CN103456065B - A kind of unmanned key management method - Google Patents

A kind of unmanned key management method Download PDF

Info

Publication number
CN103456065B
CN103456065B CN201310451903.7A CN201310451903A CN103456065B CN 103456065 B CN103456065 B CN 103456065B CN 201310451903 A CN201310451903 A CN 201310451903A CN 103456065 B CN103456065 B CN 103456065B
Authority
CN
China
Prior art keywords
key
user
server
application plan
management method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310451903.7A
Other languages
Chinese (zh)
Other versions
CN103456065A (en
Inventor
李冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201310451903.7A priority Critical patent/CN103456065B/en
Publication of CN103456065A publication Critical patent/CN103456065A/en
Application granted granted Critical
Publication of CN103456065B publication Critical patent/CN103456065B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a kind of unmanned key management method, first the identity information of key application plan and user is recorded in system server;User, by carrying out identification on specific reader accessing system server, completes the checking to user identity information Yu application plan, and checking is correct, and server system opens video monitoring probe, unlocking key cabinet door simultaneously;User gets key to appointment position;User is after key uses, and by carrying out identification on reader accessing system server, if checking is correct, server system opens video monitoring probe, unlocking key cabinet door simultaneously;Key is returned to key-placing position by user.If having received the key not being inconsistent with application plan or time-out not giving back key, then system trigger is reported to the police.This unmanned key management method can realize the intelligent management of key, it is to avoid the unreasonable use of key, it is ensured that the property safety of user.

Description

A kind of unmanned key management method
Technical field
The present invention relates to a kind of intellectualized management system, particularly relate to a kind of unmanned key management method.
Background technology
At present major part needs the place managing key to be the most also to rely on manpower, and this is accomplished by arranging special Management personnel and take special office, and due to the restriction of management personnel's daily schedule, part can be caused The vacancy of supervision time, brings great potential safety hazard;Error in management personnel's work also tends to cause Key-placing mistake and have serious consequences;Meanwhile, the record of receiving and give back of key relies on account more, holds Easily practise fraud, alter and be difficult to preserve and record clearly, increase potential safety hazard, and the needs that once meet accident are by this Checks of the records one by one, cumbersome and time consuming;Authorities can not understand key whereabouts and service condition in real time; And other security breaches that human negligence causes, it is unfavorable for the orderly management of key.
Summary of the invention
In order to solve technical problem present in background technology, the present invention provides a kind of unmanned key management Method, comprises the following steps:
S1, the identity information of key application plan and user is recorded in system server;
S2, receive: user is by carrying out identification on specific reader accessing system server, complete User identity information and the checking of application plan, verify correct in pairs, and server system will open video prison Control probe, unlocking key cabinet door simultaneously;User gets key to appointment position;
S3, recovery: user is after key uses, by specific reader accessing system server On carry out identification, complete the checking to user identity information Yu application plan, checking is correct, service Device system will open video monitoring probe, unlocking key cabinet door simultaneously;Key is returned to key and deposits by user Put position;
Wherein: described key application plan includes that a people receives/reclaim many key information modules, same use Person receives and can receive according to key application plan continuous several times after reclaiming affairs completing the most complete key Key;And:
User complete key receive/removal process after need close boxes for keys door, exceed schedule time and do not close Close then server triggers to report to the police.
Further, the identification in step S2 is living things feature recognition, and described biological characteristic at least refers to Stricture of vagina, face, sound and the one in iris;Described reader is biometrics readers.
Further, the identification in step S2 is individual's non-contact card identification, described individual's non-contact card Inside being provided with the identity information of user, the identity information of described user at least includes user name and makes User's identity corresponding individual non-contact card numbering, phone number.
Further, described key application plan at least includes the individual non-contact card numbering of user, key Numbering, use time window.
Further, described use time window includes that key receives time window and key recovery time window Mouthful.
Further, described step S2 also includes:
If S201 user identity information is consistent with the information being recorded in system server with application plan, Then be verified, system server record key receive the time;If not corresponding, then verify and do not pass through;
If the time of receiving of S202 user is not in receiving time window or without application plan, and repeatedly leads to Cross specific reader accessing system server, then triggering is reported to the police by server;And
If S203 user has got the key not being inconsistent with application plan, then server triggers is reported to the police.
Preferably, if in described step S202 the time of receiving of user not in receiving time window or without making With plan, and more than 3 times by specific reader accessing system server, then server is by triggerings report Alert.
Further, described step S3 also includes:
S301, be verified after, the recovery time of server record key;
If S302 user exceedes key, key do not given back by recovery time window, then server uses from trend Person sends note, and records and final give back the time.
Disclosure based on technique scheme, the described unmanned key management method that the present invention provides can be real In the case of existing unmanned, key is realized intelligent management;If the time of receiving of user is not when receiving Between in window or without application plan, and Multiple through then out specific reader accessing system server then server will Trigger and report to the police, can effectively avoid user malice input that whole system is damaged;If user is got The key not being inconsistent with application plan, then server triggers is reported to the police, and can ensure that key is only to meeting specific identity Information is open with the user having application plan to be used, and reduces potential safety hazard;When receiving/reclaim key, with Step starts video monitoring probe, can receive/reclaim the process of key by the omnidistance user that records clearly;If making User exceedes key recovery time window and does not gives back key, then server sends note from trend user, urges User is promoted to give back as early as possible, the Appropriate application ensureing key of maximizing.
Accompanying drawing explanation
Fig. 1 is the flow chart of a kind of unmanned key management method that the present invention proposes.
Detailed description of the invention
Below in conjunction with the accompanying drawings embodiments of the invention are described in detail.
Refer to Fig. 1, the invention provides unmanned key management method, comprise the following steps:
S1, the identity information of key application plan and user is recorded in system server;
S2, receive: user is by carrying out identification on specific reader accessing system server, complete User identity information and the checking of application plan, verify correct in pairs, and server system will open video prison Control probe, unlocking key cabinet door simultaneously;User gets key to appointment position;
S3, recovery: user is after key uses, by specific reader accessing system server On carry out identification, complete the checking to user identity information Yu application plan, checking is correct, service Device system will open video monitoring probe, unlocking key cabinet door simultaneously;Key is returned to key and deposits by user Put position.
Wherein, the function that described unmanned key management method supports a people to receive/reclaim many keys is right Ying Di, key application plan includes that a people receives/reclaim many key information modules, and same user is complete Key can be received according to key application plan continuous several times after becoming the most complete key to receive and reclaim affairs. The most complete key is received and is reclaimed affairs and is dependent on what the switch of boxes for keys door completed, does not support user In the case of not closing boxes for keys door, receive/reclaim key continuously.
User complete key receive/removal process after need close boxes for keys door, exceed schedule time and do not close Close then server triggers to report to the police.
Identification in step S2 can be living things feature recognition also can be individual non-contact card identification.
Biological characteristic is at least fingerprint, face, sound and the one in iris;And the reader of correspondence makes a living Thing tagging reader.
Be provided with the identity information of user in individual's individual non-contact card corresponding to non-contact card identification, described in make The identity information of user at least includes that the individual non-contact card that user name is corresponding with user identity is compiled Number, phone number.And, unification in the individual non-contact card use unit/key field of employment of user Open number segment coding.
Key supports traditional keys and non-contact card class key.Traditional key is the most different with one in use The non-contact card of type links into an integrated entity;The coding of non-contact card class key uses covert number segment coding, Coding rule and method can be different from individual's non-contact card, it is possible to identical, this is not limited by the present embodiment Fixed.
Described key application plan at least includes the individual non-contact card numbering of user, key numbering, uses Time window;Described use time window includes that key receives time window and key recovery time window.
The use time window of key sets according to applicable cases, and receiving time window default setting is that plan makes With first 20 minutes to 5 minutes of the time, recovery time window default setting be 5 minutes after the use time extremely 15 minutes.
Video monitoring probe connects on external memory, can circulate storage continuously, and the storage of video information is effective Phase is 5 days.
Described step S2 of receiving also includes:
If S201 user identity information is consistent with the information being recorded in system server with application plan, Then be verified, system server record key receive the time;If not corresponding, then verify and do not pass through;
If the time of receiving of S202 user is not in receiving time window or without application plan, and repeatedly leads to Cross specific reader accessing system server, then triggering is reported to the police by server;And
If S203 user has got the key not being inconsistent with application plan, then server triggers is reported to the police.
And, if in described step S202 the time of receiving of user not in receiving time window or without making to use tricks Drawing, more than 3 times by specific reader accessing system server, then triggering is reported to the police by server.
Described recycling step S3 also includes:
S301, be verified after, the recovery time of server record key;
If S302 user exceedes key, key do not given back by recovery time window, then server uses from trend Person sends note, and records and final give back the time.
Report to the police and divide exception and an accident, beyond normal key recovery time but do not affect follow-up use for abnormal; Paranormal key reclaims simple and have impact on follow-up use, user and repeatedly input and be not inconsistent with application plan Or repeatedly identity information checking has received, by, user, the key not being inconsistent with application plan is accident, it is System will give warning reminding.
To sum up, in the case of the described unmanned key management method that the present invention provides can realize unmanned Key is realized intelligent management;If the time of receiving of user is not in receiving time window or without making to use tricks Draw, and triggering is reported to the police by Multiple through then out specific reader accessing system server then server, can be effective Avoid user malice input that whole system is damaged;If user has been got and has not been inconsistent with application plan Key, then server triggers is reported to the police, and can ensure that key is only to meeting specific identity information and having application plan User is open to be used, and reduces potential safety hazard;When receiving/reclaim key, synchronous averaging video monitoring is visited Head, can receive/reclaim the process of key by the omnidistance user that records clearly;Reclaim if user exceedes key Time window does not gives back key, then server sends note from trend user, urges user to return as early as possible Also, the Appropriate application ensureing key of maximizing.
The above, the only present invention preferably detailed description of the invention, but protection scope of the present invention not office Being limited to this, any those familiar with the art is in the technical scope that the invention discloses, according to this The technical scheme of invention and inventive concept thereof in addition equivalent or change, all should contain the protection in the present invention Within the scope of.

Claims (8)

1. a unmanned key management method, it is characterised in that comprise the following steps:
S1, the identity information of key application plan and user is recorded in system server;
S2, receive: user is by carrying out identification on specific reader accessing system server, complete User identity information and the checking of application plan, verify correct in pairs, and server system will open video prison Control probe, unlocking key cabinet door simultaneously;User gets key to appointment position;
S3, recovery: user is after key uses, by specific reader accessing system server On carry out identification, complete the checking to user identity information Yu application plan, checking is correct, service Device system will open video monitoring probe, unlocking key cabinet door simultaneously;Key is returned to key and deposits by user Put position;
Wherein: described key application plan includes that a people receives/reclaim many key information modules, same use Person receives and can receive according to key application plan continuous several times after reclaiming affairs completing the most complete key Key;And:
User complete key receive/removal process after need close boxes for keys door, exceed schedule time and do not close Close then server triggers to report to the police.
A kind of unmanned key management method the most according to claim 1, it is characterised in that step Identification in rapid S2 is living things feature recognition, and described biological characteristic is at least fingerprint, face, sound With the one in iris;Described reader is biometrics readers.
A kind of unmanned key management method the most according to claim 1, it is characterised in that step Identification in rapid S2 is individual's non-contact card identification, is provided with user in described individual's non-contact card Identity information, the identity information of described user at least includes that user name is corresponding with user identity Individual's non-contact card numbering, phone number.
A kind of unmanned key management method the most according to claim 1, it is characterised in that institute State key application plan at least to include the individual non-contact card numbering of user, key numbering, use time window Mouthful.
A kind of unmanned key management method the most according to claim 4, it is characterised in that institute State use time window and include that key receives time window and key recovery time window.
A kind of unmanned key management method the most according to claim 5, it is characterised in that institute State step S2 also to include:
If S201 user identity information is consistent with the information being recorded in system server with application plan, Then be verified, system server record key receive the time;If not corresponding, then verify and do not pass through;
If the time of receiving of S202 user is not in receiving time window or without application plan, and repeatedly leads to Cross specific reader accessing system server, then triggering is reported to the police by server;And
If S203 user has got the key not being inconsistent with application plan, then server triggers is reported to the police.
A kind of unmanned key management method the most according to claim 6, it is characterised in that institute If it is in not receiving time window or without application plan and super to state the time of receiving of user in step S202 Cross and pass through specific reader accessing system server for 3 times, then triggering is reported to the police by server.
A kind of unmanned key management method the most according to claim 5, it is characterised in that institute State step S3 also to include:
S301, be verified after, the recovery time of server record key;
If S302 user exceedes key, key do not given back by recovery time window, then server uses from trend Person sends note, and records and final give back the time.
CN201310451903.7A 2013-09-27 2013-09-27 A kind of unmanned key management method Expired - Fee Related CN103456065B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310451903.7A CN103456065B (en) 2013-09-27 2013-09-27 A kind of unmanned key management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310451903.7A CN103456065B (en) 2013-09-27 2013-09-27 A kind of unmanned key management method

Publications (2)

Publication Number Publication Date
CN103456065A CN103456065A (en) 2013-12-18
CN103456065B true CN103456065B (en) 2016-12-07

Family

ID=49738389

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310451903.7A Expired - Fee Related CN103456065B (en) 2013-09-27 2013-09-27 A kind of unmanned key management method

Country Status (1)

Country Link
CN (1) CN103456065B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106991457A (en) * 2017-04-14 2017-07-28 上海外高桥造船海洋工程有限公司 The management method and system of wlding
CN109685483A (en) * 2019-01-31 2019-04-26 张义青 Key management system and key management method

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108071273B (en) * 2016-11-15 2020-08-28 国网山东省电力公司潍坊供电公司 Anti-loss key for transformer substation and use method of key
CN107680283A (en) * 2017-09-22 2018-02-09 江苏海事职业技术学院 A kind of dormitory standby key borrows system and method
CN109035507A (en) * 2018-07-10 2018-12-18 武汉瑞莱保能源技术有限公司 A kind of intelligent key management system based on loss protecting
CN109448199A (en) * 2018-12-21 2019-03-08 武汉黎赛科技有限责任公司 A kind of key management cabinet and method
CN109741502A (en) * 2019-01-11 2019-05-10 广东飞皇新能源有限公司 A kind of antitheft integrated form of gate inhibition adds intelligent access control system between paper money
CN109785533A (en) * 2019-01-24 2019-05-21 珠海市泰维思信息科技有限公司 Car key receives equipment, car key intelligence managing and control system and application method
CN111583542A (en) * 2020-04-30 2020-08-25 深圳市易流科技股份有限公司 Unattended management method and system
CN113495511A (en) * 2021-06-07 2021-10-12 北京咏安国际智能科技有限公司 Key cabinet control method and key cabinet

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201048387Y (en) * 2006-08-16 2008-04-16 苏州大成电子科技有限公司 Multimedia guide intelligent key management integrated machine
CN101329778A (en) * 2008-07-30 2008-12-24 成都市三极机械有限公司 Management system for storing article intelligently
CN102646303A (en) * 2012-04-24 2012-08-22 深圳市华星光电技术有限公司 Self-service check-out system and method for garments for clean rooms
CN103294018A (en) * 2013-02-08 2013-09-11 中国人民解放军理工大学 Intelligent key managing system and self-inspection processing method thereof

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2421342B (en) * 2004-12-14 2009-12-30 Declan Comerford A security system
CN202003396U (en) * 2010-06-29 2011-10-05 北京聚盾科技发展有限公司 Data preservation system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201048387Y (en) * 2006-08-16 2008-04-16 苏州大成电子科技有限公司 Multimedia guide intelligent key management integrated machine
CN101329778A (en) * 2008-07-30 2008-12-24 成都市三极机械有限公司 Management system for storing article intelligently
CN102646303A (en) * 2012-04-24 2012-08-22 深圳市华星光电技术有限公司 Self-service check-out system and method for garments for clean rooms
CN103294018A (en) * 2013-02-08 2013-09-11 中国人民解放军理工大学 Intelligent key managing system and self-inspection processing method thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106991457A (en) * 2017-04-14 2017-07-28 上海外高桥造船海洋工程有限公司 The management method and system of wlding
CN109685483A (en) * 2019-01-31 2019-04-26 张义青 Key management system and key management method

Also Published As

Publication number Publication date
CN103456065A (en) 2013-12-18

Similar Documents

Publication Publication Date Title
CN103456065B (en) A kind of unmanned key management method
CN102122402B (en) Access control system based on palm vein authentication and authentication method using same
CN203192058U (en) Intelligent toxic and narcotic drug management cabinet
CN101894406A (en) Network access control system
CN102945366A (en) Method and device for face recognition
CN105632001A (en) Security and protection monitoring method and system based on face recognition
CN106780866A (en) Gate control system based on living things feature recognition
CN212341991U (en) Self-service police article borrowing and returning system
CN105389871A (en) Access control system
CN112509188A (en) Equipment intelligent security manages cabinet and management system
CN106127911A (en) Gate inhibition's tracking identification method and device, recognition and tracking system, gate control system
CN106780864A (en) Gate control system based on skeleton identification technology
CN201955856U (en) Device for monitoring and recognizing personnel validity of important site
CN102063604A (en) Monitoring and identification device for validity of personnel in important place
CN102279937A (en) Electronic school badge system with radio frequency function and realization method thereof
CN109493475B (en) Method for serving as electronic fence based on biological characteristics
CN213182886U (en) Alarm system based on entrance guard's equipment
CN107767515B (en) A kind of personnel management methods for Design of Laboratory Management System
CN106340102A (en) Control method of access control system based on radio frequency identification and video monitoring
CN103294981A (en) Intelligent face recognition system
CN104715533A (en) Method for unlocking door lock by matching code by virtue of dynamic fingerprint of mobile terminal
CN205486366U (en) Campus access control system of middle and primary schools
CN203133985U (en) Iris-lock gate control system
CN206849125U (en) Intelligent access control system
CN208922361U (en) Access control system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20161207

Termination date: 20180927