Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and system for electronic pocket sequestration items

An authentication method and authentication system technology, which is applied in the direction of coin-operated equipment for distributing discrete items, logistics, and individual input/output registers, etc., can solve the problems of limited application range, high cost, and insignificant monitoring effect , to achieve the effect of protecting privacy, saving time and energy, reducing travel and waiting

Inactive Publication Date: 2018-05-11
胡惠敏
View PDF21 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, although the patent application proposes a method and device for storing items, its application scope is limited by professional use and high cost, and it is impossible for the related method and device to be extended to the storage and delivery fields of items through simple changes.
The patent application number 201020299533.1 proposes an electronic portfolio, which is mainly used to register the items stored in the bag, and has little effect on the monitoring of the storage and delivery process of the items

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system for electronic pocket sequestration items
  • Authentication method and system for electronic pocket sequestration items
  • Authentication method and system for electronic pocket sequestration items

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0106] The method for authenticating articles sealed in an electronic pocket includes two steps of placing articles and authenticating.

[0107] The steps of putting items include the following:

[0108] Put the item into the electronic pocket.

[0109] Wherein, the electronic pocket includes a bag body, a controller and a locking device. The bag body is used for storing items. The bag body includes a lockable and unlockable pocket. The lock device includes two states: closed and open. When the lock device is closed, the bag mouth is locked, and when the lock device is opened, the bag mouth is unlocked. The controller is connected with the locking device to control the opening of the locking device.

[0110] figure 1 It shows a flow of authentication steps in the electronic pocket sealed item authentication method, including the following steps:

[0111] In S11, the consignor connects with the controller through the client computer, and requests to generate verification ...

Embodiment 2

[0129] The difference between this embodiment and Embodiment 1 is that the flow of the authentication steps is different, such as figure 2 shown, including the following steps:

[0130] In S21, the consignor connects with the controller through the client computer, and inputs verification information.

[0131] In this step, the connection between the client and the controller is similar to step S11.

[0132] After the client computer is connected with the controller, the consignor inputs verification information through the client computer. In this embodiment, the input verification information is the basis for unlocking the lock device in the future, which is equivalent to the key for unlocking. The input verification information may be in the form of a password, a graphic code, or the like.

[0133] In S22, the verification information is stored.

[0134] In this step, the verification information can be stored in the controller or the client, and can also be stored in ...

Embodiment 3

[0146] The difference between this embodiment and Embodiment 1 is that the flow of the authentication steps is different, such as image 3 shown, including the following steps:

[0147] In S31, the locking device is closed to lock the opening of the bag.

[0148] This step is similar to step S13, except that if the lock device is controlled by the controller to close, the controller needs to be connected to the client in advance, and the client sends a lock request to the controller.

[0149] In S32, the consignee connects with the controller through the client computer, inputs preset verification information and requests unlocking.

[0150] In this embodiment, the controller stores preset verification information, such as passwords, fingerprints and other information set in advance by the consignor.

[0151] In this step, the connection between the client and the controller is similar to step S11.

[0152] After the client computer is connected to the controller, the consi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method and system for electronic pocket sequestration items. The main steps of the method include that consignors lock the opening of the electronic pocket which stores the items through a locking device; consignees authenticate according to verification information; after legal authentication, the opening is unlocked by a controller. The system includes aserver, a client machine and an electronic pocket. The authentication method and system for the electronic pocket sequestration items support the online operation of the server networking, provide 3authentication methods to prevent illegal opening, support 6 forms of storage and delivery, support the confirmation after receiving goods, and support picking up goods and delivering goods after deliverers paying cash deposits. The method and system provided by the authentication method and system for the electronic pocket sequestration items can greatly reduce people's travel and waiting generated by handover items, have high security, protect users' privacy well, avoid disputes among parties by registering relevant information on the server, and can bring benefits to depositories and deliverers. The system provided by the authentication method and system for the electronic pocket sequestration items can also support various flexible business operation modes and facilitate operation of operators.

Description

technical field [0001] The invention belongs to the field of information technology, in particular to a method and system for authenticating items sealed in electronic pockets. Background technique [0002] People often need to hand over items, but a lot of time will be wasted for traveling and waiting for handing over items. Although intra-city express provides a time-saving option for people to hand over items, intra-city express has the problem of high charges, and waiting for the courier to receive or deliver the goods will waste a lot of time for people. The item storage station provides a relatively cheap and time-saving option for people to exchange items, especially the lockers provided by supermarkets and other places. There is no charge or a very low charge, and the depositor and the picker do not have to wait for each other other side. However, the number of article storage stations is very small, which is difficult to meet the needs of people to hand over artic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07F17/12G07C9/00G06Q10/08G06Q50/28
CPCG06Q10/08G07C9/00571G07F17/12
Inventor 胡惠敏
Owner 胡惠敏
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products