WO2018201623A1 - 物品使用控制方法、设备、***及物品 - Google Patents
物品使用控制方法、设备、***及物品 Download PDFInfo
- Publication number
- WO2018201623A1 WO2018201623A1 PCT/CN2017/093680 CN2017093680W WO2018201623A1 WO 2018201623 A1 WO2018201623 A1 WO 2018201623A1 CN 2017093680 W CN2017093680 W CN 2017093680W WO 2018201623 A1 WO2018201623 A1 WO 2018201623A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- item
- user
- identifier
- communication
- authentication result
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0645—Rental transactions; Leasing transactions
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/0042—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for hiring of objects
- G07F17/0057—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for hiring of objects for the hiring or rent of vehicles, e.g. cars, bicycles or wheelchairs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/10—Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/10—Communication protocols, communication systems of vehicle anti-theft devices
- B60R2325/101—Bluetooth
Definitions
- the present invention relates to the field of article management technology, and more particularly to an article use control method, device, system and article.
- the item sharing service that temporarily transfers the right to use the item to the user has emerged through the Internet technology, and the idle item can be integrated and provided to the user in a time-sharing or segmented mode. Allow users to use items without paying higher costs, effectively use the resources of the items, avoid waste of goods, and provide green and environmentally friendly items. For example, shared bicycles, shared cars, and shared charging treasures that have emerged in recent years belong to such items. service.
- the unused item is usually set to the disabled state, and after the user performs the authentication operation and passes the authentication, the item is disabled to the available state for use by the user, which affects the user experience.
- a bicycle that provides shared use is usually locked, and a user needs to operate an application corresponding to providing a bicycle sharing service, and input the bicycle's logo through scanning code, manual input, etc., and then use the authentication to unlock.
- the bicycle even needs to obtain a password to manually input and unlock the bicycle.
- the process of using the authentication requires a lot of operations, which is very cumbersome. Especially when the user needs to use the bicycle in an emergency such as commuting, rushing to appointment, etc., it is necessary to use the certification to unlock the bicycle, which will delay more time, greatly hinder the smooth use of the user and affect the user experience.
- an item usage control method comprising:
- the item use authentication result is obtained by performing item use authentication based on the item identifier and the user identifier, and the user identifier is used to uniquely identify the user;
- the item When the item usage authentication result or authentication failure is not acquired before the end of the countdown, the item is caused to transition from the available state to the disabled state.
- the short-range communication mode is Bluetooth communication
- the step of providing the item identification in a short-range communication manner includes:
- the step of determining the user identifier corresponding to the user who uses the item corresponding to the item identifier includes:
- the predetermined communication condition is that the Bluetooth broadcast corresponding to the item identifier is continuously received within a predetermined time and the corresponding Bluetooth interaction reaches a predetermined number of times.
- the step of obtaining an item using the authentication result includes:
- Receiving the item use authentication request authenticating whether the user has the use right for the item according to the user identifier and the item identifier included in the item use authentication request, and obtaining the item use authentication result and transmitting.
- the event indicating that the item is used by the user includes vibration of the item, a change in pressure experienced by a portion of the item, a change in temperature of the item, and a signal that the item is used to be used or One or a combination thereof.
- the timer is restarted to count down, and the re-acquisition item is used to use the authentication result until the number of times the timer is started reaches a predetermined threshold and the last time If the item usage authentication result is not obtained before the end of the countdown or if the authentication still fails, the item is changed from the available state to the disabled state.
- an article use control method which is executed by one side of an article, comprising:
- the item use authentication result is obtained by performing item use authentication based on the item identifier and a user identifier corresponding to the user of the item corresponding to the item identifier, where the user identifier is used to uniquely identify the user;
- the item When the item use authentication result or the authentication failure is not obtained before the end of the countdown, the item is set to be changed from the available state to the disabled state.
- the short-range communication mode is Bluetooth communication
- the item identification is sent via Bluetooth broadcast to be provided to the user equipment.
- the method further includes the step of determining a user identification corresponding to a user of the item corresponding to the item identification:
- the user identifier corresponding to the user equipment that reaches the predetermined number of Bluetooth interactions is determined as the user identifier corresponding to the user who uses the item.
- the method further includes:
- the user identifier and the item identifier included in the authentication request are used to authenticate whether the user has the right to use the item and return the corresponding item using the authentication result.
- the event indicating that the item is used by the user includes vibration of the item, a change in pressure experienced by a portion of the item, a change in temperature of the item, and a signal that the item is used to be used or One or a combination thereof.
- the method further includes: restarting the timer to count down when the item fails to obtain the authentication result or the authentication failure before the end of the countdown, and triggering the reacquisition of the item to use the authentication result until the timer is started.
- the item is changed from the available state to the disabled state when the predetermined use threshold is reached and the item usage authentication result is still not obtained or the authentication still fails before the end of the last countdown.
- an item usage control method is provided, which is executed by a user equipment side, and includes:
- the short-range communication function is turned on, when at least one item identification is received by the short-range communication method, and the item identification corresponding to the item used by the user is determined, the acquisition of the item authentication result is triggered.
- the item identifier is used to uniquely identify the item, and the item use authentication result is obtained by performing item use authentication based on the item identifier and the user identifier corresponding to the item used by the user, and the user identifier is used to uniquely identify the user.
- the short-range communication is Bluetooth communication
- the Bluetooth communication status of the item corresponding to the item identification is acquired, and the item meeting the predetermined communication condition is determined as the item used by the user to determine the corresponding item identification.
- the predetermined communication condition is that the Bluetooth broadcast corresponding to the item identifier is continuously received within a predetermined time and the corresponding Bluetooth interaction reaches a predetermined number of times.
- the method further includes:
- a method for controlling the use of an item which is executed by a server side, includes:
- the item use authentication request including an item identification and a user identification corresponding to a user using the item corresponding to the item identification
- the item identification is used to uniquely identify the item
- the user identifier is used to uniquely identify a user
- an article use control device disposed on an article side, comprising:
- a communication device for implementing short-range communication
- a memory for storing instructions
- a processor for operating in accordance with instructions stored in the memory to perform the item usage control method of any of the second aspects of the present invention.
- an article comprising:
- An article use control device provided by the fifth aspect of the invention.
- the item is a vehicle
- the item use control device is an in-vehicle electronic device.
- a user equipment including:
- a communication device for implementing short-range communication
- a memory for storing instructions
- a processor for operating in accordance with instructions stored in the memory to perform the item usage control method of any of the third aspects of the present invention.
- the user equipment is a smart terminal or a wearable smart device.
- a user equipment including:
- a memory for storing instructions
- a processor for operating in accordance with instructions stored in the memory to perform the item usage control method provided by the fourth aspect of the present invention.
- an item use control system comprising:
- the inventors of the present invention have found that in the prior art, there has not been an item usage control technology scheme that allows a user to use an item before performing an authentication operation. Therefore, the technical task to be achieved by the present invention or the technical problem to be solved is not thought of or expected by those skilled in the art, so the present invention is a new technical solution.
- Fig. 1 is a flow chart showing an article use control method in the first embodiment of the present invention.
- Fig. 2 is a flow chart showing an article use control method in the second embodiment of the present invention.
- Fig. 3 is a schematic view showing an article use control device in a second embodiment of the present invention.
- Fig. 4 shows a schematic view of an article in a second embodiment of the invention.
- Fig. 5 is a flow chart showing an article use control method in the third embodiment of the present invention.
- Fig. 6 is a flow chart showing the article use control method in the third embodiment of the present invention.
- Fig. 7 is a schematic diagram showing a user equipment in a third embodiment of the present invention.
- Fig. 8 is a flow chart showing the article use control method in the fourth embodiment of the present invention.
- Fig. 9 is a schematic diagram showing a server in a fourth embodiment of the present invention.
- Fig. 10 is a schematic view showing an article use control system in a fifth embodiment of the present invention.
- FIG. 9 A schematic diagram of an item usage control system 9000 in which embodiments of the present invention may be implemented is shown in FIG.
- the item usage control system 9000 includes an item 4000, a user device 6000, and a server 8000.
- the item 4000 communicates with the user equipment 6000 in a short-range communication manner, and the item 4000 and the server 8000, the user equipment 6000 and the server 8000 communicate via the network 9100, respectively, and the network 9100 may be a wireless or wired communication network.
- the item 4000 includes at least an item use control device 3000.
- the item use control device may be as shown in FIG. 3, and may include a processor 3100, a memory 3200, an interface device 3300, a communication device 3400, a display device 3500, an input device 3600, a speaker 3700, a microphone 3800, and the like.
- the processor 3100 may be a central processing unit CPU, a microprocessor MCU, or the like.
- the memory 3200 includes, for example, a ROM (Read Only Memory), a RAM (Random Access Memory), such as a hard disk. Non-volatile memory, etc.
- the interface device 3300 includes, for example, a USB interface, a headphone jack, and the like.
- the communication device 3400 can at least perform short-range communication, such as at least one of Bluetooth communication, NFC communication, UWB communication, WiFi communication, ZigBee communication, infrared communication, and acoustic communication, and can also perform other wired or wireless communication, such as 2G. /3G/4G/5G communication or LAN communication.
- the display device 3500 is, for example, a liquid crystal display, a touch display, or the like.
- Input device 3600 can include, for example, a touch screen, a keyboard, a somatosensory input, and the like. The user can input/output voice information through the speaker 3700 and the microphone 3800.
- the article usage control device 3000 illustrated in Figure 3 is merely illustrative and is in no way meant to be limiting of the invention, its application or use.
- the memory 3200 of the item use control device 3000 is used to store instructions for controlling the processor 3100 to operate to perform any of the method items provided by the embodiments of the present invention. Use the control method.
- the present invention may relate only to some of the devices therein, for example, the article use control device 3000 relates to the processor 3100 and storage.
- Device 3200 and communication device 3400 A technician can design instructions in accordance with the disclosed aspects of the present invention. How the instructions control the processor for operation is well known in the art and will not be described in detail herein.
- the item may be the vehicle 4100 as shown in FIG. 4, and the item use control device may be the in-vehicle electronic device 3100.
- the vehicle shown in FIG. 4 is merely illustrative and does not limit the vehicle 4100 to be a bicycle, but may also be a moped, an electric bicycle, or an electric car, a car, or the like.
- the location of the in-vehicle electronic device 3100 at the location of the vehicle 4100 is also merely illustrative and does not limit the placement of the in-vehicle electronic device 3100.
- the user equipment 6000 can be a smart terminal or a wearable smart device, and the smart terminal can be a mobile phone, a palmtop computer, a tablet computer, etc., and the wearable smart device can be a smart watch, a smart bracelet or a smart jewelry.
- user device 6000 can include processor 6100, memory 6200, interface device 6300, communication device 6400, display device 6500, input device 6600, speaker 6700, microphone 6800, and the like, as shown in FIG.
- the processor 6100 may be a central processing unit CPU, a microprocessor MCU, or the like.
- the memory 6200 includes, for example, a ROM (Read Only Memory), a RAM (Random Access Memory), such as a hard disk. Non-volatile memory, etc.
- the interface device 6300 includes, for example, a USB interface, a headphone jack, and the like.
- the communication device 6400 can at least perform short-range communication, such as at least one of Bluetooth communication, NFC communication, UWB communication, WiFi communication, ZigBee communication, infrared communication, and acoustic communication, and can also perform other wired or wireless communication, such as 2G. /3G/4G/5G communication or LAN communication.
- the display device 6500 is, for example, a liquid crystal display, a touch display, or the like.
- Input device 6600 can include, for example, a touch screen, a keyboard, a somatosensory input, and the like. The user can input/output voice information through the speaker 6700 and the microphone 6800.
- the user device 6000 shown in Figure 6 is merely illustrative and in no way is meant to limit the invention, its application or use.
- the memory 6200 of the user equipment 6000 is configured to store instructions for controlling the processor 6100 to perform operations for performing item usage control according to any of the methods provided by the embodiments of the present invention. method. It will be understood by those skilled in the art that although a plurality of devices are shown for user device 6000 in FIG. 6, the present invention may only relate to some of the devices, for example, user device 6000 relates to processor 6100 and storage device 6200 and communication. Device 6400. A technician can design instructions in accordance with the disclosed aspects of the present invention. How the instructions control the processor for operation is well known in the art and will not be described in detail herein.
- the server 8000 may be a computer group such as a blade server, a computer, or a plurality of computers, or may be a cloud server.
- the server 8000 can include a processor 8100, a memory 8200, an interface device 8300, a communication device 8400, a display device 8500, and an input device 8600, as shown in FIG.
- the processor 8100 can be, for example, a central processing unit CPU, a microprocessor MCU, or the like.
- the memory 8200 includes, for example, a ROM (Read Only Memory), a RAM (Random Access Memory), a nonvolatile memory such as a hard disk, and the like.
- the interface device 8300 includes, for example, a USB interface, a serial interface, and the like.
- the communication device 8400 is capable of, for example, wired or wireless communication.
- the display device 8500 is, for example, a liquid crystal display.
- Input device 8600 can include, for example, a touch screen, a keyboard, and the like.
- the server shown in Figure 8 is merely illustrative and is in no way meant to limit the invention, its application or use.
- the storage of the server 8000 The device 8200 is configured to store instructions for controlling the processor 8100 to operate to perform an item usage control method provided by an embodiment of the present invention.
- the present invention may relate only to some of the devices therein, for example, server 8000 only relates to processor 8100 and storage device 8200.
- a technician can design instructions in accordance with the disclosed aspects of the present invention. How the instructions control the processor for operation is well known in the art and will not be described in detail herein.
- the overall concept of the embodiment is to provide a technical solution for the use control of an item.
- the user who uses the item is triggered to use the item when the item is actually used, and is not acquired.
- the item is switched from the available state to the disabled state, so that the user can use the item before performing the authentication operation.
- the item use authentication is completed in a manner that is not perceivable by the user. Improve the user experience.
- the item usage control method provided in this embodiment is as shown in FIG. 1 and includes:
- Step S1100 providing an item in an available state, the item having a unique item identification.
- the item is any item that can be used to transfer the usage right to the user for use by the user.
- the item may be a bicycle, an electric vehicle, a moped, a vehicle, or the like, or a charging device, etc. .
- the item has a unique item identification, which may be an item number, serial number, string, item code or other item identification information that uniquely identifies the item, and the like.
- a short-range communication device, a storage area, and a control unit may be disposed in the item, and a corresponding item identifier is stored in the storage area, and the item identifier may be read from the storage area under the control of the control unit,
- the short-range communication method transmits the item identifier, so that the user equipment can acquire the item identifier, for example, broadcasting the item identifier through Bluetooth so that the user equipment can receive by monitoring, or can set NFC (Near) carrying the item identifier on the item.
- the Field Communication tag enables the user equipment to read the item identification and the like when the distance from the NFC tag is within the communication range.
- Providing an item in a usable state in particular, providing an item that the user can use directly,
- a vehicle that has been unlocked or unlocked and can be directly driven or driven by a user such as a bicycle, an electric bicycle, a moped or a car, or the like, or a charging device that can be charged by the user directly using the output electric power, or the like is provided.
- Step S1200 when an event indicating that the item is used by the user occurs, the timer is started to count down.
- the event indicating that the item is used by the user includes all or a signal that the item vibrates, a pressure experienced by a portion of the item changes, a temperature of the item changes, and the item is used to be used.
- the event indicating that the item is used by the user includes all or a signal that the item vibrates, a pressure experienced by a portion of the item changes, a temperature of the item changes, and the item is used to be used.
- the vibration may occur by itself, or the pressure sensed by the bicycle seat may change, the bicycle seat senses the temperature of the human body, or the bicycle changes.
- a signal such as a light, a beep, or the like may be emitted, and all or one or a combination of these events may be an event indicating that the vehicle is used by the user.
- the charging device when the item is a charging device, when the user actually uses the charging device, the charging device may change in temperature due to the output power, or the charging device may emit a signal such as a charging interface output power or a warning light that is in an active state.
- the signal indicating that the charging device is used, all or one or a combination of these events may be an event indicating that the charging device is used by the user.
- the above-mentioned event indicating that the item is used by the user may also correspond to the used event of the different item, and may be specifically defined according to the item used by the actual user, and will not be enumerated here.
- the timer is started to count down. Specifically, the timer may be started at the item to count down, or the item may be notified by the item on the user side of the item to start the timer, or may be started by the item to notify the server that uses the item for authentication. Countdown.
- a timer is started at the item to count down so that when the item appears to be disconnected from the user device corresponding to the user using the item, or is lost with the server for item usage authentication, or the user using the item. If the corresponding user equipment is abnormal and cannot communicate, or the user who uses the item is an abnormal situation such as an illegal user who does not have the right to use the item, and the actual result of the acquisition of the item cannot be actually triggered, the following step S1400 may be used to count down. The result of the authentication is not obtained before the end of the article, so that the item is changed from the available state to the disabled state.
- the duration of the countdown can be set according to engineering experience and experimental simulation.
- Step S1300 providing the item identifier in a short-range communication manner, and determining a user identifier corresponding to the user who uses the item corresponding to the item identifier, to trigger the acquisition of the item use authentication result,
- the item use authentication result is obtained by performing item use authentication based on the item identifier and the user identifier, and the user identifier is used to uniquely identify the user.
- the user identifier is used to uniquely identify the user, and may be a user unique user number, an identity code, user feature information such as face data, voiceprint data, fingerprint data, iris data, and the like.
- the user identifier may be allocated to the user by the server that performs the registration, and is delivered to the corresponding user equipment for storage in the user equipment.
- the user equipment may be controlled by the application providing the item usage service running thereon, acquiring the user identification stored in itself, and acquiring the item corresponding to the item used by the corresponding user in a short-range communication manner.
- the identifier is sent to the server for the generated item use authentication request to obtain the corresponding item use authentication result.
- the short-range communication method may be Bluetooth communication, NFC (Near Field Communication) communication, ZigBee communication, WiFi communication, UWB (Ultra Wideband) communication, infrared communication, sound wave communication, or the like.
- NFC Near Field Communication
- WiFi Wireless Fidelity
- UWB Ultra Wideband
- the step of providing the item identification by the short-distance communication method may be implemented when the item indicates an event indicating that the item is used by the user, or may be provided in an available state for continuous real-time, in a specific application, in order to reduce the near
- the power consumption caused by the distance communication is optional, and is implemented when an event occurs that indicates that the item is used by the user.
- the short-range communication mode is Bluetooth communication
- the providing the item identifier in a short-range communication manner may include:
- the step of determining the user identifier corresponding to the user who uses the item corresponding to the item identifier includes:
- the user identifier corresponding to the user equipment of the condition is determined as the user identifier corresponding to the user who uses the item.
- the status of the Bluetooth communication of the user equipment that receives the identifier of the item may be a state in which the user equipment performs Bluetooth interaction with the item, and may also include a status in which the user equipment receives the Bluetooth broadcast.
- the manner in which the user equipment performs Bluetooth interaction with the item is not limited.
- the user equipment may acquire the Bluetooth communication address corresponding to the item through the Bluetooth broadcast of the item based on the Bluetooth communication protocol, and establish with the item.
- the Bluetooth long connection is for interactive communication, or does not establish a long connection, each time directly communicating based on the Bluetooth communication address, and the like.
- the user identifier corresponding to the user equipment that has established the Bluetooth long connection with the item or interacts with the item Bluetooth multiple times may be determined as the user identifier corresponding to the user who uses the item, or may continuously receive the Bluetooth corresponding to the item identifier.
- the user identifier corresponding to the broadcasted user equipment is determined as the user identifier corresponding to the user who uses the item, and the like.
- the user equipment may monitor multiple Bluetooth broadcast signals and receive multiple item identifiers, and cannot determine which item identifier is actually used by the user.
- the predetermined communication condition is that the Bluetooth broadcast corresponding to the item identification is continuously received for a predetermined time and the corresponding Bluetooth interaction arrives a predetermined number of times.
- the user equipment When the user equipment continues to receive the Bluetooth broadcast corresponding to the item identifier and the corresponding Bluetooth interaction reaches a predetermined number of times, indicating that the item corresponding to the item identifier is closest to the user corresponding to the user equipment and maintains the distance within a predetermined time, The user is the user who uses the item. Therefore, the user identifier corresponding to the user equipment can be determined as the user identifier corresponding to the user who uses the item.
- the predetermined number of times or the predetermined time can be set according to engineering experience or experimental simulation.
- step of using the authentication result by the acquired item triggered in step S1300 may include:
- the item authentication request including the item identifier and The user identifier
- Receiving the item use authentication request authenticating whether the user has the use right for the item according to the user identifier and the item identifier included in the item use authentication request, and obtaining the item use authentication result and transmitting.
- the item use authentication request may be sent by the user equipment or the item side to trigger a server for performing the item use authentication to receive and perform corresponding item use authentication, and authenticate whether the user has the use right to obtain the item.
- the server may send the item use authentication result to the corresponding item or user equipment, and finally cause the item to use the authentication result according to the corresponding item, keep the item in the available state or the setting from the available state to the disabled state.
- the method may include: authenticating whether the user is a registered user, Recharge, whether it is owed, whether to pay the deposit, whether to bind the payment service, etc., and also check whether the item meets the conditions for continued use, such as whether the battery is sufficient, whether the item is in good condition, etc., at the time of certification.
- an authentication failure is returned to cause the item to transition from the available state to the disabled state. Conversely, if the user has the right to use the item, the authentication is returned successfully, so that the available state of the item is maintained, and the user can continue to use the item.
- Step S1400 when the item use authentication result or the authentication failure is not acquired before the end of the countdown, the item is caused to change from the available state to the disabled state.
- the disabled state may include a blocked use state and an interference use state.
- the use-preventing state is a state in which the use function of the article is lost.
- the vehicle may be prevented from rotating by the front axle/middle axle/rear axle of the vehicle, and / or hinder the way the car is turned, such as the rotation of the handlebar, to prevent the user from riding.
- the front axle/middle axle/rear axle can be selected to prevent the user from being safe; the items are cars and electrics.
- driving a vehicle such as a car, it may be to prevent the user from continuing to drive by means of flameout, braking, shifting, etc.
- a slow braking, automatic shifting, etc. may be selected to cause the vehicle to slowly stop in a dangerous manner; when the item is a charging device, It can be to prevent the user from using the charging device by turning off the power output.
- the interference use state is a mode in which the use function of the article is not lost, but the state in which the user normally uses the article is interfered by various means, such as an alarm sound, an interference sound, a warning light, a warning text, and the like to interfere with the user's use.
- the item is disabled and the user experience is poor.
- the item usage control method further includes: restarting the timer to count down when the item fails to obtain the authentication result or the authentication failure before the end of the countdown, and triggering the reacquisition of the item to use the authentication result until the timer is started.
- the item is changed from the available state to the disabled state when the number of times reaches the predetermined threshold and the item usage authentication result is not acquired or the authentication still fails before the end of the last countdown.
- the predetermined threshold value sets a specific numerical value that is better for the user experience according to engineering experience or experimental simulation.
- the re-retransmission acquisition item uses the authentication result, and the step of obtaining the item use authentication result may be obtained as described above, and details are not described herein again.
- an item use control method is provided.
- the use is triggered.
- the user of the item performs the item use authentication, and changes the item from the available state to the disabled state when the item use authentication result is not obtained or the authentication fails, so that the user can use the item before performing the authentication operation.
- the article use authentication is completed in a manner that is not perceived by the user. Improve the user experience.
- an item usage control method is provided, which is executed by one side of the item, as shown in FIG. 2, and includes:
- Step S2100 setting the item in an available state, the item having a unique item identifier
- the item is any time that can transfer the usage right to the user in time division or segmentation.
- the item for the user to use, for example, the item may be a bicycle, an electric car, a moped, a car or the like, or a charging device or the like.
- the item has a unique item identification, which may be an item number, serial number, string, item code or other item identification information that uniquely identifies the item, and the like.
- a short-range communication device, a storage area, and a control unit may be disposed in the item, and a corresponding item identifier is stored in the storage area, and the item identifier may be read from the storage area under the control of the control unit,
- the short-range communication method transmits the item identifier, so that the user equipment can acquire the item identifier, for example, broadcasting the item identifier through Bluetooth so that the user equipment can receive by monitoring, or can set NFC (Near) carrying the item identifier on the item.
- the Field Communication tag enables the user equipment to read the item identification and the like when the distance from the NFC tag is within the communication range.
- the setting item is in an available state. Specifically, when the item is a vehicle such as a bicycle, an electric car, a moped, or a car, the vehicle may be set to be unlocked or unlocked for the user to directly ride or drive; when the item is a charging device, the setting is set.
- the charging device is in a state in which it can output electric power for charging.
- Step S2200 When it is detected that an event indicating that the item is used by the user is generated, a timer countdown is started to count down;
- the event indicating that the item is used by the user includes all or a signal that the item vibrates, a pressure experienced by a portion of the item changes, a temperature of the item changes, and the item is used to be used.
- the event indicating that the item is used by the user includes all or a signal that the item vibrates, a pressure experienced by a portion of the item changes, a temperature of the item changes, and the item is used to be used.
- an event indicating that the item is used by the user has been exemplified by the vehicle or the charging device.
- the event indicating that the item is used by the user may also have a corresponding used event corresponding to different items, which may be based on the actual user.
- the items used are defined and will not be described here.
- Countdown by starting the timer on the item side is not only applicable to the use of the item in the normal case, but the user equipment corresponding to the user who uses the item is out of association, or is disconnected from the server used for the item use authentication.
- the user equipment corresponding to the user who uses the item is abnormal and cannot communicate, or the user who uses the item is an abnormal situation such as an illegal user who does not have the right to use the item, the actual result of the acquisition of the item cannot be actually triggered.
- the old can use the following step S2400 to obtain the item use authentication result before the end of the countdown, so that the item is changed from the available state to the disabled state.
- the duration of the countdown can be set according to engineering experience and experimental simulation.
- step S2300 the item identifier is provided to the user equipment in a short-range communication manner to trigger the acquisition of the item use authentication result.
- the item use authentication result is obtained by performing item use authentication based on the item identifier and a user identifier corresponding to the user of the item corresponding to the item identifier, where the user identifier is used to uniquely identify the user.
- the user identifier is used to uniquely identify the user, and may be, for example, a user number that uniquely identifies the user, an identity code, user feature information such as facial data, voiceprint data, fingerprint data, iris data, and the like.
- the user identifier may be allocated to the user by the server that performs the registration, and is delivered to the corresponding user equipment for storage in the user equipment.
- the user equipment may be controlled by the application providing the item usage service running thereon, acquiring the user identification stored in itself, and acquiring the item corresponding to the item used by the corresponding user in a short-range communication manner.
- the identifier is sent to the server for the generated item use authentication request to obtain the corresponding item use authentication result.
- the short-range communication method may be Bluetooth communication, NFC (Near Field Communication) communication, ZigBee communication, WiFi communication, UWB (Ultra Wideband) communication, infrared communication, sound wave communication, or the like.
- NFC Near Field Communication
- WiFi Wireless Fidelity
- UWB Ultra Wideband
- the short-range communication mode is Bluetooth communication
- the item identification may be sent by Bluetooth broadcast to be provided to the user equipment.
- the item use control method provided in the present embodiment further includes the step of determining, from the item side, a user identifier corresponding to the user who uses the item corresponding to the item identification:
- the user identifier corresponding to the user equipment that reaches the predetermined number of Bluetooth interactions is determined as the user identifier corresponding to the user who uses the item.
- the Bluetooth communication address By receiving the Bluetooth communication address of the item itself, the Bluetooth communication address can be received.
- the user equipment and the item establish a long connection based on the Bluetooth communication address or directly send a message to implement the interactive communication, thereby acquiring the Bluetooth communication status, and the Bluetooth communication status at least includes the state in which the user equipment and the item perform Bluetooth interaction.
- an item may perform interactive communication with a plurality of user equipments, and a corresponding Bluetooth interaction reaches a predetermined number of user equipments, which may be considered as a user equipment carried or used by a user who uses the items, thereby achieving a plurality of
- the user equipment corresponding to the user who actually uses the item is determined by the user equipment, and correspondingly, the user identifier corresponding to the user equipment is determined as the user identifier corresponding to the user who uses the item.
- the predetermined number of times can be set according to engineering experience or experimental simulation.
- the step of obtaining the use certification result of the item may also be implemented by the item side, which specifically includes:
- the user identifier corresponding to the user who uses the item may be obtained by a short-distance communication method from a user equipment corresponding to the user who uses the item, or may be determined from the item side in the above example.
- the user identifier corresponding to the user of the item corresponding to the item identifier may be obtained by a short-distance communication method from a user equipment corresponding to the user who uses the item, or may be determined from the item side in the above example.
- the server for performing the item use authentication is triggered to receive and perform the corresponding item use authentication, and the user is authenticated whether the item has the use right.
- the specific authentication process has been described in the first embodiment, and details are not described herein again.
- the returned item use authentication result may be returned to the corresponding item or user equipment, and after the item is received from the server or received from the user equipment, the authentication result is used according to the corresponding item. , keep the item available or the setting changes from available to disabled.
- Step S2400 When the item use authentication result or the authentication failure is not acquired before the end of the countdown, the item is set to be changed from the available state to the disabled state.
- the disabled state may include a blocked use state and an interference use state.
- Blocking the use state is a state in which the use function of the item is lost.
- the interference use state is a state in which the use function of the user is disturbed by various means although the function of using the article is not lost.
- the disabled state has been specifically illustrated in the first embodiment, and details are not described herein again.
- the item is disabled and the user experience is poor.
- the item usage control method further includes: restarting the timer to count down when the item fails to obtain the authentication result or the authentication failure before the end of the countdown, and triggering the reacquisition of the item to use the authentication result until the timer is started.
- the item is changed from the available state to the disabled state when the number of times reaches the predetermined threshold and the item usage authentication result is not acquired or the authentication still fails before the end of the last countdown.
- the predetermined threshold value sets a specific numerical value that is better for the user experience according to engineering experience or experimental simulation.
- the step of triggering the reacquisition of the item using the authentication result may be a step of triggering the user equipment to resend the use authentication request by the short-range communication method to trigger the server to perform the acquisition item use authentication result as described above, or re-execute as above
- the step of obtaining an item using the authentication result implemented on the item side is not described herein again.
- an item use control device which is disposed on the item side, and includes:
- a communication device for implementing short-range communication
- a memory for storing instructions
- the item use control device may be as shown in FIG. 3, and may include a processor 3100, a memory 3200, an interface device 3300, a communication device 3400, a display device 3500, an input device 3600, a speaker 3700, a microphone 3800, and the like.
- the processor 3100 may be a central processing unit CPU, a microprocessor MCU, or the like.
- Memory The 3200 includes, for example, a ROM (Read Only Memory), a RAM (Random Access Memory), a nonvolatile memory such as a hard disk, and the like.
- the interface device 3300 includes, for example, a USB interface, a headphone jack, and the like.
- the communication device 3400 can at least perform short-range communication, such as at least one of Bluetooth communication, NFC communication, UWB communication, WiFi communication, ZigBee communication, infrared communication, and acoustic communication, and can also perform other wired or wireless communication, such as 2G. /3G/4G/5G communication or LAN communication.
- the display device 3500 is, for example, a liquid crystal display, a touch display, or the like.
- Input device 3600 can include, for example, a touch screen, a keyboard, a somatosensory input, and the like. The user can input/output voice information through the speaker 3700 and the microphone 3800.
- the article usage control device 3000 illustrated in Figure 3 is merely illustrative and is in no way meant to be limiting of the invention, its application or use.
- the memory 3200 of the item use control device 3000 is used to store instructions for controlling the processor 3100 to operate to perform any of the method items provided by the embodiments of the present invention. Use the control method.
- the present invention may relate only to some of the devices therein, for example, the article use control device 3000 relates to the processor 3100 and storage.
- Device 3200 and communication device 3400 A technician can design instructions in accordance with the disclosed aspects of the present invention. How the instructions control the processor for operation is well known in the art and will not be described in detail herein.
- the item usage control device 3000 can be implemented in a variety of ways.
- the item use control device 3000 can be implemented by an instruction configuration processor.
- the instructions may be stored in the ROM, and when the device is booted, the instructions are read from the ROM into the programmable device to implement the item usage control device.
- the item can be cured into a dedicated device (eg, an ASIC) using a control device.
- the item use control device 3000 can be divided into mutually independent units, or they can be combined and implemented.
- the item use control device 3000 may be implemented by one of the various implementations described above, or may be implemented by a combination of two or more of the various implementations described above.
- an article 4000 is provided, including at least the article use control device 3000 provided in the embodiment.
- the item may be a vehicle 4100 as shown in FIG. 4, and the item usage control
- the device can be an in-vehicle electronic device 3100.
- the vehicle shown in FIG. 4 is merely illustrative and does not limit the vehicle 4100 to be a bicycle, but may also be a moped, an electric bicycle, or an electric car, a car, or the like.
- the location of the in-vehicle electronic device 3100 at the location of the vehicle 4100 is also merely illustrative and does not limit the placement of the in-vehicle electronic device 3100.
- an object use control method, apparatus, and article are provided, which are triggered by setting an item in an available state and generating an event indicating that the item is used by the user.
- the user who uses the item is authenticated by the item, and when the item use authentication result or the authentication fails, the item is switched from the available state to the disabled state, so that the user can use the item before performing the authentication operation.
- the article use authentication is completed in a manner that is not perceived by the user. Improve the user experience.
- a method for controlling the use of an item is performed by a user equipment side, and includes:
- Step S5100 When the short-range communication function is turned on, when at least one item identifier is received by the short-range communication method, and the item identifier corresponding to the item used by the user is determined, the acquisition of the item authentication result is triggered.
- the item identifier is used to uniquely identify the item, and the item use authentication result is obtained by performing item use authentication based on the item identifier and the user identifier corresponding to the item used by the user, and the user identifier is used to uniquely identify the user.
- the item is any item that can be used to transfer the usage right to the user for use by the user.
- the item may be a bicycle, an electric vehicle, a moped, a vehicle, or the like, or a charging device, etc. .
- the item identification is used to uniquely identify the item, and may be an item number, a serial number, a character string, an item code or other item identification information that uniquely identifies the item, and the like.
- An example in which the item acquires and provides the item identification has been described in the first embodiment, and details are not described herein again.
- the user identifier is used to uniquely identify the user, and may be a unique user number and body of the user. Part code, user feature information such as face data, voiceprint data, fingerprint data, iris data, and the like.
- user identification acquisition has been described in the first embodiment, and details are not described herein again.
- the user equipment may be a device used or carried by a user, such as a smart terminal such as a mobile phone, a palmtop computer, a tablet computer, or a wearable smart device such as a smart watch, a smart bracelet, or a smart jewelry.
- a smart terminal such as a mobile phone, a palmtop computer, a tablet computer, or a wearable smart device such as a smart watch, a smart bracelet, or a smart jewelry.
- the user equipment has a short-range communication function, and can be triggered to open a short-range communication function in real time according to an application scenario, for example, opening a short-distance communication function by using an interface of an installed application that provides an item usage service, or maintaining the proximity communication function at all times. .
- the information may be received by the short-range communication method, and when the at least one item identification is received and the item identification corresponding to the item used by the user is determined, the acquisition of the item authentication result may be triggered.
- the short-range communication may be Bluetooth communication, NFC (Near Field Communication) communication, ZigBee communication, WiFi communication, UWB (Ultra Wideband) communication, infrared communication, sonic communication, or the like.
- the short-range communication is a Bluetooth communication.
- the item usage control method provided in this embodiment further includes: acquiring, when the at least one item identifier is received by monitoring a Bluetooth broadcast, acquiring the item identifier The Bluetooth communication status of the corresponding item determines an item that meets the predetermined communication condition as an item used by the user to determine a corresponding item identification.
- the status of the Bluetooth communication of the item corresponding to the item identifier may be obtained by detecting a state in which the user equipment performs Bluetooth interaction with the item, and may further include a state in which the user equipment receives a Bluetooth broadcast corresponding to the item.
- the manner in which the user equipment interacts with the item for Bluetooth is not limited.
- the user equipment may acquire the Bluetooth communication address corresponding to the item through the Bluetooth broadcast of the item based on the Bluetooth communication protocol, and establish a Bluetooth length with the item.
- the connection is for interactive communication, or does not establish a long connection, each time directly communicating based on the Bluetooth communication address, and the like.
- the item that meets the predetermined communication condition as the item used by the user to determine the corresponding item identification For example, an item that has established a Bluetooth long connection with the user equipment or interacts with the user equipment Bluetooth multiple times may be determined as an item used by the user to determine a corresponding item identifier, or may be continuously received.
- the item corresponding to the Bluetooth broadcast is determined as the item used by the user to determine the corresponding item identification and the like.
- the user equipment may monitor multiple Bluetooth broadcast signals and receive multiple item identifiers, and cannot determine which item identifier is actually used by the user.
- the predetermined communication condition is that the Bluetooth broadcast corresponding to the item identification is continuously received for a predetermined time and the corresponding Bluetooth interaction arrives a predetermined number of times.
- the user equipment When the user equipment continues to receive the Bluetooth broadcast corresponding to the item identifier and the corresponding Bluetooth interaction reaches a predetermined number of times, indicating that the item corresponding to the item identifier is closest to the user corresponding to the user equipment and maintains the distance within a predetermined time,
- the item is the item used by the user, and therefore, the item identification can be determined correspondingly.
- the item usage control method provided in this embodiment triggers the step of acquiring the item authentication, specifically as shown in step S5201 of FIG. 5:
- step S5201 after determining the item identifier corresponding to the item used by the user, the user identifier is sent to the item corresponding to the item identifier in a short-range communication manner to trigger the acquisition of the item authentication result.
- the user identifier is sent to the item corresponding to the item identifier in a short-range communication manner, and the item may be triggered to generate an item authentication request according to the user identifier and the user identifier, and sent to the server to trigger the acquisition of the item authentication result, specifically, The description in the second embodiment is not repeated here.
- the item usage control method provided in this embodiment triggers the step of acquiring the item authentication, as shown in steps S5202 and S5203 shown in FIG. 6:
- Step S5202 after determining an item identifier corresponding to the item used by the user or receiving an indication of the item used by the user in a short-range communication manner, generating an item use authentication request including the item identifier and the user identifier;
- Step S5203 sending the item use authentication request to the server, to trigger the server to determine whether the user has the use right and return the corresponding item according to the user identifier and the item identifier included in the item use authentication request. Use the certification results.
- the indication of the item used by the user received in the short-range communication mode is usually that the item is counted down at the start timer, and the item usage recognition is not obtained before the countdown ends.
- the indication is triggered by the short-range communication to trigger the user equipment to regenerate the item using the authentication request and sent to the server to trigger the server to re-execute the item use authentication.
- the item use authentication result may be returned to the item or may be returned to the user equipment. It should be understood that when the item is returned to the user device using the authentication result, the item use authentication result may be provided to the item by, for example, short-range communication, such that the item is processed according to the corresponding item use authentication result.
- a user equipment including:
- a communication device for implementing short-range communication
- a memory for storing instructions
- the user equipment may be a smart terminal or a wearable smart device
- the smart terminal may be a mobile phone, a palmtop computer, a tablet computer, etc.
- the wearable smart device may be a smart watch, a smart bracelet or a smart jewelry.
- the user device can include a processor 6100, a memory 6200, an interface device 6300, a communication device 6400, a display device 6500, an input device 6600, a speaker 6700, a microphone 6800, and the like, as shown in FIG.
- the processor 6100 may be a central processing unit CPU, a microprocessor MCU, or the like.
- the memory 6200 includes, for example, a ROM (Read Only Memory), a RAM (Random Access Memory), a nonvolatile memory such as a hard disk, and the like.
- the interface device 6300 includes, for example, a USB interface, a headphone jack, and the like.
- the communication device 6400 can at least perform short-range communication, such as at least one of Bluetooth communication, NFC communication, UWB communication, WiFi communication, ZigBee communication, infrared communication, and acoustic communication, and can also perform other wired or wireless communication, such as 2G. /3G/4G/5G communication or LAN communication.
- the display device 6500 is, for example, a liquid crystal display, a touch display, or the like.
- Input device 6600 can include, for example, a touch screen, a keyboard, a somatosensory input, and the like. The user can input/output voice information through the speaker 6700 and the microphone 6800.
- the user device 6000 shown in Figure 6 is merely illustrative and in no way is meant to limit the invention, its application or use.
- the memory 6200 of the user equipment 6000 is configured to store instructions for controlling the processor 6100 to perform operations for performing item usage control according to any of the methods provided by the embodiments of the present invention. method. It will be understood by those skilled in the art that although a plurality of devices are shown for user device 6000 in FIG. 6, the present invention may only relate to some of the devices, for example, user device 6000 relates to processor 6100 and storage device 6200 and communication. Device 6400. A technician can design instructions in accordance with the disclosed aspects of the present invention. How the instructions control the processor for operation is well known in the art and will not be described in detail herein.
- user equipment 6000 can be implemented in a variety of ways.
- user device 6000 can be implemented by an instruction configuration processor.
- the instructions may be stored in the ROM, and when the device is booted, the instructions are read from the ROM into the programmable device to implement the item usage control device.
- the item can be cured into a dedicated device (eg, an ASIC) using a control device.
- the user equipment 6000 can be divided into mutually independent units, or they can be implemented together.
- the user equipment 6000 may be implemented by one of the various implementations described above, or may be implemented by a combination of two or more of the various implementations described above.
- an item usage control method and a user equipment are provided, which are triggered by receiving an item identification in a short-range communication manner and determining an item identification corresponding to the item used by the user.
- the item authentication result is obtained so that the user can use the item before performing the authentication operation.
- the article use authentication is completed in a manner that is not perceived by the user. Improve the user experience.
- an item usage control method is provided, which is executed by a server side, such as As shown in Figure 8, it includes:
- Step S7100 Receiving an item use authentication request from a user or an item, where the item use authentication request includes an item identifier and a user identifier corresponding to a user who uses the item corresponding to the item identifier,
- the item identification is used to uniquely identify the item
- the user identification is used to uniquely identify the user.
- the item identification may be an item number, a serial number, a character string, an item code or other item identification information, etc. that uniquely identifies the item.
- An example in which the item acquires and provides the item identification has been described in the first embodiment, and details are not described herein again.
- the user identification may be a user unique user number, an identity code, user characteristic information such as face data, voiceprint data, fingerprint data, iris data, and the like.
- user characteristic information such as face data, voiceprint data, fingerprint data, iris data, and the like.
- Step S7200 According to the user identifier and the item identifier, verify whether the user has the use right for the item, and return the corresponding item use authentication result to the user or the item.
- the item identifier and the user identifier corresponding to the user who uses the item corresponding to the item identifier are authenticated, and the user is authenticated to have the right to use the item, for example, including whether the user is a registered user, whether It has been recharged, whether it is in arrears, whether to pay the deposit, whether it is bound to the payment service, etc., and it is also possible to check whether the item satisfies the conditions of continued use, such as whether the power is sufficient, whether the item is in good condition, etc., at the time of authentication.
- an authentication failure is returned to cause the item to transition from the available state to the disabled state. Conversely, if the user has the right to use the item, the authentication is returned successfully, so that the available state of the item is maintained, and the user can continue to use the item.
- a server including:
- a memory for storing instructions
- a processor for operating in accordance with instructions stored in the memory to perform the item usage control method provided in the embodiment.
- the server may be, for example, a blade server, a computer, or multiple computers.
- the computer group that is composed can also be a cloud server.
- the server 8000 can include a processor 8100, a memory 8200, an interface device 8300, a communication device 8400, a display device 8500, and an input device 8600, as shown in FIG.
- the processor 8100 can be, for example, a central processing unit CPU, a microprocessor MCU, or the like.
- the memory 8200 includes, for example, a ROM (Read Only Memory), a RAM (Random Access Memory), a nonvolatile memory such as a hard disk, and the like.
- the interface device 8300 includes, for example, a USB interface, a serial interface, and the like.
- the communication device 8400 is capable of, for example, wired or wireless communication.
- the display device 8500 is, for example, a liquid crystal display.
- Input device 8600 can include, for example, a touch screen, a keyboard, and the like.
- the server shown in Figure 8 is merely illustrative and is in no way meant to limit the invention, its application or use.
- the memory 8200 of the server 8000 is configured to store instructions for controlling the processor 8100 to operate to perform an item usage control method provided by an embodiment of the present invention.
- the present invention may relate only to some of the devices therein, for example, server 8000 only relates to processor 8100 and storage device 8200.
- a technician can design instructions in accordance with the disclosed aspects of the present invention. How the instructions control the processor for operation is well known in the art and will not be described in detail herein.
- server 8000 can be implemented in a variety of ways.
- server 8000 can be implemented by an instruction configuration processor.
- the instructions may be stored in the ROM, and when the device is booted, the instructions are read from the ROM into the programmable device to implement the item usage control device.
- the item can be cured into a dedicated device (eg, an ASIC) using a control device.
- the server 8000 can be divided into mutually independent units, or they can be combined and implemented.
- the server 8000 may be implemented by one of the various implementations described above, or may be implemented by a combination of two or more of the various implementations described above.
- an item usage control method and a server are provided, and the item identification request included in the item authentication request is received according to the item authentication request sent by the item or the user equipment. And the item identifier, whether the user authentication corresponding to the user identifier has the use right of the item using the corresponding item identifier, to return the item identification
- the result is that the user can use the item before performing the authentication operation.
- the article use authentication is completed in a manner that is not perceived by the user. Improve the user experience.
- an article use control system including the article provided in the second embodiment, the user device provided in the third embodiment, and the server provided in the fourth embodiment to implement the present invention.
- the control method of any item is used, as shown in FIG. 10, and details are not described herein again.
- the item use control system 9000 includes an item 4000 as shown in FIG. 4, a user device 6000 as shown in FIG. 7, and a server 8000 as shown in FIG.
- the item 4000 communicates with the user equipment 6000 in a short-range communication manner, and the item 4000 communicates with the server 8000, the user equipment 6000, and the server 8000 through a network 9100, which may be wireless or wired communication.
- the internet may be wireless or wired communication.
- the invention can be a system, method and/or computer program product.
- the computer program product can comprise a computer readable storage medium having computer readable program instructions embodied thereon for causing a processor to implement various aspects of the present invention.
- the computer readable storage medium can be a tangible device that can hold and store the instructions used by the instruction execution device.
- the computer readable storage medium can be, for example, but not limited to, an electrical storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or Any suitable combination of the above.
- Non-exhaustive list of computer readable storage media include: portable computer disks, hard disks, random access memory (RAM), read only memory (ROM), erasable programmable read only memory (EPROM) Or flash memory), static random access memory (SRAM), portable compact disk read only memory (CD-ROM), digital versatile disk (DVD), memory stick, floppy disk, mechanical encoding device, for example, with instructions stored thereon A raised structure in the hole card or groove, and any suitable combination of the above.
- a computer readable storage medium as used herein is not to be interpreted as a transient signal itself, such as a radio wave or other freely propagating electromagnetic wave, an electromagnetic wave propagating through a waveguide or other transmission medium (eg, a light pulse through a fiber optic cable), or through a wire The electrical signal transmitted.
- the computer readable program instructions described herein can be downloaded from a computer readable storage medium to various computing/processing devices or downloaded to an external computer or external storage device over a network, such as the Internet, a local area network, a wide area network, and/or a wireless network.
- the network may include copper transmission cables, fiber optic transmissions, wireless transmissions, routers, firewalls, switches, gateway computers, and/or edge servers.
- a network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium in each computing/processing device .
- Computer program instructions for performing the operations of the present invention may be assembly instructions, instruction set architecture (ISA) instructions, machine instructions, machine related instructions, microcode, firmware instructions, state setting data, or in one or more programming languages.
- the computer readable program instructions can execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer, partly on the remote computer, or entirely on the remote computer or server. carried out.
- the remote computer can be connected to the user's computer through any kind of network, including a local area network (LAN) or wide area network (WAN), or can be connected to an external computer (eg, using an Internet service provider to access the Internet) connection).
- the customized electronic circuit such as a programmable logic circuit, a field programmable gate array (FPGA), or a programmable logic array (PLA), can be customized by utilizing state information of computer readable program instructions.
- Executive computer readable Program instructions to implement various aspects of the present invention.
- the computer readable program instructions can be provided to a general purpose computer, a special purpose computer, or a processor of other programmable data processing apparatus to produce a machine such that when executed by a processor of a computer or other programmable data processing apparatus Means for implementing the functions/acts specified in one or more of the blocks of the flowcharts and/or block diagrams.
- the computer readable program instructions can also be stored in a computer readable storage medium that causes the computer, programmable data processing device, and/or other device to operate in a particular manner, such that the computer readable medium storing the instructions includes An article of manufacture that includes instructions for implementing various aspects of the functions/acts recited in one or more of the flowcharts.
- the computer readable program instructions can also be loaded onto a computer, other programmable data processing device, or other device to perform a series of operational steps on a computer, other programmable data processing device or other device to produce a computer-implemented process.
- instructions executed on a computer, other programmable data processing apparatus, or other device implement the functions/acts recited in one or more of the flowcharts and/or block diagrams.
- each block in the flowchart or block diagram can represent a module, a program segment, or a portion of an instruction that includes one or more components for implementing the specified logical functions.
- Executable instructions can also occur in a different order than those illustrated in the drawings. For example, two consecutive blocks may be executed substantially in parallel, and they may sometimes be executed in the reverse order, depending upon the functionality involved.
- each block of the block diagrams and/or flowcharts, and combinations of blocks in the block diagrams and/or flowcharts can be implemented in a dedicated hardware-based system that performs the specified function or function. Or it can be implemented by a combination of dedicated hardware and computer instructions. It is well known to those skilled in the art that it is implemented by hardware, by software, and by software. The implementation of the combination with the hardware is equivalent.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- Development Economics (AREA)
- Theoretical Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Economics (AREA)
- Computing Systems (AREA)
- Mechanical Engineering (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Power Engineering (AREA)
- Telephone Function (AREA)
- Lock And Its Accessories (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (24)
- 一种物品使用控制方法,其特征在于,包括:提供处于可用状态的物品,所述物品具有唯一的物品标识;在所述物品发生表示物品被用户使用的事件时,启动计时器进行倒计时;以近距离通信方式提供所述物品标识,并确定使用与所述物品标识相对应的物品的用户所对应的用户标识,以触发获取物品使用认证结果,其中,所述物品使用认证结果是基于所述物品标识和所述用户标识进行物品使用认证得到,所述用户标识用于唯一标识用户;当在倒计时结束前未获取所述物品使用认证结果或认证失败时,使得所述物品从可用状态转为禁用状态。
- 根据权利要求1所述的方法,其特征在于,所述近距离通信方式为蓝牙通信;所述以近距离通信方式提供所述物品标识的步骤包括:蓝牙广播发送所述物品标识;所述确定使用与所述物品标识相对应的物品的用户所对应的用户标识的步骤包括:监听蓝牙广播接收所述物品标识;获取接收所述物品标识的用户设备的蓝牙通信状态,将符合预定通信条件的用户设备对应的用户标识,确定为使用所述物品的用户所对应的用户标识。
- 根据权利要求1或2所述的方法,其特征在于:所述预定通信条件为,在预定时间内持续接收所述物品标识对应的蓝牙广播并且对应的蓝牙交互到达预定次数。
- 根据权利要求1-3任意一项所述的方法,其特征在于,所述获取 物品使用认证结果的步骤包括:发送物品使用认证请求,所述物品认证请求中包含所述物品标识以及所述用户标识;接收所述物品使用认证请求,根据所述物品使用认证请求包括的所述用户标识和所述物品标识,认证该用户对该物品是否具有使用权限以得到物品使用认证结果并发送。
- 根据权利要求1-4任意一项所述的方法,其特征在于,所述表示物品被用户使用的事件包括所述物品发生震动、所述物品的一部分承受的压力发生变化、所述物品的温度发生变化以及所述物品发出被使用的信号的全部或者其中之一或者及其组合。
- 根据权利要求1-5任意一项所述的方法,其特征在于,还包括:每次倒计时结束前未获取所述物品使用认证结果或认证失败时,重新启动计时器进行倒计时,并触发重新获取物品使用认证结果,直到启动计时器的次数达到预定阈值并且最后一次倒计时结束前仍未获取所述物品使用认证结果或仍认证失败时,使得所述物品从可用状态转为禁用状态。
- 一种物品使用控制方法,其特征在于,由物品一侧执行,包括:设置物品处于可用状态,所述物品具有唯一的物品标识;检测到所述物品发生表示被用户使用的事件时,启动计时器倒计时进行倒计时;以近距离通信方式向用户设备提供所述物品标识,以触发获取物品使用认证结果,其中,所述物品使用认证结果是基于所述物品标识和使用与物品标识相对应的物品的用户所对应的用户标识进行物品使用认证得到,所述用户标识用于唯一标识用户;当在倒计时结束前未获取所述物品使用认证结果或认证失败时,设置所述物品从可用状态转为禁用状态。
- 根据权利要求7所述的方法,其特征在于,所述近距离通信方式为蓝牙通信;通过蓝牙广播发送所述物品标识以提供给用户设备。
- 根据权利要求7或8所述的方法,其特征在于,还包括确定使用与所述物品标识相对应的物品的用户相对应的用户标识的步骤:广播物品自身蓝牙通信地址,以触发与所述用户设备进行交互通信获取蓝牙通信状态;将对应的蓝牙交互到达预定次数的用户设备对应的用户标识,确定为使用所述物品的用户对应的用户标识。
- 根据权利要求7-9任意一项所述的方法,其特征在于,还包括:在获取使用所述物品的用户相对应的用户标识后,生成包含所述物品标识以及所述用户标识的物品使用认证请求;向服务器发送所述物品使用认证请求,以触发服务器根据所述物品使用认证请求包括的所述用户标识和所述物品标识,认证该用户对该物品是否具有使用权限并返回对应的物品使用认证结果。
- 根据权利要求7-10任意一项所述的方法,其特征在于,所述表示物品被用户使用的事件包括所述物品发生震动、所述物品的一部分承受的压力发生变化、所述物品的温度发生变化以及所述物品发出被使用的信号的全部或者其中之一或者及其组合。
- 根据权利要求7所述的方法,其特征在于,还包括:每次倒计时结束前未获取所述物品使用认证结果或认证失败时,重新启动计时器进行倒计时,并触发重新获取物品使用认证结果,直到启动计时器的次数达到预定阈值并且最后一次倒计时结束前仍未获取所述物品使用认证结果或仍认证失败时,使得所述物品从可用状态转为禁用状态。
- 一种物品使用控制方法,其特征在于,由用户设备一侧执行,包括:在近距离通信功能被开启的情况下,当通过近距离通信方式接收到至少一个物品标识,并确定用户使用的物品相对应的物品标识时,触发获取物品认证结果,其中,所述物品标识用于唯一标识物品,所述物品使用认证结果是基于用户使用的物品相对应的所述物品标识和用户标识进行物品使用认证得到,所述用户标识用于唯一标识用户。
- 根据权利要求13所述的方法,其特征在于,所述近距离通信为蓝牙通信;当通过监听蓝牙广播接收到至少一个物品标识时,获取与所述物品标识对应的物品的蓝牙通信状态,将符合预定通信条件的物品确定为用户使用的物品以确定相对应的物品标识。
- 根据权利要求13或14所述的方法,其特征在于,所述预定通信条件为,在预定时间内持续接收所述物品标识对应的蓝牙广播并且对应的蓝牙交互到达预定次数。
- 根据权利要求13-15任意一项所述的方法,其特征在于,还包括:在确定用户使用的物品相对应的物品标识后,将所述用户标识以近距离通信方式发送给所述物品标识对应的物品,以触发获取物品认证结果;或者,在确定用户使用的物品相对应的物品标识后或者以近距离通信方式接收到所述用户使用的物品的指示后,生成包含所述物品标识以及所述用户标识的物品使用认证请求;向服务器发送所述物品使用认证请求,以触发服务器根据所述物品使用认证请求包括的所述用户标识和所述物品标识,认证该用户对该物品是 否具有使用权限并返回对应的物品使用认证结果。
- 一种物品使用控制方法,其特征在于,由服务器一侧执行,包括:从用户或者物品处接收物品使用认证请求,所述物品使用认证请求包括物品标识以及使用与所述物品标识相对应的物品的用户所对应的用户标识,其中,所述物品标识用于唯一标识物品,所述用户标识用于唯一标识用户;根据所述用户标识和所述物品标识,认证该用户对该物品是否具有使用权限,并返回对应的物品使用认证结果至用户或者物品处。
- 一种物品使用控制设备,其特征在于,设置于物品侧,包括:通信装置,用于实施近距离通信;存储器,用于存储指令;处理器,用于受控于所述存储器存储的指令进行操作,以执行如权利要求7-12中任一项所述的物品使用控制方法。
- 一种物品,其特征在于,包括:如权利要求18所述的物品使用控制设备。
- 根据权利要求19所述的物品,其特征在于,所述物品为车辆;所述物品使用控制设备为车载电子设备。
- 一种用户设备,其特征在于,包括:通信装置,用于实施近距离通信;存储器,用于存储指令;处理器,用于受控于所述存储器存储的指令进行操作,以执行如权利要求13-16中任一项所述的物品使用控制方法。
- 根据权利要求21所述的用户设备,其特征在于,所述用户设备是智能终端或者可穿戴智能设备。
- 一种服务器,其特征在于,包括:存储器,用于存储指令;处理器,用于受控于所述存储器存储的指令进行操作,以执行如权利要求17所述的物品使用控制方法。
- 一种物品使用控制***,其特征在于,包括:如权利要求19或20所述的物品;如权利要求21或22所述的用户设备;以及如权利要求23所述的服务器。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710313848.3 | 2017-05-05 | ||
CN201710313848.3A CN107295062B (zh) | 2017-05-05 | 2017-05-05 | 物品使用控制方法、设备、***及物品 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018201623A1 true WO2018201623A1 (zh) | 2018-11-08 |
Family
ID=60094542
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/093680 WO2018201623A1 (zh) | 2017-05-05 | 2017-07-20 | 物品使用控制方法、设备、***及物品 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20180319369A1 (zh) |
EP (1) | EP3399494A1 (zh) |
CN (1) | CN107295062B (zh) |
WO (1) | WO2018201623A1 (zh) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107293058B (zh) * | 2017-05-05 | 2018-03-06 | 北京摩拜科技有限公司 | 车辆管理方法、***、服务器及车辆 |
CN108090798B (zh) * | 2017-11-20 | 2023-01-31 | 创新先进技术有限公司 | 物品使用控制方法、服务器、物品、设备及*** |
CN108460660A (zh) * | 2018-03-08 | 2018-08-28 | 董神武 | 物品限时使用控制方法、物品、用户设备、服务器及*** |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102542499A (zh) * | 2012-01-13 | 2012-07-04 | 徐何燎 | 一种租还公共自行车控制方法 |
CN103559641A (zh) * | 2013-11-08 | 2014-02-05 | 常州永安公共自行车***股份有限公司 | 基于智能终端的电动汽车自助租赁***及其租赁方法 |
CN104992364A (zh) * | 2015-07-28 | 2015-10-21 | 行之有道汽车服务股份有限公司 | 一种无人值守电动汽车租赁***和租赁方法 |
CN105635174A (zh) * | 2016-02-03 | 2016-06-01 | 武汉天梯极客网络科技有限公司 | 一种智能设备分享方法 |
CN106251431A (zh) * | 2016-06-14 | 2016-12-21 | 王东升 | 共享自行车云平台热点解锁方法 |
KR101711159B1 (ko) * | 2012-12-13 | 2017-02-28 | 한국전자통신연구원 | 차량 운행 정보를 기반으로 하는 렌터카 관리 시스템 및 그 방법 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1635508A1 (en) * | 2004-09-08 | 2006-03-15 | Koninklijke Philips Electronics N.V. | Secure pairing for wireless communications devices |
CN101339683A (zh) * | 2008-05-08 | 2009-01-07 | 苏州经贸职业技术学院 | 基于数据共享中心的寄包柜控制方法及*** |
CN102404118A (zh) * | 2011-10-19 | 2012-04-04 | 陈坚 | 一种基于近距离通信终端的物品认证方法 |
US9544075B2 (en) * | 2012-02-22 | 2017-01-10 | Qualcomm Incorporated | Platform for wireless identity transmitter and system using short range wireless broadcast |
WO2014143769A1 (en) * | 2013-03-15 | 2014-09-18 | Entrust, Inc. | Method and apparatus for remote portable wireless device authentication |
TWI588782B (zh) * | 2014-11-28 | 2017-06-21 | 財團法人工業技術研究院 | 保全方法、保全閘與伺服器 |
CN106600391B (zh) * | 2017-02-21 | 2023-08-04 | 上海量明科技发展有限公司 | 制约用户违规使用的共享车辆及使用方法、客户端及*** |
-
2017
- 2017-05-05 CN CN201710313848.3A patent/CN107295062B/zh active Active
- 2017-07-20 WO PCT/CN2017/093680 patent/WO2018201623A1/zh active Application Filing
- 2017-11-01 US US15/800,307 patent/US20180319369A1/en not_active Abandoned
- 2017-11-09 EP EP17200722.1A patent/EP3399494A1/en not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102542499A (zh) * | 2012-01-13 | 2012-07-04 | 徐何燎 | 一种租还公共自行车控制方法 |
KR101711159B1 (ko) * | 2012-12-13 | 2017-02-28 | 한국전자통신연구원 | 차량 운행 정보를 기반으로 하는 렌터카 관리 시스템 및 그 방법 |
CN103559641A (zh) * | 2013-11-08 | 2014-02-05 | 常州永安公共自行车***股份有限公司 | 基于智能终端的电动汽车自助租赁***及其租赁方法 |
CN104992364A (zh) * | 2015-07-28 | 2015-10-21 | 行之有道汽车服务股份有限公司 | 一种无人值守电动汽车租赁***和租赁方法 |
CN105635174A (zh) * | 2016-02-03 | 2016-06-01 | 武汉天梯极客网络科技有限公司 | 一种智能设备分享方法 |
CN106251431A (zh) * | 2016-06-14 | 2016-12-21 | 王东升 | 共享自行车云平台热点解锁方法 |
Also Published As
Publication number | Publication date |
---|---|
US20180319369A1 (en) | 2018-11-08 |
CN107295062A (zh) | 2017-10-24 |
CN107295062B (zh) | 2018-06-19 |
EP3399494A1 (en) | 2018-11-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018201624A1 (zh) | 物品使用控制方法、设备、***、物品及服务器 | |
US11652821B2 (en) | One step security system in a network storage system | |
US11417159B2 (en) | Methods and systems for controlling a smart lock | |
US10320912B2 (en) | Communication method for a plurality of vehicles, vehicle and server | |
CN107111948B (zh) | 用于安全性和包裹交换效率的地理接近度交通工具提醒和访问*** | |
US20180297557A1 (en) | Vehicle control method, device and system and vehicle | |
JP6017737B1 (ja) | 低電力近距離無線通信認証 | |
WO2018201623A1 (zh) | 物品使用控制方法、设备、***及物品 | |
KR20170101972A (ko) | 시스템 동글 동작 | |
CN105205955A (zh) | 一种发出提示信号的方法和装置 | |
CN103856630A (zh) | 用于控制蓝牙低能耗装置的移动终端和方法 | |
CN106664301B (zh) | 移动设备及其控制方法 | |
WO2019041968A1 (zh) | 共享车辆的调度方法、设备和服务器 | |
KR102135357B1 (ko) | 클라우드 서비스 연동 장치 및 방법 | |
CN104766005A (zh) | 应用软件访问权限的管理方法和装置 | |
US20160065722A1 (en) | Systems and Methods for Managing Operating Modes of an Electronic Device | |
US10097019B2 (en) | Alternate alarm notifications based on battery condition | |
KR102661645B1 (ko) | 전자 장치 및 그의 제어 방법 | |
US10981542B2 (en) | Vehicle theft prevention based on fueling pattern | |
CN105279897A (zh) | 车辆报警方法及装置 | |
CN107278289B (zh) | 基于***能力的用户体验的动态调节 | |
US11089636B2 (en) | Vehicle-based wireless hotspot management | |
US10567512B2 (en) | Systems and methods to aggregate vehicle data from infotainment application accessories | |
US20190158629A1 (en) | Systems and methods to aggregate vehicle data from infotainment application accessories | |
US20130096768A1 (en) | Method and Apparatus for Do Not Disturb Message Delivery |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17908580 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17908580 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 14/08/2020) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17908580 Country of ref document: EP Kind code of ref document: A1 |