WO2018201623A1 - 物品使用控制方法、设备、***及物品 - Google Patents

物品使用控制方法、设备、***及物品 Download PDF

Info

Publication number
WO2018201623A1
WO2018201623A1 PCT/CN2017/093680 CN2017093680W WO2018201623A1 WO 2018201623 A1 WO2018201623 A1 WO 2018201623A1 CN 2017093680 W CN2017093680 W CN 2017093680W WO 2018201623 A1 WO2018201623 A1 WO 2018201623A1
Authority
WO
WIPO (PCT)
Prior art keywords
item
user
identifier
communication
authentication result
Prior art date
Application number
PCT/CN2017/093680
Other languages
English (en)
French (fr)
Inventor
胡玮炜
靳洪都
杨毓杰
Original Assignee
北京摩拜科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京摩拜科技有限公司 filed Critical 北京摩拜科技有限公司
Publication of WO2018201623A1 publication Critical patent/WO2018201623A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/0042Coin-freed apparatus for hiring articles; Coin-freed facilities or services for hiring of objects
    • G07F17/0057Coin-freed apparatus for hiring articles; Coin-freed facilities or services for hiring of objects for the hiring or rent of vehicles, e.g. cars, bicycles or wheelchairs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/10Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/10Communication protocols, communication systems of vehicle anti-theft devices
    • B60R2325/101Bluetooth

Definitions

  • the present invention relates to the field of article management technology, and more particularly to an article use control method, device, system and article.
  • the item sharing service that temporarily transfers the right to use the item to the user has emerged through the Internet technology, and the idle item can be integrated and provided to the user in a time-sharing or segmented mode. Allow users to use items without paying higher costs, effectively use the resources of the items, avoid waste of goods, and provide green and environmentally friendly items. For example, shared bicycles, shared cars, and shared charging treasures that have emerged in recent years belong to such items. service.
  • the unused item is usually set to the disabled state, and after the user performs the authentication operation and passes the authentication, the item is disabled to the available state for use by the user, which affects the user experience.
  • a bicycle that provides shared use is usually locked, and a user needs to operate an application corresponding to providing a bicycle sharing service, and input the bicycle's logo through scanning code, manual input, etc., and then use the authentication to unlock.
  • the bicycle even needs to obtain a password to manually input and unlock the bicycle.
  • the process of using the authentication requires a lot of operations, which is very cumbersome. Especially when the user needs to use the bicycle in an emergency such as commuting, rushing to appointment, etc., it is necessary to use the certification to unlock the bicycle, which will delay more time, greatly hinder the smooth use of the user and affect the user experience.
  • an item usage control method comprising:
  • the item use authentication result is obtained by performing item use authentication based on the item identifier and the user identifier, and the user identifier is used to uniquely identify the user;
  • the item When the item usage authentication result or authentication failure is not acquired before the end of the countdown, the item is caused to transition from the available state to the disabled state.
  • the short-range communication mode is Bluetooth communication
  • the step of providing the item identification in a short-range communication manner includes:
  • the step of determining the user identifier corresponding to the user who uses the item corresponding to the item identifier includes:
  • the predetermined communication condition is that the Bluetooth broadcast corresponding to the item identifier is continuously received within a predetermined time and the corresponding Bluetooth interaction reaches a predetermined number of times.
  • the step of obtaining an item using the authentication result includes:
  • Receiving the item use authentication request authenticating whether the user has the use right for the item according to the user identifier and the item identifier included in the item use authentication request, and obtaining the item use authentication result and transmitting.
  • the event indicating that the item is used by the user includes vibration of the item, a change in pressure experienced by a portion of the item, a change in temperature of the item, and a signal that the item is used to be used or One or a combination thereof.
  • the timer is restarted to count down, and the re-acquisition item is used to use the authentication result until the number of times the timer is started reaches a predetermined threshold and the last time If the item usage authentication result is not obtained before the end of the countdown or if the authentication still fails, the item is changed from the available state to the disabled state.
  • an article use control method which is executed by one side of an article, comprising:
  • the item use authentication result is obtained by performing item use authentication based on the item identifier and a user identifier corresponding to the user of the item corresponding to the item identifier, where the user identifier is used to uniquely identify the user;
  • the item When the item use authentication result or the authentication failure is not obtained before the end of the countdown, the item is set to be changed from the available state to the disabled state.
  • the short-range communication mode is Bluetooth communication
  • the item identification is sent via Bluetooth broadcast to be provided to the user equipment.
  • the method further includes the step of determining a user identification corresponding to a user of the item corresponding to the item identification:
  • the user identifier corresponding to the user equipment that reaches the predetermined number of Bluetooth interactions is determined as the user identifier corresponding to the user who uses the item.
  • the method further includes:
  • the user identifier and the item identifier included in the authentication request are used to authenticate whether the user has the right to use the item and return the corresponding item using the authentication result.
  • the event indicating that the item is used by the user includes vibration of the item, a change in pressure experienced by a portion of the item, a change in temperature of the item, and a signal that the item is used to be used or One or a combination thereof.
  • the method further includes: restarting the timer to count down when the item fails to obtain the authentication result or the authentication failure before the end of the countdown, and triggering the reacquisition of the item to use the authentication result until the timer is started.
  • the item is changed from the available state to the disabled state when the predetermined use threshold is reached and the item usage authentication result is still not obtained or the authentication still fails before the end of the last countdown.
  • an item usage control method is provided, which is executed by a user equipment side, and includes:
  • the short-range communication function is turned on, when at least one item identification is received by the short-range communication method, and the item identification corresponding to the item used by the user is determined, the acquisition of the item authentication result is triggered.
  • the item identifier is used to uniquely identify the item, and the item use authentication result is obtained by performing item use authentication based on the item identifier and the user identifier corresponding to the item used by the user, and the user identifier is used to uniquely identify the user.
  • the short-range communication is Bluetooth communication
  • the Bluetooth communication status of the item corresponding to the item identification is acquired, and the item meeting the predetermined communication condition is determined as the item used by the user to determine the corresponding item identification.
  • the predetermined communication condition is that the Bluetooth broadcast corresponding to the item identifier is continuously received within a predetermined time and the corresponding Bluetooth interaction reaches a predetermined number of times.
  • the method further includes:
  • a method for controlling the use of an item which is executed by a server side, includes:
  • the item use authentication request including an item identification and a user identification corresponding to a user using the item corresponding to the item identification
  • the item identification is used to uniquely identify the item
  • the user identifier is used to uniquely identify a user
  • an article use control device disposed on an article side, comprising:
  • a communication device for implementing short-range communication
  • a memory for storing instructions
  • a processor for operating in accordance with instructions stored in the memory to perform the item usage control method of any of the second aspects of the present invention.
  • an article comprising:
  • An article use control device provided by the fifth aspect of the invention.
  • the item is a vehicle
  • the item use control device is an in-vehicle electronic device.
  • a user equipment including:
  • a communication device for implementing short-range communication
  • a memory for storing instructions
  • a processor for operating in accordance with instructions stored in the memory to perform the item usage control method of any of the third aspects of the present invention.
  • the user equipment is a smart terminal or a wearable smart device.
  • a user equipment including:
  • a memory for storing instructions
  • a processor for operating in accordance with instructions stored in the memory to perform the item usage control method provided by the fourth aspect of the present invention.
  • an item use control system comprising:
  • the inventors of the present invention have found that in the prior art, there has not been an item usage control technology scheme that allows a user to use an item before performing an authentication operation. Therefore, the technical task to be achieved by the present invention or the technical problem to be solved is not thought of or expected by those skilled in the art, so the present invention is a new technical solution.
  • Fig. 1 is a flow chart showing an article use control method in the first embodiment of the present invention.
  • Fig. 2 is a flow chart showing an article use control method in the second embodiment of the present invention.
  • Fig. 3 is a schematic view showing an article use control device in a second embodiment of the present invention.
  • Fig. 4 shows a schematic view of an article in a second embodiment of the invention.
  • Fig. 5 is a flow chart showing an article use control method in the third embodiment of the present invention.
  • Fig. 6 is a flow chart showing the article use control method in the third embodiment of the present invention.
  • Fig. 7 is a schematic diagram showing a user equipment in a third embodiment of the present invention.
  • Fig. 8 is a flow chart showing the article use control method in the fourth embodiment of the present invention.
  • Fig. 9 is a schematic diagram showing a server in a fourth embodiment of the present invention.
  • Fig. 10 is a schematic view showing an article use control system in a fifth embodiment of the present invention.
  • FIG. 9 A schematic diagram of an item usage control system 9000 in which embodiments of the present invention may be implemented is shown in FIG.
  • the item usage control system 9000 includes an item 4000, a user device 6000, and a server 8000.
  • the item 4000 communicates with the user equipment 6000 in a short-range communication manner, and the item 4000 and the server 8000, the user equipment 6000 and the server 8000 communicate via the network 9100, respectively, and the network 9100 may be a wireless or wired communication network.
  • the item 4000 includes at least an item use control device 3000.
  • the item use control device may be as shown in FIG. 3, and may include a processor 3100, a memory 3200, an interface device 3300, a communication device 3400, a display device 3500, an input device 3600, a speaker 3700, a microphone 3800, and the like.
  • the processor 3100 may be a central processing unit CPU, a microprocessor MCU, or the like.
  • the memory 3200 includes, for example, a ROM (Read Only Memory), a RAM (Random Access Memory), such as a hard disk. Non-volatile memory, etc.
  • the interface device 3300 includes, for example, a USB interface, a headphone jack, and the like.
  • the communication device 3400 can at least perform short-range communication, such as at least one of Bluetooth communication, NFC communication, UWB communication, WiFi communication, ZigBee communication, infrared communication, and acoustic communication, and can also perform other wired or wireless communication, such as 2G. /3G/4G/5G communication or LAN communication.
  • the display device 3500 is, for example, a liquid crystal display, a touch display, or the like.
  • Input device 3600 can include, for example, a touch screen, a keyboard, a somatosensory input, and the like. The user can input/output voice information through the speaker 3700 and the microphone 3800.
  • the article usage control device 3000 illustrated in Figure 3 is merely illustrative and is in no way meant to be limiting of the invention, its application or use.
  • the memory 3200 of the item use control device 3000 is used to store instructions for controlling the processor 3100 to operate to perform any of the method items provided by the embodiments of the present invention. Use the control method.
  • the present invention may relate only to some of the devices therein, for example, the article use control device 3000 relates to the processor 3100 and storage.
  • Device 3200 and communication device 3400 A technician can design instructions in accordance with the disclosed aspects of the present invention. How the instructions control the processor for operation is well known in the art and will not be described in detail herein.
  • the item may be the vehicle 4100 as shown in FIG. 4, and the item use control device may be the in-vehicle electronic device 3100.
  • the vehicle shown in FIG. 4 is merely illustrative and does not limit the vehicle 4100 to be a bicycle, but may also be a moped, an electric bicycle, or an electric car, a car, or the like.
  • the location of the in-vehicle electronic device 3100 at the location of the vehicle 4100 is also merely illustrative and does not limit the placement of the in-vehicle electronic device 3100.
  • the user equipment 6000 can be a smart terminal or a wearable smart device, and the smart terminal can be a mobile phone, a palmtop computer, a tablet computer, etc., and the wearable smart device can be a smart watch, a smart bracelet or a smart jewelry.
  • user device 6000 can include processor 6100, memory 6200, interface device 6300, communication device 6400, display device 6500, input device 6600, speaker 6700, microphone 6800, and the like, as shown in FIG.
  • the processor 6100 may be a central processing unit CPU, a microprocessor MCU, or the like.
  • the memory 6200 includes, for example, a ROM (Read Only Memory), a RAM (Random Access Memory), such as a hard disk. Non-volatile memory, etc.
  • the interface device 6300 includes, for example, a USB interface, a headphone jack, and the like.
  • the communication device 6400 can at least perform short-range communication, such as at least one of Bluetooth communication, NFC communication, UWB communication, WiFi communication, ZigBee communication, infrared communication, and acoustic communication, and can also perform other wired or wireless communication, such as 2G. /3G/4G/5G communication or LAN communication.
  • the display device 6500 is, for example, a liquid crystal display, a touch display, or the like.
  • Input device 6600 can include, for example, a touch screen, a keyboard, a somatosensory input, and the like. The user can input/output voice information through the speaker 6700 and the microphone 6800.
  • the user device 6000 shown in Figure 6 is merely illustrative and in no way is meant to limit the invention, its application or use.
  • the memory 6200 of the user equipment 6000 is configured to store instructions for controlling the processor 6100 to perform operations for performing item usage control according to any of the methods provided by the embodiments of the present invention. method. It will be understood by those skilled in the art that although a plurality of devices are shown for user device 6000 in FIG. 6, the present invention may only relate to some of the devices, for example, user device 6000 relates to processor 6100 and storage device 6200 and communication. Device 6400. A technician can design instructions in accordance with the disclosed aspects of the present invention. How the instructions control the processor for operation is well known in the art and will not be described in detail herein.
  • the server 8000 may be a computer group such as a blade server, a computer, or a plurality of computers, or may be a cloud server.
  • the server 8000 can include a processor 8100, a memory 8200, an interface device 8300, a communication device 8400, a display device 8500, and an input device 8600, as shown in FIG.
  • the processor 8100 can be, for example, a central processing unit CPU, a microprocessor MCU, or the like.
  • the memory 8200 includes, for example, a ROM (Read Only Memory), a RAM (Random Access Memory), a nonvolatile memory such as a hard disk, and the like.
  • the interface device 8300 includes, for example, a USB interface, a serial interface, and the like.
  • the communication device 8400 is capable of, for example, wired or wireless communication.
  • the display device 8500 is, for example, a liquid crystal display.
  • Input device 8600 can include, for example, a touch screen, a keyboard, and the like.
  • the server shown in Figure 8 is merely illustrative and is in no way meant to limit the invention, its application or use.
  • the storage of the server 8000 The device 8200 is configured to store instructions for controlling the processor 8100 to operate to perform an item usage control method provided by an embodiment of the present invention.
  • the present invention may relate only to some of the devices therein, for example, server 8000 only relates to processor 8100 and storage device 8200.
  • a technician can design instructions in accordance with the disclosed aspects of the present invention. How the instructions control the processor for operation is well known in the art and will not be described in detail herein.
  • the overall concept of the embodiment is to provide a technical solution for the use control of an item.
  • the user who uses the item is triggered to use the item when the item is actually used, and is not acquired.
  • the item is switched from the available state to the disabled state, so that the user can use the item before performing the authentication operation.
  • the item use authentication is completed in a manner that is not perceivable by the user. Improve the user experience.
  • the item usage control method provided in this embodiment is as shown in FIG. 1 and includes:
  • Step S1100 providing an item in an available state, the item having a unique item identification.
  • the item is any item that can be used to transfer the usage right to the user for use by the user.
  • the item may be a bicycle, an electric vehicle, a moped, a vehicle, or the like, or a charging device, etc. .
  • the item has a unique item identification, which may be an item number, serial number, string, item code or other item identification information that uniquely identifies the item, and the like.
  • a short-range communication device, a storage area, and a control unit may be disposed in the item, and a corresponding item identifier is stored in the storage area, and the item identifier may be read from the storage area under the control of the control unit,
  • the short-range communication method transmits the item identifier, so that the user equipment can acquire the item identifier, for example, broadcasting the item identifier through Bluetooth so that the user equipment can receive by monitoring, or can set NFC (Near) carrying the item identifier on the item.
  • the Field Communication tag enables the user equipment to read the item identification and the like when the distance from the NFC tag is within the communication range.
  • Providing an item in a usable state in particular, providing an item that the user can use directly,
  • a vehicle that has been unlocked or unlocked and can be directly driven or driven by a user such as a bicycle, an electric bicycle, a moped or a car, or the like, or a charging device that can be charged by the user directly using the output electric power, or the like is provided.
  • Step S1200 when an event indicating that the item is used by the user occurs, the timer is started to count down.
  • the event indicating that the item is used by the user includes all or a signal that the item vibrates, a pressure experienced by a portion of the item changes, a temperature of the item changes, and the item is used to be used.
  • the event indicating that the item is used by the user includes all or a signal that the item vibrates, a pressure experienced by a portion of the item changes, a temperature of the item changes, and the item is used to be used.
  • the vibration may occur by itself, or the pressure sensed by the bicycle seat may change, the bicycle seat senses the temperature of the human body, or the bicycle changes.
  • a signal such as a light, a beep, or the like may be emitted, and all or one or a combination of these events may be an event indicating that the vehicle is used by the user.
  • the charging device when the item is a charging device, when the user actually uses the charging device, the charging device may change in temperature due to the output power, or the charging device may emit a signal such as a charging interface output power or a warning light that is in an active state.
  • the signal indicating that the charging device is used, all or one or a combination of these events may be an event indicating that the charging device is used by the user.
  • the above-mentioned event indicating that the item is used by the user may also correspond to the used event of the different item, and may be specifically defined according to the item used by the actual user, and will not be enumerated here.
  • the timer is started to count down. Specifically, the timer may be started at the item to count down, or the item may be notified by the item on the user side of the item to start the timer, or may be started by the item to notify the server that uses the item for authentication. Countdown.
  • a timer is started at the item to count down so that when the item appears to be disconnected from the user device corresponding to the user using the item, or is lost with the server for item usage authentication, or the user using the item. If the corresponding user equipment is abnormal and cannot communicate, or the user who uses the item is an abnormal situation such as an illegal user who does not have the right to use the item, and the actual result of the acquisition of the item cannot be actually triggered, the following step S1400 may be used to count down. The result of the authentication is not obtained before the end of the article, so that the item is changed from the available state to the disabled state.
  • the duration of the countdown can be set according to engineering experience and experimental simulation.
  • Step S1300 providing the item identifier in a short-range communication manner, and determining a user identifier corresponding to the user who uses the item corresponding to the item identifier, to trigger the acquisition of the item use authentication result,
  • the item use authentication result is obtained by performing item use authentication based on the item identifier and the user identifier, and the user identifier is used to uniquely identify the user.
  • the user identifier is used to uniquely identify the user, and may be a user unique user number, an identity code, user feature information such as face data, voiceprint data, fingerprint data, iris data, and the like.
  • the user identifier may be allocated to the user by the server that performs the registration, and is delivered to the corresponding user equipment for storage in the user equipment.
  • the user equipment may be controlled by the application providing the item usage service running thereon, acquiring the user identification stored in itself, and acquiring the item corresponding to the item used by the corresponding user in a short-range communication manner.
  • the identifier is sent to the server for the generated item use authentication request to obtain the corresponding item use authentication result.
  • the short-range communication method may be Bluetooth communication, NFC (Near Field Communication) communication, ZigBee communication, WiFi communication, UWB (Ultra Wideband) communication, infrared communication, sound wave communication, or the like.
  • NFC Near Field Communication
  • WiFi Wireless Fidelity
  • UWB Ultra Wideband
  • the step of providing the item identification by the short-distance communication method may be implemented when the item indicates an event indicating that the item is used by the user, or may be provided in an available state for continuous real-time, in a specific application, in order to reduce the near
  • the power consumption caused by the distance communication is optional, and is implemented when an event occurs that indicates that the item is used by the user.
  • the short-range communication mode is Bluetooth communication
  • the providing the item identifier in a short-range communication manner may include:
  • the step of determining the user identifier corresponding to the user who uses the item corresponding to the item identifier includes:
  • the user identifier corresponding to the user equipment of the condition is determined as the user identifier corresponding to the user who uses the item.
  • the status of the Bluetooth communication of the user equipment that receives the identifier of the item may be a state in which the user equipment performs Bluetooth interaction with the item, and may also include a status in which the user equipment receives the Bluetooth broadcast.
  • the manner in which the user equipment performs Bluetooth interaction with the item is not limited.
  • the user equipment may acquire the Bluetooth communication address corresponding to the item through the Bluetooth broadcast of the item based on the Bluetooth communication protocol, and establish with the item.
  • the Bluetooth long connection is for interactive communication, or does not establish a long connection, each time directly communicating based on the Bluetooth communication address, and the like.
  • the user identifier corresponding to the user equipment that has established the Bluetooth long connection with the item or interacts with the item Bluetooth multiple times may be determined as the user identifier corresponding to the user who uses the item, or may continuously receive the Bluetooth corresponding to the item identifier.
  • the user identifier corresponding to the broadcasted user equipment is determined as the user identifier corresponding to the user who uses the item, and the like.
  • the user equipment may monitor multiple Bluetooth broadcast signals and receive multiple item identifiers, and cannot determine which item identifier is actually used by the user.
  • the predetermined communication condition is that the Bluetooth broadcast corresponding to the item identification is continuously received for a predetermined time and the corresponding Bluetooth interaction arrives a predetermined number of times.
  • the user equipment When the user equipment continues to receive the Bluetooth broadcast corresponding to the item identifier and the corresponding Bluetooth interaction reaches a predetermined number of times, indicating that the item corresponding to the item identifier is closest to the user corresponding to the user equipment and maintains the distance within a predetermined time, The user is the user who uses the item. Therefore, the user identifier corresponding to the user equipment can be determined as the user identifier corresponding to the user who uses the item.
  • the predetermined number of times or the predetermined time can be set according to engineering experience or experimental simulation.
  • step of using the authentication result by the acquired item triggered in step S1300 may include:
  • the item authentication request including the item identifier and The user identifier
  • Receiving the item use authentication request authenticating whether the user has the use right for the item according to the user identifier and the item identifier included in the item use authentication request, and obtaining the item use authentication result and transmitting.
  • the item use authentication request may be sent by the user equipment or the item side to trigger a server for performing the item use authentication to receive and perform corresponding item use authentication, and authenticate whether the user has the use right to obtain the item.
  • the server may send the item use authentication result to the corresponding item or user equipment, and finally cause the item to use the authentication result according to the corresponding item, keep the item in the available state or the setting from the available state to the disabled state.
  • the method may include: authenticating whether the user is a registered user, Recharge, whether it is owed, whether to pay the deposit, whether to bind the payment service, etc., and also check whether the item meets the conditions for continued use, such as whether the battery is sufficient, whether the item is in good condition, etc., at the time of certification.
  • an authentication failure is returned to cause the item to transition from the available state to the disabled state. Conversely, if the user has the right to use the item, the authentication is returned successfully, so that the available state of the item is maintained, and the user can continue to use the item.
  • Step S1400 when the item use authentication result or the authentication failure is not acquired before the end of the countdown, the item is caused to change from the available state to the disabled state.
  • the disabled state may include a blocked use state and an interference use state.
  • the use-preventing state is a state in which the use function of the article is lost.
  • the vehicle may be prevented from rotating by the front axle/middle axle/rear axle of the vehicle, and / or hinder the way the car is turned, such as the rotation of the handlebar, to prevent the user from riding.
  • the front axle/middle axle/rear axle can be selected to prevent the user from being safe; the items are cars and electrics.
  • driving a vehicle such as a car, it may be to prevent the user from continuing to drive by means of flameout, braking, shifting, etc.
  • a slow braking, automatic shifting, etc. may be selected to cause the vehicle to slowly stop in a dangerous manner; when the item is a charging device, It can be to prevent the user from using the charging device by turning off the power output.
  • the interference use state is a mode in which the use function of the article is not lost, but the state in which the user normally uses the article is interfered by various means, such as an alarm sound, an interference sound, a warning light, a warning text, and the like to interfere with the user's use.
  • the item is disabled and the user experience is poor.
  • the item usage control method further includes: restarting the timer to count down when the item fails to obtain the authentication result or the authentication failure before the end of the countdown, and triggering the reacquisition of the item to use the authentication result until the timer is started.
  • the item is changed from the available state to the disabled state when the number of times reaches the predetermined threshold and the item usage authentication result is not acquired or the authentication still fails before the end of the last countdown.
  • the predetermined threshold value sets a specific numerical value that is better for the user experience according to engineering experience or experimental simulation.
  • the re-retransmission acquisition item uses the authentication result, and the step of obtaining the item use authentication result may be obtained as described above, and details are not described herein again.
  • an item use control method is provided.
  • the use is triggered.
  • the user of the item performs the item use authentication, and changes the item from the available state to the disabled state when the item use authentication result is not obtained or the authentication fails, so that the user can use the item before performing the authentication operation.
  • the article use authentication is completed in a manner that is not perceived by the user. Improve the user experience.
  • an item usage control method is provided, which is executed by one side of the item, as shown in FIG. 2, and includes:
  • Step S2100 setting the item in an available state, the item having a unique item identifier
  • the item is any time that can transfer the usage right to the user in time division or segmentation.
  • the item for the user to use, for example, the item may be a bicycle, an electric car, a moped, a car or the like, or a charging device or the like.
  • the item has a unique item identification, which may be an item number, serial number, string, item code or other item identification information that uniquely identifies the item, and the like.
  • a short-range communication device, a storage area, and a control unit may be disposed in the item, and a corresponding item identifier is stored in the storage area, and the item identifier may be read from the storage area under the control of the control unit,
  • the short-range communication method transmits the item identifier, so that the user equipment can acquire the item identifier, for example, broadcasting the item identifier through Bluetooth so that the user equipment can receive by monitoring, or can set NFC (Near) carrying the item identifier on the item.
  • the Field Communication tag enables the user equipment to read the item identification and the like when the distance from the NFC tag is within the communication range.
  • the setting item is in an available state. Specifically, when the item is a vehicle such as a bicycle, an electric car, a moped, or a car, the vehicle may be set to be unlocked or unlocked for the user to directly ride or drive; when the item is a charging device, the setting is set.
  • the charging device is in a state in which it can output electric power for charging.
  • Step S2200 When it is detected that an event indicating that the item is used by the user is generated, a timer countdown is started to count down;
  • the event indicating that the item is used by the user includes all or a signal that the item vibrates, a pressure experienced by a portion of the item changes, a temperature of the item changes, and the item is used to be used.
  • the event indicating that the item is used by the user includes all or a signal that the item vibrates, a pressure experienced by a portion of the item changes, a temperature of the item changes, and the item is used to be used.
  • an event indicating that the item is used by the user has been exemplified by the vehicle or the charging device.
  • the event indicating that the item is used by the user may also have a corresponding used event corresponding to different items, which may be based on the actual user.
  • the items used are defined and will not be described here.
  • Countdown by starting the timer on the item side is not only applicable to the use of the item in the normal case, but the user equipment corresponding to the user who uses the item is out of association, or is disconnected from the server used for the item use authentication.
  • the user equipment corresponding to the user who uses the item is abnormal and cannot communicate, or the user who uses the item is an abnormal situation such as an illegal user who does not have the right to use the item, the actual result of the acquisition of the item cannot be actually triggered.
  • the old can use the following step S2400 to obtain the item use authentication result before the end of the countdown, so that the item is changed from the available state to the disabled state.
  • the duration of the countdown can be set according to engineering experience and experimental simulation.
  • step S2300 the item identifier is provided to the user equipment in a short-range communication manner to trigger the acquisition of the item use authentication result.
  • the item use authentication result is obtained by performing item use authentication based on the item identifier and a user identifier corresponding to the user of the item corresponding to the item identifier, where the user identifier is used to uniquely identify the user.
  • the user identifier is used to uniquely identify the user, and may be, for example, a user number that uniquely identifies the user, an identity code, user feature information such as facial data, voiceprint data, fingerprint data, iris data, and the like.
  • the user identifier may be allocated to the user by the server that performs the registration, and is delivered to the corresponding user equipment for storage in the user equipment.
  • the user equipment may be controlled by the application providing the item usage service running thereon, acquiring the user identification stored in itself, and acquiring the item corresponding to the item used by the corresponding user in a short-range communication manner.
  • the identifier is sent to the server for the generated item use authentication request to obtain the corresponding item use authentication result.
  • the short-range communication method may be Bluetooth communication, NFC (Near Field Communication) communication, ZigBee communication, WiFi communication, UWB (Ultra Wideband) communication, infrared communication, sound wave communication, or the like.
  • NFC Near Field Communication
  • WiFi Wireless Fidelity
  • UWB Ultra Wideband
  • the short-range communication mode is Bluetooth communication
  • the item identification may be sent by Bluetooth broadcast to be provided to the user equipment.
  • the item use control method provided in the present embodiment further includes the step of determining, from the item side, a user identifier corresponding to the user who uses the item corresponding to the item identification:
  • the user identifier corresponding to the user equipment that reaches the predetermined number of Bluetooth interactions is determined as the user identifier corresponding to the user who uses the item.
  • the Bluetooth communication address By receiving the Bluetooth communication address of the item itself, the Bluetooth communication address can be received.
  • the user equipment and the item establish a long connection based on the Bluetooth communication address or directly send a message to implement the interactive communication, thereby acquiring the Bluetooth communication status, and the Bluetooth communication status at least includes the state in which the user equipment and the item perform Bluetooth interaction.
  • an item may perform interactive communication with a plurality of user equipments, and a corresponding Bluetooth interaction reaches a predetermined number of user equipments, which may be considered as a user equipment carried or used by a user who uses the items, thereby achieving a plurality of
  • the user equipment corresponding to the user who actually uses the item is determined by the user equipment, and correspondingly, the user identifier corresponding to the user equipment is determined as the user identifier corresponding to the user who uses the item.
  • the predetermined number of times can be set according to engineering experience or experimental simulation.
  • the step of obtaining the use certification result of the item may also be implemented by the item side, which specifically includes:
  • the user identifier corresponding to the user who uses the item may be obtained by a short-distance communication method from a user equipment corresponding to the user who uses the item, or may be determined from the item side in the above example.
  • the user identifier corresponding to the user of the item corresponding to the item identifier may be obtained by a short-distance communication method from a user equipment corresponding to the user who uses the item, or may be determined from the item side in the above example.
  • the server for performing the item use authentication is triggered to receive and perform the corresponding item use authentication, and the user is authenticated whether the item has the use right.
  • the specific authentication process has been described in the first embodiment, and details are not described herein again.
  • the returned item use authentication result may be returned to the corresponding item or user equipment, and after the item is received from the server or received from the user equipment, the authentication result is used according to the corresponding item. , keep the item available or the setting changes from available to disabled.
  • Step S2400 When the item use authentication result or the authentication failure is not acquired before the end of the countdown, the item is set to be changed from the available state to the disabled state.
  • the disabled state may include a blocked use state and an interference use state.
  • Blocking the use state is a state in which the use function of the item is lost.
  • the interference use state is a state in which the use function of the user is disturbed by various means although the function of using the article is not lost.
  • the disabled state has been specifically illustrated in the first embodiment, and details are not described herein again.
  • the item is disabled and the user experience is poor.
  • the item usage control method further includes: restarting the timer to count down when the item fails to obtain the authentication result or the authentication failure before the end of the countdown, and triggering the reacquisition of the item to use the authentication result until the timer is started.
  • the item is changed from the available state to the disabled state when the number of times reaches the predetermined threshold and the item usage authentication result is not acquired or the authentication still fails before the end of the last countdown.
  • the predetermined threshold value sets a specific numerical value that is better for the user experience according to engineering experience or experimental simulation.
  • the step of triggering the reacquisition of the item using the authentication result may be a step of triggering the user equipment to resend the use authentication request by the short-range communication method to trigger the server to perform the acquisition item use authentication result as described above, or re-execute as above
  • the step of obtaining an item using the authentication result implemented on the item side is not described herein again.
  • an item use control device which is disposed on the item side, and includes:
  • a communication device for implementing short-range communication
  • a memory for storing instructions
  • the item use control device may be as shown in FIG. 3, and may include a processor 3100, a memory 3200, an interface device 3300, a communication device 3400, a display device 3500, an input device 3600, a speaker 3700, a microphone 3800, and the like.
  • the processor 3100 may be a central processing unit CPU, a microprocessor MCU, or the like.
  • Memory The 3200 includes, for example, a ROM (Read Only Memory), a RAM (Random Access Memory), a nonvolatile memory such as a hard disk, and the like.
  • the interface device 3300 includes, for example, a USB interface, a headphone jack, and the like.
  • the communication device 3400 can at least perform short-range communication, such as at least one of Bluetooth communication, NFC communication, UWB communication, WiFi communication, ZigBee communication, infrared communication, and acoustic communication, and can also perform other wired or wireless communication, such as 2G. /3G/4G/5G communication or LAN communication.
  • the display device 3500 is, for example, a liquid crystal display, a touch display, or the like.
  • Input device 3600 can include, for example, a touch screen, a keyboard, a somatosensory input, and the like. The user can input/output voice information through the speaker 3700 and the microphone 3800.
  • the article usage control device 3000 illustrated in Figure 3 is merely illustrative and is in no way meant to be limiting of the invention, its application or use.
  • the memory 3200 of the item use control device 3000 is used to store instructions for controlling the processor 3100 to operate to perform any of the method items provided by the embodiments of the present invention. Use the control method.
  • the present invention may relate only to some of the devices therein, for example, the article use control device 3000 relates to the processor 3100 and storage.
  • Device 3200 and communication device 3400 A technician can design instructions in accordance with the disclosed aspects of the present invention. How the instructions control the processor for operation is well known in the art and will not be described in detail herein.
  • the item usage control device 3000 can be implemented in a variety of ways.
  • the item use control device 3000 can be implemented by an instruction configuration processor.
  • the instructions may be stored in the ROM, and when the device is booted, the instructions are read from the ROM into the programmable device to implement the item usage control device.
  • the item can be cured into a dedicated device (eg, an ASIC) using a control device.
  • the item use control device 3000 can be divided into mutually independent units, or they can be combined and implemented.
  • the item use control device 3000 may be implemented by one of the various implementations described above, or may be implemented by a combination of two or more of the various implementations described above.
  • an article 4000 is provided, including at least the article use control device 3000 provided in the embodiment.
  • the item may be a vehicle 4100 as shown in FIG. 4, and the item usage control
  • the device can be an in-vehicle electronic device 3100.
  • the vehicle shown in FIG. 4 is merely illustrative and does not limit the vehicle 4100 to be a bicycle, but may also be a moped, an electric bicycle, or an electric car, a car, or the like.
  • the location of the in-vehicle electronic device 3100 at the location of the vehicle 4100 is also merely illustrative and does not limit the placement of the in-vehicle electronic device 3100.
  • an object use control method, apparatus, and article are provided, which are triggered by setting an item in an available state and generating an event indicating that the item is used by the user.
  • the user who uses the item is authenticated by the item, and when the item use authentication result or the authentication fails, the item is switched from the available state to the disabled state, so that the user can use the item before performing the authentication operation.
  • the article use authentication is completed in a manner that is not perceived by the user. Improve the user experience.
  • a method for controlling the use of an item is performed by a user equipment side, and includes:
  • Step S5100 When the short-range communication function is turned on, when at least one item identifier is received by the short-range communication method, and the item identifier corresponding to the item used by the user is determined, the acquisition of the item authentication result is triggered.
  • the item identifier is used to uniquely identify the item, and the item use authentication result is obtained by performing item use authentication based on the item identifier and the user identifier corresponding to the item used by the user, and the user identifier is used to uniquely identify the user.
  • the item is any item that can be used to transfer the usage right to the user for use by the user.
  • the item may be a bicycle, an electric vehicle, a moped, a vehicle, or the like, or a charging device, etc. .
  • the item identification is used to uniquely identify the item, and may be an item number, a serial number, a character string, an item code or other item identification information that uniquely identifies the item, and the like.
  • An example in which the item acquires and provides the item identification has been described in the first embodiment, and details are not described herein again.
  • the user identifier is used to uniquely identify the user, and may be a unique user number and body of the user. Part code, user feature information such as face data, voiceprint data, fingerprint data, iris data, and the like.
  • user identification acquisition has been described in the first embodiment, and details are not described herein again.
  • the user equipment may be a device used or carried by a user, such as a smart terminal such as a mobile phone, a palmtop computer, a tablet computer, or a wearable smart device such as a smart watch, a smart bracelet, or a smart jewelry.
  • a smart terminal such as a mobile phone, a palmtop computer, a tablet computer, or a wearable smart device such as a smart watch, a smart bracelet, or a smart jewelry.
  • the user equipment has a short-range communication function, and can be triggered to open a short-range communication function in real time according to an application scenario, for example, opening a short-distance communication function by using an interface of an installed application that provides an item usage service, or maintaining the proximity communication function at all times. .
  • the information may be received by the short-range communication method, and when the at least one item identification is received and the item identification corresponding to the item used by the user is determined, the acquisition of the item authentication result may be triggered.
  • the short-range communication may be Bluetooth communication, NFC (Near Field Communication) communication, ZigBee communication, WiFi communication, UWB (Ultra Wideband) communication, infrared communication, sonic communication, or the like.
  • the short-range communication is a Bluetooth communication.
  • the item usage control method provided in this embodiment further includes: acquiring, when the at least one item identifier is received by monitoring a Bluetooth broadcast, acquiring the item identifier The Bluetooth communication status of the corresponding item determines an item that meets the predetermined communication condition as an item used by the user to determine a corresponding item identification.
  • the status of the Bluetooth communication of the item corresponding to the item identifier may be obtained by detecting a state in which the user equipment performs Bluetooth interaction with the item, and may further include a state in which the user equipment receives a Bluetooth broadcast corresponding to the item.
  • the manner in which the user equipment interacts with the item for Bluetooth is not limited.
  • the user equipment may acquire the Bluetooth communication address corresponding to the item through the Bluetooth broadcast of the item based on the Bluetooth communication protocol, and establish a Bluetooth length with the item.
  • the connection is for interactive communication, or does not establish a long connection, each time directly communicating based on the Bluetooth communication address, and the like.
  • the item that meets the predetermined communication condition as the item used by the user to determine the corresponding item identification For example, an item that has established a Bluetooth long connection with the user equipment or interacts with the user equipment Bluetooth multiple times may be determined as an item used by the user to determine a corresponding item identifier, or may be continuously received.
  • the item corresponding to the Bluetooth broadcast is determined as the item used by the user to determine the corresponding item identification and the like.
  • the user equipment may monitor multiple Bluetooth broadcast signals and receive multiple item identifiers, and cannot determine which item identifier is actually used by the user.
  • the predetermined communication condition is that the Bluetooth broadcast corresponding to the item identification is continuously received for a predetermined time and the corresponding Bluetooth interaction arrives a predetermined number of times.
  • the user equipment When the user equipment continues to receive the Bluetooth broadcast corresponding to the item identifier and the corresponding Bluetooth interaction reaches a predetermined number of times, indicating that the item corresponding to the item identifier is closest to the user corresponding to the user equipment and maintains the distance within a predetermined time,
  • the item is the item used by the user, and therefore, the item identification can be determined correspondingly.
  • the item usage control method provided in this embodiment triggers the step of acquiring the item authentication, specifically as shown in step S5201 of FIG. 5:
  • step S5201 after determining the item identifier corresponding to the item used by the user, the user identifier is sent to the item corresponding to the item identifier in a short-range communication manner to trigger the acquisition of the item authentication result.
  • the user identifier is sent to the item corresponding to the item identifier in a short-range communication manner, and the item may be triggered to generate an item authentication request according to the user identifier and the user identifier, and sent to the server to trigger the acquisition of the item authentication result, specifically, The description in the second embodiment is not repeated here.
  • the item usage control method provided in this embodiment triggers the step of acquiring the item authentication, as shown in steps S5202 and S5203 shown in FIG. 6:
  • Step S5202 after determining an item identifier corresponding to the item used by the user or receiving an indication of the item used by the user in a short-range communication manner, generating an item use authentication request including the item identifier and the user identifier;
  • Step S5203 sending the item use authentication request to the server, to trigger the server to determine whether the user has the use right and return the corresponding item according to the user identifier and the item identifier included in the item use authentication request. Use the certification results.
  • the indication of the item used by the user received in the short-range communication mode is usually that the item is counted down at the start timer, and the item usage recognition is not obtained before the countdown ends.
  • the indication is triggered by the short-range communication to trigger the user equipment to regenerate the item using the authentication request and sent to the server to trigger the server to re-execute the item use authentication.
  • the item use authentication result may be returned to the item or may be returned to the user equipment. It should be understood that when the item is returned to the user device using the authentication result, the item use authentication result may be provided to the item by, for example, short-range communication, such that the item is processed according to the corresponding item use authentication result.
  • a user equipment including:
  • a communication device for implementing short-range communication
  • a memory for storing instructions
  • the user equipment may be a smart terminal or a wearable smart device
  • the smart terminal may be a mobile phone, a palmtop computer, a tablet computer, etc.
  • the wearable smart device may be a smart watch, a smart bracelet or a smart jewelry.
  • the user device can include a processor 6100, a memory 6200, an interface device 6300, a communication device 6400, a display device 6500, an input device 6600, a speaker 6700, a microphone 6800, and the like, as shown in FIG.
  • the processor 6100 may be a central processing unit CPU, a microprocessor MCU, or the like.
  • the memory 6200 includes, for example, a ROM (Read Only Memory), a RAM (Random Access Memory), a nonvolatile memory such as a hard disk, and the like.
  • the interface device 6300 includes, for example, a USB interface, a headphone jack, and the like.
  • the communication device 6400 can at least perform short-range communication, such as at least one of Bluetooth communication, NFC communication, UWB communication, WiFi communication, ZigBee communication, infrared communication, and acoustic communication, and can also perform other wired or wireless communication, such as 2G. /3G/4G/5G communication or LAN communication.
  • the display device 6500 is, for example, a liquid crystal display, a touch display, or the like.
  • Input device 6600 can include, for example, a touch screen, a keyboard, a somatosensory input, and the like. The user can input/output voice information through the speaker 6700 and the microphone 6800.
  • the user device 6000 shown in Figure 6 is merely illustrative and in no way is meant to limit the invention, its application or use.
  • the memory 6200 of the user equipment 6000 is configured to store instructions for controlling the processor 6100 to perform operations for performing item usage control according to any of the methods provided by the embodiments of the present invention. method. It will be understood by those skilled in the art that although a plurality of devices are shown for user device 6000 in FIG. 6, the present invention may only relate to some of the devices, for example, user device 6000 relates to processor 6100 and storage device 6200 and communication. Device 6400. A technician can design instructions in accordance with the disclosed aspects of the present invention. How the instructions control the processor for operation is well known in the art and will not be described in detail herein.
  • user equipment 6000 can be implemented in a variety of ways.
  • user device 6000 can be implemented by an instruction configuration processor.
  • the instructions may be stored in the ROM, and when the device is booted, the instructions are read from the ROM into the programmable device to implement the item usage control device.
  • the item can be cured into a dedicated device (eg, an ASIC) using a control device.
  • the user equipment 6000 can be divided into mutually independent units, or they can be implemented together.
  • the user equipment 6000 may be implemented by one of the various implementations described above, or may be implemented by a combination of two or more of the various implementations described above.
  • an item usage control method and a user equipment are provided, which are triggered by receiving an item identification in a short-range communication manner and determining an item identification corresponding to the item used by the user.
  • the item authentication result is obtained so that the user can use the item before performing the authentication operation.
  • the article use authentication is completed in a manner that is not perceived by the user. Improve the user experience.
  • an item usage control method is provided, which is executed by a server side, such as As shown in Figure 8, it includes:
  • Step S7100 Receiving an item use authentication request from a user or an item, where the item use authentication request includes an item identifier and a user identifier corresponding to a user who uses the item corresponding to the item identifier,
  • the item identification is used to uniquely identify the item
  • the user identification is used to uniquely identify the user.
  • the item identification may be an item number, a serial number, a character string, an item code or other item identification information, etc. that uniquely identifies the item.
  • An example in which the item acquires and provides the item identification has been described in the first embodiment, and details are not described herein again.
  • the user identification may be a user unique user number, an identity code, user characteristic information such as face data, voiceprint data, fingerprint data, iris data, and the like.
  • user characteristic information such as face data, voiceprint data, fingerprint data, iris data, and the like.
  • Step S7200 According to the user identifier and the item identifier, verify whether the user has the use right for the item, and return the corresponding item use authentication result to the user or the item.
  • the item identifier and the user identifier corresponding to the user who uses the item corresponding to the item identifier are authenticated, and the user is authenticated to have the right to use the item, for example, including whether the user is a registered user, whether It has been recharged, whether it is in arrears, whether to pay the deposit, whether it is bound to the payment service, etc., and it is also possible to check whether the item satisfies the conditions of continued use, such as whether the power is sufficient, whether the item is in good condition, etc., at the time of authentication.
  • an authentication failure is returned to cause the item to transition from the available state to the disabled state. Conversely, if the user has the right to use the item, the authentication is returned successfully, so that the available state of the item is maintained, and the user can continue to use the item.
  • a server including:
  • a memory for storing instructions
  • a processor for operating in accordance with instructions stored in the memory to perform the item usage control method provided in the embodiment.
  • the server may be, for example, a blade server, a computer, or multiple computers.
  • the computer group that is composed can also be a cloud server.
  • the server 8000 can include a processor 8100, a memory 8200, an interface device 8300, a communication device 8400, a display device 8500, and an input device 8600, as shown in FIG.
  • the processor 8100 can be, for example, a central processing unit CPU, a microprocessor MCU, or the like.
  • the memory 8200 includes, for example, a ROM (Read Only Memory), a RAM (Random Access Memory), a nonvolatile memory such as a hard disk, and the like.
  • the interface device 8300 includes, for example, a USB interface, a serial interface, and the like.
  • the communication device 8400 is capable of, for example, wired or wireless communication.
  • the display device 8500 is, for example, a liquid crystal display.
  • Input device 8600 can include, for example, a touch screen, a keyboard, and the like.
  • the server shown in Figure 8 is merely illustrative and is in no way meant to limit the invention, its application or use.
  • the memory 8200 of the server 8000 is configured to store instructions for controlling the processor 8100 to operate to perform an item usage control method provided by an embodiment of the present invention.
  • the present invention may relate only to some of the devices therein, for example, server 8000 only relates to processor 8100 and storage device 8200.
  • a technician can design instructions in accordance with the disclosed aspects of the present invention. How the instructions control the processor for operation is well known in the art and will not be described in detail herein.
  • server 8000 can be implemented in a variety of ways.
  • server 8000 can be implemented by an instruction configuration processor.
  • the instructions may be stored in the ROM, and when the device is booted, the instructions are read from the ROM into the programmable device to implement the item usage control device.
  • the item can be cured into a dedicated device (eg, an ASIC) using a control device.
  • the server 8000 can be divided into mutually independent units, or they can be combined and implemented.
  • the server 8000 may be implemented by one of the various implementations described above, or may be implemented by a combination of two or more of the various implementations described above.
  • an item usage control method and a server are provided, and the item identification request included in the item authentication request is received according to the item authentication request sent by the item or the user equipment. And the item identifier, whether the user authentication corresponding to the user identifier has the use right of the item using the corresponding item identifier, to return the item identification
  • the result is that the user can use the item before performing the authentication operation.
  • the article use authentication is completed in a manner that is not perceived by the user. Improve the user experience.
  • an article use control system including the article provided in the second embodiment, the user device provided in the third embodiment, and the server provided in the fourth embodiment to implement the present invention.
  • the control method of any item is used, as shown in FIG. 10, and details are not described herein again.
  • the item use control system 9000 includes an item 4000 as shown in FIG. 4, a user device 6000 as shown in FIG. 7, and a server 8000 as shown in FIG.
  • the item 4000 communicates with the user equipment 6000 in a short-range communication manner, and the item 4000 communicates with the server 8000, the user equipment 6000, and the server 8000 through a network 9100, which may be wireless or wired communication.
  • the internet may be wireless or wired communication.
  • the invention can be a system, method and/or computer program product.
  • the computer program product can comprise a computer readable storage medium having computer readable program instructions embodied thereon for causing a processor to implement various aspects of the present invention.
  • the computer readable storage medium can be a tangible device that can hold and store the instructions used by the instruction execution device.
  • the computer readable storage medium can be, for example, but not limited to, an electrical storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or Any suitable combination of the above.
  • Non-exhaustive list of computer readable storage media include: portable computer disks, hard disks, random access memory (RAM), read only memory (ROM), erasable programmable read only memory (EPROM) Or flash memory), static random access memory (SRAM), portable compact disk read only memory (CD-ROM), digital versatile disk (DVD), memory stick, floppy disk, mechanical encoding device, for example, with instructions stored thereon A raised structure in the hole card or groove, and any suitable combination of the above.
  • a computer readable storage medium as used herein is not to be interpreted as a transient signal itself, such as a radio wave or other freely propagating electromagnetic wave, an electromagnetic wave propagating through a waveguide or other transmission medium (eg, a light pulse through a fiber optic cable), or through a wire The electrical signal transmitted.
  • the computer readable program instructions described herein can be downloaded from a computer readable storage medium to various computing/processing devices or downloaded to an external computer or external storage device over a network, such as the Internet, a local area network, a wide area network, and/or a wireless network.
  • the network may include copper transmission cables, fiber optic transmissions, wireless transmissions, routers, firewalls, switches, gateway computers, and/or edge servers.
  • a network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium in each computing/processing device .
  • Computer program instructions for performing the operations of the present invention may be assembly instructions, instruction set architecture (ISA) instructions, machine instructions, machine related instructions, microcode, firmware instructions, state setting data, or in one or more programming languages.
  • the computer readable program instructions can execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer, partly on the remote computer, or entirely on the remote computer or server. carried out.
  • the remote computer can be connected to the user's computer through any kind of network, including a local area network (LAN) or wide area network (WAN), or can be connected to an external computer (eg, using an Internet service provider to access the Internet) connection).
  • the customized electronic circuit such as a programmable logic circuit, a field programmable gate array (FPGA), or a programmable logic array (PLA), can be customized by utilizing state information of computer readable program instructions.
  • Executive computer readable Program instructions to implement various aspects of the present invention.
  • the computer readable program instructions can be provided to a general purpose computer, a special purpose computer, or a processor of other programmable data processing apparatus to produce a machine such that when executed by a processor of a computer or other programmable data processing apparatus Means for implementing the functions/acts specified in one or more of the blocks of the flowcharts and/or block diagrams.
  • the computer readable program instructions can also be stored in a computer readable storage medium that causes the computer, programmable data processing device, and/or other device to operate in a particular manner, such that the computer readable medium storing the instructions includes An article of manufacture that includes instructions for implementing various aspects of the functions/acts recited in one or more of the flowcharts.
  • the computer readable program instructions can also be loaded onto a computer, other programmable data processing device, or other device to perform a series of operational steps on a computer, other programmable data processing device or other device to produce a computer-implemented process.
  • instructions executed on a computer, other programmable data processing apparatus, or other device implement the functions/acts recited in one or more of the flowcharts and/or block diagrams.
  • each block in the flowchart or block diagram can represent a module, a program segment, or a portion of an instruction that includes one or more components for implementing the specified logical functions.
  • Executable instructions can also occur in a different order than those illustrated in the drawings. For example, two consecutive blocks may be executed substantially in parallel, and they may sometimes be executed in the reverse order, depending upon the functionality involved.
  • each block of the block diagrams and/or flowcharts, and combinations of blocks in the block diagrams and/or flowcharts can be implemented in a dedicated hardware-based system that performs the specified function or function. Or it can be implemented by a combination of dedicated hardware and computer instructions. It is well known to those skilled in the art that it is implemented by hardware, by software, and by software. The implementation of the combination with the hardware is equivalent.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Theoretical Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Computing Systems (AREA)
  • Mechanical Engineering (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Power Engineering (AREA)
  • Telephone Function (AREA)
  • Lock And Its Accessories (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种物品使用控制方法、设备、***及物品。该方法包括:提供处于可用状态的物品(S1100);在物品发生表示物品被用户使用的事件时,启动计时器进行倒计时(S1200);以近距离通信方式提供物品标识,并确定使用与物品标识相对应的物品的用户所对应的用户标识,以触发获取物品使用认证结果(S1300);当在倒计时结束前未获取物品使用认证结果或认证失败时,使得物品从可用状态转为禁用状态(S1400)。该方法可以使得用户可以在执行认证操作前就能使用物品。并且,在用户使用物品过程中,以不令用户感知的方式完成物品使用认证。提升用户体验。

Description

物品使用控制方法、设备、***及物品 技术领域
本发明涉及物品管理技术领域,更具体地,涉及一种物品使用控制方法、设备、***及物品。
背景技术
随着互联网技术和设备制造技术的飞速发展,通过互联网技术使得具有物品使用权暂时转移至用户的物品共享服务应运而生,可以将闲散物品整合以分时或者分段的模式提供给用户使用,让用户不必付出较高成本就能使用物品,有效利用物品资源,避免物品浪费,提供绿色环保的物品使用服务,例如,近年来兴起的共享自行车、共享汽车、共享充电宝都属于这类物品共享服务。
但是,目前的物品共享服务中,通常是将未被使用的物品设置于禁用状态,在用户进行认证操作通过认证以后,才将物品将禁用状态转为可用状态供用户使用,影响用户体验。例如,共享自行车服务中,提供共享使用的自行车通常是锁住的,需要用户操作对应提供自行车共享服务的应用,通过扫码、手动输入等方式输入该自行车的标识再进行使用认证后,才能解锁该自行车,甚至还需获取密码手动输入解锁自行车,使用认证的过程需要诸多操作,十分繁琐。特别是当用户需要在例如上下班、仓促赴约等时间紧急情况下使用自行车时,需要通过使用认证后才能解锁自行车使用,会耽误较多时间,极大阻碍用户的顺畅使用,影响用户体验。
因此,发明人认为,有必要对上述现有技术中存在的问题进行改进。
发明内容
本发明的一个目的是提供一种用于物品使用控制的新技术方案。
根据本发明的第一方面,提供了一种物品使用控制方法,包括:
提供处于可用状态的物品,所述物品具有唯一的物品标识;
在所述物品发生表示物品被用户使用的事件时,启动计时器进行倒计时;
以近距离通信方式提供所述物品标识,并确定使用与所述物品标识相对应的物品的用户所对应的用户标识,以触发获取物品使用认证结果,
其中,所述物品使用认证结果是基于所述物品标识和所述用户标识进行物品使用认证得到,所述用户标识用于唯一标识用户;
当在倒计时结束前未获取所述物品使用认证结果或认证失败时,使得所述物品从可用状态转为禁用状态。
可选地,所述近距离通信方式为蓝牙通信;
所述以近距离通信方式提供所述物品标识的步骤包括:
蓝牙广播发送所述物品标识;
所述确定使用与所述物品标识相对应的物品的用户所对应的用户标识的步骤包括:
监听蓝牙广播接收所述物品标识;
获取接收所述物品标识的用户设备的蓝牙通信状态,将符合预定通信条件的用户设备对应的用户标识,确定为使用所述物品的用户所对应的用户标识。
进一步可选地,所述预定通信条件为,在预定时间内持续接收所述物品标识对应的蓝牙广播并且对应的蓝牙交互到达预定次数。
可选地,所述获取物品使用认证结果的步骤包括:
发送物品使用认证请求,所述物品认证请求中包含所述物品标识以及所述用户标识;
接收所述物品使用认证请求,根据所述物品使用认证请求包括的所述用户标识和所述物品标识,认证该用户对该物品是否具有使用权限以得到物品使用认证结果并发送。
可选地,所述表示物品被用户使用的事件包括所述物品发生震动、所述物品的一部分承受的压力发生变化、所述物品的温度发生变化以及所述物品发出被使用的信号的全部或者其中之一或者及其组合。
可选地,每次倒计时结束前未获取所述物品使用认证结果或认证失败时,重新启动计时器进行倒计时,并触发重新获取物品使用认证结果,直到启动计时器的次数达到预定阈值并且最后一次倒计时结束前仍未获取所述物品使用认证结果或仍认证失败时,使得所述物品从可用状态转为禁用状态。
根据本发明的第二方面,提供一种物品使用控制方法,由物品一侧执行,包括:
设置物品处于可用状态,所述物品具有唯一的物品标识;
检测到所述物品发生表示被用户使用的事件时,启动计时器倒计时进行倒计时;
以近距离通信方式向用户设备提供所述物品标识,以触发获取物品使用认证结果,
其中,所述物品使用认证结果是基于所述物品标识和使用与物品标识相对应的物品的用户所对应的用户标识进行物品使用认证得到,所述用户标识用于唯一标识用户;
当在倒计时结束前未获取所述物品使用认证结果或认证失败时,设置所述物品从可用状态转为禁用状态。
可选地,所述近距离通信方式为蓝牙通信;
通过蓝牙广播发送所述物品标识以提供给用户设备。
进一步地,所述方法还包括确定使用与所述物品标识相对应的物品的用户相对应的用户标识的步骤:
广播物品自身蓝牙通信地址,以触发与所述用户设备进行交互通信获取蓝牙通信状态;
将对应的蓝牙交互到达预定次数的用户设备对应的用户标识,确定为使用所述物品的用户对应的用户标识。
可选地,所述方法还包括:
在获取使用所述物品的用户相对应的用户标识后,生成包含所述物品标识以及所述用户标识的物品使用认证请求;
向服务器发送所述物品使用认证请求,以触发服务器根据所述物品使 用认证请求包括的所述用户标识和所述物品标识,认证该用户对该物品是否具有使用权限并返回对应的物品使用认证结果。
可选地,所述表示物品被用户使用的事件包括所述物品发生震动、所述物品的一部分承受的压力发生变化、所述物品的温度发生变化以及所述物品发出被使用的信号的全部或者其中之一或者及其组合。
可选地,所述方法还包括:每次倒计时结束前未获取所述物品使用认证结果或认证失败时,重新启动计时器进行倒计时,并触发重新获取物品使用认证结果,直到启动计时器的次数达到预定阈值并且最后一次倒计时结束前仍未获取所述物品使用认证结果或仍认证失败时,使得所述物品从可用状态转为禁用状态。
根据本发明的第三方面,提供一种物品使用控制方法,由用户设备一侧执行,包括:
在近距离通信功能被开启的情况下,当通过近距离通信方式接收到至少一个物品标识,并确定用户使用的物品相对应的物品标识时,触发获取物品认证结果,
其中,所述物品标识用于唯一标识物品,所述物品使用认证结果是基于用户使用的物品相对应的所述物品标识和用户标识进行物品使用认证得到,所述用户标识用于唯一标识用户。
可选地,所述近距离通信为蓝牙通信;
当通过监听蓝牙广播接收到至少一个物品标识时,获取与所述物品标识对应的物品的蓝牙通信状态,将符合预定通信条件的物品确定为用户使用的物品以确定相对应的物品标识。
进一步可选地,所述预定通信条件为,在预定时间内持续接收所述物品标识对应的蓝牙广播并且对应的蓝牙交互到达预定次数。
可选地,所述方法还包括:
在确定用户使用的物品相对应的物品标识后,将所述用户标识以近距离通信方式发送给所述物品标识对应的物品,以触发获取物品认证结果;
或者,
在确定用户使用的物品相对应的物品标识后或者以近距离通信方式 接收到所述用户使用的物品的指示后,生成包含所述物品标识以及所述用户标识的物品使用认证请求;
向服务器发送所述物品使用认证请求,以触发服务器根据所述物品使用认证请求包括的所述用户标识和所述物品标识,认证该用户对该物品是否具有使用权限并返回对应的物品使用认证结果。
根据本发明的第四方面,还一种物品使用控制方法,由服务器一侧执行,包括:
从用户或者物品处接收物品使用认证请求,所述物品使用认证请求包括物品标识以及使用与所述物品标识相对应的物品的用户所对应的用户标识,
其中,所述物品标识用于唯一标识物品,
所述用户标识用于唯一标识用户;
根据所述用户标识和所述物品标识,认证该用户对该物品是否具有使用权限,并返回对应的物品使用认证结果至用户或者物品处。
根据本发明的第五方面,提供一种物品使用控制设备,设置于物品侧,包括:
通信装置,用于实施近距离通信;
存储器,用于存储指令;
处理器,用于受控于所述存储器存储的指令进行操作,以执行本发明的第二方面提供的任一项所述的物品使用控制方法。
根据本发明的第六方面,提供一种物品,包括:
本发明的第五方面提供的物品使用控制设备。
可选地,所述物品为车辆;
所述物品使用控制设备为车载电子设备。
根据本发明的第七方面,提供一种用户设备,包括:
通信装置,用于实施近距离通信;
存储器,用于存储指令;
处理器,用于受控于所述存储器存储的指令进行操作,以执行本发明的第三方面任一项所述的物品使用控制方法。
可选地,所述用户设备是智能终端或者可穿戴智能设备。
根据本发明的第八方面,提供一种用户设备,包括:
存储器,用于存储指令;
处理器,用于受控于所述存储器存储的指令进行操作,以执行本发明的第四方面提供的物品使用控制方法。
根据本发明的第九方面,提供一种物品使用控制***,包括:
本发明的第六方面提供的物品;
本发明的第七方面提供的用户设备;
以及本发明的第八方面提供的服务器。
本发明的发明人发现,在现有技术中,尚未存在一种可以使得用户在执行认证操作前就能使用物品的物品使用控制技术方案。因此,本发明所要实现的技术任务或者所要解决的技术问题是本领域技术人员从未想到的或者没有预期到的,故本发明是一种新的技术方案。
通过以下参照附图对本发明的示例性实施例的详细描述,本发明的其它特征及其优点将会变得清楚。
附图说明
被结合在说明书中并构成说明书的一部分的附图示出了本发明的实施例,并且连同其说明一起用于解释本发明的原理。
图1是示出了本发明的第一实施例中的物品使用控制方法的流程图。
图2是示出了本发明的第二实施例中的物品使用控制方法的流程图。
图3示出了本发明的第二实施例中的物品使用控制设备的示意图。
图4示出了本发明的第二实施例中的物品的示意图。
图5是示出了本发明的第三实施例中的物品使用控制方法的流程图。
图6是示出了本发明的第三实施例中的物品使用控制方法的流程图。
图7是示出了本发明的第三实施例中的用户设备的示意图。
图8是示出了本发明的第四实施例中的物品使用控制方法的流程图。
图9是示出了本发明的第四实施例中的服务器的示意图。
图10是示出了本发明的第五实施例中的物品使用控制***的示意图。
具体实施方式
现在将参照附图来详细描述本发明的各种示例性实施例。应注意到:除非另外具体说明,否则在这些实施例中阐述的部件和步骤的相对布置、数字表达式和数值不限制本发明的范围。
以下对至少一个示例性实施例的描述实际上仅仅是说明性的,决不作为对本发明及其应用或使用的任何限制。
对于相关领域普通技术人员已知的技术、方法和设备可能不作详细讨论,但在适当情况下,所述技术、方法和设备应当被视为说明书的一部分。
在这里示出和讨论的所有例子中,任何具体值应被解释为仅仅是示例性的,而不是作为限制。因此,示例性实施例的其它例子可以具有不同的值。
应注意到:相似的标号和字母在下面的附图中表示类似项,因此,一旦某一项在一个附图中被定义,则在随后的附图中不需要对其进行进一步讨论。
<硬件配置>
图10中示出了可以实施本发明实施例的物品使用控制***9000的示意图。
物品使用控制***9000包括物品4000、用户设备6000以及服务器8000。
物品4000与用户设备6000以近距离通信方式通信,物品4000与服务器8000、用户设备6000与服务器8000分别通过网络9100通信,网络9100可以是无线或有线通信网络。
物品4000,至少包括物品使用控制设备3000。
物品使用控制设备可以如图3所示,可以包括处理器3100、存储器3200、接口装置3300、通信装置3400、显示装置3500、输入装置3600、扬声器3700、麦克风3800等等。
其中,处理器3100可以是中央处理器CPU、微处理器MCU等。存储器3200例如包括ROM(只读存储器)、RAM(随机存取存储器)、诸如硬盘的 非易失性存储器等。接口装置3300例如包括USB接口、耳机接口等。通信装置3400至少能实施近距离通信,例如蓝牙通信、NFC通信、UWB通信、WiFi通信、ZigBee通信、红外通信、声波通信中其中至少一种,此外还能能够进行其他有线或无线通信,例如2G/3G/4G/5G通信或局域网通信等。显示装置3500例如是液晶显示屏、触摸显示屏等。输入装置3600例如可以包括触摸屏、键盘、体感输入等。用户可以通过扬声器3700和麦克风3800输入/输出语音信息。
图3所示的物品使用控制设备3000仅仅是说明性的并且决不意味着对本发明、其应用或使用的任何限制。应用于本发明的实施例中,物品使用控制设备3000的所述存储器3200用于存储指令,所述指令用于控制所述处理器3100进行操作以执行本发明实施例提供的任意一项方法物品使用控制方法。本领域技术人员应当理解,尽管在图3中对物品使用控制设备3000示出了多个装置,但是,本发明可以仅涉及其中的部分装置,例如,物品使用控制设备3000涉及处理器3100和存储装置3200以及通信装置3400。技术人员可以根据本发明所公开方案设计指令。指令如何控制处理器进行操作,这是本领域公知,故在此不再详细描述。
具体地,所述物品可以是如图4所示的车辆4100,所述物品使用控制设备可以是车载电子设备3100。应当理解的是,图4所示的车辆仅是示意性的,并不限制车辆4100必须是自行车,还可以是助力车、电动自行车或者电动汽车、汽车等。而车载电子设备3100位于车辆4100的位置也仅是示意性的,并不是限制车载电子设备3100的放置位置。
用户设备6000可以是智能终端或者可穿戴智能设备,该智能终端可以是手机、掌上电脑、平板电脑等,该可穿戴智能设备可以是智能手表、智能手环或者智能首饰等。
在一个例子中,用户设备6000可以如图7所示,可以包括处理器6100、存储器6200、接口装置6300、通信装置6400、显示装置6500、输入装置6600、扬声器6700、麦克风6800等等。
其中,处理器6100可以是中央处理器CPU、微处理器MCU等。存储器6200例如包括ROM(只读存储器)、RAM(随机存取存储器)、诸如硬盘的 非易失性存储器等。接口装置6300例如包括USB接口、耳机接口等。通信装置6400至少能实施近距离通信,例如蓝牙通信、NFC通信、UWB通信、WiFi通信、ZigBee通信、红外通信、声波通信中其中至少一种,此外还能能够进行其他有线或无线通信,例如2G/3G/4G/5G通信或局域网通信等。显示装置6500例如是液晶显示屏、触摸显示屏等。输入装置6600例如可以包括触摸屏、键盘、体感输入等。用户可以通过扬声器6700和麦克风6800输入/输出语音信息。
图6所示的用户设备6000仅仅是说明性的并且决不意味着对本发明、其应用或使用的任何限制。应用于本发明的实施例中,用户设备6000的所述存储器6200用于存储指令,所述指令用于控制所述处理器6100进行操作以执行本发明实施例提供的任意一项方法物品使用控制方法。本领域技术人员应当理解,尽管在图6中对用户设备6000示出了多个装置,但是,本发明可以仅涉及其中的部分装置,例如,用户设备6000涉及处理器6100和存储装置6200以及通信装置6400。技术人员可以根据本发明所公开方案设计指令。指令如何控制处理器进行操作,这是本领域公知,故在此不再详细描述。
服务器8000可以是例如刀片服务器、计算机或者多台计算机组成的计算机组,还可以是云服务器。
在一个例子中,所述服务器8000可以如图9所示,包括处理器8100、存储器8200、接口装置8300、通信装置8400、显示装置8500、输入装置8600。尽管服务器也可以包括扬声器、麦克风等等,但是,这些部件与本发明无关,故在此省略。其中,处理器8100例如可以是中央处理器CPU、微处理器MCU等。存储器8200例如包括ROM(只读存储器)、RAM(随机存取存储器)、诸如硬盘的非易失性存储器等。接口装置8300例如包括USB接口、串行接口等。通信装置8400例如能够进行有线或无线通信。显示装置8500例如是液晶显示屏。输入装置8600例如可以包括触摸屏、键盘等。
图8所示的服务器仅仅是说明性的并且决不意味着对本发明、其应用或使用的任何限制。应用于本发明的实施例中,服务器8000的的所述存储 器8200用于存储指令,所述指令用于控制所述处理器8100进行操作以执行本发明实施例提供的物品使用控制方法。本领域技术人员应当理解,尽管在图8中对服务器8000的示出了多个装置,但是,本发明可以仅涉及其中的部分装置,例如,服务器8000的只涉及处理器8100和存储装置8200。技术人员可以根据本发明所公开方案设计指令。指令如何控制处理器进行操作,这是本领域公知,故在此不再详细描述。
<第一实施例>
本实施例的总体构思,是提供一种物品使用控制的技术方案,通过提供处于可用状态下的物品,在该物品实际发生使用时才触发对使用该物品的用户进行物品使用认证,在未获取物品使用认证结果或认证失败时将物品从可用状态转为禁用状态,使得用户可以在执行认证操作前就能使用物品。并且,在用户使用物品过程中,以用户不可感知的方式完成物品使用认证。提升用户体验。
具体地,本实施例中提供的物品使用控制方法如图1所示,包括:
步骤S1100,提供处于可用状态的物品,所述物品具有唯一的物品标识。
在本实施例中,所述物品是任何可以将使用权分时或分段转移给用户以供用户使用的物品,例如,物品可以是自行车、电动车、助力车、汽车等车辆或者充电设备等等。
所述物品具有唯一的物品标识,该物品标识可以是唯一标识该物品的物品编号、序列号、字符串、物品代码或其他物品标识信息等等。
具体地,可以在物品中设置近距离通信装置、存储区以及控制单元,在所述存储区中存储有对应的物品标识,在控制单元的控制下可以从存储区中读取该物品标识,通过近距离通信方式发送该物品标识,使得用户设备可以获取该物品标识,例如,通过蓝牙广播该物品标识使得用户设备可以通过监听接收,或者,可以通过在物品上设置载有物品标识的NFC(Near Field Communication)标签,使得用户设备在与该NFC标签距离在通信范围内时可以读取该物品标识等等。
提供处于可用状态的物品,具体地,是提供用户可以直接使用的物品, 例如,提供已经解锁或者无锁的可以被用户直接骑行或驾驶的车辆如自行车、电动车、助力车或汽车等,或提供可以被用户直接使用输出电量进行充电的充电设备等。
步骤S1200,在所述物品发生表示物品被用户使用的事件时,启动计时器进行倒计时。
具体地,所述表示物品被用户使用的事件包括所述物品发生震动、所述物品的一部分承受的压力发生变化、所述物品的温度发生变化以及所述物品发出被使用的信号的全部或者其中之一或者及其组合。
例如,当物品是自行车等车辆时,在用户实际使用该自行车时,自行会发生振动、或者自行车的车座感应到承受的压力会发生变化、自行车的车座感应到人体温度而发生变化或者自行车会发出车灯亮起、蜂鸣等信号,这些事件的全部或者其中之一或者及其组合,都可以是表示车辆被用户使用的事件。
又例如,当物品是充电设备时,在用户实际使用该充电设备时,充电设备会因为输出电量而发生温度变化、或者充电设备会发出例如充电接口输出电量的信号或处于工作状态的提示灯亮起等表示充电设备被使用的信号,这些事件的全部或者其中之一或者及其组合,都可以是表示充电设备被用户使用的事件。
上述表示物品被用户使用的事件还可能对应不同的物品存在对应的被使用事件,具体可以根据实际用户使用的物品来定义,在此不一一列举。
在所述物品发生表示物品被用户使用的事件时,启动计时器进行倒计时。具体地,可以在物品处启动计时器进行倒计时,也可以由物品通知使用该物品的用户侧的用户设备处启动计时器进行倒计时,还可以由物品通知对该物品进行使用认证的服务器处启动计时器进行倒计时。
可选地,在物品处启动计时器进行倒计时,以便在出现该物品与使用该物品的用户对应的用户设备失联、或者与用于物品使用认证的服务器失联时、或者使用该物品的用户对应的用户设备出现异常无法通信、或者使用该物品的用户为不具有物品使用权限的非法用户等异常情况,导致无法实际触发获取物品使用认证结果时,可以通过下述步骤S1400,在倒计时 结束前未获取物品使用认证结果,使得该物品从可用状态转为禁用状态。
此外,所述倒计时的时长可以根据工程经验、实验仿真设置。
步骤S1300,以近距离通信方式提供所述物品标识,并确定使用与所述物品标识相对应的物品的用户所对应的用户标识,以触发获取物品使用认证结果,
其中,所述物品使用认证结果是基于所述物品标识和所述用户标识进行物品使用认证得到,所述用户标识用于唯一标识用户。
所述用户标识用于唯一标识用户,可以是用户唯一的用户编号、身份代码、用户特征信息例如面部数据、声纹数据、指纹数据、虹膜数据等等。
具体地,所述用户标识可以是用户注册过程中,由执行注册的服务器为用户分配,并下发至对应的用户设备中以存储在用户设备中。在触发获取物品使用认证结果时,用户设备可以受控于运行在其上的提供物品使用服务的应用,获取存储在自身的用户标识以及以近距离通信方式获取对应的用户所使用的物品对应的物品标识,以供生成物品使用认证请求发送至服务器获取对应的物品使用认证结果。
所述近距离通信方式可以是蓝牙通信、NFC(Near Field Communication)通信、ZigBee通信、WiFi通信、UWB(Ultra Wideband)通信、红外通信、声波通信等等。
此外,所述通过近距离通信方式提供物品标识的步骤,可以在所述物品发生表示物品被用户使用的事件时实施,也可以提供处于可用状态的物品后持续实时,具体应用中,为了降低近距离通信带来的电量消耗,可选,在所述物品发生表示物品被用户使用的事件时实施。
在一个例子中,所述近距离通信方式为蓝牙通信;
对应地,所述以近距离通信方式提供所述物品标识可以包括:
蓝牙广播发送所述物品标识;
所述确定使用与所述物品标识相对应的物品的用户所对应的用户标识的步骤包括:
监听蓝牙广播接收所述物品标识;
获取接收所述物品标识的用户设备的蓝牙通信状态,将符合预定通信 条件的用户设备对应的用户标识,确定为使用所述物品的用户所对应的用户标识。
具体地,获取接收所述物品标识的用户设备的蓝牙通信状态,可以是检测所述用户设备与所述物品进行蓝牙交互的状态,还可以包括用户设备接收蓝牙广播的状态。
应当理解的是,本实施例中并不限制用户设备与所述物品进行蓝牙交互的方式,例如,用户设备可以基于蓝牙通信协议,通过物品的蓝牙广播获取物品对应的蓝牙通信地址,与物品建立蓝牙长连接进行交互通信、或者不建立长连接每次基于所述蓝牙通信地址直接交互通信等等。
根据获取接收所述物品标识的用户设备的蓝牙通信状态,将符合预定通信条件的用户设备对应的用户标识,确定为使用所述物品的用户所对应的用户标识。例如,可以将已与物品建立蓝牙长连接或者与物品蓝牙交互多次的用户设备对应的用户标识,确定为使用所述物品的用户所对应的用户标识,或者可以持续接收到物品标识对应的蓝牙广播的用户设备对应的用户标识,确定为使用所述物品的用户所对应的用户标识等等。
但在具体应用中,用户设备可能监听到多个蓝牙广播信号而接收到多个物品标识,无法确定用户实际使用的是哪个物品标识对应的物品。因此,在一个例子中,所述预定通信条件为,在预定时间内持续接收所述物品标识对应的蓝牙广播并且对应的蓝牙交互到达预定次数。
当用户设备持续接收所述物品标识对应的蓝牙广播并且对应的蓝牙交互到达预定次数,表明所述物品标识对应的物品与该用户设备对应的用户的距离最近并且在预定时间内保持该距离,该用户即为使用该物品的用户,因此,可以将用户设备对应的用户标识,确定为使用所述物品的用户所对应的用户标识。
在本例中,预定次数或者预定时间都可以根据工程经验或者实验仿真设置具体数值。
在另一个例子中,步骤S1300中触发的所述获取物品使用认证结果的步骤可以包括:
发送物品使用认证请求,所述物品认证请求中包含所述物品标识以及 所述用户标识;
接收所述物品使用认证请求,根据所述物品使用认证请求包括的所述用户标识和所述物品标识,认证该用户对该物品是否具有使用权限以得到物品使用认证结果并发送。
具体地,所述物品使用认证请求可以由用户设备或者物品侧发送,以触发用于执行物品使用认证的服务器接收并进行对应的物品使用认证,认证该用户对该物品是否具有使用权限以得到物品使用认证结果后,服务器可以将物品使用认证结果发送给对应的物品或者用户设备,最终使得物品根据对应的物品使用认证结果,保持物品继续处于可用状态或者设置由可用状态转为禁用状态。
对物品标识以及使用与所述物品标识相对应的物品的用户所对应的用户标识进行认证,认证该用户对该物品是否具有使用权限,具体地,可以包括认证该用户是否为注册用户、是否已充值、是否欠费、是否付物品押金、是否绑定支付服务等等,并且,还可以在认证时同时检查物品是否满足继续使用条件,例如电量是否还充足、物品状态是否完好等等。
当认证用户不具有该物品的使用权限后,会返回认证失败以使得物品从可用状态转为禁用状态。反之,如果该用户具有该物品的使用权限,会返回认证成功,使得物品的可用状态被保持,用户可以持续使用该物品。
步骤S1400,当在倒计时结束前未获取所述物品使用认证结果或认证失败时,使得所述物品从可用状态转为禁用状态。
具体地,所述禁用状态可以包括阻止使用状态和干扰使用状态。
阻止使用状态是使物品的使用功能丧失的状态,例如物品是自行车、助力车、电动车等骑行车辆时,可以是通过车辆前轴/中轴/后轴抱死等阻止车轮转动的方式、和/或阻碍车把转动等阻止车辆转向的方式等来阻止用户骑行的方式,此外,还可以选择前轴/中轴/后轴抱死等不会妨碍用户安全的方式;物品是汽车、电动汽车等驾驶车辆时,可以是通过熄火、刹车、调档等方式阻止用户继续驾驶,此外还可以选择缓慢刹车、自动换挡等方式使得车辆缓慢停止不发生危险的方式;物品是充电设备时,可以是通过关闭电量输出来阻止用户使用充电设备等等。
干扰使用状态是虽然不使物品的使用功能丧失,但是通过各种方式干扰用户正常使用物品的状态,例如发出警报音、干扰音,显示警示灯、警示文字等来干扰用户使用的方式。
在一个例子中,还可以在使得所述物品从可用状态转为禁用状态之前,提供再次或多次获取物品使用认证结果的机会,避免仅一次获取不到物品使用认证结果或者一次认证失败就将物品转为禁用状态,导致用户体验不佳。
具体地,该物品使用控制方法还包括:每次倒计时结束前未获取所述物品使用认证结果或认证失败时,重新启动计时器进行倒计时,并触发重新获取物品使用认证结果,直到启动计时器的次数达到预定阈值并且最后一次倒计时结束前仍未获取所述物品使用认证结果或仍认证失败时,使得所述物品从可用状态转为禁用状态。
其中,预定阈值根据工程经验或者实验仿真设置用户体验较佳的具体数值。
具体地,所述重新重发获取物品使用认证结果,可以如上文描述的获取物品使用认证结果的步骤,在此不再赘述。
以上已经结合附图说明了本实施例,在本实施例中,提供一种物品使用控制方法,通过提供处于可用状态下的物品,在该物品发生表示物品被用户使用的事件时,触发对使用该物品的用户进行物品使用认证,在未获取物品使用认证结果或认证失败时将物品从可用状态转为禁用状态,使得用户可以在执行认证操作前就能使用物品。并且,在用户使用物品过程中,以不令用户感知的方式完成物品使用认证。提升用户体验。
<第二实施例>
<方法>
在本实施例中,提供一种物品使用控制方法,由物品一侧执行,具体如图2所示,包括:
步骤S2100,设置物品处于可用状态,所述物品具有唯一的物品标识;
在本实施例中,所述物品是任何可以将使用权分时或分段转移给用户 以供用户使用的物品,例如,物品可以是自行车、电动车、助力车、汽车等车辆或者充电设备等等。
所述物品具有唯一的物品标识,该物品标识可以是唯一标识该物品的物品编号、序列号、字符串、物品代码或其他物品标识信息等等。
具体地,可以在物品中设置近距离通信装置、存储区以及控制单元,在所述存储区中存储有对应的物品标识,在控制单元的控制下可以从存储区中读取该物品标识,通过近距离通信方式发送该物品标识,使得用户设备可以获取该物品标识,例如,通过蓝牙广播该物品标识使得用户设备可以通过监听接收,或者,可以通过在物品上设置载有物品标识的NFC(Near Field Communication)标签,使得用户设备在与该NFC标签距离在通信范围内时可以读取该物品标识等等。
设置物品处于可用状态,具体地,物品是如自行车、电动车、助力车或汽车等车辆时,可以设置车辆处于解锁或者无锁状态,以供用户直接骑行或者驾驶;物品是充电设备时,设置充电设备处于可以输出电量进行充电的状态等。
步骤S2200,检测到所述物品发生表示被用户使用的事件时,启动计时器倒计时进行倒计时;
具体地,所述表示物品被用户使用的事件包括所述物品发生震动、所述物品的一部分承受的压力发生变化、所述物品的温度发生变化以及所述物品发出被使用的信号的全部或者其中之一或者及其组合。
在第一实施例中已以车辆或者充电设备举例说明表示物品被用户使用的事件,此外,上述表示物品被用户使用的事件还可能对应不同的物品存在对应的被使用事件,具体可以根据实际用户使用的物品来定义,在此不再赘述。
通过在物品侧启动计时器进行倒计时,不仅适用于与通常情况下的物品使用认证,在出现该物品与使用该物品的用户对应的用户设备失联、或者与用于物品使用认证的服务器失联时、或者使用该物品的用户对应的用户设备出现异常无法通信、或者使用该物品的用户为不具有物品使用权限的非法用户等异常情况,导致无法实际触发获取物品使用认证结果时,依 旧可以通过下述步骤S2400,在倒计时结束前未获取物品使用认证结果,使得该物品从可用状态转为禁用状态。
此外,所述倒计时的时长可以根据工程经验、实验仿真设置。
步骤S2300,以近距离通信方式向用户设备提供所述物品标识,以触发获取物品使用认证结果,
其中,所述物品使用认证结果是基于所述物品标识和使用与物品标识相对应的物品的用户所对应的用户标识进行物品使用认证得到,所述用户标识用于唯一标识用户。
而所述用户标识用于唯一标识用户,可以是例如唯一标识用户的用户编号、身份代码、用户特征信息例如面部数据、声纹数据、指纹数据、虹膜数据等等。
具体地,所述用户标识可以是用户注册过程中,由执行注册的服务器为用户分配,并下发至对应的用户设备中以存储在用户设备中。在触发获取物品使用认证结果时,用户设备可以受控于运行在其上的提供物品使用服务的应用,获取存储在自身的用户标识以及以近距离通信方式获取对应的用户所使用的物品对应的物品标识,以供生成物品使用认证请求发送至服务器获取对应的物品使用认证结果。
所述近距离通信方式可以是蓝牙通信、NFC(Near Field Communication)通信、ZigBee通信、WiFi通信、UWB(Ultra Wideband)通信、红外通信、声波通信等等。
在一个例子中,所述近距离通信方式为蓝牙通信,对应地,可以通过蓝牙广播发送所述物品标识以提供给用户设备。
进一步地,本实施中提供的物品使用控制方法还包括,从物品一侧确定使用与所述物品标识相对应的物品的用户相对应的用户标识的步骤:
广播物品自身蓝牙通信地址,以触发与所述用户设备进行交互通信获取蓝牙通信状态;
将对应的蓝牙交互到达预定次数的用户设备对应的用户标识,确定为使用所述物品的用户对应的用户标识。
通过广播物品自身蓝牙通信地址,可以使得接收到蓝牙通信地址的用 户设备与物品基于蓝牙通信地址建立长连接或者直接进行消息发送等方式来实现交互通信,以此获取蓝牙通信状态,该蓝牙通信状态至少包含用户设备与物品进行蓝牙交互的状态。
在具体应用中,物品可能与多个用户设备实施了交互通信,而对应的蓝牙交互到达预定次数的用户设备,可以被认为是使用物品的用户所携带或使用的用户设备,以此实现从多个用户设备中确定实际使用物品的用户对应的用户设备,对应地,该用户设备对应的用户标识,确定为使用所述物品的用户对应的用户标识。
在本例中,预定次数可以根据工程经验或者实验仿真设置具体数值。
在另一个例子中,还可以由物品侧实施获取物品使用认证结果的步骤,具体包括:
在获取使用所述物品的用户相对应的用户标识后,生成包含所述物品标识以及所述用户标识的物品使用认证请求;
向服务器发送所述物品使用认证请求,以触发服务器根据所述物品使用认证请求包括的所述用户标识和所述物品标识,认证该用户对该物品是否具有使用权限并返回对应的物品使用认证结果。
其中,获取使用所述物品的用户相对应的用户标识,可以是通过近距离通信方式从使用所述物品的用户对应的用户设备处获取,或者,可以如上例中从物品一侧确定使用与所述物品标识相对应的物品的用户相对应的用户标识。
通过发送物品使用认证请求,触发用于执行物品使用认证的服务器接收并进行对应的物品使用认证,认证该用户对该物品是否具有使用权限。其中,具体的认证过程在第一实施例中已经描述,在此不再赘述。
在服务器认证得到物品使用认证结果后,返回物品使用认证结果,可以返回至对应的物品或者用户设备处,物品从服务器接收或者从用户设备处接收物品使用认证结果后,根据对应的物品使用认证结果,保持物品继续处于可用状态或者设置由可用状态转为禁用状态。
步骤S2400,当在倒计时结束前未获取所述物品使用认证结果或认证失败时,设置所述物品从可用状态转为禁用状态。
具体地,所述禁用状态可以包括阻止使用状态和干扰使用状态。阻止使用状态是使物品的使用功能丧失的状态。干扰使用状态是虽然不使物品的使用功能丧失,但是通过各种方式干扰用户正常使用物品的状态。在第一实施例中已经具体举例说明所述禁用状态,在此不再赘述。
在一个例子中,还可以在使得所述物品从可用状态转为禁用状态之前,提供再次或多次获取物品使用认证结果的机会,避免仅一次获取不到物品使用认证结果或者一次认证失败就将物品转为禁用状态,导致用户体验不佳。
具体地,该物品使用控制方法还包括:每次倒计时结束前未获取所述物品使用认证结果或认证失败时,重新启动计时器进行倒计时,并触发重新获取物品使用认证结果,直到启动计时器的次数达到预定阈值并且最后一次倒计时结束前仍未获取所述物品使用认证结果或仍认证失败时,使得所述物品从可用状态转为禁用状态。
其中,预定阈值根据工程经验或者实验仿真设置用户体验较佳的具体数值。
具体地,触发重新获取物品使用认证结果的步骤,可以是通过近距离通信方式触发用户设备重新发送使用认证请求以触发服务器执行如上文所述的获取物品使用认证结果的步骤,或者重新执行如上文所述在物品侧实施的获取物品使用认证结果的步骤,在此不再赘述。
<装置>
在本实施例中,还提供一种物品使用控制设备,设置于物品侧,包括:
通信装置,用于实施近距离通信;
存储器,用于存储指令;
处理器,用于受控于所述存储器存储的指令进行操作,以执行本实施例中任一项所述的物品使用控制方法。
具体地,所述物品使用控制设备可以如图3所示,可以包括处理器3100、存储器3200、接口装置3300、通信装置3400、显示装置3500、输入装置3600、扬声器3700、麦克风3800等等。
其中,处理器3100可以是中央处理器CPU、微处理器MCU等。存储器 3200例如包括ROM(只读存储器)、RAM(随机存取存储器)、诸如硬盘的非易失性存储器等。接口装置3300例如包括USB接口、耳机接口等。通信装置3400至少能实施近距离通信,例如蓝牙通信、NFC通信、UWB通信、WiFi通信、ZigBee通信、红外通信、声波通信中其中至少一种,此外还能能够进行其他有线或无线通信,例如2G/3G/4G/5G通信或局域网通信等。显示装置3500例如是液晶显示屏、触摸显示屏等。输入装置3600例如可以包括触摸屏、键盘、体感输入等。用户可以通过扬声器3700和麦克风3800输入/输出语音信息。
图3所示的物品使用控制设备3000仅仅是说明性的并且决不意味着对本发明、其应用或使用的任何限制。应用于本发明的实施例中,物品使用控制设备3000的所述存储器3200用于存储指令,所述指令用于控制所述处理器3100进行操作以执行本发明实施例提供的任意一项方法物品使用控制方法。本领域技术人员应当理解,尽管在图3中对物品使用控制设备3000示出了多个装置,但是,本发明可以仅涉及其中的部分装置,例如,物品使用控制设备3000涉及处理器3100和存储装置3200以及通信装置3400。技术人员可以根据本发明所公开方案设计指令。指令如何控制处理器进行操作,这是本领域公知,故在此不再详细描述。
本领域技术人员还应当明白,可以通过各种方式来实现物品使用控制设备3000。例如,可以通过指令配置处理器来实现物品使用控制设备3000。例如,可以将指令存储在ROM中,并且当启动设备时,将指令从ROM读取到可编程器件中来实现物品使用控制设备。例如,可以将物品使用控制设备固化到专用器件(例如ASIC)中。可以将物品使用控制设备3000分成相互独立的单元,或者可以将它们合并在一起实现。物品使用控制设备3000可以通过上述各种实现方式中的一种来实现,或者可以通过上述各种实现方式中的两种或更多种方式的组合来实现。
<物品>
在本实施例中,提供一种物品4000,至少包括本实施例中提供的物品使用控制设备3000。
具体地,所述物品可以是如图4所示的车辆4100,所述物品使用控制 设备可以是车载电子设备3100。应当理解的是,图4所示的车辆仅是示意性的,并不限制车辆4100必须是自行车,还可以是助力车、电动自行车或者电动汽车、汽车等。而车载电子设备3100位于车辆4100的位置也仅是示意性的,并不是限制车载电子设备3100的放置位置。
以上已经结合附图说明了本实施例,在本实施例中,提供一种物品使用控制方法、设备以及物品,通过设置物品处于可用状态并且在该物品发生表示物品被用户使用的事件时,触发对使用该物品的用户进行物品使用认证,在未获取物品使用认证结果或认证失败时,将物品从可用状态转为禁用状态,使得用户可以在执行认证操作前就能使用物品。并且,在用户使用物品过程中,以不令用户感知的方式完成物品使用认证。提升用户体验。
<第三实施例>
<方法>
在本实施例中,提供一种物品使用控制方法,如图5或图6所示,由用户设备一侧执行,包括:
步骤S5100,在近距离通信功能被开启的情况下,当通过近距离通信方式接收到至少一个物品标识,并确定用户使用的物品相对应的物品标识时,触发获取物品认证结果,
其中,所述物品标识用于唯一标识物品,所述物品使用认证结果是基于用户使用的物品相对应的所述物品标识和用户标识进行物品使用认证得到,所述用户标识用于唯一标识用户。
在本实施例中,所述物品是任何可以将使用权分时或分段转移给用户以供用户使用的物品,例如,物品可以是自行车、电动车、助力车、汽车等车辆或者充电设备等等。
所述物品标识用于唯一标识该物品,可以是唯一标识该物品的物品编号、序列号、字符串、物品代码或其他物品标识信息等等。所述物品获取并提供物品标识的例子在第一实施例中已经描述,在此不再赘述。
所述用户标识用于唯一标识用户的,可以是用户唯一的用户编号、身 份代码、用户特征信息例如面部数据、声纹数据、指纹数据、虹膜数据等等。所述用户标识获取的例子在第一实施例中已经描述,在此不再赘述。
所述用户设备可以是用户使用或者携带的设备,例如类似手机、掌上电脑、平板电脑等智能终端或者可穿戴智能设备如智能手表、智能手环或者智能首饰等。
所述用户设备具有近距离通信功能,可以根据应用场景实时被触发开启近距离通信功能,例如通过安装的提供物品使用服务的应用的界面提示开启近距离通信功能,或者一直保持开启近距离通信功能。
在开启近距离通信功能的情况下,可以通过近距离通信方式接收信息,当接收到至少一个物品标识,并确定用户使用的物品相对应的物品标识时,可以触发获取物品认证结果。
所述近距离通信可以是蓝牙通信、NFC(Near Field Communication)通信、ZigBee通信、WiFi通信、UWB(Ultra Wideband)通信、红外通信、声波通信等等。
在一个例子中,所述近距离通信为蓝牙通信,对应地,本实施例中提供的物品使用控制方法具体还包括:当通过监听蓝牙广播接收到至少一个物品标识时,获取与所述物品标识对应的物品的蓝牙通信状态,将符合预定通信条件的物品确定为用户使用的物品以确定相对应的物品标识。
具体地,获取与所述物品标识对应的物品的蓝牙通信状态,可以是检测所述用户设备与所述物品进行蓝牙交互的状态,还可以包括用户设备接收与该物品对应的蓝牙广播的状态。
应当理解的是,本实施例中并不限制用户设备与物品进行蓝牙交互的方式,例如,用户设备可以基于蓝牙通信协议,通过物品的蓝牙广播获取物品对应的蓝牙通信地址,与物品建立蓝牙长连接进行交互通信、或者不建立长连接每次基于所述蓝牙通信地址直接交互通信等等。
根据获取与所述物品标识对应的物品的蓝牙通信状态,将符合预定通信条件的物品确定为用户使用的物品以确定相对应的物品标识。例如,可以将已与用户设备建立蓝牙长连接或者与用户设备蓝牙交互多次的物品,确定为用户使用的物品以确定相对应的物品标识,或者,可以将持续接收 到的蓝牙广播对应的物品,确定为用户使用的物品以确定相对应的物品标识等等。
但在具体应用中,用户设备可能监听到多个蓝牙广播信号而接收到多个物品标识,无法确定用户实际使用的是哪个物品标识对应的物品。因此,在一个例子中,所述预定通信条件为,在预定时间内持续接收所述物品标识对应的蓝牙广播并且对应的蓝牙交互到达预定次数。
当用户设备持续接收所述物品标识对应的蓝牙广播并且对应的蓝牙交互到达预定次数,表明所述物品标识对应的物品与该用户设备对应的用户的距离最近并且在预定时间内保持该距离,该物品即为用户使用的物品,因此,可以相对应地确定物品标识。
在一个例子中,本实施例中提供的物品使用控制方法,触发获取物品认证的步骤具体如图5所示的步骤S5201:
步骤S5201,在确定用户使用的物品相对应的物品标识后,将所述用户标识以近距离通信方式发送给所述物品标识对应的物品,以触发获取物品认证结果。
具体地,将所述用户标识以近距离通信方式发送给所述物品标识对应的物品,可以触发所述物品根据用户标识以及用户标识生成物品认证请求以发送至服务器触发获取物品认证结果,具体如第二实施例中所述,在此不再赘述。
在另一个例子中,本实施例中提供的物品使用控制方法,触发获取物品认证的步骤具体如图6所示的步骤S5202、S5203:
步骤S5202,在确定用户使用的物品相对应的物品标识后或者以近距离通信方式接收到所述用户使用的物品的指示后,生成包含所述物品标识以及所述用户标识的物品使用认证请求;
步骤S5203,向服务器发送所述物品使用认证请求,以触发服务器根据所述物品使用认证请求包括的所述用户标识和所述物品标识,认证该用户对该物品是否具有使用权限并返回对应的物品使用认证结果。
具体地,以近距离通信方式接收到的所述用户使用的物品的指示,通常是在该物品在启动计时器进行倒计时,倒计时结束前未获取物品使用认 证结果或者认证失败后,重新启动计时器,并触发再次执行物品使用认证时,会以近距离通信的方式发送指示触发用户设备重新生成物品使用认证请求发送给服务器,以触发服务器重新执行物品使用认证。
而根据所述用户标识和所述物品标识认证该用户对该物品是否具有使用权限并返回对应的物品使用认证结果的具体方式已经在第一实施例、第二实施例中描述,在此不再赘述。
在本实施例中,所述物品使用认证结果可以返回至物品处,也可以返回至用户设备处。应当理解的是,当所述物品使用认证结果返回至用户设备处时,可以通过例如近距离通信方式将所述物品使用认证结果提供给物品,以使得物品根据对应的物品使用认证结果进行处理。
<用户设备>
在本实施例中,还提供一种用户设备,包括:
通信装置,用于实施近距离通信;
存储器,用于存储指令;
处理器,用于受控于所述存储器存储的指令进行操作,以执行本实施例中任一项所述的物品使用控制方法。
具体地,所述用户设备可以是智能终端或者可穿戴智能设备,该智能终端可以是手机、掌上电脑、平板电脑等,该可穿戴智能设备可以是智能手表、智能手环或者智能首饰等。
在一个例子中,所述用户设备可以如图7所示,可以包括处理器6100、存储器6200、接口装置6300、通信装置6400、显示装置6500、输入装置6600、扬声器6700、麦克风6800等等。
其中,处理器6100可以是中央处理器CPU、微处理器MCU等。存储器6200例如包括ROM(只读存储器)、RAM(随机存取存储器)、诸如硬盘的非易失性存储器等。接口装置6300例如包括USB接口、耳机接口等。通信装置6400至少能实施近距离通信,例如蓝牙通信、NFC通信、UWB通信、WiFi通信、ZigBee通信、红外通信、声波通信中其中至少一种,此外还能能够进行其他有线或无线通信,例如2G/3G/4G/5G通信或局域网通信等。 显示装置6500例如是液晶显示屏、触摸显示屏等。输入装置6600例如可以包括触摸屏、键盘、体感输入等。用户可以通过扬声器6700和麦克风6800输入/输出语音信息。
图6所示的用户设备6000仅仅是说明性的并且决不意味着对本发明、其应用或使用的任何限制。应用于本发明的实施例中,用户设备6000的所述存储器6200用于存储指令,所述指令用于控制所述处理器6100进行操作以执行本发明实施例提供的任意一项方法物品使用控制方法。本领域技术人员应当理解,尽管在图6中对用户设备6000示出了多个装置,但是,本发明可以仅涉及其中的部分装置,例如,用户设备6000涉及处理器6100和存储装置6200以及通信装置6400。技术人员可以根据本发明所公开方案设计指令。指令如何控制处理器进行操作,这是本领域公知,故在此不再详细描述。
本领域技术人员还应当明白,可以通过各种方式来实现用户设备6000。例如,可以通过指令配置处理器来实现用户设备6000。例如,可以将指令存储在ROM中,并且当启动设备时,将指令从ROM读取到可编程器件中来实现物品使用控制设备。例如,可以将物品使用控制设备固化到专用器件(例如ASIC)中。可以将用户设备6000分成相互独立的单元,或者可以将它们合并在一起实现。用户设备6000可以通过上述各种实现方式中的一种来实现,或者可以通过上述各种实现方式中的两种或更多种方式的组合来实现。
以上已经结合附图说明了本实施例,在本实施例中,提供一种物品使用控制方法以及用户设备,通过以近距离通信方式接收物品标识并确定用户使用的物品相对应的物品标识,以触发获取物品认证结果,使得用户可以在执行认证操作前就能使用物品。并且,在用户使用物品过程中,以不令用户感知的方式完成物品使用认证。提升用户体验。
<第四实施例>
<方法>
在本实施例中,提供一种物品使用控制方法,由服务器一侧执行,如 图8所示,包括:
步骤S7100,从用户或者物品处接收物品使用认证请求,所述物品使用认证请求包括物品标识以及使用与所述物品标识相对应的物品的用户所对应的用户标识,
其中,所述物品标识用于唯一标识物品,
所述用户标识用于唯一标识用户。
具体地,所述物品标识可以是唯一标识该物品的物品编号、序列号、字符串、物品代码或其他物品标识信息等等。所述物品获取并提供物品标识的例子在第一实施例中已经描述,在此不再赘述。
所述用户标识可以是用户唯一的用户编号、身份代码、用户特征信息例如面部数据、声纹数据、指纹数据、虹膜数据等等。所述用户标识获取的例子在第一实施例中已经描述,在此不再赘述。
步骤S7200,根据所述用户标识和所述物品标识,认证该用户对该物品是否具有使用权限,并返回对应的物品使用认证结果至用户或者物品处。
具体地,对物品标识以及使用与所述物品标识相对应的物品的用户所对应的用户标识进行认证,认证该用户对该物品是否具有使用权限,例如可以包括认证该用户是否为注册用户、是否已充值、是否欠费、是否付物品押金、是否绑定支付服务等等,并且,还可以在认证时同时检查物品是否满足继续使用条件,例如电量是否还充足、物品状态是否完好等等。
当认证用户不具有该物品的使用权限后,会返回认证失败以使得物品从可用状态转为禁用状态。反之,如果该用户具有该物品的使用权限,会返回认证成功,使得物品的可用状态被保持,用户可以持续使用该物品。
<服务器>
在本实施例中,还提供一种服务器,包括:
存储器,用于存储指令;
处理器,用于受控于所述存储器存储的指令进行操作,以执行本实施例中提供的物品使用控制方法。
具体地,所述服务器可以是例如刀片服务器、计算机或者多台计算机 组成的计算机组,还可以是云服务器。
在一个例子中,所述服务器8000可以如图9所示,包括处理器8100、存储器8200、接口装置8300、通信装置8400、显示装置8500、输入装置8600。尽管服务器也可以包括扬声器、麦克风等等,但是,这些部件与本发明无关,故在此省略。其中,处理器8100例如可以是中央处理器CPU、微处理器MCU等。存储器8200例如包括ROM(只读存储器)、RAM(随机存取存储器)、诸如硬盘的非易失性存储器等。接口装置8300例如包括USB接口、串行接口等。通信装置8400例如能够进行有线或无线通信。显示装置8500例如是液晶显示屏。输入装置8600例如可以包括触摸屏、键盘等。
图8所示的服务器仅仅是说明性的并且决不意味着对本发明、其应用或使用的任何限制。应用于本发明的实施例中,服务器8000的的所述存储器8200用于存储指令,所述指令用于控制所述处理器8100进行操作以执行本发明实施例提供的物品使用控制方法。本领域技术人员应当理解,尽管在图8中对服务器8000的示出了多个装置,但是,本发明可以仅涉及其中的部分装置,例如,服务器8000的只涉及处理器8100和存储装置8200。技术人员可以根据本发明所公开方案设计指令。指令如何控制处理器进行操作,这是本领域公知,故在此不再详细描述。
本领域技术人员还应当明白,可以通过各种方式来实现服务器8000。例如,可以通过指令配置处理器来实现服务器8000。例如,可以将指令存储在ROM中,并且当启动设备时,将指令从ROM读取到可编程器件中来实现物品使用控制设备。例如,可以将物品使用控制设备固化到专用器件(例如ASIC)中。可以将服务器8000分成相互独立的单元,或者可以将它们合并在一起实现。服务器8000可以通过上述各种实现方式中的一种来实现,或者可以通过上述各种实现方式中的两种或更多种方式的组合来实现。
以上已经结合附图说明了本实施例,在本实施例中,提供一种物品使用控制方法以及服务器,通过接收物品处或者用户设备处发送的物品认证请求,根据物品认证请求中包含的用户标识和物品标识,对用户标识对应的用户认证是否具有使用对应物品标识的物品的使用权限,以返回物品认 证结果,使得用户可以在执行认证操作前就能使用物品。并且,在用户使用物品过程中,以不令用户感知的方式完成物品使用认证。提升用户体验。
<第五实施例>
在本实施例中,提供一种物品使用控制***,包括第二实施例中提供的物品、第三实施例中提供的用户设备以及第四实施例中提供的服务器,以实施本发明中提供的任意一项物品使用控制方法,如图10所示,在此不再赘述。
如图10所示,物品使用控制***9000包括如图4所示的物品4000、如图7所示的用户设备6000以及如图9所示的服务器8000。
所述物品4000与用户设备6000以近距离通信方式通信,所述物品4000与所述服务器8000、所述用户设备6000与所述服务器8000分别通过网络9100通信,所述网络9100可以是无线或有线通信网络。
本领域技术人员公知的是,随着诸如大规模集成电路技术的电子信息技术的发展和软件硬件化的趋势,要明确划分计算机***软、硬件界限已经显得比较困难了。因为,任何操作可以软件来实现,也可以由硬件来实现。任何指令的执行可以由硬件完成,同样也可以由软件来完成。对于某一机器功能采用硬件实现方案还是软件实现方案,取决于价格、速度、可靠性、存储容量、变更周期等非技术性因素。因此,对于电子信息技术领域的普通技术人员来说,更为直接和清楚地描述一个技术方案的方式是描述该方案中的各个操作。在知道所要执行的操作的情况下,本领域技术人员可以基于对所述非技术性因素的考虑直接设计出期望的产品。
本发明可以是***、方法和/或计算机程序产品。计算机程序产品可以包括计算机可读存储介质,其上载有用于使处理器实现本发明的各个方面的计算机可读程序指令。
计算机可读存储介质可以是可以保持和存储由指令执行设备使用的指令的有形设备。计算机可读存储介质例如可以是――但不限于――电存储设备、磁存储设备、光存储设备、电磁存储设备、半导体存储设备或者 上述的任意合适的组合。计算机可读存储介质的更具体的例子(非穷举的列表)包括:便携式计算机盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、静态随机存取存储器(SRAM)、便携式压缩盘只读存储器(CD-ROM)、数字多功能盘(DVD)、记忆棒、软盘、机械编码设备、例如其上存储有指令的打孔卡或凹槽内凸起结构、以及上述的任意合适的组合。这里所使用的计算机可读存储介质不被解释为瞬时信号本身,诸如无线电波或者其他自由传播的电磁波、通过波导或其他传输媒介传播的电磁波(例如,通过光纤电缆的光脉冲)、或者通过电线传输的电信号。
这里所描述的计算机可读程序指令可以从计算机可读存储介质下载到各个计算/处理设备,或者通过网络、例如因特网、局域网、广域网和/或无线网下载到外部计算机或外部存储设备。网络可以包括铜传输电缆、光纤传输、无线传输、路由器、防火墙、交换机、网关计算机和/或边缘服务器。每个计算/处理设备中的网络适配卡或者网络接口从网络接收计算机可读程序指令,并转发该计算机可读程序指令,以供存储在各个计算/处理设备中的计算机可读存储介质中。
用于执行本发明操作的计算机程序指令可以是汇编指令、指令集架构(ISA)指令、机器指令、机器相关指令、微代码、固件指令、状态设置数据、或者以一种或多种编程语言的任意组合编写的源代码或目标代码,所述编程语言包括面向对象的编程语言—诸如Smalltalk、C++等,以及常规的过程式编程语言—诸如“C”语言或类似的编程语言。计算机可读程序指令可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络—包括局域网(LAN)或广域网(WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。在一些实施例中,通过利用计算机可读程序指令的状态信息来个性化定制电子电路,例如可编程逻辑电路、现场可编程门阵列(FPGA)或可编程逻辑阵列(PLA),该电子电路可以执行计算机可读 程序指令,从而实现本发明的各个方面。
这里参照根据本发明实施例的方法、装置(***)和计算机程序产品的流程图和/或框图描述了本发明的各个方面。应当理解,流程图和/或框图的每个方框以及流程图和/或框图中各方框的组合,都可以由计算机可读程序指令实现。
这些计算机可读程序指令可以提供给通用计算机、专用计算机或其它可编程数据处理装置的处理器,从而生产出一种机器,使得这些指令在通过计算机或其它可编程数据处理装置的处理器执行时,产生了实现流程图和/或框图中的一个或多个方框中规定的功能/动作的装置。也可以把这些计算机可读程序指令存储在计算机可读存储介质中,这些指令使得计算机、可编程数据处理装置和/或其他设备以特定方式工作,从而,存储有指令的计算机可读介质则包括一个制造品,其包括实现流程图和/或框图中的一个或多个方框中规定的功能/动作的各个方面的指令。
也可以把计算机可读程序指令加载到计算机、其它可编程数据处理装置、或其它设备上,使得在计算机、其它可编程数据处理装置或其它设备上执行一系列操作步骤,以产生计算机实现的过程,从而使得在计算机、其它可编程数据处理装置、或其它设备上执行的指令实现流程图和/或框图中的一个或多个方框中规定的功能/动作。
附图中的流程图和框图显示了根据本发明的多个实施例的***、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段或指令的一部分,所述模块、程序段或指令的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或动作的专用的基于硬件的***来实现,或者可以用专用硬件与计算机指令的组合来实现。对于本领域技术人员来说公知的是,通过硬件方式实现、通过软件方式实现以及通过软件 和硬件结合的方式实现都是等价的。
以上已经描述了本发明的各实施例,上述说明是示例性的,并非穷尽性的,并且也不限于所披露的各实施例。在不偏离所说明的各实施例的范围和精神的情况下,对于本技术领域的普通技术人员来说许多修改和变更都是显而易见的。本文中所用术语的选择,旨在最好地解释各实施例的原理、实际应用或对市场中的技术改进,或者使本技术领域的其它普通技术人员能理解本文披露的各实施例。本发明的范围由所附权利要求来限定。

Claims (24)

  1. 一种物品使用控制方法,其特征在于,包括:
    提供处于可用状态的物品,所述物品具有唯一的物品标识;
    在所述物品发生表示物品被用户使用的事件时,启动计时器进行倒计时;
    以近距离通信方式提供所述物品标识,并确定使用与所述物品标识相对应的物品的用户所对应的用户标识,以触发获取物品使用认证结果,
    其中,所述物品使用认证结果是基于所述物品标识和所述用户标识进行物品使用认证得到,所述用户标识用于唯一标识用户;
    当在倒计时结束前未获取所述物品使用认证结果或认证失败时,使得所述物品从可用状态转为禁用状态。
  2. 根据权利要求1所述的方法,其特征在于,
    所述近距离通信方式为蓝牙通信;
    所述以近距离通信方式提供所述物品标识的步骤包括:
    蓝牙广播发送所述物品标识;
    所述确定使用与所述物品标识相对应的物品的用户所对应的用户标识的步骤包括:
    监听蓝牙广播接收所述物品标识;
    获取接收所述物品标识的用户设备的蓝牙通信状态,将符合预定通信条件的用户设备对应的用户标识,确定为使用所述物品的用户所对应的用户标识。
  3. 根据权利要求1或2所述的方法,其特征在于:
    所述预定通信条件为,在预定时间内持续接收所述物品标识对应的蓝牙广播并且对应的蓝牙交互到达预定次数。
  4. 根据权利要求1-3任意一项所述的方法,其特征在于,所述获取 物品使用认证结果的步骤包括:
    发送物品使用认证请求,所述物品认证请求中包含所述物品标识以及所述用户标识;
    接收所述物品使用认证请求,根据所述物品使用认证请求包括的所述用户标识和所述物品标识,认证该用户对该物品是否具有使用权限以得到物品使用认证结果并发送。
  5. 根据权利要求1-4任意一项所述的方法,其特征在于,
    所述表示物品被用户使用的事件包括所述物品发生震动、所述物品的一部分承受的压力发生变化、所述物品的温度发生变化以及所述物品发出被使用的信号的全部或者其中之一或者及其组合。
  6. 根据权利要求1-5任意一项所述的方法,其特征在于,还包括:
    每次倒计时结束前未获取所述物品使用认证结果或认证失败时,重新启动计时器进行倒计时,并触发重新获取物品使用认证结果,直到启动计时器的次数达到预定阈值并且最后一次倒计时结束前仍未获取所述物品使用认证结果或仍认证失败时,使得所述物品从可用状态转为禁用状态。
  7. 一种物品使用控制方法,其特征在于,由物品一侧执行,包括:
    设置物品处于可用状态,所述物品具有唯一的物品标识;
    检测到所述物品发生表示被用户使用的事件时,启动计时器倒计时进行倒计时;
    以近距离通信方式向用户设备提供所述物品标识,以触发获取物品使用认证结果,
    其中,所述物品使用认证结果是基于所述物品标识和使用与物品标识相对应的物品的用户所对应的用户标识进行物品使用认证得到,所述用户标识用于唯一标识用户;
    当在倒计时结束前未获取所述物品使用认证结果或认证失败时,设置所述物品从可用状态转为禁用状态。
  8. 根据权利要求7所述的方法,其特征在于,
    所述近距离通信方式为蓝牙通信;
    通过蓝牙广播发送所述物品标识以提供给用户设备。
  9. 根据权利要求7或8所述的方法,其特征在于,还包括确定使用与所述物品标识相对应的物品的用户相对应的用户标识的步骤:
    广播物品自身蓝牙通信地址,以触发与所述用户设备进行交互通信获取蓝牙通信状态;
    将对应的蓝牙交互到达预定次数的用户设备对应的用户标识,确定为使用所述物品的用户对应的用户标识。
  10. 根据权利要求7-9任意一项所述的方法,其特征在于,还包括:
    在获取使用所述物品的用户相对应的用户标识后,生成包含所述物品标识以及所述用户标识的物品使用认证请求;
    向服务器发送所述物品使用认证请求,以触发服务器根据所述物品使用认证请求包括的所述用户标识和所述物品标识,认证该用户对该物品是否具有使用权限并返回对应的物品使用认证结果。
  11. 根据权利要求7-10任意一项所述的方法,其特征在于,
    所述表示物品被用户使用的事件包括所述物品发生震动、所述物品的一部分承受的压力发生变化、所述物品的温度发生变化以及所述物品发出被使用的信号的全部或者其中之一或者及其组合。
  12. 根据权利要求7所述的方法,其特征在于,还包括:
    每次倒计时结束前未获取所述物品使用认证结果或认证失败时,重新启动计时器进行倒计时,并触发重新获取物品使用认证结果,直到启动计时器的次数达到预定阈值并且最后一次倒计时结束前仍未获取所述物品使用认证结果或仍认证失败时,使得所述物品从可用状态转为禁用状态。
  13. 一种物品使用控制方法,其特征在于,由用户设备一侧执行,包括:
    在近距离通信功能被开启的情况下,当通过近距离通信方式接收到至少一个物品标识,并确定用户使用的物品相对应的物品标识时,触发获取物品认证结果,
    其中,所述物品标识用于唯一标识物品,所述物品使用认证结果是基于用户使用的物品相对应的所述物品标识和用户标识进行物品使用认证得到,所述用户标识用于唯一标识用户。
  14. 根据权利要求13所述的方法,其特征在于,
    所述近距离通信为蓝牙通信;
    当通过监听蓝牙广播接收到至少一个物品标识时,获取与所述物品标识对应的物品的蓝牙通信状态,将符合预定通信条件的物品确定为用户使用的物品以确定相对应的物品标识。
  15. 根据权利要求13或14所述的方法,其特征在于,
    所述预定通信条件为,在预定时间内持续接收所述物品标识对应的蓝牙广播并且对应的蓝牙交互到达预定次数。
  16. 根据权利要求13-15任意一项所述的方法,其特征在于,还包括:
    在确定用户使用的物品相对应的物品标识后,将所述用户标识以近距离通信方式发送给所述物品标识对应的物品,以触发获取物品认证结果;
    或者,
    在确定用户使用的物品相对应的物品标识后或者以近距离通信方式接收到所述用户使用的物品的指示后,生成包含所述物品标识以及所述用户标识的物品使用认证请求;
    向服务器发送所述物品使用认证请求,以触发服务器根据所述物品使用认证请求包括的所述用户标识和所述物品标识,认证该用户对该物品是 否具有使用权限并返回对应的物品使用认证结果。
  17. 一种物品使用控制方法,其特征在于,由服务器一侧执行,包括:
    从用户或者物品处接收物品使用认证请求,所述物品使用认证请求包括物品标识以及使用与所述物品标识相对应的物品的用户所对应的用户标识,
    其中,所述物品标识用于唯一标识物品,
    所述用户标识用于唯一标识用户;
    根据所述用户标识和所述物品标识,认证该用户对该物品是否具有使用权限,并返回对应的物品使用认证结果至用户或者物品处。
  18. 一种物品使用控制设备,其特征在于,设置于物品侧,包括:
    通信装置,用于实施近距离通信;
    存储器,用于存储指令;
    处理器,用于受控于所述存储器存储的指令进行操作,以执行如权利要求7-12中任一项所述的物品使用控制方法。
  19. 一种物品,其特征在于,包括:
    如权利要求18所述的物品使用控制设备。
  20. 根据权利要求19所述的物品,其特征在于,
    所述物品为车辆;
    所述物品使用控制设备为车载电子设备。
  21. 一种用户设备,其特征在于,包括:
    通信装置,用于实施近距离通信;
    存储器,用于存储指令;
    处理器,用于受控于所述存储器存储的指令进行操作,以执行如权利要求13-16中任一项所述的物品使用控制方法。
  22. 根据权利要求21所述的用户设备,其特征在于,
    所述用户设备是智能终端或者可穿戴智能设备。
  23. 一种服务器,其特征在于,包括:
    存储器,用于存储指令;
    处理器,用于受控于所述存储器存储的指令进行操作,以执行如权利要求17所述的物品使用控制方法。
  24. 一种物品使用控制***,其特征在于,包括:
    如权利要求19或20所述的物品;
    如权利要求21或22所述的用户设备;
    以及如权利要求23所述的服务器。
PCT/CN2017/093680 2017-05-05 2017-07-20 物品使用控制方法、设备、***及物品 WO2018201623A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710313848.3 2017-05-05
CN201710313848.3A CN107295062B (zh) 2017-05-05 2017-05-05 物品使用控制方法、设备、***及物品

Publications (1)

Publication Number Publication Date
WO2018201623A1 true WO2018201623A1 (zh) 2018-11-08

Family

ID=60094542

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/093680 WO2018201623A1 (zh) 2017-05-05 2017-07-20 物品使用控制方法、设备、***及物品

Country Status (4)

Country Link
US (1) US20180319369A1 (zh)
EP (1) EP3399494A1 (zh)
CN (1) CN107295062B (zh)
WO (1) WO2018201623A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107293058B (zh) * 2017-05-05 2018-03-06 北京摩拜科技有限公司 车辆管理方法、***、服务器及车辆
CN108090798B (zh) * 2017-11-20 2023-01-31 创新先进技术有限公司 物品使用控制方法、服务器、物品、设备及***
CN108460660A (zh) * 2018-03-08 2018-08-28 董神武 物品限时使用控制方法、物品、用户设备、服务器及***

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102542499A (zh) * 2012-01-13 2012-07-04 徐何燎 一种租还公共自行车控制方法
CN103559641A (zh) * 2013-11-08 2014-02-05 常州永安公共自行车***股份有限公司 基于智能终端的电动汽车自助租赁***及其租赁方法
CN104992364A (zh) * 2015-07-28 2015-10-21 行之有道汽车服务股份有限公司 一种无人值守电动汽车租赁***和租赁方法
CN105635174A (zh) * 2016-02-03 2016-06-01 武汉天梯极客网络科技有限公司 一种智能设备分享方法
CN106251431A (zh) * 2016-06-14 2016-12-21 王东升 共享自行车云平台热点解锁方法
KR101711159B1 (ko) * 2012-12-13 2017-02-28 한국전자통신연구원 차량 운행 정보를 기반으로 하는 렌터카 관리 시스템 및 그 방법

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1635508A1 (en) * 2004-09-08 2006-03-15 Koninklijke Philips Electronics N.V. Secure pairing for wireless communications devices
CN101339683A (zh) * 2008-05-08 2009-01-07 苏州经贸职业技术学院 基于数据共享中心的寄包柜控制方法及***
CN102404118A (zh) * 2011-10-19 2012-04-04 陈坚 一种基于近距离通信终端的物品认证方法
US9544075B2 (en) * 2012-02-22 2017-01-10 Qualcomm Incorporated Platform for wireless identity transmitter and system using short range wireless broadcast
WO2014143769A1 (en) * 2013-03-15 2014-09-18 Entrust, Inc. Method and apparatus for remote portable wireless device authentication
TWI588782B (zh) * 2014-11-28 2017-06-21 財團法人工業技術研究院 保全方法、保全閘與伺服器
CN106600391B (zh) * 2017-02-21 2023-08-04 上海量明科技发展有限公司 制约用户违规使用的共享车辆及使用方法、客户端及***

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102542499A (zh) * 2012-01-13 2012-07-04 徐何燎 一种租还公共自行车控制方法
KR101711159B1 (ko) * 2012-12-13 2017-02-28 한국전자통신연구원 차량 운행 정보를 기반으로 하는 렌터카 관리 시스템 및 그 방법
CN103559641A (zh) * 2013-11-08 2014-02-05 常州永安公共自行车***股份有限公司 基于智能终端的电动汽车自助租赁***及其租赁方法
CN104992364A (zh) * 2015-07-28 2015-10-21 行之有道汽车服务股份有限公司 一种无人值守电动汽车租赁***和租赁方法
CN105635174A (zh) * 2016-02-03 2016-06-01 武汉天梯极客网络科技有限公司 一种智能设备分享方法
CN106251431A (zh) * 2016-06-14 2016-12-21 王东升 共享自行车云平台热点解锁方法

Also Published As

Publication number Publication date
US20180319369A1 (en) 2018-11-08
CN107295062A (zh) 2017-10-24
CN107295062B (zh) 2018-06-19
EP3399494A1 (en) 2018-11-07

Similar Documents

Publication Publication Date Title
WO2018201624A1 (zh) 物品使用控制方法、设备、***、物品及服务器
US11652821B2 (en) One step security system in a network storage system
US11417159B2 (en) Methods and systems for controlling a smart lock
US10320912B2 (en) Communication method for a plurality of vehicles, vehicle and server
CN107111948B (zh) 用于安全性和包裹交换效率的地理接近度交通工具提醒和访问***
US20180297557A1 (en) Vehicle control method, device and system and vehicle
JP6017737B1 (ja) 低電力近距離無線通信認証
WO2018201623A1 (zh) 物品使用控制方法、设备、***及物品
KR20170101972A (ko) 시스템 동글 동작
CN105205955A (zh) 一种发出提示信号的方法和装置
CN103856630A (zh) 用于控制蓝牙低能耗装置的移动终端和方法
CN106664301B (zh) 移动设备及其控制方法
WO2019041968A1 (zh) 共享车辆的调度方法、设备和服务器
KR102135357B1 (ko) 클라우드 서비스 연동 장치 및 방법
CN104766005A (zh) 应用软件访问权限的管理方法和装置
US20160065722A1 (en) Systems and Methods for Managing Operating Modes of an Electronic Device
US10097019B2 (en) Alternate alarm notifications based on battery condition
KR102661645B1 (ko) 전자 장치 및 그의 제어 방법
US10981542B2 (en) Vehicle theft prevention based on fueling pattern
CN105279897A (zh) 车辆报警方法及装置
CN107278289B (zh) 基于***能力的用户体验的动态调节
US11089636B2 (en) Vehicle-based wireless hotspot management
US10567512B2 (en) Systems and methods to aggregate vehicle data from infotainment application accessories
US20190158629A1 (en) Systems and methods to aggregate vehicle data from infotainment application accessories
US20130096768A1 (en) Method and Apparatus for Do Not Disturb Message Delivery

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17908580

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17908580

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 14/08/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17908580

Country of ref document: EP

Kind code of ref document: A1