Authentication method and system for electronic pocket sequestration items
An authentication method and authentication system technology, which is applied in the direction of coin-operated equipment for distributing discrete items, logistics, and individual input/output registers, etc., can solve the problems of limited application range, high cost, and insignificant monitoring effect , to achieve the effect of protecting privacy, saving time and energy, reducing travel and waiting
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0106] The method for authenticating articles sealed in an electronic pocket includes two steps of placing articles and authenticating.
[0107] The steps of putting items include the following:
[0108] Put the item into the electronic pocket.
[0109] Wherein, the electronic pocket includes a bag body, a controller and a locking device. The bag body is used for storing items. The bag body includes a lockable and unlockable pocket. The lock device includes two states: closed and open. When the lock device is closed, the bag mouth is locked, and when the lock device is opened, the bag mouth is unlocked. The controller is connected with the locking device to control the opening of the locking device.
[0110] figure 1 It shows a flow of authentication steps in the electronic pocket sealed item authentication method, including the following steps:
[0111] In S11, the consignor connects with the controller through the client computer, and requests to generate verification ...
Embodiment 2
[0129] The difference between this embodiment and Embodiment 1 is that the flow of the authentication steps is different, such as figure 2 shown, including the following steps:
[0130] In S21, the consignor connects with the controller through the client computer, and inputs verification information.
[0131] In this step, the connection between the client and the controller is similar to step S11.
[0132] After the client computer is connected with the controller, the consignor inputs verification information through the client computer. In this embodiment, the input verification information is the basis for unlocking the lock device in the future, which is equivalent to the key for unlocking. The input verification information may be in the form of a password, a graphic code, or the like.
[0133] In S22, the verification information is stored.
[0134] In this step, the verification information can be stored in the controller or the client, and can also be stored in ...
Embodiment 3
[0146] The difference between this embodiment and Embodiment 1 is that the flow of the authentication steps is different, such as image 3 shown, including the following steps:
[0147] In S31, the locking device is closed to lock the opening of the bag.
[0148] This step is similar to step S13, except that if the lock device is controlled by the controller to close, the controller needs to be connected to the client in advance, and the client sends a lock request to the controller.
[0149] In S32, the consignee connects with the controller through the client computer, inputs preset verification information and requests unlocking.
[0150] In this embodiment, the controller stores preset verification information, such as passwords, fingerprints and other information set in advance by the consignor.
[0151] In this step, the connection between the client and the controller is similar to step S11.
[0152] After the client computer is connected to the controller, the consi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com