CN117351614A - Intelligent file cabinet management device and method with high safety - Google Patents

Intelligent file cabinet management device and method with high safety Download PDF

Info

Publication number
CN117351614A
CN117351614A CN202311398174.3A CN202311398174A CN117351614A CN 117351614 A CN117351614 A CN 117351614A CN 202311398174 A CN202311398174 A CN 202311398174A CN 117351614 A CN117351614 A CN 117351614A
Authority
CN
China
Prior art keywords
cabinet
file
intelligent
embedded host
archive
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311398174.3A
Other languages
Chinese (zh)
Inventor
刘怀春
苏学武
水军
龚波
何晓伟
邹越亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Xindehui Information Technology Co ltd
Original Assignee
Zhuhai Xindehui Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Xindehui Information Technology Co ltd filed Critical Zhuhai Xindehui Information Technology Co ltd
Priority to CN202311398174.3A priority Critical patent/CN117351614A/en
Publication of CN117351614A publication Critical patent/CN117351614A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/10Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property
    • G07F17/12Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property comprising lockable containers, e.g. for accepting clothes to be cleaned
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10297Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for handling protocols designed for non-contact record carriers such as RFIDs NFCs, e.g. ISO/IEC 14443 and 18092
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/13Sensors therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/166Detection; Localisation; Normalisation using acquisition arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Electromagnetism (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an intelligent file cabinet management device and method with high safety, comprising a file cabinet and an intelligent file cabinet control main system; the file cabinet comprises a main cabinet and a plurality of auxiliary cabinets; the intelligent file cabinet control main system comprises an electric door pivoted with the main cabinet and the auxiliary cabinet, an operation panel arranged on the main cabinet, RFID equipment and an information extraction camera arranged inside the main cabinet and the auxiliary cabinet, an embedded host arranged inside the main cabinet, and an intelligent file cabinet management system and an embedded host system arranged on the embedded host; the operation panel is provided with a display screen, a printer, fingerprint verification equipment, an authentication identification camera and bar code scanning equipment; the embedded host is respectively connected with the electric door, the RFID device, the information extraction camera, the display screen, the printer, the bar code scanning device, the fingerprint verification device and the authentication identification camera. The invention can safely realize automatic access, automatic checking, automatic alarming and automatic opening and closing of the file cabinet.

Description

Intelligent file cabinet management device and method with high safety
Technical Field
The invention relates to the technical field of file archive management, in particular to an intelligent file cabinet management device and method with high safety.
Background
The filing cabinet is a cabinet for storing office files, personal files and other data, and in the aspect of file management, such as file archiving, retrieval, checking, returning and the like, the traditional method is handled by file management staff, so that the efficiency is low. For example, when files are stored, the sorting is easy to be disturbed, so that the files are difficult to find; when the files are read, the required files are found from the file rack, which is very inconvenient; when the files are checked, the workload and the difficulty are great.
Along with the improvement of informatization level, the management of file files needs to be more convenient and scientific, and an intelligent file cabinet management device is generated. However, the safety of the existing intelligent filing cabinet management device needs to be improved when the intelligent filing cabinet management device is used.
Disclosure of Invention
The invention aims to solve the technical problem of providing the intelligent file cabinet management device and the intelligent file cabinet management method which are high in safety, and can safely realize automatic access, automatic checking, automatic alarming and automatic opening and closing of a file cabinet.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows.
An intelligent filing cabinet management device and method with high security comprises a filing cabinet and an intelligent filing cabinet control main system; the file cabinet comprises a main cabinet for storing archive files and a plurality of auxiliary cabinets; the intelligent filing cabinet control main system comprises an electric door pivoted with the main cabinet and the auxiliary cabinet, an operation panel arranged on the main cabinet and exposed out of the electric door of the main cabinet, RFID equipment arranged inside the main cabinet and the auxiliary cabinet for realizing identification of file labels, an information extraction camera for extracting file picture information and taking file personnel image information, an embedded host arranged inside the main cabinet for realizing device control, and an intelligent filing cabinet management system and an embedded host system arranged on the embedded host; the operation panel is provided with a display screen for realizing man-machine interaction, a printer for printing inventory data reports, fingerprint verification equipment and an authentication and identification camera for realizing identity authentication, and bar code scanning equipment for identifying bar codes; the embedded host is respectively connected with the electric door, the RFID device, the information extraction camera, the display screen, the printer, the bar code scanning device, the fingerprint verification device and the authentication identification camera; the intelligent file cabinet management system is linked with the embedded host system and displays the intelligent file cabinet management system and the embedded host system through the display screen.
Preferably, the embedded host adopts an encryption transmission protocol in the process of transmitting the instruction, and simultaneously, the instruction is transmitted by adopting a digital signature and an asymmetric encryption algorithm.
Preferably, the inside of the main cabinet and the auxiliary cabinet are divided into a plurality of layers which are longitudinally arranged by a baffle which is arranged and can shield the adjacent RFID interference; the intelligent file cabinet control main system comprises an operation panel and an embedded host, wherein the operation panel and the embedded host are arranged on the main cabinet and are convenient for personnel to operate.
Preferably, the main cabinet and the auxiliary cabinet are respectively provided with alarm equipment connected with the embedded host.
Preferably, the intelligent file cabinet management system can synchronize archive file information to the embedded host system, wherein the archive file information comprises initialization information, service information and operation flow information; in the synchronization process, the intelligent file cabinet management system can acquire a public key of the embedded host system, the intelligent file cabinet management system can randomly generate a symmetric key in the synchronization process, then the symmetric key is encrypted by the public key of the embedded host system and is synchronized to the embedded host system, in the data transmission process, the data are symmetrically encrypted, after the embedded host system acquires the encrypted data, the encrypted symmetric key is decrypted by the private key of the embedded host system to acquire symmetric key information, then the encrypted instruction data in the transmission process are decrypted by the symmetric key, and finally the decrypted instruction data are stored in the instruction data of the embedded host system.
Preferably, the embedded host system provides instruction data for the intelligent file cabinet management system, firstly obtains a public key of the intelligent file cabinet management system, the embedded host system randomly generates a symmetric key in the process of transmitting the instruction data, then encrypts the symmetric key by using the public key of the intelligent file cabinet management system, symmetrically encrypts data in the data transmission process, after the intelligent file cabinet management system obtains the encrypted data, decrypts the encrypted symmetric key by using the private key of the intelligent file cabinet management system to obtain symmetric key information, then decrypts the encrypted instruction data in the transmission process by using the symmetric key, and finally stores the decrypted instruction data in the instruction data of the intelligent file cabinet management system.
Preferably, the RFID device includes an RFID tag provided on each archive, a reader connected to a plurality of RFID tags, and an intermediate connected between the reader and the embedded host system.
Preferably, the authentication identification camera is a binocular camera.
The intelligent file cabinet management method with high safety is characterized by comprising the following steps of: the method comprises the following steps:
s1, synchronizing basic data to an embedded host system through a digital signature and an asymmetric encryption algorithm mode after an intelligent file cabinet management system logs in, and decrypting and initializing the embedded host system after acquiring encrypted data;
s2, storing the archive files in an intelligent file cabinet management system, setting an archive file state and storing the archive files in a storage state;
s3, after the archive file is put in storage, a borrowing approval process is initiated in the intelligent archive cabinet, and after the approval process passes, the archive file is marked as a borrowable state;
s4, carrying out tag classification on the archive file through a big data tag algorithm, uploading archive file pictures, carrying out information extraction on the archive file pictures through an intelligent image recognition algorithm by the archive file pictures, obtaining information characteristics of each archive file picture, and simultaneously realizing automatic analysis of the archive file by utilizing a big language text model;
s5, a user logs in the embedded host system in the main cabinet through a binocular camera and a fingerprint double-factor mode, the device can automatically identify and verify whether the face data and the fingerprint data information of the user are consistent with the face data and the fingerprint data in the device, and if so, the authority of the identity authentication access embedded host system is obtained;
s6, after the user initiates the document borrowing and approval by the intelligent document cabinet management system, the archive document can generate a borrowing bar code; inputting a borrowing bar code or requesting to submit the bar code to an embedded host after scanning the bar code through a bar code scanning device, wherein the embedded host system judges whether the bar code is effective or not and whether the bar code file allows borrowing or not, and if so, the borrowing is initiated;
s7, after the embedded host system acquires the borrowing instruction, automatically identifying the specific position of the archive file in the file cabinet, and automatically opening the file cabinet;
s8, when the user borrows the archive files of the intelligent archive cabinet, the intelligent archive cabinet judges whether the person who takes the archive files is the person who passes the identity verification just, if the person who takes the archive files is completely consistent, the user normally takes the archive files, and if the person who takes the archive files is inconsistent, an alarm sound is given;
s9, after the user borrows the archive files of the intelligent archive cabinet, automatically initiating inventory, and after inventory is performed through the RFID big data tag, finding that the archive files extracted by the user are wrong, and sending an alarm prompt;
s10, if the archive file borrowed by the user needs to be restored, a restoring flow is initiated in the intelligent file management system, after the restoring approval is passed, the intelligent file management system encrypts and issues a restoring state instruction to the embedded host system, and the embedded host system decrypts the restoring state of the archive file and stores the restoring state instruction into the embedded host database;
s11, the user logs in the embedded host system again through the two-factor authentication of the face and the fingerprint, and the authority of the identity authentication for accessing the embedded host system is obtained;
s12, after a user initiates file return and approval in the intelligent file cabinet management system, the archive file can generate a return bar code; inputting a return bar code or submitting the return bar code to an embedded host after scanning the return bar code through bar code scanning equipment, wherein an embedded host system judges whether the bar code is effective or not and whether the bar code allows return or not, and if the bar code allows return, returning is initiated;
s13, when the user returns the archive file of the intelligent archive cabinet, the intelligent archive cabinet judges whether the person returning the archive file is the person passing the identity verification, if the person is completely consistent, the user returns the archive file normally, and if the person is inconsistent, an alarm prompt is sent;
s14, the device can count the archive files of the intelligent file cabinet at regular time, and automatically generate a file cabinet count data report, and the count data report is automatically printed.
By adopting the technical scheme, the invention has the following technical progress.
Compared with the traditional mode, the invention can quickly search the required files according to the file attributes and file label information, and the searching speed is improved by about 50 times compared with the traditional mode; the invention can remind the user whether the file is normally acquired and returned in an automatic opening, automatic closing, automatic checking and automatic alarming mode, thereby greatly improving the borrowing speed, the returning speed and the checking counting speed.
Drawings
FIG. 1 is a schematic diagram of the structure of the present invention;
FIG. 2 is a schematic block diagram of the present invention;
fig. 3 is a flow chart of the present invention.
Wherein: 1. the device comprises a main cabinet, an operation panel, a display screen and a partition board.
Detailed Description
The invention will be described in further detail with reference to the drawings and the detailed description.
The utility model provides a high intelligent filing cabinet management device of security, combines the fig. 1 to 2 to show, includes filing cabinet and intelligent filing cabinet control main system, and wherein, intelligent filing cabinet control main system includes operating panel 2, electrically operated gate, RFID equipment, information extraction camera, alarm device and embedded host computer, and intelligent filing cabinet control main system passes through control filing cabinet, realizes that the filing cabinet is opened, is closed, file access, file inventory and automatic alarm.
The file cabinet comprises a main cabinet 1 and a plurality of auxiliary cabinets, wherein the main cabinet 1 and the auxiliary cabinets are pivoted with electric doors, the electric doors are of the prior art, the specific structure of the electric doors is not limited herein, and the electric doors realize automatic opening and automatic closing of the file cabinet through control. The inside of main cabinet 1 and vice cabinet is provided with baffle 4 along the vertical interval of cabinet body to separate into a plurality of layers of vertical range with main cabinet 1 and vice cabinet, and baffle 4 adopts special material, can shield nearby RFID interference, guarantees that current RFID radio frequency identification can not the file cabinet archive file near the disorder identification. Three partition boards 4 are arranged in the main cabinet 1, so that the main cabinet 1 is divided into four layers which are longitudinally arranged. The operation panel 2 and the embedded host computer of the intelligent filing cabinet control main system are arranged on the upper second layer of the main cabinet 1, so that the operation of personnel is convenient, and other three layers of the main cabinet 1 and each layer of the auxiliary cabinet are used for storing archive files.
The operation panel 2 is exposed out of the electric door of the main cabinet 1, and a display screen 3, a printer, fingerprint verification equipment, an authentication and identification camera and bar code scanning equipment are arranged on the operation panel 2, wherein the display screen 3 is used for realizing man-machine interaction; the printer is used for printing inventory data reports; the fingerprint verification device and the authentication recognition camera are used for realizing identity authentication; the bar code scanning device is used to identify borrowing bar codes and return bar codes. RFID equipment and information extraction camera all set up in the inside of main cabinet 1 and auxiliary cabinet, and RFID equipment is used for realizing archive file label discernment, and information extraction camera is used for extracting archive file picture information and getting and returning archive file personnel image information. The alarm equipment is arranged on the main cabinet 1 and the auxiliary cabinet and is used for realizing alarm.
The embedded host is respectively connected with the display screen 3, the alarm device, the printer, the fingerprint verification device, the authentication and identification camera, the bar code scanning device, the electric door, the RFID device and the information extraction camera, and the embedded host is also provided with an intelligent file cabinet management system and an embedded host system.
The embedded host comprises a CPU, a hard disk, a main board, a memory and other devices, the embedded host is used for realizing the overall control of the device, the embedded host is equivalent to a main controller of the device, the embedded host can receive the instruction input of face recognition, fingerprint recognition, RFID (radio frequency identification) equipment, an information extraction camera and a bar code scanning device by being connected with an authentication recognition camera, a fingerprint verification device, an RFID device, an information extraction camera and a bar code scanning device, and send out an output instruction after collecting the instruction data and carrying out background analysis and instruction algorithm calling, and the output instruction controls the operation execution of the intelligent file cabinet, and specifically controls the electric door, the RFID device, an alarm device and a printer. The embedded host can process the instructions and data of the multi-instruction multi-data stream simultaneously, and can realize the coordination of the instructions, an advanced safe encryption transmission protocol is adopted in the instruction transmission process, meanwhile, the transmission instructions adopt a digital signature and an asymmetric encryption algorithm, and the data requesters and the processors are legal signers and legal encryption and decryption persons, so that the safety, confidentiality and data integrity of the instructions and the data in the transmission process are ensured, and after the instructions and the data are received by the main cabinet 1 and the auxiliary cabinet, the instructions and the data are checked and decrypted, and the intelligent file cabinet opening, closing, file access, file checking and automatic alarm are executed.
The intelligent file cabinet management system is linked with the embedded host system and is displayed through the display screen 3. The intelligent file cabinet management system can synchronize file information to the embedded host system, wherein the file information comprises initialization information, service information and operation flow information, the intelligent file cabinet management system can acquire a public key of the embedded host system in the synchronization process, the intelligent file cabinet management system can randomly generate a symmetric key in the synchronization process, then the symmetric key is encrypted by the public key of the embedded host system and is synchronized to the embedded host system, in the data transmission process, symmetric encryption is carried out on data, after the encrypted data are acquired by the embedded host system, the encrypted symmetric key is decrypted by the private key of the embedded host system, symmetric key information is acquired, then encrypted instruction data in the transmission process are decrypted by the symmetric key, and finally the decrypted instruction data are stored in the instruction data of the embedded host system. Otherwise, if the embedded host system needs to provide instruction data for the intelligent file cabinet management system, the embedded host system firstly acquires the public key of the intelligent file cabinet management system, generates a symmetric key randomly in the process of transmitting the instruction data, then encrypts the symmetric key by using the public key of the intelligent file cabinet management system, symmetrically encrypts data in the data transmission process, decrypts the encrypted symmetric key by using the private key of the intelligent file cabinet management system after the intelligent file cabinet management system acquires the encrypted data, acquires symmetric key information, decrypts the encrypted instruction data in the transmission process by using the symmetric key, and finally stores the decrypted instruction data in the instruction data of the intelligent file cabinet management system.
Specifically, the RFID device includes an RFID tag, a reader, and middleware. An RFID tag is a small structure equipped with a chip and an antenna for attaching to an archive file; the RFID tag is mainly divided into an active tag and a passive tag, wherein a battery is arranged in the active tag and can actively transmit signals; the passive tag receives energy from the reader-writer and replies a response signal, the passive tag does not have a power supply, and the intelligent file cabinet adopts an identification mode of the active tag. The reader-writer is connected with a plurality of RFID tags, and is mainly used for communicating with the RFID tags, and the reader-writer can classify, summarize and package tag information by sending radio frequency signals to the RFID tags and receiving data returned by the RFID tags. The middleware is a software component between the reader and the embedded host system and is responsible for managing the collection and analysis of data, so that the RFID device is integrated into the existing embedded host system. Meanwhile, the RFID device can automatically identify the archive files of the intelligent archive cabinet in a non-contact manner, can automatically identify the archive files in different environments, and can identify a plurality of RFID tags through one reader-writer, so that quick and large-scale archive file identification is realized.
The fingerprint verification device mainly verifies the authenticity of the personal identity by sensing and identifying the characteristics of human fingerprints, because the fingerprint pattern of each person is unique, the authorized personal identity can be verified by comparing the fingerprints of the user with the fingerprints stored in the system database, so that the security is improved, the fingerprint verification device can replace the traditional login credentials, the user only needs to place the fingerprints in the scanning area of the device, and the device can compare the fingerprints with the stored pictures to confirm the identity of the user and grant corresponding access rights. The fingerprint verification device can be used for protecting personal data and sensitive data, and only authorized fingerprints can log in the intelligent file cabinet, so that unauthorized users are prevented from accessing the corresponding system.
The authentication recognition camera is a binocular camera, the binocular camera is an identity verification technology based on the binocular camera and a face recognition algorithm, facial images of a user are captured through the binocular camera at the same time, and the images are processed and matched through the face recognition algorithm so as to verify the characteristics of personal identities. The binocular camera can detect eye movement and three-dimensional morphological information of a user and is used for judging whether a face is a living body or not so as to prevent non-real face data such as pictures, videos and the like from being used. The binocular camera can recognize face recognition under different light rays and environmental conditions, and reliability and stability in complex scenes are improved. Compared with the fingerprint, the human face is a personal characteristic which is disclosed by comparison, and the double-factor verification mode of the binocular camera face recognition technology and the fingerprint recognition technology is combined to ensure the safe login system.
The main cabinet 1 and the auxiliary cabinet are linked in an antenna mode, namely, the communication between the electric door, the RFID equipment, the information extraction camera and the alarm equipment and the embedded host computer is realized in an antenna mode, so that the electric door opening and closing, file access, file checking and file automatic alarm functions of the main cabinet 1 and the auxiliary cabinet are controlled through the operation of the main cabinet 1.
The intelligent file cabinet management method with high safety comprises the following steps:
s1, after the intelligent file cabinet management system logs in, synchronizing basic data to the embedded host system through a digital signature and asymmetric encryption algorithm mode, and after the embedded host system acquires encrypted data, decrypting and initializing operation is carried out.
S2, storing the archive files in an intelligent file cabinet management system, setting an archive file state and storing the archive files in a storage state;
s3, after the archive file is put in storage, a borrowing approval process can be initiated in the intelligent archive cabinet, and after the approval process passes, the archive file is marked as a borrowable state.
S4, carrying out tag classification on the archive files through a big data tag algorithm, uploading archive file pictures, carrying out information extraction on the archive file pictures through an intelligent image recognition algorithm by the archive file pictures, obtaining information characteristics of each archive file picture, and simultaneously utilizing a big language text model to realize automatic analysis of the archive files.
S5, a user logs in the embedded host system in the main cabinet 1 through a binocular camera and fingerprint double-factor mode, the device can automatically identify and verify whether face data and fingerprint data information of the user are consistent with face data and fingerprint data in the device, and if so, the authority of the identity authentication access embedded host system is obtained.
S6, after the user initiates the document borrowing and approval by the intelligent document cabinet management system, the archive document can generate a borrowing bar code; and inputting a borrowing bar code or requesting to submit the bar code to the embedded host after scanning the bar code through the bar code scanning equipment, wherein the embedded host system judges whether the bar code is effective or not and whether the bar code file allows borrowing or not, and if so, the borrowing is initiated.
S7, after the embedded host system obtains the borrowing instruction, the specific position of the archive file in the file cabinet is automatically identified, and the file cabinet is automatically opened.
S8, when the user borrows the archive files of the intelligent archive cabinet, the intelligent archive cabinet can judge whether the person who gets the archive files is the person who passes the identity authentication just, if the person is completely consistent, the user normally gets the archive files, and if the person is inconsistent, an alarm sound is sent.
S9, after the user borrows the archive files of the intelligent file cabinet, the inventory is automatically initiated, and after the archive files extracted by the user are checked through the RFID big data tag, an alarm prompt can be sent.
S10, if the archive file borrowed by the user needs to be restored, a restoring flow is initiated in the intelligent file management system, after the restoring approval is passed, the intelligent file management system encrypts and issues a restoring state instruction to the embedded host system, and the embedded host system decrypts the restoring state of the archive file and stores the restoring state instruction into the embedded host database.
S11, the user logs in the embedded host system again through the two-factor authentication of the face and the fingerprint, and the authority of the identity authentication for accessing the embedded host system is obtained.
S12, after a user initiates file return and approval in the intelligent file cabinet management system, the archive file can generate a return bar code; and inputting a return bar code or submitting the return bar code to the embedded host after scanning the return bar code through the bar code scanning equipment, wherein the embedded host system judges whether the bar code is effective or not and whether the bar code allows return or not, and if the bar code allows return, returning is initiated.
S13, when the user returns the archive file of the intelligent archive cabinet, the intelligent archive cabinet can judge whether the person returning the archive file is the person passing the identity verification, if the person is completely consistent, the user returns the archive file normally, and if the person is inconsistent, an alarm prompt is sent.
S14, the device can count the archive files of the intelligent file cabinet at regular time, and automatically generate a file cabinet count data report, wherein the count data report can be automatically printed.
According to the invention, the system is ensured to log in safely by adopting double-factor authentication, the RFID radio frequency data interference is shielded by adopting a special isolation material, the safety of instruction data transmission is ensured by adopting a digital signature and an asymmetric algorithm, the archive file label is identified by adopting a big data label analysis system, the archive file image identification is realized by adopting an Internet of things sensing device and an image analysis technology, the borrowing, returning and checking conditions of the archive file are automatically analyzed by adopting an artificial intelligent AI technology, and the archive file text analysis is realized by adopting a natural language text big model.
The system is logged in by the two factors of the face identity characteristic and the fingerprint characteristic, in the login process, the system can automatically check whether the figure and the fingerprint of the logged-in person are matched with the data stored in the embedded host, and if the figure and the fingerprint are matched with the data stored in the embedded host, the system can log in normally. In the matching process, the face recognition can ensure that the login person is a normal face, and is not a picture or video login by using a living body detection technology.
By adopting special isolation materials to shield RFID radio frequency data interference, the materials can shield nearby RFID signals, and the current RFID radio frequency identification can not randomly identify nearby filing files of a filing cabinet.
The digital signature and the asymmetric algorithm are adopted to ensure the safety of data transmission, when the intelligent file cabinet management system transmits data to the embedded host system, the intelligent file cabinet management system identifies the identity of a main body through the digital signature and the encryption algorithm, encrypts the file cabinet instruction and the data, and the embedded system decrypts the data and stores the transmitted data. Otherwise, the embedded host system requests the intelligent cabinet management system data and adopts the same digital signature and asymmetric algorithm.
And the big data tag analysis platform automatically analyzes the tag database when the RFID sensing equipment sends a request, and the analysis result returns to the embedded host to trigger a control instruction and opens the file cabinet.
After the file cabinet picture data are obtained through the information extraction camera, the picture recognition algorithm can obtain file information, the file information is automatically stored in the embedded host system, and the file information is synchronized to the intelligent file cabinet management system.
The borrowing, returning and checking conditions of the archive files can be automatically analyzed through an AI analysis technology, the latest borrowing and returning conditions are analyzed, and an AI statistical report is automatically generated.
The file archive information is analyzed through the large natural language text model, the file archive content can be analyzed aiming at the user searching for the file archive content, and the large natural language text model answers the user searching questions in a self-training and self-learning mode.

Claims (9)

1. An intelligent filing cabinet management device that security is high, its characterized in that: the intelligent file cabinet control system comprises a file cabinet and an intelligent file cabinet control main system; the file cabinet comprises a main cabinet (1) for storing archive files and a plurality of auxiliary cabinets; the intelligent filing cabinet control main system comprises an electric door pivoted with the main cabinet (1) and the auxiliary cabinet, an operation panel (2) arranged on the main cabinet (1) and exposed out of the electric door of the main cabinet (1), RFID equipment arranged inside the main cabinet (1) and the auxiliary cabinet for realizing identification of filing file labels, an information extraction camera for extracting picture information of the filing file and taking back picture information of personnel of the filing file, an embedded host arranged inside the main cabinet (1) for realizing device control, and an intelligent filing cabinet management system and an embedded host system arranged on the embedded host; the operation panel (2) is provided with a display screen (3) for realizing man-machine interaction, a printer for printing inventory data reports, fingerprint verification equipment and an authentication and identification camera for realizing identity authentication and a bar code scanning equipment for identifying bar codes; the embedded host is respectively connected with the electric door, the RFID device, the information extraction camera, the display screen (3), the printer, the bar code scanning device, the fingerprint verification device and the authentication identification camera; the intelligent file cabinet management system is linked with the embedded host system and is displayed through the display screen (3).
2. The high security intelligent filing cabinet management apparatus of claim 1 wherein: the embedded host adopts an encryption transmission protocol in the process of transmitting the instruction, and simultaneously, the instruction is transmitted by adopting a digital signature and an asymmetric encryption algorithm.
3. The high security intelligent filing cabinet management apparatus of claim 1 wherein: the inside of the main cabinet (1) and the inside of the auxiliary cabinet are respectively divided into a plurality of layers which are longitudinally arranged by a baffle plate (4) capable of shielding RFID interference nearby; the intelligent file cabinet control main system comprises an operation panel (2) and an embedded host, wherein the operation panel and the embedded host are arranged on a main cabinet (1) and are convenient for personnel to operate.
4. The high security intelligent filing cabinet management apparatus of claim 1 wherein: alarm devices connected with the embedded host are arranged on the main cabinet (1) and the auxiliary cabinet.
5. The high security intelligent filing cabinet management apparatus of claim 1 wherein: the intelligent file cabinet management system can synchronize file information to the embedded host system, wherein the file information comprises initialization information, business information and operation flow information; in the synchronization process, the intelligent file cabinet management system can acquire a public key of the embedded host system, the intelligent file cabinet management system can randomly generate a symmetric key in the synchronization process, then the symmetric key is encrypted by the public key of the embedded host system and is synchronized to the embedded host system, in the data transmission process, the data are symmetrically encrypted, after the embedded host system acquires the encrypted data, the encrypted symmetric key is decrypted by the private key of the embedded host system to acquire symmetric key information, then the encrypted instruction data in the transmission process are decrypted by the symmetric key, and finally the decrypted instruction data are stored in the instruction data of the embedded host system.
6. The high security intelligent filing cabinet management apparatus of claim 1 wherein: the embedded host system provides instruction data for the intelligent file cabinet management system, firstly obtains a public key of the intelligent file cabinet management system, the embedded host system randomly generates a symmetric key in the process of transmitting the instruction data, then encrypts the symmetric key by using the public key of the intelligent file cabinet management system, symmetrically encrypts data in the data transmission process, decrypts the encrypted symmetric key by using a private key of the intelligent file cabinet management system after the intelligent file cabinet management system obtains the encrypted data, obtains symmetric key information, decrypts the encrypted instruction data in the transmission process by using the symmetric key, and finally stores the decrypted instruction data in the instruction data of the intelligent file cabinet management system.
7. The high security intelligent filing cabinet management apparatus of claim 1 wherein: the RFID device comprises RFID tags arranged on each archive file, a reader-writer connected with a plurality of RFID tags and an intermediate piece connected between the reader-writer and the embedded host system.
8. The high security intelligent filing cabinet management apparatus of claim 1 wherein: the authentication identification camera is a binocular camera.
9. The intelligent file cabinet management method with high safety is characterized by comprising the following steps of: the method comprises the following steps:
s1, synchronizing basic data to an embedded host system through a digital signature and an asymmetric encryption algorithm mode after an intelligent file cabinet management system logs in, and decrypting and initializing the embedded host system after acquiring encrypted data;
s2, storing the archive files in an intelligent file cabinet management system, setting an archive file state and storing the archive files in a storage state;
s3, after the archive file is put in storage, a borrowing approval process is initiated in the intelligent archive cabinet, and after the approval process passes, the archive file is marked as a borrowable state;
s4, carrying out tag classification on the archive file through a big data tag algorithm, uploading archive file pictures, carrying out information extraction on the archive file pictures through an intelligent image recognition algorithm by the archive file pictures, obtaining information characteristics of each archive file picture, and simultaneously realizing automatic analysis of the archive file by utilizing a big language text model;
s5, a user logs in the embedded host system in the main cabinet (1) through a binocular camera and a fingerprint double-factor mode, the device can automatically identify and verify whether the face data and the fingerprint data information of the user are consistent with the face data and the fingerprint data in the device, and if so, the authority of the identity authentication access embedded host system is obtained;
s6, after the user initiates the document borrowing and approval by the intelligent document cabinet management system, the archive document can generate a borrowing bar code; inputting a borrowing bar code or requesting to submit the bar code to an embedded host after scanning the bar code through a bar code scanning device, wherein the embedded host system judges whether the bar code is effective or not and whether the bar code file allows borrowing or not, and if so, the borrowing is initiated;
s7, after the embedded host system acquires the borrowing instruction, automatically identifying the specific position of the archive file in the file cabinet, and automatically opening the file cabinet;
s8, when the user borrows the archive files of the intelligent archive cabinet, the intelligent archive cabinet judges whether the person who takes the archive files is the person who passes the identity verification just, if the person who takes the archive files is completely consistent, the user normally takes the archive files, and if the person who takes the archive files is inconsistent, an alarm sound is given;
s9, after the user borrows the archive files of the intelligent archive cabinet, automatically initiating inventory, and after inventory is performed through the RFID big data tag, finding that the archive files extracted by the user are wrong, and sending an alarm prompt;
s10, if the archive file borrowed by the user needs to be restored, a restoring flow is initiated in the intelligent file management system, after the restoring approval is passed, the intelligent file management system encrypts and issues a restoring state instruction to the embedded host system, and the embedded host system decrypts the restoring state of the archive file and stores the restoring state instruction into the embedded host database;
s11, the user logs in the embedded host system again through the two-factor authentication of the face and the fingerprint, and the authority of the identity authentication for accessing the embedded host system is obtained;
s12, after a user initiates file return and approval in the intelligent file cabinet management system, the archive file can generate a return bar code; inputting a return bar code or submitting the return bar code to an embedded host after scanning the return bar code through bar code scanning equipment, wherein an embedded host system judges whether the bar code is effective or not and whether the bar code allows return or not, and if the bar code allows return, returning is initiated;
s13, when the user returns the archive file of the intelligent archive cabinet, the intelligent archive cabinet judges whether the person returning the archive file is the person passing the identity verification, if the person is completely consistent, the user returns the archive file normally, and if the person is inconsistent, an alarm prompt is sent;
s14, the device can count the archive files of the intelligent file cabinet at regular time, and automatically generate a file cabinet count data report, and the count data report is automatically printed.
CN202311398174.3A 2023-10-26 2023-10-26 Intelligent file cabinet management device and method with high safety Pending CN117351614A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311398174.3A CN117351614A (en) 2023-10-26 2023-10-26 Intelligent file cabinet management device and method with high safety

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311398174.3A CN117351614A (en) 2023-10-26 2023-10-26 Intelligent file cabinet management device and method with high safety

Publications (1)

Publication Number Publication Date
CN117351614A true CN117351614A (en) 2024-01-05

Family

ID=89366444

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311398174.3A Pending CN117351614A (en) 2023-10-26 2023-10-26 Intelligent file cabinet management device and method with high safety

Country Status (1)

Country Link
CN (1) CN117351614A (en)

Similar Documents

Publication Publication Date Title
JP6911154B2 (en) Access control methods and devices, systems, electronic devices, programs and media
US20190325682A1 (en) System and method for provisioning a facial recognition-based system for controlling access to a building
US7907753B2 (en) Access control system with symbol recognition
EP3704642B1 (en) Methods and system for controlling access to enterprise resources based on tracking
US20170032601A1 (en) Access control system and data processing method thereof
CN105261105B (en) Safety door inhibition method
CN105701885A (en) Face identification access control system and implementation method thereof
US20130076482A1 (en) Secure access system employing biometric identification
US20220253793A1 (en) Inventory management system
US20100174914A1 (en) System and method for traceless biometric identification with user selection
AU2007264675A1 (en) System and method for traceless biometric identification
CN107170093A (en) Authentication gate control system
CN107195045B (en) Gate inhibition's door bell and button system and security system
CN105320865A (en) Authentication method, collection device, authentication device and system, equipment cabinet and unlocking method
US20200327755A1 (en) Secure zone access control
US20110162058A1 (en) System and Method for Providing Convergent Physical/Logical Location Aware Access Control
Thakur et al. Wireless Fingerprint Based Security System Using ZigBee Technology
CN103400431A (en) Intelligent double-management and double-control secret carrier storage cabinet
Chen et al. Research and development of attendance management system based on face recognition and RFID technology
CN106340102A (en) Control method of access control system based on radio frequency identification and video monitoring
CN117351614A (en) Intelligent file cabinet management device and method with high safety
Bock Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication
CN109885994A (en) A kind of offline identity authorization system, equipment and computer readable storage medium
CN202217334U (en) Access control system based on vein identification
US8826389B2 (en) Multi-media identity management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination