CN113096324A - Method and device for storing articles - Google Patents

Method and device for storing articles Download PDF

Info

Publication number
CN113096324A
CN113096324A CN202110351202.0A CN202110351202A CN113096324A CN 113096324 A CN113096324 A CN 113096324A CN 202110351202 A CN202110351202 A CN 202110351202A CN 113096324 A CN113096324 A CN 113096324A
Authority
CN
China
Prior art keywords
face image
safe
user
target
article
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110351202.0A
Other languages
Chinese (zh)
Inventor
陈凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Zhenshi Information Technology Co Ltd
Original Assignee
Beijing Jingdong Zhenshi Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Zhenshi Information Technology Co Ltd filed Critical Beijing Jingdong Zhenshi Information Technology Co Ltd
Priority to CN202110351202.0A priority Critical patent/CN113096324A/en
Publication of CN113096324A publication Critical patent/CN113096324A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/10Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property
    • G07F17/12Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property comprising lockable containers, e.g. for accepting clothes to be cleaned
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/583Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/41Higher-level, semantic clustering, classification or understanding of video scenes, e.g. detection, labelling or Markovian modelling of sport events or news items
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Multimedia (AREA)
  • Library & Information Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Evolutionary Biology (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Evolutionary Computation (AREA)
  • Human Computer Interaction (AREA)
  • Artificial Intelligence (AREA)
  • Computational Linguistics (AREA)
  • Software Systems (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

Embodiments of the present disclosure disclose methods and apparatus for storing items. One embodiment of the method comprises: responding to an article storage order sent by a user, acquiring an initial face image of the user, and determining the article attribute of an article to be stored; determining a target safe based on the item attributes; taking the initial face image as a pre-stored face image of a user, storing the pre-stored face image into a face image library, and determining the corresponding relation between the pre-stored face image and a target safe box; responding to an operation instruction of a user for requesting to open a target safe box, acquiring a first current face image of the user at the current moment, and extracting a target prestored face image corresponding to the target safe box from a face image library; comparing the first current face image with a target prestored face image to obtain a first comparison result; in response to determining that the first comparison result is consistent, generating and sending an instruction for opening the target safe; in response to an operation instruction requesting the closing of the target safe, an instruction to lock the target safe is generated and transmitted.

Description

Method and device for storing articles
Technical Field
The embodiment of the disclosure relates to the technical field of computers, in particular to the field of machine learning, and particularly relates to a method and a device for storing articles.
Background
With the rapid development of the logistics industry, many logistics companies have introduced services for storing articles. The flow is generally as follows: the customer places an order, the server side provides a container for storing the goods after receiving the order, and the server side stores the container into the storehouse after the customer places the goods to be stored into the container.
In the related art, it is common to package and store articles to be stored by using a common implement (e.g., a carton).
Disclosure of Invention
Embodiments of the present disclosure provide methods and apparatus for storing items.
In a first aspect, embodiments of the present disclosure provide a method for storing an item, the method comprising: responding to an article storage order sent by a user, acquiring an initial face image of the user, and determining the article attribute of an article to be stored from the article storage order; determining a target safe for storing the articles to be stored based on the article attributes; taking the initial face image as a pre-stored face image of the user, storing the pre-stored face image into a face image library, and determining the corresponding relation between the pre-stored face image of the user and the target safe box; responding to an operation instruction of a user for requesting to open a target safe box, acquiring a first current face image of the user at the current moment, and extracting a target prestored face image corresponding to the target safe box from a face image library; comparing the first current face image with a target prestored face image to obtain a first comparison result; in response to the first comparison result is determined to be consistent, generating and sending an instruction for opening the target safe box so as to open the target safe box, so that the user can put the articles to be stored into the target safe box; in response to an operation instruction requesting to close the target safe, an instruction to close the target safe is generated and transmitted to lock the target safe.
In some embodiments, the article attributes include at least: a category attribute and a volume attribute of the item; and determining a target safe for storing the item to be stored based on the item attribute, comprising: determining the type of the safe box corresponding to the type attribute from a pre-constructed corresponding relation list of the article type attribute and the safe box type based on the type attribute; and determining a target safe box matched with the volume attribute from the safe boxes in the category.
In some embodiments, the method further comprises: acquiring real-time position information of a target safe box; and responding to the fact that the target safe box reaches the preset position, determining the corresponding relation between the object attribute and the target safe box, and storing the corresponding relation into a pre-constructed object storage list.
In some embodiments, the method further comprises: in response to an operation instruction of a user for requesting to check stored articles, determining whether articles to be checked, which are pointed by the operation instruction, exist in an article storage list or not; in response to the fact that the articles to be checked exist in the article storage list, acquiring a second current face image of the user at the current moment, and determining a safe to be checked for storing the articles to be checked; extracting a prestored face image corresponding to the safe box to be checked from the face image library; comparing the second current face image with a prestored face image corresponding to the safe box to be checked to obtain a second comparison result; in response to the fact that the second comparison result is consistent, acquiring a monitoring video of the safe box to be checked at the current moment, wherein the monitoring video is acquired by a camera device in a warehouse for storing the safe box to be checked; and sending the monitoring video.
In some embodiments, the method further comprises: responding to an operation instruction of a user for requesting to extract stored articles, and determining whether the articles to be extracted pointed by the operation instruction exist in an article storage list or not; in response to the fact that the articles to be extracted exist in the article storage list, acquiring a third current face image of the user at the current moment, and determining a to-be-extracted safe box for storing the articles to be extracted; extracting a prestored face image corresponding to the safe box to be extracted from a face image library; comparing the third current face image with a prestored face image of the user to obtain a third comparison result; and in response to determining that the third comparison result is consistent, generating and sending an instruction for opening the safe to be extracted so that the user can take the article to be extracted out of the safe to be extracted.
In some embodiments, after the article to be extracted in the safe to be extracted is removed, the method further comprises: generating an instruction for closing the safe box to be extracted; deleting the safe box to be extracted and the corresponding prestored face image from the face image library; and deleting the safe box to be extracted and the article attributes of the article to be extracted from the article storage list.
In a second aspect, embodiments of the present disclosure also provide an apparatus for storing an item, the apparatus comprising: the order receiving unit is configured to respond to an article storage order sent by a user, acquire an initial face image of the user and determine an article attribute of an article to be stored from the article storage order; a safe selection unit configured to determine a target safe for storing an item to be stored based on the item attribute; the image pre-storage unit is configured to store the initial face image as a pre-stored face image of the user into a face image library and determine the corresponding relation between the pre-stored face image of the user and the target safe box; the instruction receiving unit is configured to respond to an operation instruction of a user for requesting to open the target safe box, acquire a first current face image of the user at the current moment, and extract a target prestored face image corresponding to the target safe box from the face image library; the first comparison unit is configured to compare the first current face image with a target prestored face image to obtain a first comparison result; an opening instruction unit configured to generate and send an instruction to open the target safe in response to determining that the first comparison result is consistent, so as to open the target safe, so that the user puts the article to be stored in the target safe; and a closing instruction unit configured to generate and transmit an instruction to close the target safe in response to an operation instruction to request to close the target safe, so as to lock the target safe.
In some embodiments, the article attributes include at least: a category attribute and a volume attribute of the item; and, the safe selecting unit further comprises: the safe type determining module is configured to determine the safe type corresponding to the type attribute from a pre-constructed corresponding relation list of the article type attribute and the safe type based on the type attribute; and the volume matching unit is configured to determine a target safe box matched with the volume attribute from the safe boxes in the category.
In some embodiments, the apparatus further comprises: a location information acquisition unit configured to acquire real-time location information of a target safe; and the list generating unit is configured to respond to the fact that the target safe box reaches the preset position, determine the corresponding relation between the object attribute and the target safe box, and store the corresponding relation into a pre-constructed object storage list.
In some embodiments, the apparatus further comprises an item viewing unit comprising: the checking instruction receiving module is configured to respond to an operation instruction of a user for checking stored articles, and determine whether the articles to be checked pointed by the operation instruction exist in the article storage list or not; the first obtaining module is configured to respond to the fact that the object to be checked exists in the object storage list, obtain a second current face image of the user at the current moment, and determine a safe to be checked in which the object to be checked is stored; the second acquisition module is configured to extract a prestored face image corresponding to the safe to be checked from the face image library; the checking information comparison module is configured to compare the current face image of the user with a prestored face image of the user to obtain a second comparison result; the video acquisition module is configured to respond to the second comparison result and acquire the monitoring video of the safe box to be checked at the current moment, and the monitoring video is acquired by a camera device in a storeroom for storing the safe box to be checked; a video transmission module configured to transmit the monitoring video.
In some embodiments, the apparatus further comprises an item extraction unit comprising: the extraction instruction receiving module is configured to respond to an operation instruction of a user for requesting to extract the stored articles, and determine whether the articles to be extracted pointed by the operation instruction exist in an article storage list or not; the third obtaining module is configured to respond to the fact that the article to be extracted exists in the article storage list, obtain a third current face image of the user at the current moment, and determine a safe to be extracted for storing the article to be extracted; the fourth acquisition module is configured to extract a prestored face image corresponding to the safe to be extracted from the face image library; the extraction information comparison module is configured to compare the third current face image with a prestored face image of the user to obtain a third comparison result; and the extraction instruction generating module is configured to generate and send an instruction for opening the safe to be extracted in response to the third comparison result being consistent, so that the user can take the article to be extracted out of the safe to be extracted.
In some embodiments, the item extraction unit further comprises: a closing instruction generation module configured to generate an instruction for closing the safe to be extracted; the image updating module is configured to delete the safe box to be extracted and the corresponding prestored face image thereof from the face image library; and the list updating module is configured to delete the safe box to be extracted and the item attribute of the item to be extracted from the item storage list.
In a third aspect, an embodiment of the present disclosure further provides an electronic device, including: one or more processors; a storage device having one or more programs stored thereon which, when executed by one or more processors, cause the one or more processors to implement the method for storing items of any of the embodiments described above.
In a fourth aspect, embodiments of the present disclosure also provide a computer readable medium, on which a computer program is stored, where the program, when executed by a processor, implements the method for storing an article in any of the above embodiments.
According to the method and the device for storing the article, in the article collecting stage, the target safe for storing the article can be determined according to the article attribute, the initial face image of the user is obtained, the initial face image is stored in the face image library, and the pre-stored face image and the target safe are bound. And then, when an operation instruction for opening the safe box is received, acquiring a first current face image of the user at the current moment, and when the comparison result of the first current face image and the target prestored face image is consistent, generating and sending an instruction for opening the safe box so that the user can put articles into the target safe box. And generating an instruction to close the target safe to lock the target safe when the user requests to close the target safe after putting the item into the target safe. The safe box can be effectively prevented from being opened by other people except the user without permission of the user, so that the safety degree of article storage is improved.
Drawings
Other features, objects and advantages of the disclosure will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 is an exemplary system architecture diagram in which some embodiments of the present disclosure may be applied;
FIG. 2 is a flow diagram of one embodiment of a method for storing items according to the present disclosure;
FIG. 3 is a schematic view of a scenario of one embodiment of the method for storing items shown in FIG. 2;
FIG. 4 is a flow chart of yet another embodiment of a method for storing items according to the present disclosure;
FIG. 5 is a flow chart of yet another embodiment of a method for storing items according to the present disclosure;
FIG. 6 is a schematic structural view of one embodiment of an apparatus for storing items according to the present disclosure;
FIG. 7 is a schematic structural diagram of an electronic device suitable for use in implementing embodiments of the present disclosure.
Detailed Description
The present disclosure is described in further detail below with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings.
It should be noted that, in the present disclosure, the embodiments and features of the embodiments may be combined with each other without conflict. The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 illustrates an exemplary system architecture 100 for a method for depositing an item or an apparatus for depositing an item to which embodiments of the present disclosure may be applied.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, and 103 to interact with the server 105 through the network 104 to receive or send a message, etc., for example, an article storage order of the user and an operation request for a safe may be sent to the server, a current face image of the user may also be sent to the server, and an instruction to open the safe may also be received from the server, where the user operating the terminal devices 101, 102, and 103 may be a worker of a service party providing an article storage service, or a user obtaining the article storage service.
The terminal apparatuses 101, 102, and 103 may be hardware or software. When the terminal devices 101, 102, and 103 are hardware, they may be electronic devices with communication functions, including but not limited to smart phones, tablet computers, e-book readers, laptop portable computers, desktop computers, and the like. When the terminal apparatuses 101, 102, 103 are software, they can be installed in the electronic apparatuses listed above. It may be implemented, for example, as multiple software or software modules to provide distributed services, or as a single software or software module. And is not particularly limited herein.
The server 105 may be a server that provides various services, such as a background data server that processes data or operation requests sent by the terminal devices 101, 102, 103 (for example, compares a current face image of a user with a pre-stored face image). The background data server may compare the received data and may feed back a processing result (e.g., an instruction to open the safe) to the terminal device or the safe, so that the user opens the safe.
The server may be hardware or software. When the server is hardware, it may be implemented as a distributed server cluster formed by multiple servers, or may be implemented as a single server. When the server is software, it may be implemented as multiple pieces of software or software modules, for example, to provide distributed services, or as a single piece of software or software module. And is not particularly limited herein.
It should be noted that the method for depositing an item provided by the embodiment of the present disclosure may be executed by the terminal devices 101, 102, and 103, or may be executed by the server 105. Accordingly, the means for storing the items may be provided in the terminal apparatuses 101, 102, 103, or may be provided in the server 105. And is not particularly limited herein.
With continued reference to FIG. 2, a flow 200 of one embodiment of a method for storing items according to the present disclosure is shown. The process comprises the following steps:
step 201, responding to an article storage order sent by a user, acquiring an initial face image of the user, and determining an article attribute of an article to be stored from the article storage order.
In this embodiment, the article attribute is used to characterize the characteristic attribute of the article to be stored, and may include, for example, a physical attribute (e.g., volume, weight), a value attribute, an article category, and the like of the article. The initial facial image represents a facial image provided by the user when requesting to obtain the service.
In one particular example, the executing entity may be, for example, a business server of a service party that provides an item deposit service. The user's terminal device (which may be a smartphone, for example) has loaded thereon the application client of the service party. When a user requests to acquire an article storage service, an application client sends a request for registering an account to an execution main body, the execution main body can guide the user to provide necessary information and an initial face image of the user, then a user ID (Identity document) is generated according to the information of the user, and the face image provided during user registration is used as the initial face image of the user ID. Thereafter, the user may initiate a request to deposit an item to the execution subject through the application client, which may direct the user to input item attributes for the item to be deposited at the interactive interface. The application client may then generate an item deposit order based on the information provided at the time of user registration and the item attributes, and send the item deposit order to the fulfillment host. After the execution main body receives the operation instruction, the object attribute of the object to be stored can be extracted from the operation instruction.
Step 202, based on the property of the item, a target safe for storing the item to be stored is determined.
In this embodiment, the execution subject may select a target safe adapted to the article to be stored according to the article attribute.
For example, the property of the item may include a value property, and the execution main body may pre-store a corresponding relationship list between the value property and the security level of the safe, so that the execution main body may determine the security level of the target safe according to the value property of the item by only retrieving the corresponding relationship list between the value property and the security level of the safe, for example, a safe with a higher security level may be selected for a valuable item, and a safe with a lower security level may be selected for an item with a common value.
In some alternative implementations of embodiments of the present disclosure, the item attributes include at least: a category attribute and a volume attribute of the item; and determining a target safe for storing the item to be stored based on the item attribute, comprising: determining the type of the safe box corresponding to the type attribute from a pre-constructed corresponding relation list of the article type attribute and the safe box type based on the type attribute; and determining a target safe box matched with the volume attribute from the safe boxes in the category.
In this implementation, the safe category may represent characteristic attributes of the safe, for example, may represent functional characteristics of the safe (e.g., oxidation resistance, fall resistance, etc.), and may further represent safety performance of the safe, for example.
For example, the execution body may pre-store a correspondence list between the item type and the safe type, and the execution body may search for the item type attribute in the correspondence list between the item type and the safe function type, that is, may determine the type of the target safe according to the item type. For example, for fragile articles, a safe having a shock absorbing function may be used; for easily oxidized articles, a safe with a vacuum function may be used. The execution main body can also prestore a corresponding relation list of the types of the safes and the volumes of the stored articles, and the execution main body can determine the target safe matched with the volume of the articles by searching the corresponding relation list of the types of the safes and the volumes of the stored articles.
And 203, taking the initial face image as a pre-stored face image of the user, storing the pre-stored face image into a face image library, and determining the corresponding relation between the pre-stored face image of the user and the target safe box.
By way of example, a safe may be numbered and the safe number used as the unique identity of the safe. And then constructing a corresponding relation between the pre-stored face image of the user and the number of the target safe box, and storing the corresponding relation into a pre-constructed face image library.
Step 204, responding to an operation instruction of a user for requesting to open the target safe box, acquiring a first current face image of the user at the current moment, and extracting a target pre-stored face image corresponding to the target safe box from the face image library.
In this embodiment, the initial state of the target safe is a closed state. After the execution subject constructs the corresponding relationship between the pre-stored face image of the user and the target safe through steps 201 to 203, the user may send an operation instruction requesting to open the target safe to the execution subject, so as to put the object into the target safe.
In a specific example, after the execution of step 203 by the main body, information that the registration is successful may be sent to the application client, and then prompt information that the target safe can be opened is presented to the user by the application client, so as to guide the user to open the target safe and further put the object into the target safe. When a user needs to open the safe, the terminal device can be operated to send an operation instruction for requesting the safe to be opened to the execution main body. After receiving the instruction, the execution main body can send a request for acquiring the current face image of the user to the terminal equipment, a camera equipped on the terminal equipment of the user acquires the face image of the user at the current moment, and then sends the acquired face image to the execution main body to obtain a first face image; on the other hand, the executing agent may extract a target pre-stored face image corresponding to the target safe (i.e., the initial face image obtained in step 201) from the face image library.
In practice, the user may select a self-service or delivery safe in the application client, and if the user selects self-service, the user needs to go to a location (e.g., a business office of the service provider) designated by the service provider, and the service provider provides the target safe at the designated location. If the user selects to deliver the safe, the service worker can deliver the closed target safe to the position designated by the user.
And step 205, comparing the first current face image with the target prestored face image to obtain a first comparison result.
In this embodiment, the first comparison result may be, for example, a similarity degree of a face image, which may represent a safety degree of the target safe at the current time. If the comparison result is consistent, the risk of opening the safe box at the current time is low, otherwise, the risk of opening the safe box at the current time is high.
As an example, the execution body may be preloaded with an application program of an image contrast class, for example, a deep learning model such as OpenCV, convolutional neural network, or a migration learning model. And executing an application program that the main body inputs the first current face image and the target prestored face image into the image contrast class to obtain similarity indexes of the two images, comparing the similarity indexes with a preset similarity threshold, and if the similarity indexes are larger than the similarity threshold, determining the first comparison result as 'consistent' or otherwise determining the first comparison result as 'inconsistent'.
It should be noted that the image contrast application or model belongs to a mature technology widely used in the field of computer vision, and the application is not limited thereto.
Step 206, in response to determining that the first comparison result is consistent, generating and sending an instruction to open the target safe.
In this embodiment, the instruction to open the target safe is used to open the target safe so that the user puts the article to be stored in the target safe.
It should be noted that the safe of the present disclosure may be a container with a security function, for example, a high-strength password box, and besides a preset emergency opening mode, the safe can be opened only by an opening instruction generated by the execution main body.
As an example, the safe may be equipped with a communication component, and the execution body may directly send an opening instruction to the safe through a network, thereby enabling remote opening of the safe. Further, the user may directly operate a command button of the safe configuration to send an operation instruction of the safe to the execution main body, for example, the user may click an open button of the safe to send an operation instruction of requesting to open the safe to the execution main body.
For another example, the unlocking instruction generated by the execution subject may be a one-time electronic key, and the electronic key is sent to the terminal device of the user, so that the user can unlock the target safe box by using the electronic key, and the electronic key can unlock the target safe box only once within a preset time period. For example, the electronic key may be a two-dimensional code, the safe is equipped with a code scanning device, and the execution subject may send the two-dimensional code to a terminal device of a user, and the user presents the two-dimensional code to a working area of the code scanning device, so as to open the safe.
Step 207, in response to the operation instruction requesting to close the target safe, generating and sending an instruction to close the target safe to lock the target safe.
In this embodiment, the instruction for closing the target safe is used to instruct to close the target safe, and ensure that the closed target safe can only be opened by the execution of the opening instruction of the main body, so as to lock the target safe.
After the user puts the object into the target safe, an operation instruction for closing the target safe can be sent to the execution main body, and the instruction for closing the target safe is generated by the execution main body.
In practice, after the target safe is locked, the execution main body can also generate a safe warehousing instruction, and send the safe warehousing instruction to the terminal device of the worker, and the worker of the service party transports the target safe to a preset position (such as a warehouse) for storage.
In some optional implementation manners of this embodiment, the execution main body may further obtain real-time location information of the target safe, so that a track of the target safe may be monitored, thereby further improving a safety degree of the target safe in a transportation process. Accordingly, the target safe may be configured with a location information transmitting component, such as a GPS (Global Positioning System) module
With continued reference to fig. 3, fig. 3 is a schematic view of a scenario of one embodiment of the method shown in fig. 2. In fig. 3, a smart phone 301 may be loaded with an application client of a service party, an execution subject 302 may be a service server of the service party, and 303 is a target safe provided for the service party. The server can respectively carry out information interaction with the smart phone and the safe box through a network. As shown in fig. 3(a), when a user needs an item storage service, an item storage order may be sent to a service server 302 of a service party through an application client loaded on a smartphone 301. After the business server 302 receives the order, on one hand, the item attribute of the item to be stored is determined from the order, and thus a target safe for storing the item is determined; on the other hand, an initial face image of the user may be acquired, the acquired initial face image 304 may be stored in the face image library 305 as a pre-stored face image, and a corresponding relationship between the pre-stored face image and the target safe may be determined. Thereafter, referring to fig. 3(b), when the user needs to open the safe, an operation instruction requesting to open the safe may be sent to the service server 302 through the application client on the smart phone. After the service server 302 receives the operation instruction, on one hand, a request instruction for acquiring a current face image of the user is sent to the smart phone, and the smart phone sends the acquired current face image as a first current face image 306 to the service server 302; on the other hand, a target pre-stored face image 307 corresponding to the target safe box is extracted from a preset face image library. And then, the server compares the first current face image with the target prestored face image through a preset graphic processing application to determine a first comparison result. And if the first comparison result is consistent, generating an instruction for opening the target safe box, and sending the instruction to the target safe box to remotely open the target safe box so that the user can put the object into the target safe box. Referring finally to fig. 3(c), after the user places the item into the target safe, an instruction requesting to close the target safe may be sent to the business server 302, the instruction to close the target safe may be generated by the business server 302, and sent to the target safe, the target safe having been locked.
According to the method and the device for storing the article, in the article collecting stage, the target safe for storing the article can be determined according to the article attribute, the initial face image of the user is obtained, the initial face image is stored in the face image library, and the pre-stored face image and the target safe are bound. And then, when an operation instruction for opening the safe box is received, acquiring a first current face image of the user at the current moment, and when the comparison result of the first current face image and the target prestored face image is consistent, generating and sending an instruction for opening the safe box so that the user can put articles into the target safe box. And generating an instruction to close the target safe to lock the target safe when the user requests to close the target safe after putting the item into the target safe. The safe box can be effectively prevented from being opened by other people except the user without permission of the user, so that the safety degree of article storage is improved.
Referring next to fig. 4, fig. 4 illustrates a flow 400 of yet another embodiment of a method for storing items. The process 400 includes the following steps:
step 401, obtaining real-time position information of a target safe.
In this embodiment, the real-time location information is used to indicate the real-time location of the target safe.
As an example, a target safe may be configured with a GPS component, and the enforcement agent may determine real-time location information for the target safe based on signals transmitted by the GPS component.
Step 402, in response to determining that the target safe box reaches the preset position, determining a corresponding relationship between the object attribute and the target safe box, and storing the corresponding relationship into a pre-constructed object storage list.
In this embodiment, the preset location may represent a storage location of the target safe, for example, a storage location in a warehouse storing the safe. The item deposit list may be used to characterize the correspondence between the item attributes of all deposited items and the safe in which the item is deposited.
When the target safe box reaches the preset position, the storage process of the object to be stored is represented to be finished, and at the moment, the storage information of the object can be recorded into the object storage list.
Further, the item storage list may further include user information (e.g., user ID, etc.) ID of the stored item and the storage location of the target safe in the warehouse.
In step 403, in response to an operation instruction for a user to request to view stored items, it is determined whether an item to be viewed, which is pointed by the operation instruction, exists in the item storage list.
In this embodiment, when the execution main body receives an operation instruction that the user requests to view the stored items, the execution main body may retrieve the item storage list to determine whether the item to be viewed, which is pointed by the instruction, exists in the item storage list.
Step 404, in response to determining that the article to be checked exists in the article storage list, acquiring a second current face image of the user at the current moment, and determining a safe to be checked in which the article to be checked is stored.
Step 405, extracting a pre-stored face image corresponding to the safe to be checked from the face image library.
And 406, comparing the second current face image with a prestored face image corresponding to the safe to be checked to obtain a second comparison result.
And 407, in response to the fact that the second comparison result is consistent, acquiring a monitoring video of the safe to be checked at the current moment.
In this embodiment, the surveillance video is captured by a camera device in the warehouse where the safe to be checked is stored. The execution main body can perform information interaction with the camera device in the storehouse through the network so as to acquire the monitoring video in the storehouse.
In a specific example, the execution subject may prestore a list of correspondence between the storage location of the safe in the storage and the image pickup device in the storage, and when the execution subject determines that the second comparison result is consistent, the execution subject may retrieve the number of the safe to be checked in the list, thereby determining the image pickup device monitoring the safe to be checked. And then the execution main body sends a video acquisition request to the camera device so as to acquire the monitoring video of the safe box to be checked from the camera device.
And step 408, sending the monitoring video.
In a specific example, a user may click a command button for viewing an item in an interactive interface of an application client of a server, and the application client of the server may generate an operation instruction according to an ID of the user and an item attribute of the item that the user wants to view, and send the operation instruction to an execution subject. After receiving the operation instruction, the execution main body can extract the article attribute of the article to be checked from the operation instruction and retrieve the article storage list. If the object to be checked is in the object storage list, the object to be checked by the user is stored in the storeroom. Then, on one hand, the execution main body can determine a to-be-checked safe box for storing the to-be-checked object from the object storage list, and extract a pre-stored face image corresponding to the to-be-checked safe box from the face image library; on the other hand, a second current face image of the user may be acquired. And then, the execution main body can compare the second current face image with the pre-stored face image corresponding to the safe to be checked. If the second comparison result is consistent, the verification is passed, the execution main body can send a command for calling the monitoring video to the warehouse monitoring system so as to obtain the monitoring video of the safe to be checked at the current moment, and the monitoring video is sent to the terminal equipment of the user so that the user can know the current storage state of the articles.
As can be seen from fig. 4, the embodiment shown in fig. 4 embodies the step of the user viewing the stored article, when the user requests to view the stored article, the user identity can be verified by comparing the second current face image of the user at the current moment with the pre-stored face image, after the verification is passed, the monitoring video of the article to be viewed can be presented to the user, and the user can conveniently know the storage state of the stored article at any time.
Referring next to FIG. 5, a flow 500 of yet another embodiment of a method of the present disclosure for storing items is shown, the flow comprising:
step 501, responding to an operation instruction of a user for requesting to extract a stored article, and determining whether the article to be extracted pointed by the operation instruction exists in an article storage list.
In this embodiment, the item storage list is generated by executing steps 401 to 402 for the execution main body, and details are not described herein.
As an example, a user may initiate a request to extract an item by operating an application client, generate an operation instruction by the application client based on an item attribute of the item to be extracted to which the request is directed, and send the operation instruction to an execution subject. After receiving the operation instruction, the execution main body can determine the article attribute of the article to be extracted, and then the execution main body can search the article storage list to determine whether the article to be extracted exists in the article storage list.
Step 502, in response to determining that the article to be extracted exists in the article storage list, acquiring a third current face image of the user at the current moment, and determining a safe to be extracted for storing the article to be extracted.
Step 503, extracting the pre-stored face image corresponding to the safe to be extracted from the face image library.
And 504, comparing the third current face image with a prestored face image of the user to obtain a third comparison result.
And 505, in response to the third comparison result is determined to be consistent, generating and sending an instruction for opening the safe to be extracted, so that the user can take the article to be extracted out of the safe to be extracted.
The steps 503 to 505 correspond to the steps 201 to 203, and are not described herein again.
As can be seen from fig. 5, the embodiment shown in fig. 5 shows that when the user extracts the stored article, the risk degree of opening the safe at the current time is determined by comparing the third current face image with the pre-stored face image, and an instruction for opening the safe is generated only when the comparison result is consistent, so that other people except the user are prevented from opening the safe and taking the stored article without permission of the user, thereby avoiding economic loss caused by the comparison, and further improving the safety of article storage and extraction.
In some optional implementations of this embodiment, after the article to be extracted in the safe to be extracted is taken out, the method further includes: generating an instruction for closing the safe box to be extracted; generating an instruction for closing the safe box to be extracted; deleting the safe box to be extracted and the corresponding prestored face image from the face image library; and deleting the safe box to be extracted and the article attributes of the article to be extracted from the article storage list. Therefore, the face image library and the article storage list can be updated in real time to recover the safe.
With further reference to fig. 6, as an implementation of the methods illustrated in the above figures, the present disclosure provides one embodiment of an apparatus for storing articles, which corresponds to the method embodiment illustrated in fig. 2, and which is particularly applicable in various electronic devices.
As shown in fig. 6, the apparatus 600 for storing articles of the present embodiment includes: the order receiving unit 601 is configured to obtain an initial face image of a user in response to an item storage order sent by the user, and determine an item attribute of an item to be stored from the item storage order; a safe selection unit 602 configured to determine a target safe for storing an item to be stored based on the item attribute; an image pre-storing unit 603 configured to store the initial face image as a pre-stored face image of the user into a face image library, and determine a corresponding relationship between the pre-stored face image of the user and the target safe; the instruction receiving unit 604 is configured to respond to an operation instruction of a user for requesting to open a target safe box, acquire a first current face image of the user at the current moment, and extract a target prestored face image corresponding to the target safe box from a face image library; a first comparing unit 605 configured to compare the first current face image with the target pre-stored face image to obtain a first comparison result; an opening instruction unit 606 configured to generate and send an instruction to open the target safe in response to determining that the first comparison result is consistent, so as to open the target safe, so that the user puts the article to be stored in the target safe; a closing instruction unit 607 configured to generate and transmit an instruction to close the target safe in response to an operation instruction to request to close the target safe, to lock the target safe.
In this embodiment, the article attributes include at least: a category attribute and a volume attribute of the item; and, safe selection unit 602 further includes: the safe type determining module is configured to determine the safe type corresponding to the type attribute from a pre-constructed corresponding relation list of the article type attribute and the safe type based on the type attribute; and the volume matching unit is configured to determine a target safe box matched with the volume attribute from the safe boxes in the category.
In this embodiment, the apparatus 600 further includes: a location information acquisition unit configured to acquire real-time location information of a target safe; and the list generating unit is configured to respond to the fact that the target safe box reaches the preset position, determine the corresponding relation between the object attribute and the target safe box, and store the corresponding relation into a pre-constructed object storage list.
In this embodiment, the apparatus 600 further includes an item viewing unit, which includes: the checking instruction receiving module is configured to respond to an operation instruction of a user for checking stored articles, and determine whether the articles to be checked pointed by the operation instruction exist in the article storage list or not; the first obtaining module is configured to respond to the fact that the object to be checked exists in the object storage list, obtain a second current face image of the user at the current moment, and determine a safe to be checked in which the object to be checked is stored; the second acquisition module is configured to extract a prestored face image corresponding to the safe to be checked from the face image library; the checking information comparison module is configured to compare the current face image of the user with a prestored face image of the user to obtain a second comparison result; the video acquisition module is configured to respond to the second comparison result and acquire the monitoring video of the safe box to be checked at the current moment, and the monitoring video is acquired by a camera device in a storeroom for storing the safe box to be checked; a video transmission module configured to transmit the monitoring video.
In this embodiment, the apparatus 600 further comprises an item extraction unit comprising: the extraction instruction receiving module is configured to respond to an operation instruction of a user for requesting to extract the stored articles, and determine whether the articles to be extracted pointed by the operation instruction exist in an article storage list or not; the third obtaining module is configured to respond to the fact that the article to be extracted exists in the article storage list, obtain a third current face image of the user at the current moment, and determine a safe to be extracted for storing the article to be extracted; the fourth acquisition module is configured to extract a prestored face image corresponding to the safe to be extracted from the face image library; the extraction information comparison module is configured to compare the third current face image with a prestored face image of the user to obtain a third comparison result; and the extraction instruction generating module is configured to generate and send an instruction for opening the safe to be extracted in response to the third comparison result being consistent, so that the user can take the article to be extracted out of the safe to be extracted.
In this embodiment, the article extracting unit further includes: a closing instruction generation module configured to generate an instruction for closing the safe to be extracted; the image updating module is configured to delete the safe box to be extracted and the corresponding prestored face image thereof from the face image library; and the list updating module is configured to delete the safe box to be extracted and the item attribute of the item to be extracted from the item storage list.
Referring now to fig. 7, a schematic diagram of an electronic device (e.g., the server or terminal device of fig. 1) 700 suitable for use in implementing embodiments of the present disclosure is shown. The terminal device in the embodiments of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), and the like, and a fixed terminal such as a digital TV, a desktop computer, and the like. The terminal device shown in fig. 7 is only an example, and should not bring any limitation to the functions and the use range of the embodiments of the present disclosure.
As shown in fig. 7, electronic device 700 may include a processing means (e.g., central processing unit, graphics processor, etc.) 701 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)702 or a program loaded from storage 708 into a Random Access Memory (RAM) 703. In the RAM 703, various programs and data necessary for the operation of the electronic apparatus 700 are also stored. The processing device 701, the ROM 702, and the RAM 703 are connected to each other by a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
Generally, the following devices may be connected to the I/O interface 705: input devices 706 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 707 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 708 including, for example, magnetic tape, hard disk, etc.; and a communication device 709. The communication means 709 may allow the electronic device 700 to communicate wirelessly or by wire with other devices to exchange data. While fig. 7 illustrates an electronic device 700 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided. Each block shown in fig. 7 may represent one device or may represent multiple devices as desired.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such embodiments, the computer program may be downloaded and installed from a network via the communication means 709, or may be installed from the storage means 708, or may be installed from the ROM 702. The computer program, when executed by the processing device 701, performs the above-described functions defined in the methods of embodiments of the present disclosure. It should be noted that the computer readable medium described in the embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In embodiments of the disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In embodiments of the present disclosure, however, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: responding to an article storage order sent by a user, acquiring an initial face image of the user, and determining the article attribute of an article to be stored from the article storage order; determining a target safe for storing the articles to be stored based on the article attributes; taking the initial face image as a pre-stored face image of the user, storing the pre-stored face image into a face image library, and determining the corresponding relation between the pre-stored face image of the user and the target safe box; responding to an operation instruction of a user for requesting to open a target safe box, acquiring a first current face image of the user at the current moment, and extracting a target prestored face image corresponding to the target safe box from a face image library; comparing the first current face image with a target prestored face image to obtain a first comparison result; in response to the first comparison result is determined to be consistent, generating and sending an instruction for opening the target safe box so as to open the target safe box, so that the user can put the articles to be stored into the target safe box; in response to an operation instruction requesting to close the target safe, an instruction to close the target safe is generated and transmitted to lock the target safe.
Computer program code for carrying out operations for embodiments of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. The described units may also be provided in a processor, and may be described as: a processor comprises an order receiving unit, a safe selecting unit, an image pre-storing unit, an instruction receiving unit, a first comparison unit, an opening instruction unit and a closing instruction unit. The names of the units do not form a limitation on the units themselves in some cases, for example, the order receiving unit may also be described as a "unit that obtains an initial face image of the user in response to an item storage order sent by the user and determines an item attribute of an item to be stored from the item storage order".
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present disclosure is not limited to the specific combination of the above-mentioned features, but also encompasses other embodiments in which any combination of the above-mentioned features or their equivalents is made without departing from the inventive concept as defined above. For example, the above features and (but not limited to) technical features with similar functions disclosed in the embodiments of the present disclosure are mutually replaced to form the technical solution.

Claims (14)

1. A method for storing an item, comprising:
responding to an article storage order sent by a user, acquiring an initial face image of the user, and determining an article attribute of an article to be stored from the article storage order;
determining a target safe for storing the to-be-stored item based on the item attribute;
taking the initial face image as a pre-stored face image of the user, storing the pre-stored face image into the face image library, and determining the corresponding relation between the pre-stored face image of the user and the target safe box;
responding to an operation instruction of the user for requesting to open the target safe box, acquiring a first current face image of the user at the current moment, and extracting a target prestored face image corresponding to the target safe box from the face image library;
comparing the first current face image with the target prestored face image to obtain a first comparison result;
in response to the first comparison result is determined to be consistent, generating and sending an instruction for opening the target safe box so as to open the target safe box, so that the user can put the article to be stored into the target safe box;
and generating and sending an instruction for closing the target safe box to lock the target safe box in response to an operation instruction for requesting to close the target safe box.
2. The method of claim 1, wherein the item attributes comprise at least: a category attribute and a volume attribute of the item; and the number of the first and second groups,
determining a target safe for storing the item to be stored based on the item attributes, comprising:
based on the category attribute, determining the category of the safe box corresponding to the category attribute from a pre-constructed corresponding relation list of the item category attribute and the safe box category;
and determining a target safe box matched with the volume attribute from the safe boxes in the category.
3. The method of claim 1, further comprising:
acquiring real-time position information of the target safe box;
and responding to the fact that the target safe box reaches the preset position, determining the corresponding relation between the object attribute and the target safe box, and storing the corresponding relation into a pre-constructed object storage list.
4. The method of claim 3, further comprising:
in response to an operation instruction of the user for requesting to view the stored items, determining whether the item to be viewed, which is pointed by the operation instruction, exists in the item storage list or not;
in response to the fact that the article to be checked exists in the article storage list, acquiring a second current face image of the user at the current moment, and determining a safe to be checked for storing the article to be checked;
extracting a pre-stored face image corresponding to the safe box to be checked from the face image library;
comparing the second current face image with a prestored face image corresponding to the safe box to be checked to obtain a second comparison result;
in response to the fact that the second comparison result is consistent, acquiring a monitoring video of the safe box to be checked at the current moment, wherein the monitoring video is acquired by a camera device in a warehouse for storing the safe box to be checked;
and sending the monitoring video.
5. The method of claim 3, further comprising:
responding to an operation instruction of a user for requesting to extract stored articles, and determining whether the articles to be extracted pointed by the operation instruction exist in the article storage list or not;
in response to the fact that the article to be extracted exists in the article storage list, acquiring a third current face image of the user at the current moment, and determining a safe to be extracted for storing the article to be extracted;
extracting a prestored face image corresponding to the safe box to be extracted from the face image library;
comparing the third current face image with the prestored face image of the user to obtain a third comparison result;
and in response to the third comparison result is determined to be consistent, generating and sending an instruction for opening the safe box to be extracted so that the user can take the article to be extracted out of the safe box to be extracted.
6. The method of claim 5, further comprising, after the items to be extracted in the safe to be extracted are removed:
generating an instruction for closing the safe box to be extracted;
deleting the safe box to be extracted and the corresponding prestored face image thereof from the face image library;
and deleting the safe box to be extracted and the article attributes of the article to be extracted from the article storage list.
7. An apparatus for storing articles, comprising:
the order receiving unit is configured to respond to an article storage order sent by a user, acquire an initial face image of the user and determine an article attribute of an article to be stored from the article storage order;
a safe selecting unit configured to determine a target safe for storing the item to be stored based on the item attribute;
the image pre-storage unit is configured to store the initial face image as a pre-stored face image of the user into the face image library and determine the corresponding relation between the pre-stored face image of the user and the target safe box;
the instruction receiving unit is configured to respond to an operation instruction of the user for requesting to open the target safe box, acquire a first current face image of the user at the current moment, and extract a target pre-stored face image corresponding to the target safe box from the face image library;
the first comparison unit is configured to compare the first current face image with the target prestored face image to obtain a first comparison result;
an opening instruction unit configured to generate and send an instruction to open the target safe in response to determining that the first comparison result is consistent, so as to open the target safe, so that the user puts the article to be stored into the target safe;
a closing instruction unit configured to generate and transmit an instruction to close the target safe in response to an operation instruction to request to close the target safe, to lock the target safe.
8. The apparatus of claim 7, the item attributes comprising at least: a category attribute and a volume attribute of the item; and the number of the first and second groups,
the safe selecting unit further comprises:
the category determination module is configured to determine the category of the safe box corresponding to the category attribute from a pre-constructed corresponding relation list of the item category attribute and the safe box category based on the category attribute;
and the volume matching unit is configured to determine a target safe box matched with the volume attribute from the safe boxes in the category.
9. The apparatus of claim 7, further comprising:
a location information acquisition unit configured to acquire real-time location information of the target safe;
a list generating unit configured to determine a correspondence between the item attribute and the target safe in response to determining that the target safe reaches a preset position, and store the correspondence in a pre-constructed item deposit list.
10. The apparatus of claim 9, further comprising an item viewing unit, the item viewing unit comprising:
the checking instruction receiving module is configured to respond to an operation instruction of a user for checking stored articles, and determine whether the articles to be checked pointed by the operation instruction exist in the article storage list or not;
a first obtaining module configured to, in response to determining that the article to be viewed exists in the article storage list, obtain a second current face image of the user at a current time, and determine a safe to be viewed in which the article to be viewed is stored;
the second acquisition module is configured to extract a prestored face image corresponding to the safe box to be checked from the face image library;
the checking information comparison module is configured to compare the current face image of the user with a prestored face image of the user to obtain a second comparison result;
the video acquisition module is configured to acquire a monitoring video of the safe box to be checked at the current moment in response to the second comparison result being determined to be consistent, and the monitoring video is acquired by a camera device in a warehouse storing the safe box to be checked;
a video transmission module configured to transmit the monitoring video.
11. The apparatus of claim 9, further comprising an item extraction unit comprising:
the extraction instruction receiving module is configured to respond to an operation instruction of a user for requesting to extract a stored article, and determine whether an article to be extracted pointed by the operation instruction exists in the article storage list or not;
a third obtaining module, configured to, in response to determining that the article to be extracted exists in the article storage list, obtain a third current face image of the user at the current time, and determine a safe to be extracted in which the article to be extracted is stored;
the fourth acquisition module is configured to extract a prestored face image corresponding to the safe to be extracted from the face image library;
the extraction information comparison module is configured to compare the third current face image with a prestored face image of the user to obtain a third comparison result;
and the extraction instruction generation module is configured to generate and send an instruction for opening the safe to be extracted in response to the third comparison result being consistent, so that the user can take the article to be extracted out of the safe to be extracted.
12. The apparatus of claim 11, wherein the item extraction unit further comprises:
a closing instruction generation module configured to generate an instruction for closing the safe to be extracted;
the image updating module is configured to delete the safe box to be extracted and the corresponding pre-stored face image thereof from the face image library;
a list updating module configured to delete the to-be-extracted safe and the item attribute of the to-be-extracted item from the item storage list.
13. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon,
when executed by the one or more processors, cause the one or more processors to implement a method for depositing items as recited in any one of claims 1-6.
14. A computer-readable medium, on which a computer program is stored, which program, when being executed by a processor, carries out the method for storing an item according to any one of claims 1-6.
CN202110351202.0A 2021-03-31 2021-03-31 Method and device for storing articles Pending CN113096324A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110351202.0A CN113096324A (en) 2021-03-31 2021-03-31 Method and device for storing articles

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110351202.0A CN113096324A (en) 2021-03-31 2021-03-31 Method and device for storing articles

Publications (1)

Publication Number Publication Date
CN113096324A true CN113096324A (en) 2021-07-09

Family

ID=76673180

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110351202.0A Pending CN113096324A (en) 2021-03-31 2021-03-31 Method and device for storing articles

Country Status (1)

Country Link
CN (1) CN113096324A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114463899A (en) * 2022-01-28 2022-05-10 上海商汤科技开发有限公司 Article storage method and device, storage cabinet, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106297055A (en) * 2016-08-30 2017-01-04 湖南大学 A kind of locker, storage cabinet control and system
CN107492214A (en) * 2017-08-30 2017-12-19 深圳前海弘稼科技有限公司 Intelligent storage method and intelligent storage device
CN108230574A (en) * 2017-12-20 2018-06-29 阿里巴巴集团控股有限公司 Object storage terminal pickup method and device and electronic equipment
CN109636979A (en) * 2018-12-14 2019-04-16 深圳壹账通智能科技有限公司 Article access method, locker, backstage face identification system and electronic equipment
CN109887186A (en) * 2019-02-28 2019-06-14 深圳市沐腾科技有限公司 A kind of locker opens cabinet method, locker and storage cabinet system
CN109903474A (en) * 2019-01-17 2019-06-18 平安科技(深圳)有限公司 A kind of intelligence based on recognition of face opens cabinet method and device
CN109902195A (en) * 2019-01-31 2019-06-18 深圳市丰巢科技有限公司 Monitoring image querying method, device, equipment and medium
CN110084550A (en) * 2019-04-16 2019-08-02 安庆易达供应链管理有限公司 A kind of logistics system based on Internet of Things

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106297055A (en) * 2016-08-30 2017-01-04 湖南大学 A kind of locker, storage cabinet control and system
CN107492214A (en) * 2017-08-30 2017-12-19 深圳前海弘稼科技有限公司 Intelligent storage method and intelligent storage device
CN108230574A (en) * 2017-12-20 2018-06-29 阿里巴巴集团控股有限公司 Object storage terminal pickup method and device and electronic equipment
CN109636979A (en) * 2018-12-14 2019-04-16 深圳壹账通智能科技有限公司 Article access method, locker, backstage face identification system and electronic equipment
CN109903474A (en) * 2019-01-17 2019-06-18 平安科技(深圳)有限公司 A kind of intelligence based on recognition of face opens cabinet method and device
CN109902195A (en) * 2019-01-31 2019-06-18 深圳市丰巢科技有限公司 Monitoring image querying method, device, equipment and medium
CN109887186A (en) * 2019-02-28 2019-06-14 深圳市沐腾科技有限公司 A kind of locker opens cabinet method, locker and storage cabinet system
CN110084550A (en) * 2019-04-16 2019-08-02 安庆易达供应链管理有限公司 A kind of logistics system based on Internet of Things

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114463899A (en) * 2022-01-28 2022-05-10 上海商汤科技开发有限公司 Article storage method and device, storage cabinet, electronic equipment and storage medium
CN114463899B (en) * 2022-01-28 2023-12-19 上海商汤科技开发有限公司 Article storage method, device, storage cabinet, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US11488455B1 (en) Registry verification with authentication using a mobile device
US10255737B1 (en) Systems and methods for controlling door locking mechanisms to facilitate package delivery or pickup
KR101842427B1 (en) Managing confidential information
US9990603B2 (en) Product inventory system
US10922909B2 (en) Computer-implemented systems and methods for secure enclosures and access thereto
CN105144156A (en) Associating metadata with images in a personal image collection
US20180181928A1 (en) Physical sensor data enablement of application functionality using real-world device contexts
US11893530B2 (en) Automated storage retrieval system connection and communication protocol
CN109871834A (en) Information processing method and device
US10992593B2 (en) Persistent integration platform for multi-channel resource transfers
KR20190046960A (en) A method, device and mobile terminal for associating a notification message
US10621842B2 (en) Auto-learning generation and use of objects checklist based on proximity control
CN109977839A (en) Information processing method and device
CN114358691A (en) Unmanned vehicle-based part collection method, device, equipment and storage medium
CN103810595A (en) Information verification method and device
CN113096324A (en) Method and device for storing articles
CN108171286B (en) Unmanned selling method and system
CN111784931B (en) Method and apparatus for sharing distribution boxes
EP4163854A1 (en) Systems and methods for conducting remote user authentication
CN115482631A (en) Information interaction method and device
CN110969775A (en) Article access method, electronic device, self-service cabinet and computer-readable storage medium
KR101750934B1 (en) Property sharing method based social network service
CN113763629A (en) Intelligent sales counter and foreign matter detection method
CN110647767A (en) Data viewing method, electronic device and computer-readable storage medium
CN109522737A (en) Method and apparatus for determining resource access authority

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210709