Movatterモバイル変換


[0]ホーム

URL:


CN112967425B - Anti-unpacking monitoring method and device - Google Patents

Anti-unpacking monitoring method and device
Download PDF

Info

Publication number
CN112967425B
CN112967425BCN202110147058.9ACN202110147058ACN112967425BCN 112967425 BCN112967425 BCN 112967425BCN 202110147058 ACN202110147058 ACN 202110147058ACN 112967425 BCN112967425 BCN 112967425B
Authority
CN
China
Prior art keywords
box
server
unpacking
verification information
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110147058.9A
Other languages
Chinese (zh)
Other versions
CN112967425A (en
Inventor
罗巨明
朱国平
史大鹏
邵冠军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBCfiledCriticalIndustrial and Commercial Bank of China Ltd ICBC
Priority to CN202110147058.9ApriorityCriticalpatent/CN112967425B/en
Publication of CN112967425ApublicationCriticalpatent/CN112967425A/en
Application grantedgrantedCritical
Publication of CN112967425BpublicationCriticalpatent/CN112967425B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The invention discloses a method and a device for monitoring a disassembly-preventing box, wherein the method comprises the following steps: detecting a locking instruction of the anti-dismantling box, wherein a display screen is arranged on the anti-dismantling box shell; acquiring plaintext verification information randomly generated by a server according to a locking instruction, and displaying the plaintext verification information through a display screen arranged on a shell of the anti-dismantling box; acquiring a video image of the locking process of the anti-dismantling box, wherein the video image comprises the plaintext verification information; storing the collected video image to a server; and monitoring the locking process of the anti-unpacking box based on the video image stored in the server. The invention can realize the monitoring of the locking process of the anti-dismantling box and ensure that the commodity put into the anti-dismantling box by a seller is a real commodity.

Description

Anti-unpacking monitoring method and device
Technical Field
The invention relates to the technical field of internet, in particular to a method and a device for monitoring a box dismantling prevention.
Background
This section is intended to provide a background or context to the embodiments of the invention that are recited in the claims. The description herein is not admitted to be prior art by inclusion in this section.
With the continuous progress of internet technology, online shopping is rapidly developed. For some valuables (precious metal products, jewelry, jade, etc.), people are increasingly looking for online purchases. To ensure that the consumer receives the actual merchandise, the current practice is for the seller to place the valuables in a tamper-evident box to prevent the valuables from being replaced during shipment. This kind of mode can't prevent that seller puts into in the anti-unpacking case with fake goods or substandard product, also can't realize the control to the locking process of anti-unpacking case, has the potential safety hazard.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the invention provides a method for monitoring an anti-unpacking box, which is used for solving the technical problem that the locking process of the anti-unpacking box cannot be monitored by adopting the existing mode of transporting valuables by adopting the anti-unpacking box, and comprises the following steps: detecting a locking instruction of the anti-dismantling box, wherein a display screen is arranged on the anti-dismantling box shell; acquiring plaintext verification information randomly generated by the server according to a locking instruction, and displaying the plaintext verification information through a display screen arranged on the anti-dismantling box shell; acquiring a video image of the locking process of the anti-dismantling box, wherein the video image comprises the plaintext verification information; storing the collected video image to a server; and monitoring the locking process of the anti-unpacking box based on the video image stored in the server.
The embodiment of the invention also provides a device for monitoring the anti-dismantling box, which is used for solving the technical problem that the locking process of the anti-dismantling box cannot be monitored in the existing mode of transporting valuables by adopting the anti-dismantling box, and the device comprises: the anti-unpacking monitoring module is used for detecting a locking instruction of the anti-unpacking box, wherein a display screen is arranged on the anti-unpacking box shell; the verification information acquisition module is used for acquiring plaintext verification information randomly generated by the server according to the locking instruction and displaying the plaintext verification information through a display screen arranged on the anti-dismantling box shell; the video image acquisition module is used for acquiring a video image in the locking process of the anti-dismantling box, and the video image comprises the plaintext verification information; the video image storage module is used for storing the acquired video image to the server, wherein the video image contains plaintext verification information; and the anti-unpacking monitoring module is used for monitoring the locking process of the anti-unpacking box based on the video image stored in the server.
The embodiment of the invention also provides computer equipment for solving the technical problem that the locking process of the anti-unpacking box cannot be monitored by adopting the traditional mode of transporting valuables by adopting the anti-unpacking box.
The embodiment of the invention also provides a computer readable storage medium, which is used for solving the technical problem that the locking process of the anti-unpacking box cannot be monitored by adopting the traditional mode of transporting valuables by adopting the anti-unpacking box.
In the embodiment of the invention, the display screen for displaying the plaintext verification information is arranged on the anti-dismantling box shell, after the locking instruction of the anti-dismantling box is detected, the server randomly generates the plaintext verification information according to the locking instruction, and the plaintext verification information is displayed through the display screen arranged on the anti-dismantling box shell, so that the acquired video image containing the plaintext verification information in the locking process of the anti-dismantling box is stored in the server, and transportation personnel or consumers in the later period can conveniently monitor the locking process of the anti-dismantling box based on the video image containing the plaintext verification information stored in the server.
By the embodiment of the invention, the locking process of the anti-dismantling box can be monitored, and the commodities put into the anti-dismantling box by a seller are guaranteed to be real commodities.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts. In the drawings:
fig. 1 is a flowchart of a monitoring method for a tamper evident box according to an embodiment of the present invention;
FIG. 2 is a schematic view of a tamper evident box provided in an embodiment of the present invention;
FIG. 3 is a schematic view of a tamper-evident lock provided in an embodiment of the present invention;
FIG. 4 is a schematic view of an inner weft ring of a tamper-evident enclosure in accordance with an embodiment of the present invention;
FIG. 5 is a schematic view of a warp coil in a tamper-evident case according to an embodiment of the present invention;
FIG. 6 is a perspective view of a tamper evident case provided in an embodiment of the present invention;
fig. 7 is an internal structural view of a tamper controller provided in an embodiment of the present invention;
FIG. 8 is a schematic diagram of a value network transaction verification system provided in an embodiment of the present invention;
FIG. 9 is a flow chart of a method for verifying a value network transaction provided in an embodiment of the present invention;
FIG. 10 is a schematic view of a tamper-evident monitoring device provided in an embodiment of the present invention;
FIG. 11 is a schematic view of an alternative tamper-evident monitoring device provided in an embodiment of the present invention;
fig. 12 is a schematic diagram of a computer device provided in an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the embodiments of the present invention are further described in detail below with reference to the accompanying drawings. The exemplary embodiments and descriptions of the present invention are provided to explain the present invention, but not to limit the present invention.
The embodiment of the invention provides a method for monitoring an anti-unpacking box, which is characterized in that a display screen for displaying plaintext verification information is additionally arranged on the anti-unpacking box, and a verification code randomly generated when the anti-unpacking box is locked is displayed through the display screen, so that the fraudulent behavior of a seller can be prevented.
Fig. 1 is a flowchart of a monitoring method for a tamper-evident box according to an embodiment of the present invention, as shown in fig. 1, the method includes the following steps:
s101, detecting a locking instruction of the anti-dismantling box, wherein a display screen is arranged on the anti-dismantling box shell.
The tamper-proof box in the embodiment of the present invention is a packaging box that can prevent the box from being opened halfway. The display screen arranged on the anti-dismantling box is used for displaying the plaintext verification information randomly generated when the anti-dismantling box is locked.
And S102, acquiring plaintext verification information randomly generated by the server according to the locking instruction, and displaying the plaintext verification information through a display screen arranged on the anti-dismantling box shell.
It should be noted that, in the embodiment of the present invention, after the locking instruction of the anti-unpacking box is detected, the server randomly generates a plaintext verification information instead of the seller terminal, so that the security is higher.
For identification, in one embodiment, the plaintext verification information in the embodiment of the present invention may be a string of numbers or letters randomly generated by the server according to the lock instruction. And the method has stronger intuition by adopting the verification code of the plaintext number.
S103, collecting a video image of the locking process of the anti-dismantling box, wherein the video image contains plaintext verification information.
In specific implementation, the external camera or the camera arranged on the anti-dismantling box can be used for shooting the video image of the whole locking process of the seller for putting the commodity into the anti-dismantling box, locking the anti-dismantling box and displaying the plaintext verification information.
And S104, storing the acquired video image to a server.
It should be noted that, storing the collected video image containing the plaintext authentication information in the server instead of the seller terminal can prevent the video image from being tampered. In one embodiment, the collected video image containing the plaintext authentication information can be stored on a block link network, so that the tamper resistance of the video image is improved.
And S105, monitoring the locking process of the anti-unpacking box based on the video image stored in the server.
In order to improve the security of the verification information during the transmission process, in an embodiment, the method for monitoring the anti-unpacking device provided in the embodiment of the present invention may further include the following steps: acquiring plaintext verification information generated by a server according to a locking instruction; encrypting plaintext verification information by using a private key to obtain ciphertext verification information; decrypting the ciphertext verification information by using a public key corresponding to the private key to obtain plaintext verification information; and displaying the plaintext verification information through a display screen arranged on the anti-dismantling box shell.
In an embodiment, the method for monitoring an anti-unpacking box provided in the embodiment of the present invention may further include the following steps: receiving a video viewing request sent by a user terminal, wherein the video viewing request is used for requesting to view a video image of a locking process of an anti-dismantling box stored on a server; and sending the video image of the anti-unpacking and locking process to the user terminal according to the video viewing request.
The monitoring method for the anti-dismantling box provided by the embodiment of the invention can be applied to, but is not limited to, the anti-dismantling box shown in fig. 2. As shown in fig. 2, the tamper-proof case includes: thebox cover 201, thebox 202, prevent tearing open thelock 203, wherein, thebox 202 is used for placing valuables, and thebox cover 201 is used for covering thebox 202, seals the valuables placed in thebox 202, and the material ofbox cover 201,box 202 can adopt the material of moulding material, also can adopt other materials that the effect is the same such as wood.
In order to monitor the opening state of the tamper-proof box, in the tamper-proof box provided in the embodiment of the present invention, the tamper-proof locks 203 shown in fig. 3 are installed on the upper and lower edges of thebox cover 201 and thebox body 202, and as shown in fig. 3, the tamper-proof locks 203 include: anupper lock body 2031 and alower lock body 2032; wherein thelower lock 2032 is a main body part comprising:tamper controller 20321 anddisplay 20322.
The main bodies of theupper lock body 2031 and thelower lock body 2032 of theanti-disassembly lock 203 are installed in the frame material of thecase cover 201 and thecase body 202, i.e. the outer side of thecase cover 201 and the outer side of thecase body 202 are invisible, and the inner side is designed to be visible or invisible. Thedisplay screen 20322 of thelower lock 2032 is outside the surface of thecase 202, and displays information visible from the outside. Thetamper controller 20321 comprisesconductive contacts 5, 6,7, 8,9, 10, 11, 12, theconductive contacts 5, 6, 11, 12 are connected to the a, b, c, d ends of the warp and weft coils inside the casing of thecabinet 202, respectively, the weft coils being shown in fig. 4 and the warp coils being shown in fig. 5.
Fig. 6 is a perspective view of a tamper-evident box provided in an embodiment of the present invention, as shown in fig. 6. Thedisplay screen 20322 is used for displaying a verification code, for example, "23456789", which is generated by theonline mall server 801 and signed with a private key, and thetamper controller 20321 verifies the verification code (the verification code is verified with the public key of theonline mall server 801, and the verification code is authenticated to be generated by the online mall server 801), and thedisplay screen 20322 displays the verification code. The function of the verification code is to prevent a seller from not putting the valuables sold by the seller, such as putting fake commodities and inferior commodities, and the principle is as follows: the seller records videos of the process of putting valuables into the anti-unpacking box, uploads the videos to theonline mall server 801, the valuables in the videos need to be put into the anti-unpacking box, the anti-unpacking box is locked, and the process of the verification code is displayed on a display screen of the anti-unpacking box. The logistics company can check the video and verify that the verification code in the video is consistent with the verification code displayed on the display screen of the anti-unpacking box, otherwise, the transportation is refused. Similarly, the buyer can view the video and verify that the verification code in the video is consistent with the verification code displayed on the display screen of the anti-unpacking box, otherwise the buyer refuses to sign.
It should be noted that, in one embodiment, the conductive contact 5 corresponds to a, the conductive contact 6 corresponds to b, theconductive contact 11 corresponds to c, and theconductive contact 12 corresponds to d; in another embodiment, conductive contact 5 corresponds to b, conductive contact 6 corresponds to a,conductive contact 11 corresponds to d, andconductive contact 12 corresponds to c. It should be noted that the present invention is not limited to this, and any correspondence relationship that does not affect the function implementation may be exchanged.
In the embodiment of the present invention, the warp and weft coils provided on the anti-dismantling case are used to prevent thecase 202 from being cut. Similarly, theconductive contacts 1, 2, 3, and 4 of theupper lock 2031 are connected to the longitudinal and latitudinal coils inside thelid 201, respectively, to prevent thelid 201 from being cut.
For example, thebox cover 201 is provided with a warp and weft coil similar to thebox 202, the warp and weft coil end points are h, i, j, k, theconductive contacts 1, 2, 3, 4 of theupper lock 2031 are also respectively connected to the warp and weft coil end points h, i, j, k, for example, 1 corresponds to h,2 corresponds to i,3 corresponds to j,4 corresponds to k, or 1 corresponds to i,2 corresponds to h,3 corresponds to k,4 corresponds to j, and in specific implementation, other corresponding relations that do not affect the function implementation may be exchanged.
It should be noted that the crossing of the warp and weft threads inside the housing of thecover 201 and thehousing 202 is an absolute source. Theanti-removal lock 203 may be one such that the rear sides of thecase body 202 and thecase cover 201 are movably connected, as in a conventional case. The number of theanti-disassembly locks 203 can be two, so that the anti-disassembly box is arranged at the front and the back, and thebox cover 201 can be completely separated from thebox body 202, namely thebox cover 201 can be integrally removed.
Fig. 7 shows an internal structure of the tamper controller provided in the embodiment of the present invention, and as shown in fig. 7, thetamper controller 20321 includes: apower supply 701, amicro control unit 702, acurrent detection module 703 and awireless communication module 704.
Thepower source 701 is configured to provide power to each unit inside thetamper controller 20321, and optionally, a switch for controlling thepower source 701 may be further provided, the switch may be turned on only from inside thecasing 202, and when the casing is loaded with valuables, the switch may be turned on, and thepower source 701 is in a power supply state.
Thecurrent detection module 703 is connected to theconductive contacts 5, 6,7, 8,9, 10, 11, 12, and detects the currents of the four pairs oflines 5 and 6,7 and 8,9 and 10, 11 and 12, respectively. If one of the lines is open, the status of the line current is sent to themicro control unit 702. Thecurrent detection module 703 is composed of 4 sets of micro current detection sensors. 4 groups of micro current detection sensors respectively detect whether current exists from 5 to 6 circuits through the longitude and latitude, from 7 to 8 circuits through the longitude and latitude, from 9 to 10 circuits through the longitude and latitude, and from 11 to 12 circuits through the longitude and latitude. In order to make the 4 lines have current, one end (conductive contacts 5, 7, 9 and 11) of each line is connected to the positive pole of apower source 701, the other end of each line is connected to one end of a resistor R1, R2, R3 and R4 with different resistance values being approximately the same or completely the same, namely, the conductive contacts 6 are connected with R1 and R8 and R2 and 10 are connected with R3 and R12 and R4, and the other end of each line R1, R2, R3 and R4 is connected with the negative pole of thepower source 701, so that the current is generated in the lines and disappears unless the longitude and latitude lines are broken. The miniature current detection sensor is a current detection sensor with a tiny volume, is a general product, and can be found through hundred-degree search.
And themicro control unit 702 is used for controlling all the modules. The method comprises the steps of obtaining the voltage state of a voltage detection circuit, detecting the state of acurrent detection module 703, and setting the state to be 'abnormal disconnection' when a group of circuit current is disconnected. The locking state of the tamper resistant case can be reported by communicating with a mobile phone through thewireless communication module 704, and the locking state of the tamper resistant case can be set by communicating with a seller's computer. Themicro control unit 702 has a security management function, and is provided with a private key certificate inside, and performs signature processing on information sent outside by using the private key, and a public key matched with the private key is disclosed outside.
Thewireless communication module 704 is configured to wirelessly communicate with a mobile phone or a computer, and the communication mode may be bluetooth, RFID radio frequency, NB-IoT, or other internet of things communication modes.
Fig. 8 is a schematic diagram of a value network transaction verification system provided in an embodiment of the invention, as shown in fig. 8, the system includes: an onlineshopping mall server 801, a seller PC 802 (which may also be a mobile phone), ahandheld device 803 of a logistics company, a buyermobile phone 804 and a tamper-proof box 805.
Theonline mall server 801 may be an online shopping service processing system of an online mall platform, and manages shopping process information.
Thevendor PC 802 is responsible for setting the "locked" status of the tamperevident box 805. The seller loads the goods (valuables), opens the power switch of the anti-unpacking box and covers the box cover of the anti-unpacking box. The locking command is sent to the tamperevident box 805 through wireless communication, the tamperevident box 805 receives the command through the wireless receiving module, themicro control unit 702 first checks whether the current status is "unlocked" or "unlocked" (i.e., initial status), sets the status to "locked", and signs the status information with a private key certificate. The signed information is fed back to theseller PC 802, theseller PC 802 signs by using a private key of the seller again and then sends the signed information to theonline mall server 801, theonline mall server 801 verifies the signed information by using the anti-unpacking public key certificate, and the anti-unpacking record state is updated to be locked in the system after the verification is successful. And finally feeds the update result back to theseller PC 802.
The logistics company holds theequipment 803 in charge of setting theanti-dismantling box 805 in a 'transport' state. The wireless communication mode is used for sending a transportation instruction to theanti-dismantling box 805, theanti-dismantling box 805 receives the instruction through the wireless receiving module, themicro control unit 702 firstly checks whether the current state is a locked state, sets the state to be transportation, and signs the state information by using a private key certificate. The signed information is fed back to thehandheld device 803 of the logistics company, thehandheld device 803 of the logistics company signs by using a private key of thehandheld device 803 of the logistics company and then sends the signed information to theonline mall server 801, theonline mall server 801 verifies the signed information by using the anti-unpacking public key certificate, and the recorded state of the anti-unpacking information is updated to be 'transportation' in the system after the verification is successful. And finally, feeding back the updating result to thehandheld equipment 803 of the logistics company. If the status detected by themcu 702 is not "on lock," an error message is fed back. For example, if the tamper evident box is opened or the box is cut open, a "forced detachment" status will be fed back.
Buyer'scell phone 804 is installed with App software of the online shopping mall for the "unlocked" state of tamper evident 805. An 'unlocking' instruction is sent to theanti-tamper box 805 in a wireless mobile phone communication mode, theanti-tamper box 805 receives the instruction through a wireless receiving module, themicro control unit 702 firstly checks whether the current state is a 'transportation' state, sets the state to be 'unlocked', and signs the state information by using a private key certificate. The signed information is fed back to the buyermobile phone 804, the buyermobile phone 804 signs by using a private key of the buyermobile phone 804 and then sends the signed information to theonline mall server 801, theonline mall server 801 verifies the signed information by using the anti-unpacking public key certificate, and the anti-unpacking record state is updated to be 'transportation' in the system after the verification is successful. And finally, the updating result is fed back to themobile phone 804 of the buyer. If the state detected by themicro control unit 702 is not a "transport" state, an error message is fed back. For example, if the tamper evident box is opened or the box is cut open, a "forced detachment" status will be fed back.
The tamperevident boxes 805 may be devices issued by, registered with, or manufactured or purchased by the vendor, but need to be registered with the online mall. The registration needs to send the serial number of the anti-tamper box and the public key certificate to an online mall, and the online mall registers.
Fig. 9 is a flowchart of a method for verifying a network transaction of a valuable item according to an embodiment of the present invention, as shown in fig. 9, which specifically includes the following steps:
s901, registering an anti-unpacking box: the online mall personnel or the seller register the anti-unpacking box on the online mall server, the registration needs to send information such as the number and the public key of the anti-unpacking box to the online mall, the online mall records the information after receiving the information, and the user subsequently verifies the information sent by the anti-unpacking box.
S902, the seller sets the anti-unpacking state as the locking state: after the seller loads the goods (valuables), the power switch of the anti-unpacking box is opened, and the box cover of the anti-unpacking box is covered. The seller terminal (for example, a PC computer) sends a "lock" command to the tamper box through wireless communication, the tamper box receives the command through the wireless receiving module, themicro control unit 702 first checks whether the current state is "unlocked" or "unlocked" (i.e., the initial state), sets the state to "lock", and signs the state information with a private key certificate. And feeding back the signed information to the seller terminal, sending the information to the online mall server after the seller terminal signs by using a private key of the seller terminal, verifying by using the anti-unpacking public key of the online mall server, and updating the anti-unpacking record state to be locked in the system after the verification is successful. And finally, feeding the updating result back to the seller terminal.
S903, the online shopping mall sets the verification code for preventing unpacking: and in the last step, the update result fed back to the seller terminal by the online mall server also contains verification code information. A verification code, such as "23456789," is generated by the online mall server, and the number of the verification code is signed by the online mall server using a private key. And the online mall server feeds the signed verification code back to the seller terminal, and the seller terminal transmits the signed verification code to the anti-unpacking box in a wireless communication mode. The controller of the anti-disassembly lock on the anti-disassembly box verifies the verification code (the verification code is verified by using the public key of the online mall server, and the verification code is authenticated to be generated by the online mall server), and the verification code is displayed by a display screen arranged on the anti-disassembly box.
The seller takes a video of the process of loading the valuables into the tamper-evident box. Valuable articles need to be put into the anti-dismantling box in the video, the anti-dismantling box is locked, and the process of the verification code is displayed on a display screen of the anti-dismantling box. And uploading the shot video image to an online shopping mall server by the seller terminal. The function of the verification code is to prevent the seller from not faithfully placing the valuable items for sale, such as placing fake goods, inferior goods.
S904, the logistics company verifies the verification code of the anti-unpacking box: when the logistics company receives goods, the handheld device is used for accessing the online mall server, whether the verification code displayed in the boxing video is consistent with the verification code displayed on the display screen of the anti-unpacking box is verified, and if the verification code is not consistent, the transportation is refused.
S905, the logistics company sets the anti-unpacking box to be in a 'transportation' state: when the logistics company receives goods, the anti-unpacking device (namely the logistics company terminal) is adopted to set the anti-unpacking state to be the 'transportation' state. The anti-dismantling device comprises a micro control unit, a wireless receiving module, a transmission module and a receiving module, wherein the micro control unit is used for sending a 'transmission' instruction to the anti-dismantling box in a wireless communication mode, receiving the instruction by the wireless receiving module, checking whether the current state is a 'locked' state, setting the state to be 'transmission' and signing the state information by using a private key certificate. And feeding back the signed information to the handheld equipment of the logistics company, sending the signed information to the online mall server after the handheld equipment of the logistics company signs the information by using a private key of the handheld equipment of the logistics company, verifying the information by using the public key of the anti-unpacking box by the online mall server, and updating the recorded state of the anti-unpacking box in the system to be 'transportation' after the verification is successful. And finally, feeding back the updating result to the handheld equipment of the logistics company. If the status detected by the micro control unit is not "locked" status, an error message is fed back. For example, if the tamper evident box is opened or the box is cut open, a "forced detachment" status will be fed back.
S906, verifying the verification code of the anti-unpacking box by the buyer: when receiving goods, a user firstly accesses the online mall server by using a mobile phone (namely a buyer terminal), verifies whether the verification code displayed in the boxing video is consistent with the verification code displayed on the display screen of the anti-unpacking box, and if not, rejects the acceptance.
S907, verifying the state of the anti-unpacking box by the buyer: after receiving the goods, the user uses a mobile phone (provided with App software of an online shopping mall) to communicate with the anti-unpacking box, reads the state of the anti-unpacking box and judges whether the state is a 'transportation' state. After the anti-unpacking box sends the state information to the mobile phone, the mobile phone sends the state information to the online mall server for verification, the online mall server also uses the public key of the anti-unpacking box for verification, and sends the verification result to the mobile phone of the user. If the status of the tamper-proof box is read as abnormal, for example, as a "forcibly detached" status, the user rejects the shipment.
S908, setting the anti-unpacking box to be in an unlocking state: and after the user successfully verifies in the last step, receiving goods, and setting the anti-dismantling box to be in an 'unlocking' state by using a mobile phone. An unlocking instruction is sent to the anti-dismantling box in a wireless mobile phone communication mode, the anti-dismantling box receives the instruction through the wireless receiving module, the micro control unit sets the state to be unlocked, and the state information is signed by a private key certificate. And feeding back the signed information to the buyer mobile phone, sending the information to the online mall server after the buyer mobile phone signs by using a private key of the buyer mobile phone, verifying the information by using the anti-unpacking public key of the online mall server, and updating the anti-unpacking record state into transportation in the system after the verification is successful. And finally, feeding the updating result back to the mobile phone of the buyer.
S909, checking the delivery status of the tamper: after the user receives the goods, the logistics company uses the handheld device to visit the online shopping mall, checks whether the current state of the anti-dismantling box is in an 'unlocking' state, and if the current state is in the 'unlocking' state, the logistics company can leave the user to indicate that the user successfully receives the goods.
Based on the same inventive concept, the embodiment of the present invention further provides a monitoring device for preventing the box from being detached, as described in the following embodiments. Because the principle of solving the problems of the device is similar to that of the anti-unpacking monitoring method, the implementation of the device can refer to the implementation of the anti-unpacking monitoring method, and repeated parts are not described again.
Fig. 10 is a schematic view of a monitoring device for a tamper-evident box according to an embodiment of the present invention, as shown in fig. 10, the monitoring device includes: the system comprises an anti-box-dismantlingmonitoring module 11, a verificationinformation acquisition module 12, a videoimage acquisition module 13, a videoimage storage module 14 and an anti-box-dismantlingmonitoring module 15.
Theanti-unpacking monitoring module 11 is used for detecting a locking instruction of the anti-unpacking box, wherein a display screen is arranged on an anti-unpacking box shell; the verificationinformation acquisition module 12 is used for acquiring plaintext verification information randomly generated by the server according to the locking instruction and displaying the plaintext verification information through a display screen arranged on the anti-dismantling box shell; the videoimage acquisition module 13 is used for acquiring a video image of the locking process of the anti-dismantling box, wherein the video image comprises the plaintext verification information; the videoimage storage module 14 is configured to store the acquired video image to a server, where the video image includes plaintext verification information; and theanti-unpacking monitoring module 15 is used for monitoring the locking process of the anti-unpacking box based on the video image stored in the server.
In an embodiment, as shown in fig. 11, in the monitoring apparatus for preventing a box from being detached provided in the embodiment of the present invention, the verificationinformation obtaining module 12 includes: a verificationinformation obtaining unit 121, configured to obtain plaintext verification information generated by the server according to the locking instruction; a verificationinformation encryption unit 122, configured to encrypt plaintext verification information using a private key to obtain ciphertext verification information; the verificationinformation decryption unit 123 is configured to decrypt the ciphertext verification information by using the public key corresponding to the private key to obtain plaintext verification information; and the verificationinformation display unit 124 is used for displaying the plaintext verification information through a display screen arranged on the anti-dismantling box shell.
Optionally, in the embodiment of the present invention, the plaintext verification information obtained by the verificationinformation obtaining module 12 is a string of numbers or letters randomly generated by the server according to the locking instruction.
In an embodiment, as shown in fig. 11, the monitoring apparatus for preventing unpacking according to an embodiment of the present invention may further include: theverification request module 16 is configured to receive a video viewing request sent by a user terminal, where the video viewing request is used to request to view a video image of the anti-theft box locking process stored on the server; and the verificationinformation sending module 17 is used for sending the video image of the anti-dismantling box locking process to the user terminal according to the video viewing request.
Based on the same inventive concept, an embodiment of the present invention further provides a computer device, so as to solve the technical problem that the existing manner of transporting valuables by using a tamper-proof box cannot realize monitoring of the locking process of the tamper-proof box, fig. 12 is a schematic diagram of the computer device provided in the embodiment of the present invention, as shown in fig. 12, thecomputer device 12 includes amemory 121, aprocessor 122, and a computer program stored in thememory 121 and capable of running on theprocessor 122, and theprocessor 122 realizes the tamper-proof box monitoring method when executing the computer program.
Based on the same inventive concept, the embodiment of the invention also provides a computer readable storage medium, which is used for solving the technical problem that the locking process of the anti-unpacking box cannot be monitored in the conventional manner of transporting valuables by adopting the anti-unpacking box.
In summary, embodiments of the present invention provide a method, an apparatus, a computer device, and a computer readable storage medium for monitoring an anti-tamper box, in which a display screen for displaying plaintext verification information is disposed on an anti-tamper box housing, after a locking instruction of the anti-tamper box is detected, a server randomly generates plaintext verification information according to the locking instruction, and displays the plaintext verification information through the display screen disposed on the anti-tamper box housing, so that a video image acquired during locking of the anti-tamper box includes the plaintext verification information, and the acquired video image including the plaintext verification information is stored in the server, which may facilitate a later transportation worker or a consumer to monitor a locking process of the anti-tamper box based on the video image including the plaintext verification information stored in the server.
By the embodiment of the invention, the locking process of the anti-dismantling box can be monitored, and the commodities put into the anti-dismantling box by a seller are guaranteed to be real commodities. The embodiment of the invention is applied to the anti-dismantling box of the valuables, and can ensure that the valuables are not dismantled in the transportation process, thereby ensuring the safety and the anti-repudiation performance of the valuables in the transaction transportation and receiving processes.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above-mentioned embodiments are provided to further explain the objects, technical solutions and advantages of the present invention in detail, and it should be understood that the above-mentioned embodiments are only examples of the present invention and should not be used to limit the scope of the present invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (8)

CN202110147058.9A2021-02-032021-02-03Anti-unpacking monitoring method and deviceActiveCN112967425B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202110147058.9ACN112967425B (en)2021-02-032021-02-03Anti-unpacking monitoring method and device

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202110147058.9ACN112967425B (en)2021-02-032021-02-03Anti-unpacking monitoring method and device

Publications (2)

Publication NumberPublication Date
CN112967425A CN112967425A (en)2021-06-15
CN112967425Btrue CN112967425B (en)2023-03-28

Family

ID=76273673

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202110147058.9AActiveCN112967425B (en)2021-02-032021-02-03Anti-unpacking monitoring method and device

Country Status (1)

CountryLink
CN (1)CN112967425B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN114664011A (en)*2022-04-142022-06-24中国工商银行股份有限公司 Logistics management method, system, computer equipment, storage medium and program product

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103177220A (en)*2013-04-122013-06-26成都市易恒信科技有限公司Personal information encryption method in logistics system based on two-dimensional codes
CN110490505A (en)*2019-06-252019-11-22北京京东振世信息技术有限公司Logistics information processing method, device and equipment
CN111415445A (en)*2020-04-282020-07-14北京仁信证科技有限公司 Logistics box management method, device, computer equipment and storage medium
CN112270636A (en)*2020-11-252021-01-26广东广宇科技发展有限公司Block chain-based consignment logistics management method, device, terminal and storage medium

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103377422A (en)*2012-04-252013-10-30张洪波Commodity safety distribution system and method and commodity safety distribution terminal device
CN104129562B (en)*2014-08-042017-06-06矩众合能(天津)科技发展有限公司Internet of Things anti-counterfeit anti-theft package bin and its application method
CN105632330B (en)*2014-10-272019-03-19上海锐帆信息科技有限公司A kind of visualization digital Sealing arrangement
US10672211B2 (en)*2017-08-312020-06-02BinBox, Inc.Secure storage systems and methods
CN108177871A (en)*2017-12-182018-06-19合肥凯石投资咨询有限公司A kind of electronic seal lock and its application in logistics
US11208244B2 (en)*2018-05-242021-12-28Mindweaver LLCPortable and trackable security box and method for delivering and tracking security box
CN111115004A (en)*2018-10-312020-05-08北京外麦王科技有限公司Safety box and safety transportation method thereof
CN111572992B (en)*2020-05-282024-02-02中国工商银行股份有限公司Accommodation apparatus, control method, and system for transporting article

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103177220A (en)*2013-04-122013-06-26成都市易恒信科技有限公司Personal information encryption method in logistics system based on two-dimensional codes
CN110490505A (en)*2019-06-252019-11-22北京京东振世信息技术有限公司Logistics information processing method, device and equipment
CN111415445A (en)*2020-04-282020-07-14北京仁信证科技有限公司 Logistics box management method, device, computer equipment and storage medium
CN112270636A (en)*2020-11-252021-01-26广东广宇科技发展有限公司Block chain-based consignment logistics management method, device, terminal and storage medium

Also Published As

Publication numberPublication date
CN112967425A (en)2021-06-15

Similar Documents

PublicationPublication DateTitle
US20180032759A1 (en)Open registry for human identification
US20180108024A1 (en)Open registry for provenance and tracking of goods in the supply chain
US20180019872A1 (en)Open registry for internet of things including sealed materials
CN104823200B (en)Dynamic object label and associated system and method
US10152720B2 (en)Authentication tags and systems for golf clubs
US9256881B2 (en)Authenticating and managing item ownership and authenticity
US20160210547A1 (en)Identification Tag with Magnet Attachment and System for Supply Chain Management
WO2018075403A1 (en)Open registry for provenance and tracking of goods in the supply chain
CN105378774A (en) Secure transaction system and method
US9721259B2 (en)Rules-based selection of counterfeit detection techniques
CN105096134A (en)Security scheme for authenticating digital entities and aggregate object origins
US10958665B2 (en)Consumer and business anti-counterfeiting services using identification tags
WO2018067974A1 (en)Open registry for human identification
CN105940665A (en)Electronic device management system, electronic device management server, and electronic device management method
JP2008542940A (en) Product identifier verification
CN108573296A (en)False proof device, anti-counterfeiting system and method for anti-counterfeit
CN112967425B (en)Anti-unpacking monitoring method and device
CN203937986U (en)Internet of Things false-proof wine bottle
WO2018064329A1 (en)Open registry for internet of things including sealed materials
US9672505B2 (en)Method for verifying the authenticity of a terminal, corresponding device and program
CN214325890U (en)Anti-unpacking box and monitoring system thereof
CN208314828U (en)False proof device and anti-counterfeiting system
EP2717195B1 (en)Counterfeit detection
US20250054346A1 (en)Delivery container with signal-activated fastener
CN110399711A (en)Member identity identification method and device

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp