CN103456065A - Unattended key management method - Google Patents

Unattended key management method Download PDF

Info

Publication number
CN103456065A
CN103456065A CN2013104519037A CN201310451903A CN103456065A CN 103456065 A CN103456065 A CN 103456065A CN 2013104519037 A CN2013104519037 A CN 2013104519037A CN 201310451903 A CN201310451903 A CN 201310451903A CN 103456065 A CN103456065 A CN 103456065A
Authority
CN
China
Prior art keywords
key
user
server
management method
application plan
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013104519037A
Other languages
Chinese (zh)
Other versions
CN103456065B (en
Inventor
李冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201310451903.7A priority Critical patent/CN103456065B/en
Publication of CN103456065A publication Critical patent/CN103456065A/en
Application granted granted Critical
Publication of CN103456065B publication Critical patent/CN103456065B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses an unattended key management method. A key usage plan and identity information of a user are recorded in a system server first; the user logs in the system server for identity recognition through a specific reader to complete the verification of the identity information of the user and the usage plan; if the verification result is correct, a server system starts a video monitoring probe, and a key cabinet is opened at the same time; the user takes a key from a specified position; after using the key, the user logs in the system server for identity recognition through the reader; if the verification result is correct, the server system starts the video monitoring probe, and the key cabinet is opened at the same time; the user returns the key to a key storing position. If a key which is inconsistent with the usage plan is taken or the key is not returned at due time, the system triggers an alarm. By means of the unattended key management method, intelligent management of the key can be realized, unreasonable usage of the key is avoided, and property safety of the user is guaranteed.

Description

A kind of unmanned key management method
Technical field
The present invention relates to a kind of intellectualized management system, relate in particular to a kind of unmanned key management method.
Background technology
Most of place of management key that needs all still depends on manpower at present, this just needs arrange special managerial personnel and take special-purpose office, and due to the restriction of managerial personnel's daily schedule, can cause the part vacancy of supervision time, bring great potential safety hazard; Error in managerial personnel's work also tends to cause the key-placing mistake and has serious consequences; Simultaneously, key receive and give back record the accounts that rely on more, it is clear easily to practise fraud, alter and be difficult to preserve and record, and increases potential safety hazard, once and meet accident and need by this checks of the records one by one, not only time-consuming but also effort; Competent authorities can not understand key whereabouts and service condition in real time; And other security breaches of causing of human negligence, be unfavorable for the orderly management of key.
Summary of the invention
In order to solve the technical matters existed in background technology, the present invention proposes a kind of.
The invention provides a kind of unmanned key management method, comprise the following steps:
S1, key application plan and user's identity information is recorded in to system server;
S2, receive: the user, by specific reader accessing system server, carrying out identification, completes the checking to user's identity information and application plan, and checking is correct, and server system will be opened the video monitoring probe, while unlocking key cabinet door; The user gets key to assigned address;
S3, recovery: the user is after key is finished using, by on specific reader accessing system server, carrying out identification, complete the checking to user's identity information and application plan, checking is correct, server system will be opened the video monitoring probe, simultaneously unlocking key cabinet door; The user is returned to the key-placing position by key.
Further, the identification in step S2 is living things feature recognition, and described biological characteristic is at least a kind of in fingerprint, people's face, sound and iris; Described reader is biological tagging reader.
Further, identification in step S2 is individual non-contact card identification, be provided with user's identity information in described individual non-contact card, described user's identity information at least comprises that user's name, the individual non-contact card corresponding with user's identity are numbered, phone number.
Further, described key application plan at least comprises user's individual non-contact card numbering, key numbering, service time window.
Further, described service time, window comprised that key receives time window and key recovery time window.
Further, described step S2 also comprises:
If S201 user's identity information conforms to the information in being recorded in system server with application plan, be verified, system server records the time of receiving of key; If do not conform to, checking is not passed through;
If S202 user's the time of receiving is not in receiving time window or without application plan, and the specific reader accessing system of Multiple through then out server, server is by trigger alarm; And
If S203 user has got the key be not inconsistent with application plan, server triggers is reported to the police.
Preferably, if in described step S202, user's the time of receiving, not in receiving time window or without application plan, and surpasses 3 times by specific reader accessing system server, server is by trigger alarm.
Further, described step S3 also comprises:
S301, be verified after, the recovery time of server record key;
Do not give back key if S302 user surpasses key recovery time window, server sends note from the trend user, and records final giving back the time.
Further, the user needs to close the boxes for keys door after the receive/removal process that completes key, exceeds schedule time not close server triggers and report to the police.
Further, described key application plan comprise a people receive/reclaim many key information module, same user complete once complete key receive with reclaim affairs after can receive key according to key application plan continuous several times.
Based on disclosing of technique scheme, described unmanned key management method provided by the invention can realize, in unattended situation, key is realized to intelligent management; If user's the time of receiving not in receiving time window or without application plan, and the specific reader accessing system of Multiple through then out server server by trigger alarm, can effectively avoid the user maliciously to input whole system is damaged; If the user has got the key be not inconsistent with application plan, server triggers is reported to the police, and can ensure that key, only to meeting specific identity information and having the user of application plan to open use, reduces potential safety hazard; Receive/while reclaiming key, synchronously start the video monitoring probe, whole process records the process that the user received/reclaimed key clearly; Do not give back key if the user surpasses key recovery time window, server sends note from the trend user, urges the user to give back as early as possible, the reasonable utilization of the guarantee key of maximizing.
The accompanying drawing explanation
The process flow diagram that Fig. 1 is a kind of unmanned key management method of proposing of the present invention.
Embodiment
Below in conjunction with accompanying drawing, embodiments of the invention are described in detail.
Refer to Fig. 1, the invention provides unmanned key management method, comprise the following steps:
S1, key application plan and user's identity information is recorded in to system server;
S2, receive: the user, by specific reader accessing system server, carrying out identification, completes the checking to user's identity information and application plan, and checking is correct, and server system will be opened the video monitoring probe, while unlocking key cabinet door; The user gets key to assigned address;
S3, recovery: the user is after key is finished using, by on specific reader accessing system server, carrying out identification, complete the checking to user's identity information and application plan, checking is correct, server system will be opened the video monitoring probe, simultaneously unlocking key cabinet door; The user is returned to the key-placing position by key.
Identification in step S2 can be living things feature recognition and also can be individual non-contact card identification.
Biological characteristic is at least a kind of in fingerprint, people's face, sound and iris; And corresponding reader is biological tagging reader.
Individual's non-contact card is identified the identity information that is provided with the user in corresponding individual non-contact card, and described user's identity information at least comprises that user's name, the individual non-contact card corresponding with user's identity are numbered, phone number.And open number segment unified in user's individual non-contact card applying unit/key field of employment is encoded.
Key is supported traditional key and non-contact card class key.Traditional key directly links into an integrated entity with the non-contact card of an abnormal shape in use; The coding of non-contact card class key is used covert number segment coding, and coding rule and method can be different from individual non-contact card, also can be identical, and the present embodiment is not construed as limiting this.
Described key application plan at least comprises user's individual non-contact card numbering, key numbering, service time window; Described service time, window comprised that key receives time window and key recovery time window.
Window service time of key is set according to applicable cases, receives the time window default setting for plan first 20 minutes to 5 minutes of service time, and recovery time window default setting is 5 minutes to 15 minutes after service time.
The video monitoring probe connects on external storage, but the continuous circulation storage, and the storage term of validity of video information is 5 days.
The described step S2 that receives also comprises:
If S201 user's identity information conforms to the information in being recorded in system server with application plan, be verified, system server records the time of receiving of key; If do not conform to, checking is not passed through;
If S202 user's the time of receiving is not in receiving time window or without application plan, and the specific reader accessing system of Multiple through then out server, server is by trigger alarm; And
If S203 user has got the key be not inconsistent with application plan, server triggers is reported to the police.
And, if in described step S202, user's the time of receiving, not in receiving time window or without application plan, surpasses 3 times by specific reader accessing system server, server is by trigger alarm.
Described recycling step S3 also comprises:
S301, be verified after, the recovery time of server record key;
Do not give back key if S302 user surpasses key recovery time window, server sends note from the trend user, and records final giving back the time.
The user needs to close the boxes for keys door after the receive/removal process that completes key, exceeds schedule time not close server triggers and report to the police.
Report to the police and divide abnormal and an accident, exceed normal key recovery time but do not affect follow-up use for abnormal; Paranormal key reclaim simple and affected follow-up use, user repeatedly input with application plan, be not inconsistent or repeatedly the identity information checking by, key that the user has received not to be inconsistent with application plan, be not accident, system will give warning reminding.
Described unmanned key management method supports a people to receive/reclaim the function of many keys, accordingly, the key application plan comprise a people receive/reclaim many key information module, same user complete once complete key receive with reclaim affairs after can receive key according to key application plan continuous several times.Once complete key is received with reclaiming affairs to be to rely on the switch of boxes for keys door to complete, not support the user in the situation that do not close the boxes for keys door and receive continuously/reclaim key.
To sum up, described unmanned key management method provided by the invention can realize, in unattended situation, key is realized to intelligent management; If user's the time of receiving not in receiving time window or without application plan, and the specific reader accessing system of Multiple through then out server server by trigger alarm, can effectively avoid the user maliciously to input whole system is damaged; If the user has got the key be not inconsistent with application plan, server triggers is reported to the police, and can ensure that key, only to meeting specific identity information and having the user of application plan to open use, reduces potential safety hazard; Receive/while reclaiming key, synchronously start the video monitoring probe, whole process records the process that the user received/reclaimed key clearly; Do not give back key if the user surpasses key recovery time window, server sends note from the trend user, urges the user to give back as early as possible, the reasonable utilization of the guarantee key of maximizing.
The above; it is only preferably embodiment of the present invention; but protection scope of the present invention is not limited to this; anyly be familiar with those skilled in the art in the technical scope that the present invention discloses; be equal to replacement or changed according to technical scheme of the present invention and inventive concept thereof, within all should being encompassed in protection scope of the present invention.

Claims (10)

1. a unmanned key management method, is characterized in that, comprises the following steps:
S1, key application plan and user's identity information is recorded in to system server;
S2, receive: the user, by specific reader accessing system server, carrying out identification, completes the checking to user's identity information and application plan, and checking is correct, and server system will be opened the video monitoring probe, while unlocking key cabinet door; The user gets key to assigned address;
S3, recovery: the user is after key is finished using, by on specific reader accessing system server, carrying out identification, complete the checking to user's identity information and application plan, checking is correct, server system will be opened the video monitoring probe, simultaneously unlocking key cabinet door; The user is returned to the key-placing position by key.
2. a kind of unmanned key management method according to claim 1, is characterized in that, the identification in step S2 is living things feature recognition, and described biological characteristic is at least a kind of in fingerprint, people's face, sound and iris; Described reader is biological tagging reader.
3. a kind of unmanned key management method according to claim 1, it is characterized in that, identification in step S2 is individual non-contact card identification, be provided with user's identity information in described individual non-contact card, described user's identity information at least comprises that user's name, the individual non-contact card corresponding with user's identity are numbered, phone number.
4. a kind of unmanned key management method according to claim 1, is characterized in that, described key application plan at least comprises user's individual non-contact card numbering, key numbering, service time window.
5. a kind of unmanned key management method according to claim 4, is characterized in that, described service time, window comprised that key receives time window and key recovery time window.
6. a kind of unmanned key management method according to claim 5, is characterized in that, described step S2 also comprises:
If S201 user's identity information conforms to the information in being recorded in system server with application plan, be verified, system server records the time of receiving of key; If do not conform to, checking is not passed through;
If S202 user's the time of receiving is not in receiving time window or without application plan, and the specific reader accessing system of Multiple through then out server, server is by trigger alarm; And
If S203 user has got the key be not inconsistent with application plan, server triggers is reported to the police.
7. a kind of unmanned key management method according to claim 6, it is characterized in that, if in described step S202, user's the time of receiving is not in receiving time window or without application plan, and surpass 3 times by specific reader accessing system server, server is by trigger alarm.
8. a kind of unmanned key management method according to claim 5, is characterized in that, described step S3 also comprises:
S301, be verified after, the recovery time of server record key;
Do not give back key if S302 user surpasses key recovery time window, server sends note from the trend user, and records final giving back the time.
9. a kind of unmanned key management method according to claim 1, is characterized in that, the user needs to close the boxes for keys door after the receive/removal process that completes key, exceeds schedule time not close server triggers and report to the police.
10. unmanned key management method according to claim 1, it is characterized in that, described key application plan comprise a people receive/reclaim many key information module, same user complete once complete key receive with reclaim affairs after can receive key according to key application plan continuous several times.
CN201310451903.7A 2013-09-27 2013-09-27 A kind of unmanned key management method Expired - Fee Related CN103456065B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310451903.7A CN103456065B (en) 2013-09-27 2013-09-27 A kind of unmanned key management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310451903.7A CN103456065B (en) 2013-09-27 2013-09-27 A kind of unmanned key management method

Publications (2)

Publication Number Publication Date
CN103456065A true CN103456065A (en) 2013-12-18
CN103456065B CN103456065B (en) 2016-12-07

Family

ID=49738389

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310451903.7A Expired - Fee Related CN103456065B (en) 2013-09-27 2013-09-27 A kind of unmanned key management method

Country Status (1)

Country Link
CN (1) CN103456065B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107680283A (en) * 2017-09-22 2018-02-09 江苏海事职业技术学院 A kind of dormitory standby key borrows system and method
CN108071273A (en) * 2016-11-15 2018-05-25 刘伟华 The application method of substation's Anti-lost key and the key
CN109035507A (en) * 2018-07-10 2018-12-18 武汉瑞莱保能源技术有限公司 A kind of intelligent key management system based on loss protecting
CN109448199A (en) * 2018-12-21 2019-03-08 武汉黎赛科技有限责任公司 A kind of key management cabinet and method
CN109685483A (en) * 2019-01-31 2019-04-26 张义青 Key management system and key management method
CN109741502A (en) * 2019-01-11 2019-05-10 广东飞皇新能源有限公司 A kind of antitheft integrated form of gate inhibition adds intelligent access control system between paper money
CN109785533A (en) * 2019-01-24 2019-05-21 珠海市泰维思信息科技有限公司 Car key receives equipment, car key intelligence managing and control system and application method
CN111583542A (en) * 2020-04-30 2020-08-25 深圳市易流科技股份有限公司 Unattended management method and system
CN113495511A (en) * 2021-06-07 2021-10-12 北京咏安国际智能科技有限公司 Key cabinet control method and key cabinet

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106991457A (en) * 2017-04-14 2017-07-28 上海外高桥造船海洋工程有限公司 The management method and system of wlding

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070241898A1 (en) * 2004-12-14 2007-10-18 Declan Comerford Security System
CN201048387Y (en) * 2006-08-16 2008-04-16 苏州大成电子科技有限公司 Multimedia guide intelligent key management integrated machine
CN101329778A (en) * 2008-07-30 2008-12-24 成都市三极机械有限公司 Management system for storing article intelligently
CN202003396U (en) * 2010-06-29 2011-10-05 北京聚盾科技发展有限公司 Data preservation system
CN102646303A (en) * 2012-04-24 2012-08-22 深圳市华星光电技术有限公司 Self-service check-out system and method for garments for clean rooms
CN103294018A (en) * 2013-02-08 2013-09-11 中国人民解放军理工大学 Intelligent key managing system and self-inspection processing method thereof

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070241898A1 (en) * 2004-12-14 2007-10-18 Declan Comerford Security System
CN201048387Y (en) * 2006-08-16 2008-04-16 苏州大成电子科技有限公司 Multimedia guide intelligent key management integrated machine
CN101329778A (en) * 2008-07-30 2008-12-24 成都市三极机械有限公司 Management system for storing article intelligently
CN202003396U (en) * 2010-06-29 2011-10-05 北京聚盾科技发展有限公司 Data preservation system
CN102646303A (en) * 2012-04-24 2012-08-22 深圳市华星光电技术有限公司 Self-service check-out system and method for garments for clean rooms
CN103294018A (en) * 2013-02-08 2013-09-11 中国人民解放军理工大学 Intelligent key managing system and self-inspection processing method thereof

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108071273A (en) * 2016-11-15 2018-05-25 刘伟华 The application method of substation's Anti-lost key and the key
CN108071273B (en) * 2016-11-15 2020-08-28 国网山东省电力公司潍坊供电公司 Anti-loss key for transformer substation and use method of key
CN107680283A (en) * 2017-09-22 2018-02-09 江苏海事职业技术学院 A kind of dormitory standby key borrows system and method
CN109035507A (en) * 2018-07-10 2018-12-18 武汉瑞莱保能源技术有限公司 A kind of intelligent key management system based on loss protecting
CN109448199A (en) * 2018-12-21 2019-03-08 武汉黎赛科技有限责任公司 A kind of key management cabinet and method
CN109741502A (en) * 2019-01-11 2019-05-10 广东飞皇新能源有限公司 A kind of antitheft integrated form of gate inhibition adds intelligent access control system between paper money
CN109785533A (en) * 2019-01-24 2019-05-21 珠海市泰维思信息科技有限公司 Car key receives equipment, car key intelligence managing and control system and application method
CN109685483A (en) * 2019-01-31 2019-04-26 张义青 Key management system and key management method
CN109685483B (en) * 2019-01-31 2021-08-10 张义青 Key management system and key management method
CN111583542A (en) * 2020-04-30 2020-08-25 深圳市易流科技股份有限公司 Unattended management method and system
CN113495511A (en) * 2021-06-07 2021-10-12 北京咏安国际智能科技有限公司 Key cabinet control method and key cabinet

Also Published As

Publication number Publication date
CN103456065B (en) 2016-12-07

Similar Documents

Publication Publication Date Title
CN103456065A (en) Unattended key management method
CN102881064A (en) Visitor management system and method based on face identification
CN103465649A (en) Intelligent anti-counterfeiting seal with information tracing, authority controlling and seal impression authenticity verifying functions
CN204698138U (en) A kind of management through accounting specific information file cabinet
CN106780866A (en) Gate control system based on living things feature recognition
CN101550783A (en) Electronic coded lock and coded key
CN112509188A (en) Equipment intelligent security manages cabinet and management system
CN202706777U (en) Safety box with RFID (Radio Frequency Identification) recognizer and special folder
CN204423476U (en) A kind of split type clearance equipment
CN204423477U (en) A kind of monoblock type clearance equipment
CN112699987A (en) Method and system for monitoring work task by using lock
CN104008592A (en) Electrostatic control entrance guard management system and method
CN201955856U (en) Device for monitoring and recognizing personnel validity of important site
CN109979056A (en) Access control system and method based on image recognition technology
CN103678985A (en) Automatic operator tag generating system and automatic operator tag generating method
CN105335831A (en) Three-level networking bullet dynamic management system
CN105975836A (en) Management method for signature and authority authentication equipment
CN103164602A (en) Management method for valuable and special pharmaceutical in pharmacy
CN109465798B (en) Intelligent tool cabinet system of Internet of things
CN111414981A (en) Vehicle management method, device, equipment and storage medium
CN201111262Y (en) POS machine arranged on escort car
CN205507770U (en) Gun handing -over authenticate device
CN205680156U (en) A kind of access control equipment of improvement
CN202102455U (en) Safe management device based on RFID (Radio Frequency Identification)
CN204719838U (en) A kind of Multifunctional access device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20161207

Termination date: 20180927