CN103456065A - Unattended key management method - Google Patents
Unattended key management method Download PDFInfo
- Publication number
- CN103456065A CN103456065A CN2013104519037A CN201310451903A CN103456065A CN 103456065 A CN103456065 A CN 103456065A CN 2013104519037 A CN2013104519037 A CN 2013104519037A CN 201310451903 A CN201310451903 A CN 201310451903A CN 103456065 A CN103456065 A CN 103456065A
- Authority
- CN
- China
- Prior art keywords
- key
- user
- server
- management method
- application plan
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention discloses an unattended key management method. A key usage plan and identity information of a user are recorded in a system server first; the user logs in the system server for identity recognition through a specific reader to complete the verification of the identity information of the user and the usage plan; if the verification result is correct, a server system starts a video monitoring probe, and a key cabinet is opened at the same time; the user takes a key from a specified position; after using the key, the user logs in the system server for identity recognition through the reader; if the verification result is correct, the server system starts the video monitoring probe, and the key cabinet is opened at the same time; the user returns the key to a key storing position. If a key which is inconsistent with the usage plan is taken or the key is not returned at due time, the system triggers an alarm. By means of the unattended key management method, intelligent management of the key can be realized, unreasonable usage of the key is avoided, and property safety of the user is guaranteed.
Description
Technical field
The present invention relates to a kind of intellectualized management system, relate in particular to a kind of unmanned key management method.
Background technology
Most of place of management key that needs all still depends on manpower at present, this just needs arrange special managerial personnel and take special-purpose office, and due to the restriction of managerial personnel's daily schedule, can cause the part vacancy of supervision time, bring great potential safety hazard; Error in managerial personnel's work also tends to cause the key-placing mistake and has serious consequences; Simultaneously, key receive and give back record the accounts that rely on more, it is clear easily to practise fraud, alter and be difficult to preserve and record, and increases potential safety hazard, once and meet accident and need by this checks of the records one by one, not only time-consuming but also effort; Competent authorities can not understand key whereabouts and service condition in real time; And other security breaches of causing of human negligence, be unfavorable for the orderly management of key.
Summary of the invention
In order to solve the technical matters existed in background technology, the present invention proposes a kind of.
The invention provides a kind of unmanned key management method, comprise the following steps:
S1, key application plan and user's identity information is recorded in to system server;
S2, receive: the user, by specific reader accessing system server, carrying out identification, completes the checking to user's identity information and application plan, and checking is correct, and server system will be opened the video monitoring probe, while unlocking key cabinet door; The user gets key to assigned address;
S3, recovery: the user is after key is finished using, by on specific reader accessing system server, carrying out identification, complete the checking to user's identity information and application plan, checking is correct, server system will be opened the video monitoring probe, simultaneously unlocking key cabinet door; The user is returned to the key-placing position by key.
Further, the identification in step S2 is living things feature recognition, and described biological characteristic is at least a kind of in fingerprint, people's face, sound and iris; Described reader is biological tagging reader.
Further, identification in step S2 is individual non-contact card identification, be provided with user's identity information in described individual non-contact card, described user's identity information at least comprises that user's name, the individual non-contact card corresponding with user's identity are numbered, phone number.
Further, described key application plan at least comprises user's individual non-contact card numbering, key numbering, service time window.
Further, described service time, window comprised that key receives time window and key recovery time window.
Further, described step S2 also comprises:
If S201 user's identity information conforms to the information in being recorded in system server with application plan, be verified, system server records the time of receiving of key; If do not conform to, checking is not passed through;
If S202 user's the time of receiving is not in receiving time window or without application plan, and the specific reader accessing system of Multiple through then out server, server is by trigger alarm; And
If S203 user has got the key be not inconsistent with application plan, server triggers is reported to the police.
Preferably, if in described step S202, user's the time of receiving, not in receiving time window or without application plan, and surpasses 3 times by specific reader accessing system server, server is by trigger alarm.
Further, described step S3 also comprises:
S301, be verified after, the recovery time of server record key;
Do not give back key if S302 user surpasses key recovery time window, server sends note from the trend user, and records final giving back the time.
Further, the user needs to close the boxes for keys door after the receive/removal process that completes key, exceeds schedule time not close server triggers and report to the police.
Further, described key application plan comprise a people receive/reclaim many key information module, same user complete once complete key receive with reclaim affairs after can receive key according to key application plan continuous several times.
Based on disclosing of technique scheme, described unmanned key management method provided by the invention can realize, in unattended situation, key is realized to intelligent management; If user's the time of receiving not in receiving time window or without application plan, and the specific reader accessing system of Multiple through then out server server by trigger alarm, can effectively avoid the user maliciously to input whole system is damaged; If the user has got the key be not inconsistent with application plan, server triggers is reported to the police, and can ensure that key, only to meeting specific identity information and having the user of application plan to open use, reduces potential safety hazard; Receive/while reclaiming key, synchronously start the video monitoring probe, whole process records the process that the user received/reclaimed key clearly; Do not give back key if the user surpasses key recovery time window, server sends note from the trend user, urges the user to give back as early as possible, the reasonable utilization of the guarantee key of maximizing.
The accompanying drawing explanation
The process flow diagram that Fig. 1 is a kind of unmanned key management method of proposing of the present invention.
Embodiment
Below in conjunction with accompanying drawing, embodiments of the invention are described in detail.
Refer to Fig. 1, the invention provides unmanned key management method, comprise the following steps:
S1, key application plan and user's identity information is recorded in to system server;
S2, receive: the user, by specific reader accessing system server, carrying out identification, completes the checking to user's identity information and application plan, and checking is correct, and server system will be opened the video monitoring probe, while unlocking key cabinet door; The user gets key to assigned address;
S3, recovery: the user is after key is finished using, by on specific reader accessing system server, carrying out identification, complete the checking to user's identity information and application plan, checking is correct, server system will be opened the video monitoring probe, simultaneously unlocking key cabinet door; The user is returned to the key-placing position by key.
Identification in step S2 can be living things feature recognition and also can be individual non-contact card identification.
Biological characteristic is at least a kind of in fingerprint, people's face, sound and iris; And corresponding reader is biological tagging reader.
Individual's non-contact card is identified the identity information that is provided with the user in corresponding individual non-contact card, and described user's identity information at least comprises that user's name, the individual non-contact card corresponding with user's identity are numbered, phone number.And open number segment unified in user's individual non-contact card applying unit/key field of employment is encoded.
Key is supported traditional key and non-contact card class key.Traditional key directly links into an integrated entity with the non-contact card of an abnormal shape in use; The coding of non-contact card class key is used covert number segment coding, and coding rule and method can be different from individual non-contact card, also can be identical, and the present embodiment is not construed as limiting this.
Described key application plan at least comprises user's individual non-contact card numbering, key numbering, service time window; Described service time, window comprised that key receives time window and key recovery time window.
Window service time of key is set according to applicable cases, receives the time window default setting for plan first 20 minutes to 5 minutes of service time, and recovery time window default setting is 5 minutes to 15 minutes after service time.
The video monitoring probe connects on external storage, but the continuous circulation storage, and the storage term of validity of video information is 5 days.
The described step S2 that receives also comprises:
If S201 user's identity information conforms to the information in being recorded in system server with application plan, be verified, system server records the time of receiving of key; If do not conform to, checking is not passed through;
If S202 user's the time of receiving is not in receiving time window or without application plan, and the specific reader accessing system of Multiple through then out server, server is by trigger alarm; And
If S203 user has got the key be not inconsistent with application plan, server triggers is reported to the police.
And, if in described step S202, user's the time of receiving, not in receiving time window or without application plan, surpasses 3 times by specific reader accessing system server, server is by trigger alarm.
Described recycling step S3 also comprises:
S301, be verified after, the recovery time of server record key;
Do not give back key if S302 user surpasses key recovery time window, server sends note from the trend user, and records final giving back the time.
The user needs to close the boxes for keys door after the receive/removal process that completes key, exceeds schedule time not close server triggers and report to the police.
Report to the police and divide abnormal and an accident, exceed normal key recovery time but do not affect follow-up use for abnormal; Paranormal key reclaim simple and affected follow-up use, user repeatedly input with application plan, be not inconsistent or repeatedly the identity information checking by, key that the user has received not to be inconsistent with application plan, be not accident, system will give warning reminding.
Described unmanned key management method supports a people to receive/reclaim the function of many keys, accordingly, the key application plan comprise a people receive/reclaim many key information module, same user complete once complete key receive with reclaim affairs after can receive key according to key application plan continuous several times.Once complete key is received with reclaiming affairs to be to rely on the switch of boxes for keys door to complete, not support the user in the situation that do not close the boxes for keys door and receive continuously/reclaim key.
To sum up, described unmanned key management method provided by the invention can realize, in unattended situation, key is realized to intelligent management; If user's the time of receiving not in receiving time window or without application plan, and the specific reader accessing system of Multiple through then out server server by trigger alarm, can effectively avoid the user maliciously to input whole system is damaged; If the user has got the key be not inconsistent with application plan, server triggers is reported to the police, and can ensure that key, only to meeting specific identity information and having the user of application plan to open use, reduces potential safety hazard; Receive/while reclaiming key, synchronously start the video monitoring probe, whole process records the process that the user received/reclaimed key clearly; Do not give back key if the user surpasses key recovery time window, server sends note from the trend user, urges the user to give back as early as possible, the reasonable utilization of the guarantee key of maximizing.
The above; it is only preferably embodiment of the present invention; but protection scope of the present invention is not limited to this; anyly be familiar with those skilled in the art in the technical scope that the present invention discloses; be equal to replacement or changed according to technical scheme of the present invention and inventive concept thereof, within all should being encompassed in protection scope of the present invention.
Claims (10)
1. a unmanned key management method, is characterized in that, comprises the following steps:
S1, key application plan and user's identity information is recorded in to system server;
S2, receive: the user, by specific reader accessing system server, carrying out identification, completes the checking to user's identity information and application plan, and checking is correct, and server system will be opened the video monitoring probe, while unlocking key cabinet door; The user gets key to assigned address;
S3, recovery: the user is after key is finished using, by on specific reader accessing system server, carrying out identification, complete the checking to user's identity information and application plan, checking is correct, server system will be opened the video monitoring probe, simultaneously unlocking key cabinet door; The user is returned to the key-placing position by key.
2. a kind of unmanned key management method according to claim 1, is characterized in that, the identification in step S2 is living things feature recognition, and described biological characteristic is at least a kind of in fingerprint, people's face, sound and iris; Described reader is biological tagging reader.
3. a kind of unmanned key management method according to claim 1, it is characterized in that, identification in step S2 is individual non-contact card identification, be provided with user's identity information in described individual non-contact card, described user's identity information at least comprises that user's name, the individual non-contact card corresponding with user's identity are numbered, phone number.
4. a kind of unmanned key management method according to claim 1, is characterized in that, described key application plan at least comprises user's individual non-contact card numbering, key numbering, service time window.
5. a kind of unmanned key management method according to claim 4, is characterized in that, described service time, window comprised that key receives time window and key recovery time window.
6. a kind of unmanned key management method according to claim 5, is characterized in that, described step S2 also comprises:
If S201 user's identity information conforms to the information in being recorded in system server with application plan, be verified, system server records the time of receiving of key; If do not conform to, checking is not passed through;
If S202 user's the time of receiving is not in receiving time window or without application plan, and the specific reader accessing system of Multiple through then out server, server is by trigger alarm; And
If S203 user has got the key be not inconsistent with application plan, server triggers is reported to the police.
7. a kind of unmanned key management method according to claim 6, it is characterized in that, if in described step S202, user's the time of receiving is not in receiving time window or without application plan, and surpass 3 times by specific reader accessing system server, server is by trigger alarm.
8. a kind of unmanned key management method according to claim 5, is characterized in that, described step S3 also comprises:
S301, be verified after, the recovery time of server record key;
Do not give back key if S302 user surpasses key recovery time window, server sends note from the trend user, and records final giving back the time.
9. a kind of unmanned key management method according to claim 1, is characterized in that, the user needs to close the boxes for keys door after the receive/removal process that completes key, exceeds schedule time not close server triggers and report to the police.
10. unmanned key management method according to claim 1, it is characterized in that, described key application plan comprise a people receive/reclaim many key information module, same user complete once complete key receive with reclaim affairs after can receive key according to key application plan continuous several times.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310451903.7A CN103456065B (en) | 2013-09-27 | 2013-09-27 | A kind of unmanned key management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310451903.7A CN103456065B (en) | 2013-09-27 | 2013-09-27 | A kind of unmanned key management method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103456065A true CN103456065A (en) | 2013-12-18 |
CN103456065B CN103456065B (en) | 2016-12-07 |
Family
ID=49738389
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310451903.7A Expired - Fee Related CN103456065B (en) | 2013-09-27 | 2013-09-27 | A kind of unmanned key management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103456065B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107680283A (en) * | 2017-09-22 | 2018-02-09 | 江苏海事职业技术学院 | A kind of dormitory standby key borrows system and method |
CN108071273A (en) * | 2016-11-15 | 2018-05-25 | 刘伟华 | The application method of substation's Anti-lost key and the key |
CN109035507A (en) * | 2018-07-10 | 2018-12-18 | 武汉瑞莱保能源技术有限公司 | A kind of intelligent key management system based on loss protecting |
CN109448199A (en) * | 2018-12-21 | 2019-03-08 | 武汉黎赛科技有限责任公司 | A kind of key management cabinet and method |
CN109685483A (en) * | 2019-01-31 | 2019-04-26 | 张义青 | Key management system and key management method |
CN109741502A (en) * | 2019-01-11 | 2019-05-10 | 广东飞皇新能源有限公司 | A kind of antitheft integrated form of gate inhibition adds intelligent access control system between paper money |
CN109785533A (en) * | 2019-01-24 | 2019-05-21 | 珠海市泰维思信息科技有限公司 | Car key receives equipment, car key intelligence managing and control system and application method |
CN111583542A (en) * | 2020-04-30 | 2020-08-25 | 深圳市易流科技股份有限公司 | Unattended management method and system |
CN113495511A (en) * | 2021-06-07 | 2021-10-12 | 北京咏安国际智能科技有限公司 | Key cabinet control method and key cabinet |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106991457A (en) * | 2017-04-14 | 2017-07-28 | 上海外高桥造船海洋工程有限公司 | The management method and system of wlding |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070241898A1 (en) * | 2004-12-14 | 2007-10-18 | Declan Comerford | Security System |
CN201048387Y (en) * | 2006-08-16 | 2008-04-16 | 苏州大成电子科技有限公司 | Multimedia guide intelligent key management integrated machine |
CN101329778A (en) * | 2008-07-30 | 2008-12-24 | 成都市三极机械有限公司 | Management system for storing article intelligently |
CN202003396U (en) * | 2010-06-29 | 2011-10-05 | 北京聚盾科技发展有限公司 | Data preservation system |
CN102646303A (en) * | 2012-04-24 | 2012-08-22 | 深圳市华星光电技术有限公司 | Self-service check-out system and method for garments for clean rooms |
CN103294018A (en) * | 2013-02-08 | 2013-09-11 | 中国人民解放军理工大学 | Intelligent key managing system and self-inspection processing method thereof |
-
2013
- 2013-09-27 CN CN201310451903.7A patent/CN103456065B/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070241898A1 (en) * | 2004-12-14 | 2007-10-18 | Declan Comerford | Security System |
CN201048387Y (en) * | 2006-08-16 | 2008-04-16 | 苏州大成电子科技有限公司 | Multimedia guide intelligent key management integrated machine |
CN101329778A (en) * | 2008-07-30 | 2008-12-24 | 成都市三极机械有限公司 | Management system for storing article intelligently |
CN202003396U (en) * | 2010-06-29 | 2011-10-05 | 北京聚盾科技发展有限公司 | Data preservation system |
CN102646303A (en) * | 2012-04-24 | 2012-08-22 | 深圳市华星光电技术有限公司 | Self-service check-out system and method for garments for clean rooms |
CN103294018A (en) * | 2013-02-08 | 2013-09-11 | 中国人民解放军理工大学 | Intelligent key managing system and self-inspection processing method thereof |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108071273A (en) * | 2016-11-15 | 2018-05-25 | 刘伟华 | The application method of substation's Anti-lost key and the key |
CN108071273B (en) * | 2016-11-15 | 2020-08-28 | 国网山东省电力公司潍坊供电公司 | Anti-loss key for transformer substation and use method of key |
CN107680283A (en) * | 2017-09-22 | 2018-02-09 | 江苏海事职业技术学院 | A kind of dormitory standby key borrows system and method |
CN109035507A (en) * | 2018-07-10 | 2018-12-18 | 武汉瑞莱保能源技术有限公司 | A kind of intelligent key management system based on loss protecting |
CN109448199A (en) * | 2018-12-21 | 2019-03-08 | 武汉黎赛科技有限责任公司 | A kind of key management cabinet and method |
CN109741502A (en) * | 2019-01-11 | 2019-05-10 | 广东飞皇新能源有限公司 | A kind of antitheft integrated form of gate inhibition adds intelligent access control system between paper money |
CN109785533A (en) * | 2019-01-24 | 2019-05-21 | 珠海市泰维思信息科技有限公司 | Car key receives equipment, car key intelligence managing and control system and application method |
CN109685483A (en) * | 2019-01-31 | 2019-04-26 | 张义青 | Key management system and key management method |
CN109685483B (en) * | 2019-01-31 | 2021-08-10 | 张义青 | Key management system and key management method |
CN111583542A (en) * | 2020-04-30 | 2020-08-25 | 深圳市易流科技股份有限公司 | Unattended management method and system |
CN113495511A (en) * | 2021-06-07 | 2021-10-12 | 北京咏安国际智能科技有限公司 | Key cabinet control method and key cabinet |
Also Published As
Publication number | Publication date |
---|---|
CN103456065B (en) | 2016-12-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103456065A (en) | Unattended key management method | |
CN102881064A (en) | Visitor management system and method based on face identification | |
CN103465649A (en) | Intelligent anti-counterfeiting seal with information tracing, authority controlling and seal impression authenticity verifying functions | |
CN204698138U (en) | A kind of management through accounting specific information file cabinet | |
CN106780866A (en) | Gate control system based on living things feature recognition | |
CN101550783A (en) | Electronic coded lock and coded key | |
CN112509188A (en) | Equipment intelligent security manages cabinet and management system | |
CN202706777U (en) | Safety box with RFID (Radio Frequency Identification) recognizer and special folder | |
CN204423476U (en) | A kind of split type clearance equipment | |
CN204423477U (en) | A kind of monoblock type clearance equipment | |
CN112699987A (en) | Method and system for monitoring work task by using lock | |
CN104008592A (en) | Electrostatic control entrance guard management system and method | |
CN201955856U (en) | Device for monitoring and recognizing personnel validity of important site | |
CN109979056A (en) | Access control system and method based on image recognition technology | |
CN103678985A (en) | Automatic operator tag generating system and automatic operator tag generating method | |
CN105335831A (en) | Three-level networking bullet dynamic management system | |
CN105975836A (en) | Management method for signature and authority authentication equipment | |
CN103164602A (en) | Management method for valuable and special pharmaceutical in pharmacy | |
CN109465798B (en) | Intelligent tool cabinet system of Internet of things | |
CN111414981A (en) | Vehicle management method, device, equipment and storage medium | |
CN201111262Y (en) | POS machine arranged on escort car | |
CN205507770U (en) | Gun handing -over authenticate device | |
CN205680156U (en) | A kind of access control equipment of improvement | |
CN202102455U (en) | Safe management device based on RFID (Radio Frequency Identification) | |
CN204719838U (en) | A kind of Multifunctional access device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20161207 Termination date: 20180927 |