A locker-based third-party authorized pick-up system and its authorized pick-up method
A locker, pick-up technology, applied in the direction of coin-operated equipment for distributing discrete items, coin-free or similar appliances, coin-operated equipment with meter control, etc. The mode of information tracking, the inability to track the system, etc., to achieve the effect of flexible use
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0054] A third-party authorized pick-up system based on a locker, including a locker 1, an intelligent terminal 2, a third-party authorizer 3 and a server 4, the locker 1 is used to store the user's items to be picked up, and the smart terminal 2 is used to After the user sends the authorization pickup request to the server 4 and receives the authorization pickup result fed back by the server 4, the third-party authorizer 3 provides the server 4 with the information of the authorized pickup person, and the server 4 is used to handle the operation of the authorization pickup.
[0055] If the picker is waiting to pick up the item in the locker 1, the picker obtains the authorized picker information through the third-party authorizer 3, and completes the authorization operation of the pick-up through the server 4; after authorization, the authorized person goes to the locker 1 to pick up the item. Take the corresponding express;
[0056] Items to be picked up are parcels, letters...
Embodiment 2
[0091] For the locker-based third-party authorized pick-up system in Embodiment 1, the server 4 is also provided with a third-party authorization module, which is used to interact with the smart terminal 2 and the locker 1 respectively. Information and pick-up pending authorization information are also used to call third-party authorizer information in the server database.
[0092] For the third-party authorized pick-up method of the system with the third-party authorization module, the following steps are included:
[0093] A. The user enters personal login information through the smart terminal 2, and the personal login information is sent to the identity verification module of the server 4 to verify whether the user's identity is legal; if it is legal, proceed to the next step; if not, the user re-enters the personal login information and verify;
[0094]B. For a user who has successfully logged in, retrieve the user's box information to be picked up from the server databa...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com