CN106408057A - Monitoring method of file in secret box, device and system - Google Patents

Monitoring method of file in secret box, device and system Download PDF

Info

Publication number
CN106408057A
CN106408057A CN201610991508.1A CN201610991508A CN106408057A CN 106408057 A CN106408057 A CN 106408057A CN 201610991508 A CN201610991508 A CN 201610991508A CN 106408057 A CN106408057 A CN 106408057A
Authority
CN
China
Prior art keywords
file
secrecy box
information
positional information
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610991508.1A
Other languages
Chinese (zh)
Inventor
章燚
杨琼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN SEA SKY LAND TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN SEA SKY LAND TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN SEA SKY LAND TECHNOLOGY Co Ltd filed Critical SHENZHEN SEA SKY LAND TECHNOLOGY Co Ltd
Priority to CN201610991508.1A priority Critical patent/CN106408057A/en
Publication of CN106408057A publication Critical patent/CN106408057A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Abstract

The embodiment of the invention is applied to the technical field of file security and provides a monitoring method of a file in a secret box, a device and a system. The method comprises the steps that when the triggering of a monitoring task is detected, an execution terminal in the secret box scans the RF code of a file in the secret box, the identity information of the file is obtained, the position information of the secret box is obtained, and the identity information and the position information are sent to a monitoring terminal. Compared with the prior art, according to the method, the file is scanned and the current position of the secret box is obtained through the execution terminal in the secret box, the obtained identity information of the file and the position information of the secret box are sent to the monitoring terminal, the monitoring terminal analyzes and processes the information sent by the execution terminal, the real-time information of the secret box and the file stored in the box can be grasped without opening the box, the problem of the difficult monitoring of the file in the secret box in the prior art is solved, at the same time, the position of the secret box can be obtained in real time, and the safety of the file in the secret box is ensured.

Description

The monitoring method of file, apparatus and system in a kind of secrecy box
Technical field
The invention belongs to file security technical field, the monitoring method of file in more particularly, to a kind of secrecy box, device and System.
Background technology
At present, the units such as large-scale company, and school, hospital, have much important file to need to deposit and transport, For such vital document, the security of file is particularly important, therefore most of files deposit with transportation in, all can Store files are come using secrecy box.In the prior art, by file storage in secrecy box after, user can lock to secrecy box, When needing file, then unlock and take out file.If user needs to carry out file in secrecy box to check, user is also needed to open secrecy Case is checked, and very bothers.
Content of the invention
Embodiment of the present invention technical problem to be solved is to provide the monitoring method of file, device in a kind of secrecy box And system is it is intended to solve the problems, such as that in secrecy box case in prior art, file monitor is difficult.
Embodiment of the present invention first aspect provides a kind of monitoring method of file in secrecy box, and methods described includes:
When monitor task is detected and being triggered, the execution terminal scanning being built in secrecy box leaves in secrecy box The radio frequency code of file, obtains the identification information of described file;
Obtain the positional information of described secrecy box;
Described identification information and described positional information are sent to monitor terminal.
Embodiment of the present invention second aspect provides a kind of monitoring method of file in secrecy box, and methods described includes:
When monitor task is detected and being triggered, the execution terminal scanning being built in secrecy box leaves in secrecy box The radio frequency code of file, obtains the identification information of described file, obtains the positional information of described secrecy box, and by described identification information It is sent to monitor terminal with described positional information;
Described monitor terminal by the described identification information receiving and described positional information respectively with preset described secrecy The positional information of the identification information of the file in case and preset described secrecy box is mated, if mating completely, generates clear Point finishes information.
The embodiment of the present invention third aspect provides a kind of supervising device of file in secrecy box, and described device includes:
Scan module, for when monitor task is detected and being triggered, the radio frequency of the file in secrecy box is left in scanning in Code, obtains the identification information of described file;
Acquisition module, for obtaining the positional information of described secrecy box;
Sending module, for being sent to monitor terminal by described identification information and described positional information.
Embodiment of the present invention fourth aspect provides a kind of monitoring system of file in secrecy box, and described system includes:
Execution terminal and monitor terminal;
Described execution terminal, for when monitor task is detected and being triggered, the file in secrecy box is left in scanning in Radio frequency code, obtains the identification information of described file, obtains the positional information of described secrecy box, and by described identification information with described Positional information is sent to monitor terminal;
Described monitor terminal, for by the described identification information receiving and described positional information respectively with preset described in The positional information of the identification information of the file in secrecy box and preset described secrecy box is mated, if mating completely, gives birth to Become to check the information of finishing.
The embodiment of the present invention the 5th aspect provides a kind of monitoring system of file in secrecy box, and described system includes:
Radio frequency code, file storage apparatus, execution terminal and monitor terminal;
Described execution terminal built-in is in secrecy box;
Described radio frequency code is arranged on the preset position that described file stores apparatus, for leaving described file storage in The identification information of the file in apparatus;
Described execution terminal includes scanning element, locator and transmission equipment;
Described scanning element, for when monitor task is detected and being triggered, the file in secrecy box is left in scanning in Radio frequency code, obtains the identification information of described file;
Described locator, for obtaining the positional information of described secrecy box;
Described transmission equipment, for being sent to monitor terminal by described identification information and described positional information;
Described monitor terminal, for by the described identification information receiving and described positional information respectively with preset described in The positional information of the identification information of the file in secrecy box and preset described secrecy box is mated, if mating completely, gives birth to Become to check the information of finishing.
Knowable to the embodiments of the present invention, the present invention passes through, when monitor task is detected and being triggered, to be built in secrecy Execution terminal scanning in case leaves the radio frequency code of the file in secrecy box in, obtains the identification information of file, obtains secrecy box Positional information, identification information and positional information are sent to monitor terminal, compared to prior art, the present invention passes through secrecy box In built-in execution terminal scanning file and the current location obtaining secrecy box, and by the identification information of the file obtaining and secrecy The positional information of case is sent to monitor terminal, then is analyzed processing by the information that monitor terminal sends to execution terminal, no Unpack and just can grasp the real time information of the file deposited in secrecy box and case, solve file monitor in secrecy box case in prior art Difficult problem, can obtain the position of secrecy box simultaneously in real time, more ensure that the safety of file in secrecy box.
Brief description
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing Have technology description in required use accompanying drawing be briefly described it should be apparent that, drawings in the following description be only this Some embodiments of invention, for those skilled in the art, without having to pay creative labor, can also root Obtain other accompanying drawings according to these accompanying drawings.
Fig. 1 be first embodiment of the invention provide secrecy box in file monitoring method realize schematic flow sheet;
Fig. 2 be second embodiment of the invention provide secrecy box in file monitoring method realize schematic flow sheet;
Fig. 3 be third embodiment of the invention provide secrecy box in file monitoring method realize schematic flow sheet;
Fig. 4 be fourth embodiment of the invention provide secrecy box in file monitoring method realize schematic flow sheet;
Fig. 5 is the structural representation of the supervising device of file in the secrecy box that fifth embodiment of the invention provides;
Fig. 6 is the structural representation of the supervising device of file in the secrecy box that sixth embodiment of the invention provides;
Fig. 7 is the structural representation of the monitoring system of file in the secrecy box that the present invention the seven, the 8th embodiment provides;
Fig. 8 is the structural representation of the monitoring system of file in the secrecy box that ninth embodiment of the invention provides;
Fig. 9 is the structural representation of the monitoring system of file in the secrecy box that tenth embodiment of the invention provides.
Specific embodiment
For enabling the goal of the invention of the embodiment of the present invention, feature, advantage more obvious and understandable, below in conjunction with Accompanying drawing in the embodiment of the present invention, is clearly and completely described it is clear that being retouched to the technical scheme in the embodiment of the present invention The embodiment stated is only a part of embodiment of the present invention, and not all embodiments.Based on the embodiment in the present invention, this area The every other embodiment that technical staff is obtained under the premise of not making creative work, broadly falls into the model of present invention protection Enclose.
Refer to Fig. 1, in the secrecy box that Fig. 1 provides for first embodiment of the invention, the monitoring method of file realizes flow process Schematic diagram, the present embodiment realizes process to execute terminal for what executive agent described this method, and this execution terminal built-in is in secrecy In case, in the secrecy box of offer in the embodiment of the present invention, the monitoring method of file includes:
S101, when monitor task is detected and being triggered, the execution terminal scanning being built in secrecy box leaves secrecy in The radio frequency code of the file in case, obtains the identification information of file;
When monitor task is detected and being triggered, can be, but not limited to including:When secrecy box is detected and locking;From detection Lock beginning to secrecy box, every the preset time period, trigger a monitor task, such as, every 10 minutes, this kind of method is led to File in run-down secrecy box at set intervals, preferably monitors and protects the file in secrecy box;When detecting Monitor terminal send monitoring instruction when, this kind of method be applied in the user at monitor terminal it should be understood that secrecy box preserve The present situation of file situation.
In the present embodiment, radio frequency code can be specifically RFID (Radio Frequency Identification, wirelessly RF identification) radio frequency code, execution terminal in can an integrated RFID scanning means, for scanning RFID radio frequency code.Conceptually come Say, wireless radio-frequency and traditional bar code scanning technique are much like, its purpose is all rapidly and accurately to identify target object.Mainly Difference is as follows:Radio frequency code in wireless radio-frequency is built-in with chip, can fresh information, simultaneously because wireless radio-frequency is By radio wave transmissions information, therefore identifier can be across other object identification radio frequency codes, and the identification process bar of bar code Other object lattice gears can not be had between code and identifier.In addition, radio frequency code can carry out batch identification.
Wherein, the identification information of file includes the numbering of file, can also include the title of file, classification, be stored in guarantor Time of close case etc..
S102, the positional information of acquisition secrecy box;
In the present embodiment, in execution terminal also can an integrated locator, for obtaining the positional information of secrecy box, this is fixed Position device can be, but not limited to including:Gps satellite locator, big-dipper satellite locator.
S103, identification information and positional information are sent to monitor terminal.
Identification information and positional information are sent to monitor terminal by execution terminal.
The monitoring method of file in secrecy box provided in an embodiment of the present invention, is triggered by monitor task is detected When, the execution terminal scanning being built in secrecy box leaves the radio frequency code of the file in secrecy box in, obtains the mark letter of file Breath, obtains the positional information of secrecy box, and identification information and positional information are sent to monitor terminal, compared to prior art, this Invention by built-in execution terminal scanning file in secrecy box and the current location obtaining secrecy box, and by the file obtaining The positional information of identification information and secrecy box is sent to monitor terminal, then is entered by the information that monitor terminal sends to execution terminal Row analyzing and processing, does not unpack and just can grasp the real time information of the file deposited in secrecy box and case, solves to maintain secrecy in prior art In case case, the difficult problem of file monitor, can obtain the position of secrecy box simultaneously in real time, more ensure that file in secrecy box Safety.
Refer to Fig. 2, in the secrecy box that Fig. 2 provides for second embodiment of the invention, the monitoring method of file realizes flow process Schematic diagram, the present embodiment still realizes process to execute terminal for what executive agent described this method, and this execution terminal built-in is in guarantor In close case, in the secrecy box of offer in the embodiment of the present invention, the monitoring method of file includes:
S201, when monitor task is detected and being triggered, the execution terminal scanning being built in secrecy box leaves secrecy in The radio frequency code of the file in case, obtains the identification information of file;
When monitor task is detected and being triggered, can be, but not limited to including:When secrecy box is detected and locking;From detection Lock beginning to secrecy box, every the preset time period, trigger a monitor task, such as, every 10 minutes, this kind of method is led to File in run-down secrecy box at set intervals, preferably monitors and protects the file in secrecy box;When detecting Monitor terminal send monitoring instruction when, this kind of method be applied in the user at monitor terminal it should be understood that secrecy box preserve The present situation of file situation.
In the present embodiment, radio frequency code can be specifically RFID radio frequency code, can an integrated RFID scanning dress in execution terminal Put, for scanning RFID radio frequency code.Conceptually, wireless radio-frequency and traditional bar code scanning technique are much like, its mesh Be all rapidly and accurately identification target object.The main distinction is as follows:Radio frequency code in wireless radio-frequency is built-in with chip, energy Enough fresh informations, simultaneously because wireless radio-frequency is that therefore identifier can be across other by radio wave transmissions information Object identification radio frequency code, and between the identification process bar code of bar code and identifier, can not have other object lattice gears.In addition, radio frequency code Batch identification can be carried out.
Wherein, the identification information of file includes the numbering of file, can also include the title of file, classification, be stored in guarantor Time of close case etc..
S202, the positional information of acquisition secrecy box;
In the present embodiment, in execution terminal also can an integrated locator, for obtaining the positional information of secrecy box, this is fixed Position device can be, but not limited to including:Gps satellite locator, big-dipper satellite locator.
S203, identification information and positional information are sent to monitor terminal;
Identification information and positional information are sent to monitor terminal by execution terminal.
S204, after receiving the control instruction of monitor terminal transmission, according to control instruction, export information warning and simultaneously control Secrecy box is locked.
This control instruction includes exporting information warning and controls secrecy box to be locked.Wherein, export information warning bag Include and continuously send out sharp, high-decibel sound, or persistently play the warning sentence of high-decibel, such as " please don't be close ".Control When secrecy box is locked, if the chamber door of secrecy box is in open mode moreover it is possible to control this chamber door to close, and locked, lock This secrecy box upper.
Further, also can execution terminal in an integrated camera, the direction of this camera just to secrecy box chamber door, and Towards outdoors, then this control instruction can also make this camera open, record situation at that time.
The monitoring method of file in secrecy box provided in an embodiment of the present invention, is triggered by monitor task is detected When, the execution terminal scanning being built in secrecy box leaves the radio frequency code of the file in secrecy box in, obtains the mark letter of file Breath, obtains the positional information of secrecy box, and identification information and positional information are sent to monitor terminal, compared to prior art, this Invention by built-in execution terminal scanning file in secrecy box and the current location obtaining secrecy box, and by the file obtaining The positional information of identification information and secrecy box is sent to monitor terminal, then is entered by the information that monitor terminal sends to execution terminal Row analyzing and processing, does not unpack and just can grasp the real time information of the file deposited in secrecy box and case, solves to maintain secrecy in prior art In case case, the difficult problem of file monitor, can obtain the position of secrecy box simultaneously in real time, more ensure that file in secrecy box Safety.
Refer to Fig. 3, in the secrecy box that Fig. 3 provides for third embodiment of the invention, the monitoring method of file realizes flow process Schematic diagram, the angle that the present embodiment is interacted with monitor terminal from execution terminal is described, the guarantor providing in the embodiment of the present invention In close case, the monitoring method of file includes:
S301, scanning leave the radio frequency code of the file in secrecy box in, obtain the identification information of file;
When monitor task is detected and being triggered, the execution terminal scanning being built in secrecy box leaves in secrecy box The radio frequency code of file, obtains the identification information of file scanning.
When monitor task is detected and being triggered, can be, but not limited to including:When secrecy box is detected and locking;From detection Lock beginning to secrecy box, every the preset time period, trigger a monitor task, such as, every 10 minutes, this kind of method is led to File in run-down secrecy box at set intervals, preferably monitors and protects the file in secrecy box;When detecting Monitor terminal send monitoring instruction when, this kind of method be applied in the user at monitor terminal it should be understood that secrecy box preserve The present situation of file situation.
In the present embodiment, radio frequency code can be specifically RFID radio frequency code, can an integrated RFID scanning dress in execution terminal Put, for scanning RFID radio frequency code.Conceptually, wireless radio-frequency and traditional bar code scanning technique are much like, its mesh Be all rapidly and accurately identification target object.The main distinction is as follows:Radio frequency code in wireless radio-frequency is built-in with chip, energy Enough fresh informations, simultaneously because wireless radio-frequency is that therefore identifier can be across other by radio wave transmissions information Object identification radio frequency code, and between the identification process bar code of bar code and identifier, can not have other object lattice gears.In addition, radio frequency code Batch identification can be carried out.
Wherein, the identification information of file includes the numbering of file, can also include the title of file, classification, be stored in guarantor Time of close case etc..
S302, the positional information of acquisition secrecy box;
In the present embodiment, in execution terminal also can an integrated locator, for obtaining the positional information of secrecy box, this is fixed Position device can be, but not limited to including:Gps satellite locator, big-dipper satellite locator.
S303, transmission identification information and positional information;
Identification information and positional information are sent to monitor terminal by execution terminal.
S304, by the identification information receiving and positional information respectively with preset secrecy box in file identification information Mated with the positional information of preset secrecy box;
Monitor terminal by the identification information receiving and positional information respectively with preset secrecy box in file mark The positional information of information and preset secrecy box is mated.
Wherein, if this secrecy box is in static storage configuration, the identification information of the file in preset secrecy box and preset The positional information of secrecy box can be the identification information and position that certain execution terminal once receiving of specifying of user sends Information, typically user can be deposited in secrecy box the identification information that the execution terminal that receives for the first time after file sends and Positional information is as this preset information it is also possible to the mark that sends of the execution terminal that receives for the first time after locking secrecy box Information and positional information are as this preset information;Identification information that the execution terminal that can also be received the last time sends and Positional information is as this preset information.If this secrecy box is in travel position, such as transport the process of examination paper, preset file The determination mode of identification information can be as above-mentioned each side formula, and preset positional information can be that user sets in monitor terminal in advance The route of this secrecy box put this time transport, when the positional information receiving is included in the route this time transporting, then position letter The match is successful for breath, further, can be with preset time information, the positional information that is, object time receives need to be included in this In the route of transport, and need to be in the section that this preset object time in the route that this transports is pointed to, then positional information The match is successful.
If S305 mates completely, generate and check the information of finishing.
If the identification information match of the file in the preset secrecy box of the identification information receiving, the positional information receiving Mate with the positional information of preset secrecy box, then confirm to mate completely, generate and check the information of finishing, check the information of finishing and include Identification information and positional information that the execution terminal receiving sends, may also include the time of checking, check user's name, and clear Point finishes after information generates and can export this information, can also set up and check database, this be checked the information of finishing and is added to this Check in database, for consulting afterwards.
The monitoring method of file in secrecy box provided in an embodiment of the present invention, is triggered by monitor task is detected When, the execution terminal scanning being built in secrecy box leaves the radio frequency code of the file in secrecy box in, obtains the mark letter of file Breath, obtains the positional information of secrecy box, and identification information and positional information are sent to monitor terminal, compared to prior art, this Invention by built-in execution terminal scanning file in secrecy box and the current location obtaining secrecy box, and by the file obtaining The positional information of identification information and secrecy box is sent to monitor terminal, then is entered by the information that monitor terminal sends to execution terminal Row analyzing and processing, does not unpack and just can grasp the real time information of the file deposited in secrecy box and case, solves to maintain secrecy in prior art In case case, the difficult problem of file monitor, can obtain the position of secrecy box simultaneously in real time, more ensure that file in secrecy box Safety.
Refer to Fig. 4, in the secrecy box that Fig. 4 provides for fourth embodiment of the invention, the monitoring method of file realizes flow process Schematic diagram, the angle that the present embodiment is still interacted with monitor terminal from execution terminal is described, and provides in the embodiment of the present invention In secrecy box, the monitoring method of file includes:
S401, scanning leave the radio frequency code of the file in secrecy box in, obtain the identification information of file;
When monitor task is detected and being triggered, the execution terminal scanning being built in secrecy box leaves in secrecy box The radio frequency code of file, obtains the identification information of file scanning.
When monitor task is detected and being triggered, can be, but not limited to including:When secrecy box is detected and locking;From detection Lock beginning to secrecy box, every the preset time period, trigger a monitor task, such as, every 10 minutes, this kind of method is led to File in run-down secrecy box at set intervals, preferably monitors and protects the file in secrecy box;When detecting Monitor terminal send monitoring instruction when, this kind of method be applied in the user at monitor terminal it should be understood that secrecy box preserve The present situation of file situation.
In the present embodiment, radio frequency code can be specifically RFID radio frequency code, can an integrated RFID scanning dress in execution terminal Put, for scanning RFID radio frequency code.Conceptually, wireless radio-frequency and traditional bar code scanning technique are much like, its mesh Be all rapidly and accurately identification target object.The main distinction is as follows:Radio frequency code in wireless radio-frequency is built-in with chip, energy Enough fresh informations, simultaneously because wireless radio-frequency is that therefore identifier can be across other by radio wave transmissions information Object identification radio frequency code, and between the identification process bar code of bar code and identifier, can not have other object lattice gears.In addition, radio frequency code Batch identification can be carried out.
Wherein, the identification information of file includes the numbering of file, can also include the title of file, classification, be stored in guarantor Time of close case etc..
S402, the positional information of acquisition secrecy box;
In the present embodiment, in execution terminal also can an integrated locator, for obtaining the positional information of secrecy box, this is fixed Position device can be, but not limited to including:Gps satellite locator, big-dipper satellite locator.
S403, transmission identification information and positional information;
Identification information and positional information are sent to monitor terminal by execution terminal.
S404, by the identification information receiving and positional information respectively with preset secrecy box in file identification information Mated with the positional information of preset secrecy box;
Monitor terminal by the identification information receiving and positional information respectively with preset secrecy box in file mark The positional information of information and preset secrecy box is mated.
Wherein, if this secrecy box is in static storage configuration, the identification information of the file in preset secrecy box and preset The positional information of secrecy box can be the identification information and position that certain execution terminal once receiving of specifying of user sends Information, typically user can be deposited in secrecy box the identification information that the execution terminal that receives for the first time after file sends and Positional information is as this preset information it is also possible to the mark that sends of the execution terminal that receives for the first time after locking secrecy box Information and positional information are as this preset information;Identification information that the execution terminal that can also be received the last time sends and Positional information is as this preset information.If this secrecy box is in travel position, such as transport the process of examination paper, preset file The determination mode of identification information can be as above-mentioned each side formula, and preset positional information can be that user sets in monitor terminal in advance The route of this secrecy box put this time transport, when the positional information receiving is included in the route this time transporting, then position letter The match is successful for breath, further, can be with preset time information, the positional information that is, object time receives need to be included in this In the route of transport, and need to be in the section that this preset object time in the route that this transports is pointed to, then positional information The match is successful.
If S405 mates completely, generate and check the information of finishing;
If the identification information match of the file in the preset secrecy box of the identification information receiving, the positional information receiving Mate with the positional information of preset secrecy box, then confirm to mate completely, generate and check the information of finishing, check the information of finishing and include Identification information and positional information that the execution terminal receiving sends, may also include the time of checking, check user's name, and clear Point finishes after information generates and can export this information, can also set up and check database, this be checked the information of finishing and is added to this Check in database, for consulting afterwards.
If not mating completely, execution step S406 and S407.
If S406 does not mate completely, export the positional information of the secrecy box receiving;
If not mating completely, the positional information of the secrecy box that monitor terminal output receives, further, can also be defeated Go out information, point out monitoring this secrecy box of end subscriber to exist abnormal.Monitoring end subscriber can according to the positional information of secrecy box, Before go to check whether this secrecy box exception, also the personnel near secrecy box can be commanded to check whether this secrecy box occurs different Often.
If S407 does not mate completely, send control instruction;
If not mating completely, monitor terminal, in addition to the positional information of the secrecy box that output receives, also refers to sending control Make to execution terminal, so that this execution terminal executes corresponding operation according to this control instruction.This control instruction includes output police Show information and control secrecy box to be locked.Wherein, output information warning includes continuously sending out sharp, high-decibel sound Sound, or persistently play the warning sentence of high-decibel, such as " please don't be close ".When controlling secrecy box to be locked, if secrecy box Chamber door is in open mode moreover it is possible to control this chamber door to close, and is locked, and locks this secrecy box.
Further, also can execution terminal in an integrated camera, the direction of this camera just to secrecy box chamber door, and Towards outdoors, then this control instruction can also make this camera open, record situation at that time.
S408, export information warning and control secrecy box to be locked.
Execution terminal, according to control instruction, exports information warning and controls secrecy box to be locked.
Further, a monitor terminal can control multiple execution terminals, when requiring to look up text document, Yong Huneng The identification information of enough input files in monitor terminal, finds the position that the corresponding secrecy box of this document and this secrecy box are located, User can be allowed quickly to obtain file.
The monitoring method of file in secrecy box provided in an embodiment of the present invention, is triggered by monitor task is detected When, the execution terminal scanning being built in secrecy box leaves the radio frequency code of the file in secrecy box in, obtains the mark letter of file Breath, obtains the positional information of secrecy box, and identification information and positional information are sent to monitor terminal, compared to prior art, this Invention by built-in execution terminal scanning file in secrecy box and the current location obtaining secrecy box, and by the file obtaining The positional information of identification information and secrecy box is sent to monitor terminal, then is entered by the information that monitor terminal sends to execution terminal Row analyzing and processing, does not unpack and just can grasp the real time information of the file deposited in secrecy box and case, solves to maintain secrecy in prior art In case case, the difficult problem of file monitor, can obtain the position of secrecy box simultaneously in real time, more ensure that file in secrecy box Safety.
Refer to Fig. 5, Fig. 5 is the structural representation of the supervising device of file in the secrecy box that fifth embodiment of the invention provides Figure, for convenience of description, illustrate only the part related to the embodiment of the present invention.The monitoring of file in the secrecy box of Fig. 5 example Device can be the executive agent of the monitoring method of file in the secrecy box that aforementioned first embodiment provides.The secrecy of Fig. 5 example The supervising device of file in case, main inclusion:Scan module 501, acquisition module 502, sending module 503.Each functional module is detailed Carefully it is described as follows:
Scan module 501, for when monitor task is detected and being triggered, being built in the execution terminal scanning in secrecy box Leave the radio frequency code of the file in secrecy box in, obtain the identification information of file.
Acquisition module 502, for obtaining the positional information of secrecy box.
Sending module 503, for being sent to monitor terminal by identification information and positional information.
Above-mentioned each module realizes the detailed process of its respective function, refers in the secrecy box that above-mentioned first embodiment provides The related content of the monitoring method of file, here is omitted.
The supervising device of file in secrecy box provided in an embodiment of the present invention, is triggered by monitor task is detected When, the execution terminal scanning being built in secrecy box leaves the radio frequency code of the file in secrecy box in, obtains the mark letter of file Breath, obtains the positional information of secrecy box, and identification information and positional information are sent to monitor terminal, compared to prior art, this Invention by built-in execution terminal scanning file in secrecy box and the current location obtaining secrecy box, and by the file obtaining The positional information of identification information and secrecy box is sent to monitor terminal, then is entered by the information that monitor terminal sends to execution terminal Row analyzing and processing, does not unpack and just can grasp the real time information of the file deposited in secrecy box and case, solves to maintain secrecy in prior art In case case, the difficult problem of file monitor, can obtain the position of secrecy box simultaneously in real time, more ensure that file in secrecy box Safety.
Refer to Fig. 6, Fig. 6 is the structural representation of the supervising device of file in the secrecy box that sixth embodiment of the invention provides Figure, for convenience of description, illustrate only the part related to the embodiment of the present invention.The monitoring of file in the secrecy box of Fig. 6 example Device can be the executive agent of the monitoring method of file in the secrecy box that aforementioned second embodiment provides.The secrecy of Fig. 6 example The supervising device of file in case, main inclusion:Scan module 601, acquisition module 602, sending module 603, performing module 604. Each functional module describes in detail as follows:
Scan module 601, for when monitor task is detected and being triggered, being built in the execution terminal scanning in secrecy box Leave the radio frequency code of the file in secrecy box in, obtain the identification information of file.
Acquisition module 602, for obtaining the positional information of secrecy box.
Sending module 603, for being sent to monitor terminal by identification information and positional information.
Performing module 604, for after receiving the control instruction of monitor terminal transmission, according to control instruction, output police Show information and control secrecy box to be locked.
Above-mentioned each module realizes the detailed process of its respective function, refers in the secrecy box that above-mentioned second embodiment provides The related content of the monitoring method of file, here is omitted.
The supervising device of file in secrecy box provided in an embodiment of the present invention, is triggered by monitor task is detected When, the execution terminal scanning being built in secrecy box leaves the radio frequency code of the file in secrecy box in, obtains the mark letter of file Breath, obtains the positional information of secrecy box, and identification information and positional information are sent to monitor terminal, compared to prior art, this Invention by built-in execution terminal scanning file in secrecy box and the current location obtaining secrecy box, and by the file obtaining The positional information of identification information and secrecy box is sent to monitor terminal, then is entered by the information that monitor terminal sends to execution terminal Row analyzing and processing, does not unpack and just can grasp the real time information of the file deposited in secrecy box and case, solves to maintain secrecy in prior art In case case, the difficult problem of file monitor, can obtain the position of secrecy box simultaneously in real time, more ensure that file in secrecy box Safety.
Refer to Fig. 7, Fig. 7 is the structural representation of the monitoring system of file in the secrecy box that seventh embodiment of the invention provides Figure, for convenience of description, illustrate only the part related to the embodiment of the present invention.The monitoring of file in the secrecy box of Fig. 7 example System can be the executive agent of the monitoring method of file in the secrecy box that aforementioned third embodiment provides.The secrecy of Fig. 7 example The monitoring system of file in case, main inclusion:Execution terminal 701 and monitor terminal 702.Each functional module describes in detail as follows:
Execution terminal 701, leaves the radio frequency code of the file in secrecy box in, obtains the identification information of file for scanning, Obtain the positional information of secrecy box, and identification information and positional information are sent to monitor terminal.
Monitor terminal 702, for by the identification information receiving and positional information respectively with preset secrecy box in literary composition The positional information of the identification information of part and preset secrecy box is mated, if mating completely, generating and checking the information of finishing.
Above-mentioned each module realizes the detailed process of its respective function, refers in the secrecy box that above-mentioned 3rd embodiment provides The related content of the monitoring method of file, here is omitted.
The monitoring system of file in secrecy box provided in an embodiment of the present invention, is triggered by monitor task is detected When, the execution terminal scanning being built in secrecy box leaves the radio frequency code of the file in secrecy box in, obtains the mark letter of file Breath, obtains the positional information of secrecy box, and identification information and positional information are sent to monitor terminal, compared to prior art, this Invention by built-in execution terminal scanning file in secrecy box and the current location obtaining secrecy box, and by the file obtaining The positional information of identification information and secrecy box is sent to monitor terminal, then is entered by the information that monitor terminal sends to execution terminal Row analyzing and processing, does not unpack and just can grasp the real time information of the file deposited in secrecy box and case, solves to maintain secrecy in prior art In case case, the difficult problem of file monitor, can obtain the position of secrecy box simultaneously in real time, more ensure that file in secrecy box Safety.
Referring still to Fig. 7, Fig. 7 is the structural representation of the supervising device of file in the secrecy box that eighth embodiment of the invention provides Figure, for convenience of description, illustrate only the part related to the embodiment of the present invention.The secrecy box that eighth embodiment of the invention provides The monitoring system of interior file can be the executive agent of the monitoring method of file in the secrecy box that aforementioned fourth embodiment provides.Figure The monitoring system of file in the secrecy box of 7 examples, main inclusion:Execution terminal 701 and monitor terminal 702.Each functional module is detailed Carefully it is described as follows:
Execution terminal 701, leaves the radio frequency code of the file in secrecy box in, obtains the identification information of file for scanning, Obtain the positional information of secrecy box, and identification information and positional information are sent to monitor terminal.
Monitor terminal 702, for by the identification information receiving and positional information respectively with preset secrecy box in literary composition The positional information of the identification information of part and preset secrecy box is mated, if mating completely, generating and checking the information of finishing, if Do not mate completely, then export the positional information of the secrecy box receiving, and send control instruction to execution terminal 701.
Execution terminal 701, for according to control instruction, exporting information warning and controlling secrecy box to be locked.
Above-mentioned each module realizes the detailed process of its respective function, refers in the secrecy box that above-mentioned fourth embodiment provides The related content of the monitoring method of file, here is omitted.
The monitoring system of file in secrecy box provided in an embodiment of the present invention, is triggered by monitor task is detected When, the execution terminal scanning being built in secrecy box leaves the radio frequency code of the file in secrecy box in, obtains the mark letter of file Breath, obtains the positional information of secrecy box, and identification information and positional information are sent to monitor terminal, compared to prior art, this Invention by built-in execution terminal scanning file in secrecy box and the current location obtaining secrecy box, and by the file obtaining The positional information of identification information and secrecy box is sent to monitor terminal, then is entered by the information that monitor terminal sends to execution terminal Row analyzing and processing, does not unpack and just can grasp the real time information of the file deposited in secrecy box and case, solves to maintain secrecy in prior art In case case, the difficult problem of file monitor, can obtain the position of secrecy box simultaneously in real time, more ensure that file in secrecy box Safety.
Refer to Fig. 8, Fig. 8 is the structural representation of the monitoring system of file in the secrecy box that ninth embodiment of the invention provides Figure, for convenience of description, illustrate only the part related to the embodiment of the present invention.The monitoring of file in the secrecy box of Fig. 8 example System, main inclusion:Radio frequency code 801, file storage apparatus 802, execution terminal 803 and monitor terminal 804, wherein execute terminal Scanning element 8031, locator 8032 and transmission equipment 8033 is comprised in 803.
Radio frequency code 801 is arranged on the preset position that file stores on apparatus 802, for the identification information of storage file, literary composition Part storage apparatus 802 can be specifically documents pouch, is used for depositing file.
In the present embodiment, radio frequency code can be specifically RFID radio frequency code, can an integrated RFID scanning dress in execution terminal Put, for scanning RFID radio frequency code.Conceptually, wireless radio-frequency and traditional bar code scanning technique are much like, its mesh Be all rapidly and accurately identification target object.The main distinction is as follows:Radio frequency code in wireless radio-frequency is built-in with chip, energy Enough fresh informations, simultaneously because wireless radio-frequency is that therefore identifier can be across other by radio wave transmissions information Object identification radio frequency code, and between the identification process bar code of bar code and identifier, can not have other object lattice gears.In addition, radio frequency code Batch identification can be carried out.
Execution terminal 803 is built in secrecy box, including scanning element 8031, locator 8032 and transmission equipment 8033.
Scanning element 8031, for when monitor task is detected and being triggered, the file in secrecy box is left in scanning in Radio frequency code, obtains the identification information of file.
When monitor task is detected and being triggered, can be, but not limited to including:When secrecy box is detected and locking;From detection Lock beginning to secrecy box, every the preset time period, trigger a monitor task, such as, every 10 minutes, this kind of method is led to File in run-down secrecy box at set intervals, preferably monitors and protects the file in secrecy box;When detecting Monitor terminal send monitoring instruction when, this kind of method be applied in the user at monitor terminal it should be understood that secrecy box preserve The present situation of file situation.
Wherein, the identification information of file includes the numbering of file, can also include the title of file, classification, be stored in guarantor Time of close case etc..
Locator 8032, for obtaining the positional information of secrecy box.
Locator 8032 can be, but not limited to including:Gps satellite locator, big-dipper satellite locator.
Transmission equipment 8033, for being sent to monitor terminal 804 by identification information and positional information.
Monitor terminal 804, for by the identification information receiving and positional information respectively with preset secrecy box in literary composition The positional information of the identification information of part and preset secrecy box is mated, if mating completely, generating and checking the information of finishing.
Wherein, if this secrecy box is in static storage configuration, the identification information of the file in preset secrecy box and preset The positional information of secrecy box can be the identification information and position that certain execution terminal once receiving of specifying of user sends Information, typically user can be deposited in secrecy box the identification information that the execution terminal that receives for the first time after file sends and Positional information is as this preset information it is also possible to the mark that sends of the execution terminal that receives for the first time after locking secrecy box Information and positional information are as this preset information;Identification information that the execution terminal that can also be received the last time sends and Positional information is as this preset information.If this secrecy box is in travel position, such as transport the process of examination paper, preset file The determination mode of identification information can be as above-mentioned each side formula, and preset positional information can be that user sets in monitor terminal in advance The route of this secrecy box put this time transport, when the positional information receiving is included in the route this time transporting, then position letter The match is successful for breath, further, can be with preset time information, the positional information that is, object time receives need to be included in this In the route of transport, and need to be in the section that this preset object time in the route that this transports is pointed to, then positional information The match is successful.
If the identification information match of the file in the preset secrecy box of the identification information receiving, the positional information receiving Mate with the positional information of preset secrecy box, then confirm to mate completely, generate and check the information of finishing, check the information of finishing and include Identification information and positional information that the execution terminal receiving sends, may also include the time of checking, check user's name, and clear Point finishes after information generates and can export this information, can also set up and check database, this be checked the information of finishing and is added to this Check in database, for consulting afterwards.
The monitoring system of file in secrecy box provided in an embodiment of the present invention, is triggered by monitor task is detected When, the execution terminal scanning being built in secrecy box leaves the radio frequency code of the file in secrecy box in, obtains the mark letter of file Breath, obtains the positional information of secrecy box, and identification information and positional information are sent to monitor terminal, compared to prior art, this Invention by built-in execution terminal scanning file in secrecy box and the current location obtaining secrecy box, and by the file obtaining The positional information of identification information and secrecy box is sent to monitor terminal, then is entered by the information that monitor terminal sends to execution terminal Row analyzing and processing, does not unpack and just can grasp the real time information of the file deposited in secrecy box and case, solves to maintain secrecy in prior art In case case, the difficult problem of file monitor, can obtain the position of secrecy box simultaneously in real time, more ensure that file in secrecy box Safety.
Refer to Fig. 9, Fig. 9 is the structural representation of the monitoring system of file in the secrecy box that tenth embodiment of the invention provides Figure, for convenience of description, illustrate only the part related to the embodiment of the present invention.The monitoring of file in the secrecy box of Fig. 9 example System, main inclusion:Radio frequency code 901, file storage apparatus 902, execution terminal 903 and monitor terminal 904, wherein execute terminal Comprise scanning element 9031, locator 9032, transmission equipment 9033, receiving device 9034, alarming device 9035 in 903, control Equipment 9036.
Radio frequency code 901 is arranged on the preset position that file stores on apparatus 902, for the identification information of storage file, literary composition Part storage apparatus 902 can be specifically documents pouch, is used for depositing file.
In the present embodiment, radio frequency code can be specifically RFID radio frequency code, can an integrated RFID scanning dress in execution terminal Put, for scanning RFID radio frequency code.Conceptually, wireless radio-frequency and traditional bar code scanning technique are much like, its mesh Be all rapidly and accurately identification target object.The main distinction is as follows:Radio frequency code in wireless radio-frequency is built-in with chip, energy Enough fresh informations, simultaneously because wireless radio-frequency is that therefore identifier can be across other by radio wave transmissions information Object identification radio frequency code, and between the identification process bar code of bar code and identifier, can not have other object lattice gears.In addition, radio frequency code Batch identification can be carried out.
Execution terminal 903 is built in secrecy box, including scanning element 9031, locator 9032 and transmission equipment 9033.
Scanning element 9031, for when monitor task is detected and being triggered, the file in secrecy box is left in scanning in Radio frequency code, obtains the identification information of file.
When monitor task is detected and being triggered, can be, but not limited to including:When secrecy box is detected and locking;From detection Lock beginning to secrecy box, every the preset time period, trigger a monitor task, such as, every 10 minutes, this kind of method is led to File in run-down secrecy box at set intervals, preferably monitors and protects the file in secrecy box;When detecting Monitor terminal send monitoring instruction when, this kind of method be applied in the user at monitor terminal it should be understood that secrecy box preserve The present situation of file situation.
Wherein, the identification information of file includes the numbering of file, can also include the title of file, classification, be stored in guarantor Time of close case etc..
Locator 9032, for obtaining the positional information of secrecy box.
Locator 9032 can be, but not limited to including:Gps satellite locator, big-dipper satellite locator.
Transmission equipment 9033, for being sent to monitor terminal 904 by identification information and positional information.
Monitor terminal 904, for by the identification information receiving and positional information respectively with preset secrecy box in literary composition The positional information of the identification information of part and preset secrecy box is mated, if mating completely, generating and checking the information of finishing.
Wherein, if this secrecy box is in static storage configuration, the identification information of the file in preset secrecy box and preset The positional information of secrecy box can be the identification information and position that certain execution terminal once receiving of specifying of user sends Information, typically user can be deposited in secrecy box the identification information that the execution terminal that receives for the first time after file sends and Positional information is as this preset information it is also possible to the mark that sends of the execution terminal that receives for the first time after locking secrecy box Information and positional information are as this preset information;Identification information that the execution terminal that can also be received the last time sends and Positional information is as this preset information.If this secrecy box is in travel position, such as transport the process of examination paper, preset file The determination mode of identification information can be as above-mentioned each side formula, and preset positional information can be that user sets in monitor terminal in advance The route of this secrecy box put this time transport, when the positional information receiving is included in the route this time transporting, then position letter The match is successful for breath, further, can be with preset time information, the positional information that is, object time receives need to be included in this In the route of transport, and need to be in the section that this preset object time in the route that this transports is pointed to, then positional information The match is successful.
If the identification information match of the file in the preset secrecy box of the identification information receiving, the positional information receiving Mate with the positional information of preset secrecy box, then confirm to mate completely, generate and check the information of finishing, check the information of finishing and include Identification information and positional information that the execution terminal receiving sends, may also include the time of checking, check user's name, and clear Point finishes after information generates and can export this information, can also set up and check database, this be checked the information of finishing and is added to this Check in database, for consulting afterwards.
Monitor terminal 904, if being additionally operable to not mate completely, exports the positional information of this secrecy box receiving, and to Execution terminal 903 sends control instruction.
If not mating completely, the positional information of the secrecy box that monitor terminal 904 output receives, further, also may be used To export information, monitoring this secrecy box of end subscriber is pointed out to exist abnormal.Monitoring end subscriber can be according to the position of secrecy box Information, front go to check whether this secrecy box exception, the personnel near secrecy box also can be commanded to check whether this secrecy box goes out Now abnormal.
If not mating completely, monitor terminal 904 also will send control instruction to execution terminal 903, so that this execution terminal Corresponding operation is executed according to this control instruction.This control instruction includes exporting information warning and controls on secrecy box carries out Lock.Wherein, output information warning includes continuously sending out sharp, high-decibel sound, or the warning persistently playing high-decibel Sentence, such as " please don't be close ".When controlling secrecy box to be locked, if the chamber door of secrecy box is in open mode being somebody's turn to do moreover it is possible to control Chamber door is closed, and is locked, and locks this secrecy box.
Execution terminal 903 also includes receiving device 9034, alarming device 9035 and the control being connected with the case lock of secrecy box Equipment 9036.
Receiving device 9034, for receiving the control instruction of monitor terminal transmission.
Alarming device 9035, for according to control instruction, exporting information warning.
Control device 9036, for according to control instruction, controlling secrecy box to be locked.
The monitoring system of file in secrecy box provided in an embodiment of the present invention, is triggered by monitor task is detected When, the execution terminal scanning being built in secrecy box leaves the radio frequency code of the file in secrecy box in, obtains the mark letter of file Breath, obtains the positional information of secrecy box, and identification information and positional information are sent to monitor terminal, compared to prior art, this Invention by built-in execution terminal scanning file in secrecy box and the current location obtaining secrecy box, and by the file obtaining The positional information of identification information and secrecy box is sent to monitor terminal, then is entered by the information that monitor terminal sends to execution terminal Row analyzing and processing, does not unpack and just can grasp the real time information of the file deposited in secrecy box and case, solves to maintain secrecy in prior art In case case, the difficult problem of file monitor, can obtain the position of secrecy box simultaneously in real time, more ensure that file in secrecy box Safety.
It should be noted that for aforesaid each method embodiment, for easy description, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because According to the present invention, some steps can be carried out using other orders or simultaneously.Secondly, those skilled in the art also should know Know, embodiment described in this description belongs to preferred embodiment, and involved action and module might not be all these Bright necessary.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion described in detail in certain embodiment Point, may refer to the associated description of other embodiments.
It is more than the description to the monitoring method of file, apparatus and system in secrecy box provided by the present invention, for this The technical staff in field, according to the thought of the embodiment of the present invention, all has change in specific embodiments and applications Place, to sum up, this specification content should not be construed as limitation of the present invention.

Claims (10)

1. in a kind of secrecy box the monitoring method of file it is characterised in that methods described includes:
When monitor task is detected and being triggered, the execution terminal scanning being built in secrecy box leaves the file in secrecy box in Radio frequency code, obtain the identification information of described file;
Obtain the positional information of described secrecy box;
Described identification information and described positional information are sent to monitor terminal.
2. the method for claim 1 is it is characterised in that described be sent to described identification information with described positional information After monitor terminal, including:
After receiving the control instruction that described monitor terminal sends, according to described control instruction, export information warning and control Described secrecy box is locked.
3. in a kind of secrecy box the monitoring method of file it is characterised in that methods described includes:
When monitor task is detected and being triggered, the execution terminal scanning being built in secrecy box leaves the file in secrecy box in Radio frequency code, obtain the identification information of described file, obtain the positional information of described secrecy box, and by described identification information and institute State positional information and be sent to monitor terminal;
Described monitor terminal by the described identification information receiving and described positional information respectively with preset described secrecy box in The identification information of file and the positional information of preset described secrecy box mated, if mating completely, generating and having checked Complete information.
4. method as claimed in claim 3 is it is characterised in that described monitor terminal is by the described identification information receiving and institute State positional information respectively with preset described secrecy box in the identification information of file and preset described secrecy box position letter After breath is mated, including:
If not mating completely, the positional information of the described secrecy box that described monitor terminal output receives, and to described execution Terminal sends control instruction;
Described execution terminal, according to described control instruction, exports information warning and controls described secrecy box to be locked.
5. in a kind of secrecy box the supervising device of file it is characterised in that described device includes:
Scan module, for when monitor task is detected and being triggered, the radio frequency code of the file in secrecy box is left in scanning in, obtains Identification information to described file;
Acquisition module, for obtaining the positional information of described secrecy box;
Sending module, for being sent to monitor terminal by described identification information and described positional information.
6. device as claimed in claim 5 is it is characterised in that described device also includes:
Performing module, for after receiving the control instruction that described monitor terminal sends, according to described control instruction, output police Show information and control described secrecy box to be locked.
7. in a kind of secrecy box the monitoring system of file it is characterised in that described system includes:
Execution terminal and monitor terminal;
Described execution terminal, for when monitor task is detected and being triggered, the radio frequency of the file in secrecy box is left in scanning in Code, obtains the identification information of described file, obtains the positional information of described secrecy box, and by described identification information and described position Information is sent to monitor terminal;
Described monitor terminal, for by the described identification information receiving and described positional information respectively with preset described secrecy The positional information of the identification information of the file in case and preset described secrecy box is mated, if mating completely, generates clear Point finishes information.
8. system as claimed in claim 7 it is characterised in that
Described monitor terminal, if being additionally operable to not mate completely, exports the positional information of the described secrecy box receiving, and to institute State execution terminal and send control instruction;
Described execution terminal, is additionally operable to, according to described control instruction, export information warning and control described secrecy box to be locked.
9. in a kind of secrecy box the monitoring system of file it is characterised in that described system includes:
Radio frequency code, file storage apparatus, execution terminal and monitor terminal;
Described execution terminal built-in is in secrecy box;
Described radio frequency code is arranged on the preset position that described file stores apparatus, for leaving described file storage apparatus in The identification information of interior file;
Described execution terminal includes scanning element, locator and transmission equipment;
Described scanning element, for when monitor task is detected and being triggered, the radio frequency of the file in secrecy box is left in scanning in Code, obtains the identification information of described file;
Described locator, for obtaining the positional information of described secrecy box;
Described transmission equipment, for being sent to monitor terminal by described identification information and described positional information;
Described monitor terminal, for by the described identification information receiving and described positional information respectively with preset described secrecy The positional information of the identification information of the file in case and preset described secrecy box is mated, if mating completely, generates clear Point finishes information.
10. system as claimed in claim 9 it is characterised in that
Described monitor terminal, if being additionally operable to not mate completely, exports the positional information of the described secrecy box receiving, and to institute State execution terminal and send control instruction;
Described execution terminal also includes receiving device, alarming device and the control device being connected with the case lock of described secrecy box;
Described receiving device, for receiving the control instruction that described monitor terminal sends;
Described alarming device, for according to described control instruction, exporting information warning;
Described control device, for according to described control instruction, controlling described secrecy box to be locked.
CN201610991508.1A 2016-11-10 2016-11-10 Monitoring method of file in secret box, device and system Pending CN106408057A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610991508.1A CN106408057A (en) 2016-11-10 2016-11-10 Monitoring method of file in secret box, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610991508.1A CN106408057A (en) 2016-11-10 2016-11-10 Monitoring method of file in secret box, device and system

Publications (1)

Publication Number Publication Date
CN106408057A true CN106408057A (en) 2017-02-15

Family

ID=59230603

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610991508.1A Pending CN106408057A (en) 2016-11-10 2016-11-10 Monitoring method of file in secret box, device and system

Country Status (1)

Country Link
CN (1) CN106408057A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865955A (en) * 2020-07-11 2020-10-30 广州斯沃德科技有限公司 Secure transportation monitoring method, device and system for confidential documents

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1816477A (en) * 2003-07-02 2006-08-09 美国邮政管理局 System and method for tracking shipment of items utilizing rfid-tags
CN102073891A (en) * 2011-01-28 2011-05-25 迈普通信技术股份有限公司 System and method for monitoring bank note box in real time
CN103544562A (en) * 2013-10-12 2014-01-29 佛山市中韬信息科技有限公司 Intelligent confidential article identification management system on basis of internet of things
CN103955781A (en) * 2014-03-14 2014-07-30 李志敏 Intelligent identification confidential article management system based on Internet of Things
CN105898704A (en) * 2016-06-17 2016-08-24 北京汉唐自远技术股份有限公司 Position information processing method
CN206193860U (en) * 2016-11-10 2017-05-24 深圳市海云天科技股份有限公司 Monitoring system for file in confidential box

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1816477A (en) * 2003-07-02 2006-08-09 美国邮政管理局 System and method for tracking shipment of items utilizing rfid-tags
CN102073891A (en) * 2011-01-28 2011-05-25 迈普通信技术股份有限公司 System and method for monitoring bank note box in real time
CN103544562A (en) * 2013-10-12 2014-01-29 佛山市中韬信息科技有限公司 Intelligent confidential article identification management system on basis of internet of things
CN103955781A (en) * 2014-03-14 2014-07-30 李志敏 Intelligent identification confidential article management system based on Internet of Things
CN105898704A (en) * 2016-06-17 2016-08-24 北京汉唐自远技术股份有限公司 Position information processing method
CN206193860U (en) * 2016-11-10 2017-05-24 深圳市海云天科技股份有限公司 Monitoring system for file in confidential box

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865955A (en) * 2020-07-11 2020-10-30 广州斯沃德科技有限公司 Secure transportation monitoring method, device and system for confidential documents

Similar Documents

Publication Publication Date Title
CN105761041A (en) Chemical intelligent management method and chemical intelligent management system
CN104700058B (en) Detection method and device for hand baggage
DE102015205300B4 (en) Apparatus, methods and computer programs for the apparatus for providing a lock control signal for a mobile logistics destination
CN106447847A (en) Access control system capable of ensuring recipient safety
CN206193860U (en) Monitoring system for file in confidential box
CN108279244A (en) A kind of urban track traffic safe examination system
CN105868952A (en) Consignment logistics management system
CN111028473B (en) Campus safety monitoring linkage identification system
CN108665125A (en) The method and system of harmful influence supervision are realized based on flow dynamic configuration
CN106327077A (en) Electrical maloperation-preventing control device based on entrance guard and control method thereof
CN106408057A (en) Monitoring method of file in secret box, device and system
EP3306578B1 (en) Authorisation for opening a storage compartment of an unmanned vehicle
DE102016120060A1 (en) Warding off a hazard
DE102011106202A1 (en) Method and system for monitoring the integrity of freight containers
CN107610261A (en) The system of management of withdrawing from the arena is entered in a kind of building site that can carry out
CN204759496U (en) Storehouse management system is rolled up to intelligence
WO2017025193A1 (en) Method and device for carrying out a screening of persons
CN101620754A (en) Inflight larder safety device and supervision method
CN207952030U (en) Automatic letter sorting machine and its sorting management system
CN109801455A (en) Control method, express delivery cabinet and the computer-readable medium of express delivery cabinet
EP3499476A1 (en) Gas measuring device
CN106254818A (en) Method for monitoring area
EP2822805B1 (en) Electronic identification plate for measuring devices
DE202016105595U1 (en) Safety system with a safety switch
CN206039611U (en) Escort trade management system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination