电检测器或位置检测器。
  9. 一种对根据权利要求1-8中的任一项所述的电子关锁设备所施封的货厢进行查验的方法,包括:
    从所述电子关锁设备获取初始查验图像;
    采集所述货厢的即时查验图像;
    比较所述初始查验图像和所述即时查验图像,
    其中,当所述比较的结果为一致时,确定所述货厢通过查验。
  10. 根据权利要求9所述的方法,还包括:
    从所述电子关锁设备获取事件信息记录,
    其中,当所述事件信息记录为空时,确定所述货厢通过查验,
    当所述事件信息记录不为空时,触发所述获取初始查验图像和/或物流信息的步骤。
  11. 根据权利要求9所述的方法,还包括:
    从服务器获取关于所述电子关锁设备的报警记录,
    其中,当所述报警记录为空时,确定所述货厢通过查验,
    当所述报警记录不为空时,触发所述获取初始查验图像和/或物流信息的步骤。
  12. 根据权利要求11所述的方法,所述从服务器获取关于所述电子关锁设备的报警记录包括:
    获得所述电子关锁设备的标识信息;
    利用所述标识信息,向所述服务器进行报警记录查询;
    从服务器接收查询结果。
  13. 根据权利要求9所述的方法,其中,当所述比较的结果为不一致时,触发开箱查验提示。
PCT/CN2018/101287 2017-09-18 2018-08-20 电子关锁设备以及进行货厢查验的方法 WO2019052312A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710841212.6 2017-09-18
CN201710841212.6A CN107895413A (zh) 2017-09-18 2017-09-18 电子关锁设备以及进行货厢查验的方法

Publications (1)

Publication Number Publication Date
WO2019052312A1 true WO2019052312A1 (zh) 2019-03-21

Family

ID=61803526

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/101287 WO2019052312A1 (zh) 2017-09-18 2018-08-20 电子关锁设备以及进行货厢查验的方法

Country Status (3)

Country Link
EP (1) EP3457364A1 (zh)
CN (1) CN107895413A (zh)
WO (1) WO2019052312A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107895413A (zh) * 2017-09-18 2018-04-10 同方威视技术股份有限公司 电子关锁设备以及进行货厢查验的方法
CN113496563B (zh) * 2020-03-19 2023-04-25 杭州海康威视数字技术股份有限公司 一种智慧闸口的管理方法、装置及设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1595418A (zh) * 2004-06-29 2005-03-16 南京三宝科技股份有限公司 一种用于电子关锁的加密方法
EP1544386A1 (en) * 2003-12-17 2005-06-22 HT S.r.l. Method to attest an occurred tampering of a container and electronic lock that carries out this method
US20100265068A1 (en) * 2001-12-28 2010-10-21 Private Pallet Security Systems, Llc System for maintaining security of evidence throughout chain of custody
CN201786111U (zh) * 2010-08-25 2011-04-06 东莞市凌康信息技术有限公司 基于rfid的物流电子关锁
CN107895413A (zh) * 2017-09-18 2018-04-10 同方威视技术股份有限公司 电子关锁设备以及进行货厢查验的方法
CN207233069U (zh) * 2017-09-18 2018-04-13 同方威视技术股份有限公司 电子关锁设备

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050144991A1 (en) * 2004-01-06 2005-07-07 Bravo Ramiro H. Reusable hasp-locking mechanism
US7135977B2 (en) * 2005-01-04 2006-11-14 Hewlett-Packard Development Company, L.P. Method and system for tracking identification devices
US7609159B2 (en) * 2005-05-03 2009-10-27 Palomar Technology, Llc Trusted monitoring system and method
US8154397B2 (en) * 2005-05-04 2012-04-10 Astrin Arthur W Locking mechanism, systems and methods for cargo container transport security
CN101430843A (zh) * 2008-09-26 2009-05-13 广州朗昇网络科技有限公司 电子签封的方法、相关装置及通信系统
DE102009048770A1 (de) * 2009-10-08 2011-04-14 Smiths Heimann Gmbh Transportwanne in einem Röntgenprüfsystem
CN202838487U (zh) * 2012-09-28 2013-03-27 天津开发区中环系统电子工程有限公司 一种货物运输车辆查验放行系统
CN103208141B (zh) * 2012-12-20 2015-09-16 招商局国际信息技术有限公司 闸口中的查验方法和系统
CN104464058B (zh) * 2014-12-17 2017-04-12 同方威视技术股份有限公司 基于物品识别标签的物品安检方法和系统
CN104537745A (zh) * 2014-12-31 2015-04-22 宁波江东索雷斯电子科技有限公司 一种多功能的电子锁系统
CN106651255A (zh) * 2016-12-08 2017-05-10 同方威视技术股份有限公司 智能物流电子锁设备和系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100265068A1 (en) * 2001-12-28 2010-10-21 Private Pallet Security Systems, Llc System for maintaining security of evidence throughout chain of custody
EP1544386A1 (en) * 2003-12-17 2005-06-22 HT S.r.l. Method to attest an occurred tampering of a container and electronic lock that carries out this method
CN1595418A (zh) * 2004-06-29 2005-03-16 南京三宝科技股份有限公司 一种用于电子关锁的加密方法
CN201786111U (zh) * 2010-08-25 2011-04-06 东莞市凌康信息技术有限公司 基于rfid的物流电子关锁
CN107895413A (zh) * 2017-09-18 2018-04-10 同方威视技术股份有限公司 电子关锁设备以及进行货厢查验的方法
CN207233069U (zh) * 2017-09-18 2018-04-13 同方威视技术股份有限公司 电子关锁设备

Also Published As

Publication number Publication date
CN107895413A (zh) 2018-04-10
EP3457364A1 (en) 2019-03-20

Similar Documents

Publication Publication Date Title
US10627451B2 (en) Systems and methods for detecting battery theft
US11100455B2 (en) System for parcel transport and tracking operated responsive to data bearing records
US9954829B2 (en) Method and apparatus for detecting and dealing with a lost electronics device
JP5115926B2 (ja) コンテナの状態を監視するためのシステム及び方法
EP4006589A1 (en) Location tracking using beacons
US20160005284A1 (en) System and method for monitoring and tracking items
CN110324306B (zh) 容器系统、封闭系统和容器封闭安全方法
US10836250B2 (en) System for securing fuel in vehicles using IoT devices
WO2017193803A1 (zh) 智能行李箱及使用方法
WO2007149736A2 (en) Removable data storage media tracking system
US11183086B2 (en) Wireless security for freight container seals
WO2019052312A1 (zh) 电子关锁设备以及进行货厢查验的方法
RU2723273C1 (ru) Система опломбирования и способ установки системы опломбирования
CA3089659C (en) Item depository operated responsive to data bearing records
US20210248897A1 (en) Storing events of a sensor device
US9117354B2 (en) System and method for protecting against tampering with a security device
WO2018103507A1 (zh) 智能物流电子锁设备和系统
CN207233069U (zh) 电子关锁设备
US11127238B2 (en) System operated responsive to data bearing records
CN102616467A (zh) 一种具备辐射剂量检测功能的防盗智能运输箱
JP5016011B2 (ja) 自動販売機等扉の開閉検知・記録装置
US12032074B2 (en) Tracking device
EP3404545B1 (en) Handheld logging apparatus
CN113362013A (zh) 物流包装盒和基于区块链的物流信息处理方法
CA3121968A1 (en) System for parcel transport and tracking operated responsive to data bearing records

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18855711

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18855711

Country of ref document: EP

Kind code of ref document: A1