CN101650844A - Control method and corresponding device for controlling automatic opening of confidential folder - Google Patents

Control method and corresponding device for controlling automatic opening of confidential folder Download PDF

Info

Publication number
CN101650844A
CN101650844A CN200810041554A CN200810041554A CN101650844A CN 101650844 A CN101650844 A CN 101650844A CN 200810041554 A CN200810041554 A CN 200810041554A CN 200810041554 A CN200810041554 A CN 200810041554A CN 101650844 A CN101650844 A CN 101650844A
Authority
CN
China
Prior art keywords
state
confidential folder
folder
customizing messages
confidential
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200810041554A
Other languages
Chinese (zh)
Inventor
郝淑芬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI DIHADA COMPUTER TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI DIHADA COMPUTER TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI DIHADA COMPUTER TECHNOLOGY Co Ltd filed Critical SHANGHAI DIHADA COMPUTER TECHNOLOGY Co Ltd
Priority to CN200810041554A priority Critical patent/CN101650844A/en
Publication of CN101650844A publication Critical patent/CN101650844A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a control method for controlling automatic opening of a confidential folder. The method comprises the following steps: a, determining whether a predetermined condition is met ornot, wherein the predetermined condition is used for indicating the opening of the confidential folder; and b, opening the confidential folder if the predetermined condition is met. Preferably, the method is to determine whether the current time exceeds the predetermined time or not, and determine whether the state corresponding to specific information is changed or not. The invention also provides a control device for controlling automatic opening of the confidential folder. The method and the device allow people to set an opening scheme in advance before the confidential folder is opened soas to ensure that the stored files and objects only can be acquired by people at expected time, and can avoid the losses caused by the influences of key loss, inside job and other unexpected/man-madefactors. The device is more suitable for storing the files and objects with special requirements on confidentiality and security, and can be widely applied in a plurality of fields, such as confidential services, legal services, corporate managements, business activities, public securities and the like.

Description

A kind of control method and corresponding device thereof of controlling automatic opening of confidential folder
Technical field
The present invention relates to have the locking devices such as safety cabinet that certain solid space is used to store capsule information, especially deposit the confidential folder or the secret locker of file, particularly, relate to control method and the corresponding device thereof of controlling automatic opening of confidential folder.
Background technology
The safety cabinet or other locker that are used for depositing various vital documents, article are seen everywhere in actual life, and for example people can place wall with home-use safety cabinet usually, and place cash therein, jewellery, house property relevant document and other article; For example enterprise places accounting office usually with safety cabinet again, and places article such as cash, check, enterprise's seal therein.In fact small-sized safety cabinet like this has similar function with the mass file cabinet that is used for memory file, promptly provides certain space to come storage file, article, and has one or multi-channel lock usually, so that provide safety guarantee for stored file, article.File cabinet is normally used for archive office, and for example such file cabinet may be placed by the office of large enterprise, is used for storing various files specially; For example lawyer's office also can buy file cabinet again, and the upright file cabinet that can slide is first-selected, and such file cabinet can be so that the secretary reads the file that places in a certain hurdle more easily.
Make a general survey of above-mentioned various safety cabinet, file cabinet or other locker, its characteristics are to have certain storage space, have one or multi-channel lock simultaneously.But these safety cabinets, file cabinet and even the equipment such as suitcase with safety lock are normally unblanked by the input password or with key, such equipment may because of password or key be lost and cause this document cabinet or file to be opened by the disabled user, thereby causes file, article lost; Also may be opened, for example open safety cabinet or file cabinet under the unwarranted situation of personnel of password or key certainly, thereby cause some vital documents to be divulged a secret on inappropriate opportunity.For example; lawyer's office is through regular meeting's some vital documents of keeping; for example testament or other legal documents that just comes into force in certain particular moment; theoretically; testament should just come forth after testator's death; so files such as testament can be placed in the file cabinet, and after testator's death, open this document cabinet.But set-up mode according to existing file cabinet, safety cabinet, as long as have correct password or key, can open this document cabinet, safety cabinet whenever and wherever possible, therefore the part staff may occur and be bribed and the situation of the cabinet that opens file privately, there is potential safety hazard in this.Conclusion is got up, and whether such drawback is that this document cabinet, safety cabinet controlled by the people, rather than control it according to specified conditions very much and open.
Prior art is paid close attention to the degree of safety that how to improve coded lock or mechanical lock, for example, application number is 200410087146 Chinese patent, by random series being encrypted the complexity that increases password, thereby improve the security of electronic lock, again for example, application number is 200310108152 Chinese patent, by with mechanical lock combining wireless electricity warning device, make relevant personnel's discovery in time to the illegal unlatching of lockset, thereby improve the degree of safety of electronic lock, and do not consider technical scheme according to specified conditions file opening cabinet.
Summary of the invention
At the defective of opening safety cabinet or file cabinet, confidential folder in the prior art by modes such as password or keys, the purpose of this invention is to provide and a kind ofly control confidential folder control of turning method and control corresponding device according to specified conditions.
According to an aspect of the present invention, provide a kind of control method of controlling automatic opening of confidential folder, wherein, comprise the steps: that a. judges whether to conform to a predetermined condition, wherein, described predetermined condition is used for indication and opens confidential folder; B. if conform to a predetermined condition, then open described confidential folder.
Preferably, described confidential folder comprises security lock arrangement, this security lock arrangement is used for described file is pinned, and open this document folder after receiving correct release information, wherein, the step of the described confidential folder of unlatching among the described step b comprises the steps: that b1. sends release information to described security lock arrangement.
Preferably, described step a comprises: a1. judges whether the current time surpasses the described schedule time.Preferably, described step a also comprises: a1 '. whether the state of judging described customizing messages correspondence is changed, and wherein, described step b comprises the steps: then to open described confidential folder if the state of described customizing messages correspondence is changed.
Preferably, described control method wherein, also comprises: c. writes down the operation of described unlatching confidential folder.Preferably, described step c comprises: the operation of described unlatching confidential folder is sent to a central database by wireless communication mode.
According to another aspect of the present invention, also provide a kind of control device of controlling automatic opening of confidential folder, it is characterized in that, comprise: first judgment means, be used to judge whether to conform to a predetermined condition, wherein, described predetermined condition is used for indication and opens confidential folder; And first actuating unit, open described confidential folder when being used to conform to a predetermined condition.
The present invention determines whether to open the equipment of confidential folder or classified document cabinet or similar stores by judging whether predetermined condition is satisfied.Compared with prior art, the present invention allows people to set in advance the scheme of unlatching before confidential folder is opened, so that the file article of depositing only just can be acquired on desirable opportunity, like this, can avoid suffering a loss because of key accident/artificial factor such as lose, defalcate.In the preferred case,, there are not key or other openers in principle, only just can open satisfying under the situation of specified conditions at confidential folder provided by the invention.Therefore, the present invention is more suitable for the file article that confidentiality and security there are specific demand in depositing, for example, there are the legal documents of strict demand the time of disclosure, in emergency circumstances just allows the gauge tap used etc.Device provided by the invention, equipment and/or control method can be widely used in various fields such as security services, legal services, company management, commercial activity, public safety.
Description of drawings
By reading the detailed description of non-limiting example being done with reference to the following drawings, it is more obvious that other features, objects and advantages of the present invention will become:
Fig. 1 illustrates according to the first embodiment of the present invention, the process flow diagram of the control method of control automatic opening of confidential folder;
Fig. 2 illustrates according to the first embodiment of the present invention, judges the process flow diagram of the control method whether predetermined condition is satisfied in the process of control automatic opening of confidential folder;
Fig. 3 illustrates according to a second embodiment of the present invention, judges the process flow diagram of the control method whether predetermined condition is satisfied in the process of control automatic opening of confidential folder;
Fig. 4 illustrates according to the first embodiment of the present invention, controls the structural representation of the control device of described automatic opening of confidential folder;
Fig. 5 illustrates according to the first embodiment of the present invention, the structural representation of first judgment means 41 in the control device 4 shown in Figure 4;
Fig. 6 illustrates according to a specific embodiment of the present invention, the structured flowchart of the control device of control automatic opening of confidential folder;
Fig. 7 illustrates according to another embodiment of the present invention, the network topological diagram of the control device of control automatic opening of confidential folder;
Fig. 8 illustrates according to another embodiment of the present invention, the network topological diagram of the control device of control automatic opening of confidential folder;
Embodiment
In the prior art, confidential folder or classified document cabinet or other are similarly stored the equipment of important item always by inputing password artificially or being unlocked by importing other information of opening confidential folders, for example make and turn the key in the lock or open the door by the scanning of biological characteristics such as fingerprint, and confidential folder provided by the invention, only when satisfying specified conditions, automatically open, like this can so that this confidential folder only when meeting specified conditions, just can open, opened by mistake the possibility that opens thereby reduced, improved the security of classified document.Preferably, the invention provides a kind of control method of controlling automatic opening of confidential folder; Preferably, also provide a kind of confidential folder that can be opened automatically.
Particularly, Fig. 1 illustrates according to the first embodiment of the present invention, the process flow diagram of the control method of control automatic opening of confidential folder.At first execution in step S101 judges whether to conform to a predetermined condition, and wherein, described predetermined condition is used to indicate whether to open described confidential folder, preferably satisfies and opens described confidential folder under the situation of this predetermined condition.As if described judged result negate, promptly do not meet described predetermined condition, then do not open described confidential folder, re-execute described step S101; If described judged result is sure, promptly meet described predetermined condition, then change execution in step S102 over to.
It will be appreciated by those skilled in the art that if the judged result of step S101 negates, then judge whether to meet described predetermined condition again, be satisfied until this condition in next particular moment.This is actually the process of a cycle criterion, for example can judge once that every 5 minutes perhaps carry out such judgement in the shorter cycle, the cycle of judgement is depended on the levels of precision of specific embodiment, and it changes does not influence flesh and blood of the present invention.Further, those skilled in the art also understand, in a not preferred embodiment, also can carry out described step S101 according to the trigger condition of outside, promptly when receiving a trigger condition, carry out once described step S101, such trigger condition can be a various ways, for example with the trigger condition that is updated to of third party database, be trigger condition every the pulse signal that the regular hour was sent for example again with outside timer, again for example with the trigger condition that is changed to of extraneous light intensity, those skilled in the art can realize these trigger conditions in conjunction with prior art, do not repeat them here.
It will be appreciated by those skilled in the art that the described predetermined condition of above-mentioned steps S101 can realize by variety of way.For example preferably, described predetermined condition comprises the schedule time, and wherein, the described schedule time is used to refer to confidential folder and when opens automatically.Preferably, described predetermined condition comprises whether the state of customizing messages correspondence is changed, and wherein, described customizing messages comprises personnel, assets and incident.For example, Fig. 2, embodiment illustrated in fig. 3 different predetermined conditions described respectively.
Next, in step S102, carry out the prompting operation that described confidential folder is about to be unlocked.In the present embodiment, described classified document is clipped in before the automatic unlatching, carries out the prompting operation that described confidential folder is about to be unlocked in advance.Those skilled in the art understand, described confidential folder does not rely on the input password or is unlocked by importing other information of opening confidential folder, but only when meeting specified conditions, just can open, therefore, when opening, if without any prompting, nobody knows that this confidential folder is about to be unlocked probably.Before described automatic opening of confidential folder, because nobody can open described file, file article wherein are in safe state, but in case behind the described automatic opening of confidential folder, then anyone can both obtain file article wherein easily, so, for the sake of security, must guarantee in described automatic opening of confidential folder have personnel on duty aside.
Consider above-mentioned situation, in the present embodiment, in advance personnel are pointed out before being implemented in described automatic opening of confidential folder by step S102.Particularly, can be accomplished in several ways above-mentioned prompting operation, for example, described confidential folder can comprise warning light, wherein, lighted in the certain hour of described warning light before described automatic opening of confidential folder, be used for being about to open automatically after the described classified document of prompting personnel is clipped in certain hour, on duty so that the arrangement personnel carry out; Again for example, described confidential folder can comprise display screen, and wherein, described display screen is used for showing the concrete time of described automatic opening of confidential folder; Again for example, described confidential folder can come display reminding information by controlling outside display device, for example embodiment as shown in Figure 7; Again for example, can finish prompting operation, for example play the prompting of " No. 5 file is about to be unlocked " by playing device by sending specific sound.Certainly, above-mentioned warning light, display screen (device), audio unit also can be placed in outside the described confidential folder, controlling these equipment by described confidential folder by wired or wireless mode correspondingly operates, for example in a strong-room, deposited a plurality of confidential folders, and in duty room, described warning light is set correspondingly, suggestion device such as display screen (device), audio unit.Further, it will be appreciated by those skilled in the art that and point out the specific people if desired, also can perhaps point out this specific people by mobile phone, home phone number, the Work Telephone of putting through this specific people to modes such as this specific people send SMS message.Those skilled in the art can not repeat them here in conjunction with the above-mentioned prompting operation of existing techniques in realizing.
After the execution in step S102, continue execution in step S103, send release information to described safety lock.Preferably, described confidential folder comprises security lock arrangement, and this security lock arrangement is used for described file is pinned, and opens this document folder after receiving correct release information.Those skilled in the art understand, described security lock arrangement can be an electronic lock, promptly adopt electronic circuit control, with electromagnet or micromotor and lock body electromechanical integration safety apparatus as topworks, it generally comprises control section and topworks, art technology technician can utilize prior art (for example, the development and the development of electronic lock " both at home and abroad " is stated from the 4th phase of " electrotechnics " nineteen ninety-five) to realize above-mentioned electronic lock.Described release information then is and the corresponding unlock command of described security lock arrangement that for example, if described security lock arrangement is an infrared electronic lock, then described release information can be an infrared signal; Again for example, if described security lock arrangement is the radio frequency electric lock, then described release information can be a radiofrequency signal; Again for example, if the control section of described security lock arrangement is a microprocessor, then described release information can be the variation of a pulse or level.Those skilled in the art can realize such device in conjunction with prior art, do not repeat them here.
Send release information by execution in step S103 to described security lock arrangement, and open described confidential folder by execution in step S104.Particularly, described security lock arrangement carries out release after receiving described release information, to open described confidential folder.Those skilled in the art can this step in conjunction with prior art, for example at least can with reference to denomination of invention be " electric control door lock " Chinese patent application (application number: 03808286.1) and denomination of invention for the Chinese patent application of " locks for doors " (application number: 200510052474.1) and denomination of invention be the Chinese patent application (application number: 02151796.7), do not repeat them here of " the method and system equipment of wireless centralized control gate inhibition/door lock ".
At last, execution in step S105, the operation of described confidential folder opened in record.Particularly, can write down the time that described confidential folder is unlocked, can also write down with this and open corresponding predetermined condition, like this, can strengthen management, especially can inquire about the open record of this confidential folder easily the file article of being preserved in the described confidential folder.
It will be appreciated by those skilled in the art that above-mentioned steps S105 can be accomplished in several ways, for example in a preferred embodiment, it comprises step: the operation of described unlatching confidential folder is sent to a central database by wireless communication mode.For example, the management system or the corresponding with it database that adapt with this confidential folder that the time that described confidential folder can be unlocked sends to notary organs by the WAP mode will be so that will fix the usefulness of evidence; Again for example, can be sent in the management system or database of upper management mechanism by the WiFi mode opening corresponding predetermined condition with this.Those skilled in the art at least can also be with reference to the Chinese patent application (application number: 200810041121.5) realize this step, do not repeat them here of denomination of invention for " a kind of novel confidential folder ".
And change in the example at one, above-mentioned steps S102 can be omitted.It will be appreciated by those skilled in the art that when some emergency conditioies takes place people wish that described classified document double-layered quilt promptly opens, and make that the article in the described confidential folder can promptly be obtained by people, then at this moment can omit step S102.For example, in combustion gas manufacturing enterprise, enterprise has been equipped with respirator for the employee, so that prevent that the employee from sucking toxic gas when gas leakage takes place, these respirators leave in the described confidential folder at ordinary times, when sensor measurement is too high to airborne combustion gas level, described confidential folder is without prompting operation, but directly sends release information with automatic unlatching, like this to described security lock arrangement, the employee just can put on respirator as soon as possible, and is for example embodiment illustrated in fig. 8.Those skilled in the art understand, such variation example does not influence flesh and blood of the present invention, in the situation of above-mentioned example, before described safe cabinet is opened, the related personnel has accumulated in the cupboard next door and has waited for that cupboard is opened, at this moment, whether send above-mentioned prompting operation and do not influence concrete enforcement of the present invention.Similarly, do not need to point out under related personnel's the situation in other existence, for example the article of preserving in this confidential folder are unimportant, and perhaps this confidential folder itself has been placed in the home-use safe, and then described step S102 all can be omitted.
And change in the example at another, step S102 and step S103 location swap on execution sequence, this does not influence flesh and blood of the present invention.In this variation example, if the judged result of step S101 is sure, then follows first execution in step S103 and send release information to described security lock arrangement, at this moment, described security lock arrangement is not to carry out release immediately; And then execution in step S102, promptly carry out the prompting operation that described confidential folder is about to be unlocked; At last, change step S104 again over to and do processing further.In other words, described security lock arrangement is unblanked information to opening the described confidential folder from reception, exists the regular hour, carries out on duty so that the user has sufficient time to the arrangement personnel.
And in another changed example, when not needing the operation of described unlatching confidential folder write down, then step S105 can be omitted, and this does not influence flesh and blood of the present invention yet.
In first embodiment shown in Fig. 1, to having carried out overall description by the process of the processing of predetermined condition being controlled the confidential folder unlatching, wherein, relate to whether satisfying the deterministic process of predetermined condition, those skilled in the art can realize processing to predetermined condition in conjunction with prior art.For example, in first embodiment shown in Fig. 2, preferably, described predetermined condition can comprise the schedule time, promptly judges whether meeting the described schedule time; In second embodiment shown in Fig. 3, preferably, described predetermined condition can comprise whether the state of customizing messages correspondence is changed, if the state of described customizing messages correspondence is changed, then opens described confidential folder.
Particularly, Fig. 2 illustrates according to the first embodiment of the present invention, judges the process flow diagram of the control method whether predetermined condition is satisfied in the process of control automatic opening of confidential folder.In the present embodiment, at first execution in step S211 obtains the described schedule time.Preferably, the described schedule time is set in the memory storage that described confidential folder can read, and further preferably this memory storage is placed in described confidential folder inside, thereby improves the level of security of confidential folder provided by the invention.Preferably, the above-mentioned schedule time in confidential folder, pack into behind file or other article that need preserve and close this confidential folder after be provided with, perhaps before closing this confidential folder, be provided with.Further, described memory storage can be write once device (for example, programmable read only memory (EPROM)), promptly after being provided with the described schedule time, then can not revise the described schedule time; Described memory storage can also be the read-write equipment that has write-protect switch; this write-protect switch is set to a read states before closing this classified document; like this, revise this schedule time if desired, then must after described confidential folder is opened, reset.In the present embodiment, described confidential folder can directly read the described schedule time from described memory storage.
Next execution in step S212 obtains the current time.Concrete, can obtain the described current time in several ways.For example, described confidential folder can comprise clock apparatus, provides power supply by battery for this clock apparatus, and this clock apparatus is set to the standard time, and described confidential folder can obtain the described current time by this clock apparatus; Again for example, described confidential folder can comprise radio receiver, by the third party system (for example, the time service platform and the gps system at country time service center) obtain the described current time, for example the Current Standard time is outwards issued in this third party's system cycle ground, thereby described confidential folder receives and obtains the current time by described receiving trap.Those skilled in the art understand, described receiving trap can adopt GPRS receiver or WiFi receiver or Bluetooth Receiver or based on the receiving trap of any agreement in the agreements such as TD-SCDMA, WCDMA, CDMA2000, Wimax, accordingly, the dispensing device that described third party's system's employing and receiving trap adapt sends the described standard time, this does not influence flesh and blood of the present invention, and can realize such receiving trap in conjunction with prior art, do not repeat them here.
Obtain after the described schedule time and described current time by execution in step S211 and step S212, continue execution in step S213, judge whether the described current time surpasses the described schedule time.If the judged result of step S213 negates that the promptly described current time does not surpass the described schedule time, then changes execution in step S212 over to; If the judged result of step S213 is sure, the promptly described current time has surpassed the described schedule time, then changes step S 102 shown in Figure 1 over to and continues to carry out.Preferably, the described schedule time is consistent with the form of current time, so that both are compared; Preferably, both levels of precisions are also identical.Those skilled in the art understand, even described preset time and described current time are inconsistent on levels of precision, still can with above-mentioned both compare, the for example described schedule time is o'clock sharp 1 day 12 January in 2009, and the described current time only is accurate to day, then the described schedule time can be rounded is on January 1st, 2009 or to round be on January 2nd, 2009, and then compares with the described current time, and this does not influence flesh and blood of the present invention.
If the judged result of step S213 is sure, determine that then described predetermined condition is satisfied, continue to carry out thereby change step S102 shown in Figure 1 over to, do not repeat them here.
Those skilled in the art understand, whether described confidential folder surpasses the described schedule time and determines whether and will open automatically by judging the current time, can avoid human factor effectively like this, improve the security of classified document the adverse effect that security work caused.For example, in the managing test paper of national examination, often paper is deposited in the secret container of each examination point at the examination eve, and the paper custodian who requires each examination point only just can open this secret container and obtain paper after surpassing the specific time, wherein, this secret container has safety lock, and needing can release by key, and this key is responsible for certainly by the paper custodian.But if the paper custodian loses key or violates security discipline, then this secret container still might be opened in advance, causes divulging a secret of paper content.Described confidential folder then can effectively prevent the generation of above-mentioned situation, people are as long as input to described confidential folder with the above-mentioned specific time as the described schedule time, described then confidential folder only just can be opened above the described schedule time automatically in the described current time, has improved the security of classified document.Further, those skilled in the art also understand, based on confidential folder provided by the invention, described key also can be omitted, after for example paper was loaded into the classified document cabinet, this document cabinet was directly by college entrance examination safety director person setting-up time, and described classified document cabinet is transported to each examination point preserved, this classified document cabinet is unlocked in special time period, then still can operate even without described key.
Corresponding with Fig. 2, Fig. 3 illustrates according to a second embodiment of the present invention, judges the process flow diagram of the control method whether predetermined condition is satisfied in the process of control automatic opening of confidential folder.In the present embodiment, predetermined condition realizes by preset condition.Particularly, at first execution in step S221 obtains the described state that presets.Those skilled in the art can realize this step with reference to the step S211 shown in the figure 2 at least, and different is the content difference that is stored in ad-hoc location in the memory storage, is a status information in the present embodiment, does not repeat them here.
Follow execution in step S222, obtain the state of described customizing messages correspondence, enter step S223 then, judge whether the state of described customizing messages correspondence and the state that described confidential folder presets be inconsistent.If the result that step S223 judges is sure, the state that the state of promptly described customizing messages correspondence and described confidential folder preset is inconsistent, then changes execution in step S222 over to, promptly repeats this step; If the result that step S223 judges negates, the state that is described customizing messages correspondence is consistent with the state that described confidential folder presets, and then this treatment scheme finishes, and determines that described predetermined condition is satisfied, continue to carry out thereby change step S102 shown in Figure 1 over to, do not repeat them here.
It will be appreciated by those skilled in the art that in different embodiment the customizing messages described in the above-mentioned steps S222 can be different.For example this customizing messages can be corresponding with concrete personnel, and the state of described customizing messages correspondence is exactly the state of this personnel's correspondence.For example can be the state whether these personnel survive, such embodiment goes for the enforcement of publication right after author's death at least.For example, the author wishes its works of finishing are before death delivered after its death again, and then this author can deposit in these works in the confidential folder provided by the present invention.And this confidential folder can be kept at lawyer, public notary office or other trusted third party place (for example bosom friend place).After this author's death, this confidential folder is opened obtain the dead state of this author from public security household register system after automatically, so that the relevant personnel such as lawyer obtain these works and it is delivered.
For example the state of this personnel's correspondence can be whether these personnel are diagnosed as the state of suffering from certain disease again, and such embodiment goes in the control and management to medicine at least.For example, when having therapeutic action, some medicine may make the user habit-forming, then this medicine can be stored in this confidential folder this moment, when these personnel are diagnosed as when suffering from certain disease, the infosystem of medical institutions is to be diagnosed as the state of suffering from certain disease with these personnel's status modifier, this confidential folder obtains from the infosystem of medical institutions and opens automatically after these personnel are diagnosed as the state of suffering from certain disease then, so that the relevant personnel such as doctor obtain this medicine.
For example the state of this personnel's correspondence can be the state whether these personnel are disengaged certain post again, and such embodiment goes in the management to company property at least.For example, certain company and an employee remove labour contract, and this employee refuses to return the key of the file security folder of depositing vital document, then the personnel information system of company is the state of removing sb. from his position with this employee's status modifier, this confidential folder is opened obtain the state that these personnel are disengaged certain post from the personnel information system of company after automatically then, so that company is not having still to open this confidential folder under the situation of key immediately.It will be understood by those skilled in the art that the unlatching predetermined condition of this document folder of after opening this confidential folder, can resetting or this document folder is cancelled.
For example the state of this specific people's correspondence can also comprise whether assets that these personnel have are lower than the state of first threshold again.For example the pledger gives the obligee with the pledge pledge, and the obligee must not use pledge during the agreement pledge, but when if debtor's assets are lower than first threshold, the obligee has the right this pledge is brought to the hammer, then above-mentioned three parts can deposit in pledge in this confidential folder, when the debtor when deposit at bank is lower than first threshold, this confidential folder is unlocked.At this moment, the management system of this confidential folder and described bank communicates, perhaps communicate with a third party system and the approaching quantity of obtaining described deposit in real time from described banking system of this third party system, those skilled in the art can realize such device in conjunction with prior art.
For example the state of this personnel's correspondence can be the state whether the share ratio of certain company that these personnel have surpasses second threshold value again.For example the shareholder of the said firm by contract engagement when the ratio of corporation stock that these personnel have is lower than second threshold value (for example 30%), then the director of this personnel's appointment should be reduced to 1 from original 3, and this contract placed in the described confidential folder, correspondingly be provided with predetermined condition then.Under these circumstances, described confidential folder is connected with the Database Systems of industrial and commercial administration department to obtain these personnel's (shareholder) share ratio, and this Internal Management System that perhaps is connected with the Internal Management System of the said firm then obtains these personnel's (shareholder) share ratio from the Database Systems of described industrial and commercial administration department or other system with similar functions (in real time or near in real time).Be appreciated that, determine to open automatically after the share ratio of described company that these personnel have is lower than described second threshold value when this confidential folder, also correspondingly handle the matters that change the director according to company's associated inner rule of management thereby make administrative personnel of company or general body of shareholders can obtain this contract.
Similarly, the described customizing messages among the above-mentioned steps S222 can also be corresponding with concrete assets, and at this moment, the state of described customizing messages correspondence is exactly the state of this assets correspondence.Particularly, the state of this assets correspondence can be the state whether owner of these assets changes, for example working as these assets is antiques, after described antiques is transferred the possession of, after transferable information is embodied in the Database Systems of antiques trade center, then described classified document double-layered quilt is automatically opened, and is stored in the interior data relevant with this antiques of described confidential folder, for example data such as historical record and probation report thereby make the new owner to obtain.Change in the example at another, the state of described customizing messages correspondence also can be the state whether these assets are disposed, and for example whether these assets are in state under the hammer or state under the hammer.Change in the example at another, the state of described customizing messages correspondence can be the state whether this assets devaluation is higher than the 3rd threshold percentage, for example when these assets are a place house property, the estimated value of this house property embodies in the evaluating system at house prosperity transaction center always to some extent, and described confidential folder is closed present worth and described the 3rd threshold value that is provided with this house property before, described then confidential folder obtains the value of this house property in real time from the evaluating system at described house prosperity transaction center, whether be higher than described the 3rd threshold value thereby calculate the devaluation amplitude of determining this house property, and after determining to be higher than described the 3rd threshold value, open described confidential folder by simple mathematical.Change in the example at another, the state of described customizing messages correspondence can be the state whether term of life of these assets expires, for example the client rents this confidential folder that bank provides, expire and this client when not re-renting when the rental period, then this confidential folder is unlocked, and avoids bringing loss because this confidential folder is idle to bank.
Further, the described customizing messages among the above-mentioned steps S222 can also be corresponding with a concrete incident, and at this moment, the state of described customizing messages correspondence is exactly the state of this incident correspondence.Preferably, described particular event comprises disaster and public safety incident, preferably, the state of described particular event correspondence can be whether specific disaster (for example tsunami, rubble flow, volcanic explosion) and public safety incident (for example terrorist activity, infectious disease) takes place.It will be appreciated by those skilled in the art that such state can obtain by the public safety supervisory system that government department safeguards, embodiment for example shown in Figure 8 does not repeat them here.
Change in the example at one, the state of described customizing messages correspondence can be the state whether this incident finishes.For example, can require the relevant personnel before entering court, communicators such as mobile phone to be left in this confidential folder, when this confidential folder gets access to the state of court's trial end, just open for safeguarding the order of court.It will be appreciated by those skilled in the art that in such variation example, described confidential folder can be connected to the trial supervisory system of law court, thereby obtain the state whether court's trial carried out in the specific court finishes.
Change in the example at another, the state of described customizing messages correspondence can be the state whether this incident arrived for the 4th default stage.For example for the start button that prevents the flood discharge of maloperation sluice causes damage, this start button can be placed in this confidential folder or the safe cabinet, have only that this confidential folder just is unlocked when water level surpasses the warning height.Those skilled in the art understand, in such variation example, described confidential folder can be measured water level by an external level detecting device at least and whether surpass specific warning height, for example a ball float can be placed the water surface, thereby and this ball float by can roof pressure after floating a button connect shown in the circuit of level detecting device correspondence, do not repeat them here.
And change in the example at one, described step S221 can be omitted, and whether step S223 correspondingly is changed to the state of judging described customizing messages correspondence and is changed.Particularly, if the judged result of step S223 negates, the state that is described customizing messages correspondence is not changed, then next particular moment again execution in step S222 obtain the state of described customizing messages correspondence, judged result until step S223 is sure, and the state of promptly described customizing messages correspondence has been changed.This is actually the process of a cycle criterion, for example can judge that once perhaps carry out such judgement in the shorter cycle, the cycle of judgement is depended on the levels of precision of specific embodiment every 5 minutes.It will be appreciated by those skilled in the art that described confidential folder can read the third party system according to the above-mentioned cycle, thereby whether the state of determining described customizing messages changes, the system that for example reads public security bureau judges whether a personage's existing state changes or the like.
It will be appreciated by those skilled in the art that whether described confidential folder is changed by the state of judging described customizing messages correspondence determines whether and will open automatically.For example, in the prior art, in the artwork auction process between seller, buyer and the auctioner the asymmetric meeting of information cause the increase of transaction cost, only with regard to the buyer, the buyer has to the artwork is done twice evaluation sometimes, before evaluation for the first time occurs in the auction beginning, is used for determining the true and false of the artwork, when identifying the payment that occurs in the back artwork that strikes a bargain for the second time, be used for determining whether this artwork is replaced.And described confidential folder can reduce above-mentioned three parts's distrust, for example, after the auctioner organizes each side to carry out the evaluation of the artwork before auction, this artwork is left in the described confidential folder, when the owner of this artwork becomes the buyer by the seller, described confidential folder obtains the state that the owner of this artwork changes from auctioner's transaction register system, and open automatically, like this, nobody can open described confidential folder before this artwork is paid, therefore, the buyer can only do once and identify, has reduced the distrust and the transaction cost of each side.
Fig. 4 illustrates according to the first embodiment of the present invention, controls the structural representation of the control device of described automatic opening of confidential folder.In the present embodiment, described control device 4 comprises first judgment means 41, first actuating unit 42 and first pen recorder 43.Wherein, described first judgment means 41 is used to judge whether to conform to a predetermined condition, and wherein, described predetermined condition is used to indicate the condition of opening confidential folder, opens described confidential folder when promptly satisfying described predetermined condition; Described first actuating unit 42 is opened described confidential folder when being used to conform to a predetermined condition; Described first pen recorder 43, the operation that is used to write down described unlatching confidential folder.Further, described first actuating unit 42 comprises first dispensing device 421 and security lock arrangement 422, wherein, described first dispensing device 421 is used for sending release information to described security lock arrangement, described security lock arrangement 422 is used for described file is pinned, and opens this document folder after receiving correct release information.
Particularly, whether 41 pairs of described predetermined conditions of described first judgment means are satisfied is judged, if judged result is sure, then sends instruction to described first actuating unit 42, is done further by described first actuating unit 42 and handles; If the judged result of described first judgment means 41 negates, then judge whether to meet described predetermined condition again in next particular moment, be satisfied until this condition.This is actually the process of a cycle criterion, and for example described first judgment means 41 can judge that once perhaps carry out such judgement in the shorter cycle, the cycle of judgement is depended on the levels of precision of specific embodiment every 5 minutes.
After described first actuating unit 42 receives the instruction of described first judgment means 41 transmissions, described first dispensing device 421 sends release information to described security lock arrangement 422, wherein, described security lock arrangement 422 can be an electronic lock, promptly adopt electronic circuit control, with electromagnet or micromotor and lock body electromechanical integration safety apparatus as topworks, it generally comprises control section and topworks, art technology technician can utilize prior art (for example, the development and the development of electronic lock " both at home and abroad " is stated from the 4th phase of " electrotechnics " nineteen ninety-five) to realize above-mentioned electronic lock.Described release information then is and the corresponding unlock command of described security lock arrangement that for example, if described security lock arrangement is an infrared electronic lock, then described release information can be an infrared signal; Again for example, if described security lock arrangement is the radio frequency electric lock, then described release information can be a radiofrequency signal; Again for example, if the control section of described security lock arrangement is a microprocessor, then described release information can be the variation of a pulse or level.
Described security lock arrangement 422 receives described release information and carries out release, to open described confidential folder.Described then first actuating unit 42 sends instruction to described first pen recorder 43, described first pen recorder 43 receives this instruction, the operation of described confidential folder opened in record, for example, write down the time that described confidential folder is unlocked, again for example, record is opened corresponding predetermined condition with this.
And in a preference, described first pen recorder 43 comprises second dispensing device 431, and it is used for the operation of described unlatching confidential folder is sent to a central database by wireless communication mode.For example, described second dispensing device 431 can comprise the WAP module, is sent to time of above-mentioned unlatching in the database of upper management mechanism by the WAP mode; Again for example, described second dispensing device 431 can comprise the WiFi module, will send to the database of notary organs by the WiFi mode in opening corresponding predetermined condition with this, so that will fix the usefulness of evidence.
And in another preference, described first actuating unit 42 comprises first suggestion device 423 (not shown among Fig. 4), and described first suggestion device 423 is used to carry out the prompting operation that described confidential folder is about to be unlocked.Particularly, can be accomplished in several ways described first suggestion device 423, for example, described first suggestion device 423 can comprise warning light, wherein, lighted in the certain hour of described warning light before described automatic opening of confidential folder, be used for the described classified document of prompting personnel and be clipped in certain hour unlatching automatically soon afterwards, carried out on duty so that the user has sufficient time to the arrangement personnel; Again for example, described first suggestion device 423 can comprise display screen, and wherein, described display screen is used for showing the concrete time of described automatic opening of confidential folder.Those skilled in the art can not repeat them here in conjunction with the above-mentioned prompting operation of existing techniques in realizing.
And change in the example at one, when not needing the operation of described unlatching confidential folder write down, then described first pen recorder 43 can be omitted, and this does not influence flesh and blood of the present invention.
Change in the example at another, described first actuating unit 42 does not comprise described security lock arrangement 422, and in such variation example, described security lock arrangement is placed in outside the described control device 4 and is the ingredient of described confidential folder.Particularly, the security lock arrangement of described first actuating unit 42 in placing described confidential folder sends unlock command (release information), and described security lock arrangement is opened according to this instruction.Those skilled in the art at least can with reference to denomination of invention be " electric control door lock " Chinese patent application (application number: 03808286.1) and denomination of invention for the Chinese patent application of " locks for doors " (application number: 200510052474.1) and denomination of invention be the Chinese patent application (application number: 02151796.7) realize such device, do not repeat them here of " the method and system equipment of wireless centralized control gate inhibition/door lock ".
Those skilled in the art understand, described control device 4 can obtain described customizing messages by the third party system, wherein, described third party system stores the state of described customizing messages correspondence, and described third party system provides interface so that external system (for example described control device 4) can be obtained the state of described customizing messages correspondence.For example, described third party system can be public security household register system, social security information system, civil defence early warning system, property tax infosystem, public safety supervisory system, national defence early warning system, house prosperity transaction system and enterprise personnel system etc.
Fig. 5 illustrates according to the first embodiment of the present invention, the structural representation of first judgment means 41 in the control device 4 shown in Figure 4.In the present embodiment, described predetermined condition comprises whether the state of customizing messages correspondence is changed, and wherein, preferably, described customizing messages comprises personnel, assets and incident.Accordingly, described first judgment means 41 comprises the 3rd judgment means 412, and this device 412 is used to judge whether the state of described customizing messages correspondence is changed.Preferably, described the 3rd judgment means 412 comprises the 4th judgment means 4121, and it is used to judge whether the state of described customizing messages correspondence is consistent with the state that described confidential folder presets.Particularly, described the 3rd judgment means 412 judges whether the state of described customizing messages correspondence is changed.If the result that described the 3rd judgment means 412 is judged is sure, the state that is described customizing messages correspondence is consistent with the state that described confidential folder presets, then described the 3rd judgment means 412 judges that in next particular moment whether the state of described customizing messages correspondence is consistent with the state that described confidential folder presets, and is satisfied until described predetermined condition again; If the result that described the 3rd judgment means 412 is judged is sure, be that the state of described customizing messages correspondence and state that described confidential folder presets are inconsistent, then described first judgment means 41 sends instruction to described first actuating unit 42, does further processing by described first actuating unit 42.
Preferably, described customizing messages comprises the specific people, and the state of this specific people's correspondence comprises the state whether described specific people survives; Whether described specific people is diagnosed as the state of suffering from certain disease; Whether described specific people is disengaged the state of certain post; Whether assets that described specific people has are lower than the state of first threshold; And whether the share ratio of certain company that described specific people has surpasses or is lower than the state of second threshold value.Those skilled in the art understand, for example, the Supreme Judicial Court has decided that certain shareholder's first holds the share ratio of the A of company and must not be higher than 70% (being described second threshold value), then will make fine to shareholder's first if surpass, and such written verdict is placed in the described confidential folder.Adapt with such example, preferably, described the 4th judgment means 4121 is connected to the database of industrial and commercial administrative department, whether be satisfied thereby monitor described predetermined condition in real time, and in the share ratio that this shareholder's first is held the A of company surpasses schedule time (for example 10 minutes) after 70%, send the instruction of opening described confidential folder.
Preferably, described customizing messages comprises special assets, and the state of this special assets correspondence comprises the state whether owner of described special assets changes; The state whether described special assets is disposed; Whether the described special assets amplitude of devaluing surpasses the state of the 3rd threshold percentage; And the state that whether expires of the term of life of described special assets.
Preferably, described customizing messages comprises particular event, and the state of this particular event correspondence comprises the state whether described particular event takes place; The state whether described particular event finishes; And whether described particular event arrives the state in the 4th default stage, the i.e. state of a certain predefined phase.Preferably, described particular event comprises disaster, major holiday or commemoration day and public safety incident.
And in another preference, described predetermined condition comprises the schedule time, and wherein, the described schedule time is used to refer to confidential folder and when opens automatically.Particularly, described first judgment means 41 comprises second judgment means (not shown among Fig. 5), and wherein, described second judgment means is used to judge whether the current time surpasses the described schedule time.Further, described second judgment means judges whether the described current time surpasses the described schedule time, if the result that described second judgment means is judged negates, be the described current time not surpass the described schedule time, then described second judgment means judges whether to meet described predetermined condition again in next particular moment, is satisfied until this condition; If the result that described second judgment means is judged is sure, the promptly described current time has surpassed the described schedule time, and then described first judgment means 41 sends instruction to described first actuating unit 42, does further processing by described first actuating unit 42.Those skilled in the art understand, even described preset time and described current time are inconsistent on levels of precision, still can with above-mentioned both compare, the for example described schedule time is o'clock sharp 1 day 12 January in 2009, and the described current time only is accurate to day, then the described schedule time can be rounded is on January 1st, 2009, compares with the described current time then, and this does not influence flesh and blood of the present invention.
Fig. 6 illustrates according to a specific embodiment of the present invention, the structured flowchart of the control device of control automatic opening of confidential folder.In this embodiment, described file comprises processor 11 and electronic lock 12, wherein, described processor 11 can be a single-chip microcomputer, it is used to judge whether to conform to a predetermined condition, and send release information to described electronic lock 12, described electronic lock 12 is used to pin described confidential folder 1, and after receiving described release information release to open described confidential folder 1.
Particularly, described processor 11 receives the state of described customizing messages correspondence, whether the state of judging described customizing messages correspondence is changed, if the state of described customizing messages correspondence is changed, then the electronic lock in confidential folder 1 12 sends release information, and the operation of described unlatching confidential folder is sent to a central database 71 by wireless communication mode.
More specifically, described processor 11 comprises that by calculating the Boolean of the logical expression of a plurality of variablees judges whether to send release information, if the Boolean of described logical expression is " 0 ", judge that promptly the state of described customizing messages correspondence is not changed, then do not send release information; If the Boolean of described logical expression is " 1 ", judge that promptly the state of described customizing messages correspondence has been changed, then send release information.Whether wherein, described variable is used for representing described customizing messages, and indicate the state of described customizing messages correspondence to change by the assignment of variable.
In this embodiment, described logical expression is:
x+y+z
Wherein, the computing of "+" presentation logic " or ", variable x represents described personnel, and variable y represents described assets, and variable z represents described incident.And set: the assignment of above-mentioned variable is " 0 ", and then the indication state corresponding with the corresponding described characteristic information of this variable do not change; The assignment of above-mentioned variable is " 1 ", and then variation has taken place the indication state corresponding with the corresponding described characteristic information of this parameter.For example, x=1, y=0, z=0, the Boolean of then described logical expression x+y+z are 1, described processor 11 judges that the state of described customizing messages correspondence has been changed, and sends release information; Again for example, x=0, y=0, z=0, the Boolean of then described logical expression x+y+z are 0, described processor 11 judges that the state of described customizing messages correspondence is not changed, and does not send release information.
And in a preference, described variable x can represent with following logical expression:
x=x1+x2+x3+x4+x5
Wherein, the computing of "+" presentation logic " or ", variable x1 represents the state whether personnel survive, variable x2 represents whether personnel are diagnosed as the state of suffering from certain disease, variable x3 represents whether personnel are disengaged the state of certain post, variable x4 represents whether assets that personnel have are lower than the state of first threshold, and variable x5 represents whether the share ratio of certain company that personnel have surpasses the state of second threshold value.And set: the assignment of above-mentioned variable is " 0 ", and then the indication state corresponding with the corresponding described characteristic information of this variable do not change; The assignment of above-mentioned variable is " 1 ", and then variation has taken place the indication state corresponding with the corresponding described characteristic information of this parameter.
And in another preference, described variable y can express with following logical expression:
y=y1+y2+y3+y4
Wherein, the computing of "+" presentation logic " or ", variable y1 represents the state whether owner of assets changes, variable y2 represents the state whether assets are disposed, variable y3 represents whether the assets devaluation is lower than the state of the 3rd threshold percentage, and variable y4 represents the state whether term of life of assets expires.And set: the assignment of above-mentioned variable is " 0 ", and then the indication state corresponding with the corresponding described characteristic information of this variable do not change; The assignment of above-mentioned variable is " 1 ", and then variation has taken place the indication state corresponding with the corresponding described characteristic information of this parameter.
And in another preference, described variable z can express with following logical expression:
z=z1+z2+z3
Wherein, the computing of "+" presentation logic " or ", whether the state whether variable z1 presentation of events takes place, the state whether variable z2 presentation of events finishes, variable z3 presentation of events arrive the state in the 4th default stage.And set: the assignment of above-mentioned variable is " 0 ", and then the indication state corresponding with the corresponding described characteristic information of this variable do not change; The assignment of above-mentioned variable is " 1 ", and then variation has taken place the indication state corresponding with the corresponding described characteristic information of this parameter.
Those skilled in the art understand, preferably, processor 11 shown in Figure 6 can be understood that the combination of first judgment means 41, first dispensing device 421 and first pen recorder 43 in the control device 4 shown in Figure 4, and this processor 11 has been realized the function of these devices in other words.
Fig. 7 illustrates according to another embodiment of the present invention, the network topological diagram of the control device of control automatic opening of confidential folder.In this embodiment, described confidential folder 1 is applied in the legal affairs of testate succession, the legator mandatory lawyer office keeping testament that it stood, and require 12 this testaments of naming a person for a particular job of after its death the tenth day open, this lawyer's office accepts this testament inheritor's trust, and assigned counsel 91 is as this testamentary procurator.After described lawyer 91 accepts to assign this testament is deposited in the described confidential folder 1.Described confidential folder and public security household register system 2, rule association's database 3 and computing machine 72 establish a communications link, wherein, described public security household register system 2 is used for sending to described confidential folder 1 state of described customizing messages correspondence, described rule assists database 3 to be used for receiving by wireless communication mode the operation note of described confidential folder 1, and described computing machine 72 is used to carry out the prompting operation that described confidential folder is about to be unlocked.
Particularly, before legator's death, public security household register system 2 should testamentary household register information, promptly this legator state of still surviving sends to described confidential folder 1, after legator's death, public security household register system 2 should nullify by testamentary household register, and the information that household register is nullified, the i.e. dead state of this legator, send to described confidential folder 1, after described confidential folder 1 receives the information of above-mentioned household register cancellation, judge that the state whether this legator survives has been changed, then described confidential folder 1 sends the instruction of carrying out the prompting operation that described confidential folder is about to be unlocked to described computing machine 72, after described computing machine receives this instruction, is showing the text prompt of " confidential folder will after ten days ten two unlatchings automatically " on its monitor, then, described lawyer 91 is according to above-mentioned text prompt, notifies come lawyer's office, the testate succession program of being correlated with at ten two of the personnel 92 relevant with this testament the tenth day after this legator's death.During after this legator's death the tenth day ten two, described automatic opening of confidential folder, write down the operation of described unlatching and send to described rule and assist database 3, so that rule assists the implementation status to this legator institute matter entrusted to exercise supervision by wireless communication mode.
Fig. 8 illustrates according to another embodiment of the present invention, the network topological diagram of the control device of control automatic opening of confidential folder.In this embodiment, described confidential folder is applied to the management domain of fire fighting device.
In the prior art, for guaranteeing the safety of people's lives and properties, office building, the operator of facilities such as warehouse often is required to be equipped with flame snuffer and alarm switch in the public domain of buildings, because flame snuffer and alarm switch belong to the fire fighting device that must be used fast in the public safety incident, therefore it can not be deposited in the existing secret container (for example taking care of the secret container of key) by security personnel, but meanwhile, because fire fighting devicies such as above-mentioned flame snuffer can be obtained outside the public safety incident easily, cause fire fighting device destroyed easily, for example, flame snuffer is stolen, and again for example, alarm switch is wasted the fire-fighting resource by maloperation.
And described confidential folder 1 can be by the state of judging whether the public safety incident takes place, and is in locking states at ordinary times, then opens automatically when the public safety incident takes place.Particularly, flame snuffer 81 and alarm switch 82 are deposited in the described confidential folder 1, and described confidential folder 1 communicates with temperature sensor 73, wherein, described temperature sensor 73 is used to measure temperature, and the temperature data that records is sent to described classified document adds 1.
More specifically, the state that people preset to described confidential folder input in advance, for example, the described state that presets of people's input is for being no more than Celsius temperature 60 degree, and described temperature sensor 73 sends to described confidential folder 1 every the regular hour (for example 30 seconds) with the temperature data that records.Described confidential folder 1 receives this temperature data and judges in conjunction with the described state that presets, if this temperature data does not surpass 60 degree, then is judged as the state of described customizing messages correspondence and the state consistency that described confidential folder presets; If this temperature data has surpassed 60 degree, it is inconsistent then to be judged as the state of described customizing messages correspondence and state that described confidential folder presets, described confidential folder 1 is opened automatically, like this, personnel 93 just can obtain described flame snuffer 81, and by the described alarm switch 82 notice fire alarms 94 of operation.And at ordinary times, when promptly the public safety incident did not take place, described confidential folder 1 was in the state of locking, can prevent effectively that fire fighting device is destroyed.
In conjunction with above-mentioned Fig. 7 or embodiment illustrated in fig. 8, it will be appreciated by those skilled in the art that described confidential folder can exist a plurality of in a mechanism that confidential folder service is provided specially, for example be placed on corresponding position by numbering respectively.Similarly, also each locker that this mechanism can be provided is as an embodiment of confidential folder provided by the invention, at this moment, the form of the electronic account receipt box that proof box that then can bank provides or bank provide occurs, different is, and these proof boxs or receipt box or locker are opened when conforming to a predetermined condition automatically, and preferably do not use key.Large-scale therewith confidential folder service adapts, can by an electronic display or many personal computers show some or certain several confidential folder with the information of opening, for example this confidential folder numbering is shown or voice suggestion or the like, those skilled in the art can realize these devices in conjunction with prior art, do not repeat them here.
It will be appreciated by those skilled in the art that confidential folder provided by the invention, not only can only when meeting specified conditions, open automatically, opened by mistake the possibility that opens, improve the security of classified document thereby reduced; Described confidential folder can also comprise all the other locksets of the prior art according to actual needs further.For example, when described predetermined condition is satisfied, described safety lock automatic unlocking, even unmanned described confidential folder is carried out on duty this moment, all the other locksets still can pin described confidential folder; Again for example, confidential folder shown in Figure 8 can also comprise a lockset, and wherein, the key of this lockset is grasped by fire department, and like this, fire department can opened confidential folder by this key at ordinary times, changes the fire fighting equipment that expires tenure of use.
Describe confidential folder though it will be appreciated by those skilled in the art that the various embodiments described above emphasis, device provided by the invention, equipment and control corresponding method not only are applicable to file, can also be applicable to file cabinet, safety cabinet and other locker.
More than specific embodiments of the invention are described.It will be appreciated that the present invention is not limited to above-mentioned specific implementations, those skilled in the art can make various distortion or modification within the scope of the claims, and this does not influence flesh and blood of the present invention.

Claims (31)

1. a control method of controlling automatic opening of confidential folder wherein, comprises the steps:
A. judge whether to conform to a predetermined condition, wherein, described predetermined condition is used for indication and opens confidential folder;
B. if conform to a predetermined condition, then open described confidential folder.
2. method according to claim 1, wherein, described confidential folder comprises at least one security lock arrangement, described security lock arrangement is used for described file is pinned, and open this document folder after receiving correct release information, wherein, the step of the described confidential folder of unlatching among the described step b comprises the steps:
B1. send release information to described security lock arrangement.
3. method according to claim 1 and 2, wherein, described predetermined condition comprises the schedule time, wherein, described step a comprises the steps:
A1. judge whether the current time surpasses the described schedule time.
4. according to each described method in the claim 1 to 3, wherein, described predetermined condition comprises whether the state of customizing messages correspondence is changed, and wherein, described step a comprises the steps:
A1 '. whether the state of judging described customizing messages correspondence is changed;
Wherein, described step b comprises the steps:
The state of the described customizing messages correspondence of-Ruo is changed, and then opens described confidential folder.
5. method according to claim 4, wherein, described customizing messages comprise in the following information any or appoint multiple:
-personnel;
-assets; And
-incident.
6. according to claim 4 or 5 described methods, wherein, described customizing messages is the specific people, the state of described specific people's correspondence comprise in the following state any or appoint multiple:
-state that whether described specific people survives;
Whether-described specific people is diagnosed as the state of suffering from certain disease;
Whether-described specific people is disengaged the state of certain post;
Whether-assets that described specific people has are lower than the state of first threshold; And
Whether-share the ratio of certain company that described specific people has is lower than the state of second threshold value.
7. according to claim 4 or 5 described methods, wherein, described customizing messages comprises special assets, the state of described special assets correspondence comprise in the following state any or appoint multiple:
The state whether owner of-described special assets changes;
The state whether-described special assets is disposed;
Whether-described special assets devaluation surpasses the state of the 3rd threshold percentage; And
The state whether term of life of-described special assets expires.
8. according to claim 4 or 5 described methods, wherein, described customizing messages comprises particular event, the state of described particular event correspondence comprise in the following state any or appoint multiple:
-state that whether described particular event takes place;
-state that whether described particular event finishes; And
Whether-described particular event arrives the state in the 4th default stage.
9. method according to claim 8, wherein, described particular event comprise in the following incident any or appoint multiple:
-disaster;
-the major holiday;
-commemorative the date; And
-public safety incident.
10. according to each described control method in the claim 4 to 9, wherein, described step a1 ' comprises the steps:
-judge whether the state of described customizing messages correspondence is consistent with the state that described confidential folder presets;
Wherein, described step b comprises the steps:
The state consistency that the state of the described customizing messages correspondence of-Ruo and described confidential folder preset is then opened described confidential folder.
11. according to each described control method in the claim 4 to 10, wherein, described customizing messages is stored in the third party system.
12., wherein, also comprise the steps: before the step of the described confidential folder of unlatching among the described step b according to each described control method in the claim 1 to 11
The prompting operation that the described confidential folder of-execution is about to be unlocked.
13., wherein, also comprise the steps: according to each described control method in the claim 1 to 12
C. write down the operation of described unlatching confidential folder.
14. control method according to claim 13, wherein, described step c comprises the steps:
-operation of described unlatching confidential folder is sent to a central database by wireless communication mode.
15. a control device of controlling automatic opening of confidential folder is characterized in that, comprising:
First judgment means is used to judge whether to conform to a predetermined condition, and wherein, described predetermined condition is used for indication and opens confidential folder; And
First actuating unit is opened described confidential folder when being used to conform to a predetermined condition.
16. control device according to claim 15 wherein, pins described file by at least one security lock arrangement, and described security lock arrangement opens this document folder after receiving correct release information, wherein, described first actuating unit comprises:
First dispensing device is used for sending release information to described security lock arrangement.
17. control device according to claim 16, wherein, described first actuating unit also comprises described security lock arrangement.
18. according to each described control device in the claim 15 to 17, wherein, described first judgment means comprises:
Second judgment means is used to judge whether the current time surpasses the described schedule time.
19. according to each described control device in the claim 15 to 18, wherein, described first judgment means comprises:
The 3rd judgment means is used to judge whether the state of described customizing messages correspondence is changed.
20. control device according to claim 19, wherein said customizing messages comprise in the following information any or appoint multiple:
-personnel;
-assets; And
-incident.
21. according to claim 19 or 20 described methods, wherein, described customizing messages is the specific people, the state of described specific people's correspondence comprise in the following state any or appoint multiple:
-state that whether described specific people survives;
Whether-described specific people is diagnosed as the state of suffering from certain disease;
Whether-described specific people is disengaged the state of certain post;
Whether-assets that described specific people has are lower than the state of first threshold; And
Whether-share the ratio of certain company that described specific people has is lower than the state of second threshold value.
22. according to claim 19 or 20 described methods, wherein, described customizing messages comprises special assets, the state of described special assets correspondence comprise in the following state any or appoint multiple:
The state whether owner of-described special assets changes;
The state whether-described special assets is disposed;
Whether-described special assets the amplitude of devaluing surpasses the state of the 3rd threshold percentage; And
The state whether term of life of-described special assets expires.
23. according to claim 19 or 20 described methods, wherein, described customizing messages comprises particular event, the state of described particular event correspondence comprise in the following state any or appoint multiple:
-state that whether described particular event takes place;
-state that whether described particular event finishes; And
Whether-described particular event arrives the state in the 4th default stage.
24. method according to claim 23, wherein, described particular event comprise in the following incident any or appoint multiple:
-disaster;
-the major holiday;
-commemorative the date; And
-public safety incident.
25. according to each described control device in the claim 19 to 24, wherein, described the 3rd judgment means comprises:
The 4th judgment means is used to judge whether the state of described customizing messages correspondence is consistent with the state that described confidential folder presets.
26. according to each described control device in the claim 19 to 25, wherein, described customizing messages is stored in the third party system.
27. according to each described control device in the claim 15 to 26, wherein, described first actuating unit comprises:
First suggestion device is used to carry out the prompting operation that described confidential folder is about to be unlocked.
28., wherein, also comprise as lower device according to each described control device in the claim 15 to 27:
First pen recorder, the operation that is used to write down described unlatching confidential folder.
29. control device according to claim 28, wherein, described first pen recorder also comprises as lower device:
Second dispensing device is used for the operation of described unlatching confidential folder is sent to a central database by wireless communication mode.
30. a confidential folder is opened when conforming to a predetermined condition automatically, it is characterized in that, comprises according to each described control device in the claim 15 to 29.
31. confidential folder according to claim 30 is characterized in that, it can also be in the following equipment any:
-classified document cabinet;
-safe cabinet; And
-secret locker.
CN200810041554A 2008-08-11 2008-08-11 Control method and corresponding device for controlling automatic opening of confidential folder Pending CN101650844A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810041554A CN101650844A (en) 2008-08-11 2008-08-11 Control method and corresponding device for controlling automatic opening of confidential folder

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810041554A CN101650844A (en) 2008-08-11 2008-08-11 Control method and corresponding device for controlling automatic opening of confidential folder

Publications (1)

Publication Number Publication Date
CN101650844A true CN101650844A (en) 2010-02-17

Family

ID=41673073

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810041554A Pending CN101650844A (en) 2008-08-11 2008-08-11 Control method and corresponding device for controlling automatic opening of confidential folder

Country Status (1)

Country Link
CN (1) CN101650844A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108460872A (en) * 2018-03-06 2018-08-28 宁夏慧百通赢科技有限公司 The control method and device of smart lock

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006076762A1 (en) * 2005-01-20 2006-07-27 Telezygology Inc Locking systems
CN101059877A (en) * 2007-03-22 2007-10-24 杨守平 Test paper conservation and management method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006076762A1 (en) * 2005-01-20 2006-07-27 Telezygology Inc Locking systems
CN101059877A (en) * 2007-03-22 2007-10-24 杨守平 Test paper conservation and management method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108460872A (en) * 2018-03-06 2018-08-28 宁夏慧百通赢科技有限公司 The control method and device of smart lock

Similar Documents

Publication Publication Date Title
CN108027992B (en) For providing the lock in redundant access channel
Rigakos et al. Bubbles of governance: private policing and the law in Canada
JP2013242886A (en) Application data relating to logical and physical securities
US20120119877A1 (en) Programmable electronic lockbox system
CN103714626A (en) Multi-password pre-warning type bank card capable of being controlled by different card
JP5368543B2 (en) Rental housing management system
McElroy DIS/POSSESSORY DATA POLITICS: From Tenant Screening to Anti‐Eviction Organizing
de la Cruz López et al. Assessing the risk of robbery in bank branches to reduce impact on personnel
CN101650844A (en) Control method and corresponding device for controlling automatic opening of confidential folder
JP4747944B2 (en) Electronic door lock system
Sproule et al. Defining identity theft
JP4965965B2 (en) Rental housing management system
WO2002008551A1 (en) Access method and system
JP2003337979A (en) Locker system
Taavila Wearable technology as part of access control
JP5435778B2 (en) Vending machine management system
Purpura Internal Threats and Countermeasures
CN103985211A (en) Automatic arming and disarming method of intelligent networking alarm
Cole Worker exploitation in garment manufacturing: Ascertaining its causes
TWM553013U (en) Security authentication system for renewing and inquiring registered password
Haberman Before death, we must part: Relocation and protection for domestic violence victims in volatile divorce and custody situations
JP2007002477A (en) Key system for rental house
Horan The Retailer's Guide to Loss Prevention and Security
JP2010140456A (en) Money payment and receiving system
Land et al. The construction of identity offences taxonomy: an Australian context

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20100217