Method for borrowing device, terminal device and server
A technology for terminal equipment and servers, applied in the fields of instruments, data processing applications, computing, etc., can solve the problems of complex equipment management process, low borrowing efficiency, occupation of staff, etc., to simplify equipment management process, improve borrowing efficiency, save money The effect of registration time
Pending Publication Date: 2019-03-29
山东影响力智能科技有限公司
4 Cites 0 Cited by
AI-Extracted Technical Summary
Problems solved by technology
[0003] However, the inventor found that there are at least the following problems in the prior art: the equipment management process is complicated, and it is not only necessary to confirm whether the borrower has the right to borrow the equ...
Method used
Concretely, can obtain the equipment identification number of the terminal equipment that sends borrowing request; According to equipment identification number, and the corresponding relation of prestored equipment identification number and borrowing authority, obtain the borrowing authority corresponding with equipment identification number, as borrowing party's borrowing rights. Since the terminal equipment held by the borrower is generally not frequently replaced, the equipment identification number of each borrower's terminal equipment is relatively stable, and the identification number of each equipment is unique. In this embodiment, by sending the borrowing request The device identification number of the terminal device is used as the borrowing authority, which helps to improve the accuracy of authority authentication.
In addition, since the face images or fingerprint information of some borrowers are pre-stored in the server, and a one-to-one correspondence is established between the borrower and the face images or fingerprint information, therefore, if the identity information of the borrower includes person Face image or fingerprint information can prevent others from claiming and borrowing relevant borrowed equipment in their own name, which is conducive to equipment management.
In the present embodiment, the server can be used to manage the borrowing information of N devices; N sheets are stored in the server with one-to-one borrowing tables corresponding to N devices, and N is a natural number greater than or equal to 1; according to the borrowing device For equipment information, look up the borrowing table of the borrowed equipment; record the borrowing information of the borrower in the borrowing table. By making the server store several borrowing tables that record the borrowing information of the borrower, it is helpful to further save the registration time in the process of borrowing equipment and improve the borrowing efficiency.
It is not difficult to find that the borrowing me...
Abstract
The embodiment of the invention relates to the field of article management, and discloses a borrowing method of equipment, a terminal device and a server. In the invention, a device borrowing method is applied to a terminal device. The method comprises the following steps: scanning a tag located on a shell of the borrowed device to identify the device information carried by the tag; sending a borrowing request to a server managing borrowed equipment, wherein the borrowing request carries the equipment information for the server to authenticate the borrowing right of the terminal equipment according to the borrowing request; receiving an authentication result of a borrowing right of the terminal device by the server. The embodiment also provides a terminal device and a server. The inventioncan simplify the equipment management process, quickly carry out the authority authentication, save the registration time in the process of borrowing equipment, and improve the borrowing efficiency.
Application Domain
Resources
Technology Topic
Terminal equipmentManagement process +1
Image
Examples
- Experimental program(1)
Example Embodiment
[0020] In order to make the objectives, technical solutions and advantages of the embodiments of the present invention clearer, the various embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, those of ordinary skill in the art can appreciate that, in the various embodiments of the present invention, many technical details are set forth in order for the reader to better understand the present application. However, even without these technical details and various changes and modifications based on the following embodiments, the technical solutions claimed in the present application can be realized.
[0021] A first embodiment of the present invention relates to a borrowing method of a device. Applied to terminal equipment, in this embodiment, by using the label set on the shell of the borrowing device, it can play a role of reminding the borrower to pass authority authentication when borrowing, and because the label carries the device information, the borrower can pass Scan the label to easily identify the device information. After identifying the device information, the terminal device sends a borrowing request carrying the device information to the server that manages the borrowing device, so that the server can automatically authenticate the borrowing authority of the terminal device according to the borrowing request. , the terminal device can directly receive the authentication result of the borrowing authority of the terminal device by the server, which simplifies the device management process, saves the steps of manually performing authority authentication, and achieves the purpose of quickly performing authority authentication.
[0022] The implementation details of the device borrowing method in this embodiment will be specifically described below. The following content is only provided for the convenience of understanding, and is not necessary for implementing this solution.
[0023] The terminal device in this embodiment may be any terminal device with a scanning function, such as a mobile phone, a tablet computer, etc., wherein the terminal device here may be the terminal device of the borrower, or the terminal device of the relevant staff, (for example, item management personnel's terminal equipment), which is not specifically limited in this embodiment.
[0024] The flowchart of the device borrowing method in this embodiment is as follows: figure 1 shown, including:
[0025] Step 101 , scan the label on the housing of the borrowed device, and identify the device information carried by the label.
[0026] The borrowed equipment mentioned here can be general equipment such as a mobile phone, a calculator, and a translator. What is more special is that the test prototypes such as mobile phones generally carry out more detailed management of mobile phones according to different projects, different stages, and different configurations of the company, and the management process is more complicated. The borrowed device in this embodiment may also be a relatively special device such as a test prototype.
[0027] Specifically, the label mentioned here may be a two-dimensional code label, a one-dimensional code label, a text label, or may also be a radio frequency identification (Radio Frequency Identification, “RFID” label for short). In practical applications, identification labels can be attached to the back of the items to be managed to ensure the aesthetics of the items to be managed, but this should not be limited. Among them, the device information can be written into the tag by using a programmer or a writer.
[0028] In this embodiment, the device information carried in the tag may include the project name, project stage, etc. corresponding to the borrowed device, and the management personnel may enter the device information according to actual needs. Preferably, the tag may also carry the address information of the server, so as to send a borrowing request to the server that manages the borrowing device.
[0029] Step 102: Send a borrowing request to a server that manages borrowed equipment.
[0030] The borrowing request carries device information for the server to authenticate the borrowing authority of the terminal device according to the borrowing request.
[0031] Specifically, when the tag also carries the address information of the server; in the step of sending the borrowing request to the server managing the borrowing device, the borrowing request is sent using the address information carried by the tag as the destination address.
[0032] Step 103: Receive the authentication result of the borrowing authority of the terminal device by the server.
[0033]For example, the authentication result of the server's borrowing authority on the terminal device may be: "authentication passed", at this time, the borrower has borrowed the device; the authentication result of the borrowing authority may be: "authentication failed", at this time, it can prompt The current borrowing authority of the borrower does not reach the authority of the borrowing device, and information such as being unable to lend. In another example, the terminal device may receive a more detailed authentication result of the borrowing authority: when the authentication result of the borrowing authority is: "authentication passed", the received authentication result may be "***, name***, On September 20, 2018 at 9:00 am by borrowing *** device". When the authentication result of the borrowing authority is: "Authentication failed", the received authentication result can be: "With your current borrowing authority, you can only borrow *** devices at present", or, "With your current borrowing authority, you can only borrow *** devices." If you borrow 1 device, you cannot borrow 2 devices, please change the number of borrowed devices or cancel the request”, etc., which will not be listed here.
[0034] It is not difficult to find that a method for borrowing a device provided in this embodiment can play a role of reminding the borrower to pass authority authentication when borrowing by using a label set on the shell of the borrowing device, and because the label carries the device information. , so that the borrower can easily identify the device information by scanning the label. After identifying the device information, the terminal device sends a borrowing request carrying the device information to the server that manages the borrowed device, so that the server can automatically obtain the borrowing authority of the terminal device according to the borrowing request. After authentication, the terminal device can directly receive the authentication result of the borrowing authority of the terminal device from the server, which simplifies the device management process, saves the steps of manual authority authentication, and achieves the purpose of quick authority authentication.
[0035] A second embodiment of the present invention relates to a borrowing method of a device. Applied to the server, in this embodiment, the server receives the borrowing request that carries the device information of the borrowing device sent by the borrower's terminal device, and then obtains the borrowing authority of the borrower according to the borrowing request, and according to the borrowing authority and device information. Whether the borrower has the authority to borrow the device for authentication; when it is determined that the borrower has the authority to borrow the device, the verification result of the borrowing authority will be fed back to the terminal device, and the borrower's borrowing information will be automatically recorded. Registering circulation information such as equipment borrowing in paper documents simplifies the equipment management process, saves the borrower's registration time in the process of borrowing equipment, and improves borrowing efficiency.
[0036] The implementation details of the device borrowing method in this embodiment will be specifically described below. The following content is only provided for the convenience of understanding, and is not necessary for implementing this solution.
[0037] The flowchart of the device borrowing method in this embodiment is as follows: figure 2 shown, including:
[0038] Step 201: Receive a borrowing request sent by the borrower's terminal device.
[0039] The borrowing request carries the device information of the borrowing device. The device information of the borrowed device may be included in the QR code affixed to the housing of the borrowed device. The borrowing information of the borrower may include: the identity information of the borrower; or, the identity information of the borrower and the borrowing time. In this embodiment, the specific content that can be included in the borrowing information of multiple borrowers is provided, so that the specific content of the borrowing information can be flexibly realized. The identity information of the borrower may also include, but is not limited to, one of the following: face image, fingerprint information, name, user name, and job number.
[0040] If the identity information of the borrower includes a face image, the face image is obtained through the camera device of the mobile terminal; if the identity information of the borrower includes fingerprint information, the fingerprint information is obtained through the fingerprint module of the mobile terminal; if the identity of the borrower The information includes name, user name or job number, and the name, user name or job number is obtained through the human-computer interaction interface of the mobile terminal.
[0041] Preferably, in practical applications, if the identity information of the borrower includes a face image or fingerprint information, the name, user name or job number of the borrower is searched according to the face image or fingerprint information; The borrower's name, user name or job number is reported to the server. In this embodiment, when the identity information of the borrower includes a face image or fingerprint information, the borrower's name, user name or job number is also searched according to the face image or fingerprint information, and the found content is reported to the server , so as to improve the identity information of the borrower, without the need for manual input by the borrower, which can further simplify the item management process.
[0042] In addition, since there are several borrower's face images or fingerprint information pre-stored in the server, and a one-to-one correspondence is established between the borrower and the face images or fingerprint information, if the borrower's identity information includes a face image or The fingerprint information can prevent others from falsely claiming and borrowing the relevant borrowed equipment in their own name, which is beneficial to the management of the equipment.
[0043] In this embodiment, the server can be used to manage the borrowing information of N devices; the server stores N borrowing tables corresponding to N devices one-to-one, where N is a natural number greater than or equal to 1; according to the device information of the borrowed device, Find the borrowing table of the borrowed equipment; record the borrowing information of the borrower in the borrowing table. By making the server store several borrowing tables recording the borrowing information of the borrower, it is helpful to further save the registration time in the process of borrowing equipment and improve the borrowing efficiency.
[0044] Step 202, obtaining the borrowing authority of the borrower according to the borrowing request.
[0045] Specifically, the device identification number of the terminal device that sends the borrowing request can be obtained; according to the device identification number and the pre-stored correspondence between the device identification number and the borrowing authority, the borrowing authority corresponding to the device identification number is obtained as the borrower's borrowing. permissions. Since the terminal equipment held by the borrower is generally not replaced frequently, the equipment identification number of each borrower's terminal equipment is relatively stable, and the identification number of each equipment is unique. The device identification number of the terminal device is used as the borrowing authority, which helps to improve the accuracy of authority authentication.
[0046] Wherein, the borrowing authority of the borrower can be divided into different levels, which can be represented by English letters A, B, C, respectively, or by other symbols such as numbers, which are not specifically limited in this embodiment.
[0047] Step 203 , according to the borrowing authority and the device information, verify whether the borrower has the authority to borrow the device.
[0048] For example, if the borrowing authority corresponding to the borrowed device is level A, and the borrower's borrowing authority is level B, and the level B is lower than level A, it is verified that the borrower does not have the authority to borrow the borrowed device. For another example, if the borrowing authority corresponding to the borrowed device is level 2, and the borrower's borrowing authority is level 1, and the authority level 1 is higher than the authority level 2, it is authenticated that the borrower has the authority to borrow the borrowed device.
[0049] In practical applications, the administrator can set an upper limit on the number of servers to be borrowed according to the borrower's borrowing authority. For example, test managers can borrow up to 30 prototypes, and general testers or R&D personnel can borrow up to 2 prototypes. When the borrower borrows the prototype, it only needs to input the borrowed quantity and check the corresponding prototype number. If the borrowing authority level of the general tester is B, the input borrowing quantity is 10, which exceeds the upper limit of the general tester borrowing the prototype. (2 units), the authentication fails and cannot pass.
[0050] Step 204 , when it is determined that the authority to borrow the device is available, the authentication result of the borrowing authority is fed back to the terminal device.
[0051] That is, the authentication result of the borrowing authority is fed back to the terminal device, so that the other party can use the borrowing device.
[0052] Step 205, record the borrowing information of the borrower.
[0053] Specifically, each time the borrower successfully borrows the borrowed device, the server records the borrower's borrowing information and updates it synchronously, and it is not necessary to manually register the circulation information such as the borrowing of the device in the paper file after the authority authentication is passed. , which simplifies the equipment management process and saves the registration time of the borrower in the process of borrowing equipment, thereby improving the borrowing efficiency.
[0054] Preferably, it can also be set that every preset time, the server will send the borrowing information of the borrowing record to the personnel with the preset authority in the form of a borrowing table, so that the personnel with the preset authority can get the company information clearly and conveniently. The specific information of the borrower of the prototype, for example, the borrower's name, borrowing object, borrowing time and other information may be included in the borrowing table.
[0055] It is not difficult to find that this embodiment corresponds to the device borrowing method provided by the first embodiment, and is applied to the server. The server receives the borrowing request sent by the borrower's terminal device and carries the device information of the borrowing device, and then according to the borrowing request Obtain the borrower's borrowing authority, and verify whether the borrower has the authority to borrow the device according to the borrowing authority and device information; when it is determined that the borrower has the authority to borrow the device, feedback the verification result of the borrowing authority to the terminal device, and automatically record it The borrower's borrowing information does not need to manually register the transfer information such as the borrowing of the equipment in the paper file after the authority authentication is passed, which simplifies the equipment management process and saves the borrower's registration time in the process of borrowing equipment, thereby improving borrowing. efficiency.
[0056] The steps of the above various methods are divided only for the purpose of describing clearly. During implementation, they can be combined into one step or some steps can be split and decomposed into multiple steps. As long as the same logical relationship is included, they are all within the protection scope of this patent. ;Adding insignificant modifications to the algorithm or process or introducing insignificant designs, but not changing the core design of the algorithm and process are all within the scope of protection of this patent.
[0057] The third embodiment of the present invention relates to a terminal device, such as image 3 As shown, it includes: at least one processor 301 ; and a memory 302 connected in communication with the at least one processor 301 ; wherein, the memory 302 stores instructions that can be executed by the at least one processor 301 , and the instructions are executed by the at least one processor 301 , so that at least one processor 301 can execute the borrowing method of the device as in the first embodiment.
[0058] The fourth embodiment of the present invention relates to a server, such as Figure 4 As shown, it includes: at least one processor 401; and a memory 402 connected in communication with the at least one processor 401; wherein, the memory 402 stores instructions executable by the at least one processor 401, and the instructions are executed by the at least one processor 401 , so that at least one processor 401 can execute the borrowing method of the device as in the second embodiment.
[0059] Wherein, the memory and the processor in the third and fourth embodiments are connected by a bus, the bus may include any number of interconnected buses and bridges, and the bus links one or more processing and various circuits of the memory together . The bus may also link together various other circuits, such as peripherals, voltage regulators, and power management circuits, which are well known in the art and therefore will not be described further herein. The bus interface provides the interface between the bus and the transceiver. A transceiver may be a single element or multiple elements, such as multiple receivers and transmitters, providing a means for communicating with various other devices over a transmission medium. The data processed by the processor is transmitted on the wireless medium through the antenna, and further, the antenna also receives the data and transmits the data to the processor.
[0060] The processor is responsible for managing the bus and general processing, and can also provide various functions, including timing, peripheral interface, voltage regulation, power management, and other control functions. Instead, memory may be used to store data used by the processor in performing operations.
[0061]That is, those skilled in the art can understand that all or part of the steps in the method for implementing the above embodiments can be completed by instructing the relevant hardware through a program, and the program is stored in a storage medium and includes several instructions to make a device ( It may be a single chip microcomputer, a chip, etc.) or a processor (processor) to execute all or part of the steps of the methods described in the various embodiments of the present application. The aforementioned storage medium includes: U disk, removable hard disk, Read-Only Memory (ROM, Read-Only Memory), Random Access Memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program codes.
[0062] Those skilled in the art can understand that the above-mentioned embodiments are specific examples for realizing the present invention, and in practical applications, various changes in form and details can be made without departing from the spirit and the spirit of the present invention. scope.
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Portable self-service borrowing method
InactiveCN105118193AImprove borrowing efficiencyReduce manpower requirements
Owner:成都亿邻通科技有限公司
Book management system and method for library
InactiveCN108765803AReduce lookup and retrieval timeImprove borrowing efficiency
Owner:CHONGQING IND POLYTECHNIC COLLEGE