CN106815943A - A kind of real object access method with from perception early warning security characteristic - Google Patents
A kind of real object access method with from perception early warning security characteristic Download PDFInfo
- Publication number
- CN106815943A CN106815943A CN201611138141.5A CN201611138141A CN106815943A CN 106815943 A CN106815943 A CN 106815943A CN 201611138141 A CN201611138141 A CN 201611138141A CN 106815943 A CN106815943 A CN 106815943A
- Authority
- CN
- China
- Prior art keywords
- real object
- real
- storage holder
- specified
- cabinet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/10—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property
- G07F17/12—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property comprising lockable containers, e.g. for accepting clothes to be cleaned
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Electromagnetism (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Theoretical Computer Science (AREA)
- Burglar Alarm Systems (AREA)
Abstract
A kind of real object access method with from perception early warning security characteristic, every real object is independently stored in specified real object storage holder in interactive process;Real object is delivered using radio electronic label+Quick Response Code composition combination tag, the uninterrupted automatic identification scanning monitoring of RFID read heads, the full-time, state that real-time report real object is in intellectual access cabinet;User can only face specified real object file and be operated, and will not see, take, influenceing, the real object disturbed in other real object storage holders;The real object that user is taken in interactive process can only take out from specified real object storage holder;Every real object is independently stored in the specified real object storage holder in intellectual access cabinet, just for a specified real object, will not be seen, be taken, influenceing and can deposit, withdraw and stealing other real objects with illegal means.
Description
Technical field
The present invention relates to a kind of with from the real object access method for perceiving early warning security characteristic, it is related to logistics field;It is real
Object field of storage;Official document, files, drawing exchange field;Official document, files, drawing keeping field;Official document, files, drawing are borrowed
Field;Firearms take care of field;Valuables take care of field.
Background technology
The intermediate transfer medium that the intelligent commuting case of material object circulation is exchanged as real object, outbox side and recipient only respectively with
The intelligent commuting case of material object circulation carries out transmission in kind, state when this mode can only reflect that real object puts into, it is impossible to protect completely
The phenomenons such as whether object is carried secretly, wrong throwing are confirmed, even if entrainment, the wrong problem thrown occur can only also be followed the trail of afterwards;Taking thing
When cabinet door need to be opened, therefore typically can only by all real objects all take out, if only taking part real object, remaining real object meeting
It is seen or takes away, it is impossible to ensures the possibility that real object is stolen well.
The content of the invention
In order to overcome the deficiencies in the prior art, the present invention to provide a kind of real object with from perception early warning security characteristic and deposit
Take method.
A kind of real object access method with from perception early warning security characteristic, contains following steps;Interactive process
In every real object be independently stored in specified real object storage holder;Real object is delivered using radio electronic label+Quick Response Code composition
Combination tag, the uninterrupted automatic identification scanning monitoring of RFID read heads, the full-time, shape that real-time report real object is in intellectual access cabinet
State;User can only face specified real object file and be operated, in not interfering with, disturbing other real object storage holders
Real object;The real object that user is taken in interactive process can only take out from specified real object storage holder;Every material object
Body is independently stored in the specified real object storage holder in intellectual access cabinet, just for a specified real object, is not influenceed and can
Deposit, withdraw and steal other real objects with illegal means.
The advantage for using of the invention and good effect are:Realize in real object operating process fault avoidance, thing in early warning, thing in advance
After can review, it is ensured that real object is passed in and out and the institute in totally-enclosed cabinet is stateful all the time in full-time, real-time monitoring and reporting
During.Every real object through system authorization is independently stored in and taken out in specified real object storage holder in interactive process,
User can only be operated in face of specified real object file in the process, while ensureing the material object in other storage holders
Body is not visible, contacts, takes away.Radiofrequency signal does not leak in access cabinet, it is ensured that data safety.
Brief description of the drawings
When considered in conjunction with the accompanying drawings, by referring to following detailed description, can more completely more fully understand the present invention with
And the adjoint advantage of many of which is easily learnt, but accompanying drawing described herein is used for providing a further understanding of the present invention,
A part of the invention is constituted, schematic description and description of the invention is used to explain the present invention, does not constitute to this hair
Bright improper restriction, such as figure are wherein:
Fig. 1 is radio electronic label of the present invention+Quick Response Code composition combination tag;
Fig. 2 (a) is present system initialization flowchart;
Fig. 2 (b) is one of intellectual access cabinet state of the present invention figure;
Fig. 3 (a) is that real object of the present invention is stored in operational flowchart;
Fig. 3 (b) is two figures of intellectual access cabinet state of the present invention;
Fig. 4 (a) is that flow chart is made in real object taking-up of the present invention;
Fig. 4 (b) is three figures of intellectual access cabinet state of the present invention;
Radio electronic label 1-1, Quick Response Code 1-2, combination tag 1-3, bin 2-1, access port 2-2, real object storage holder
2-3, real object 2-4,
The present invention is further described with reference to the accompanying drawings and examples.
Specific embodiment
Obviously, those skilled in the art belong to guarantor of the invention based on many modifications and variations that spirit of the invention is done
Shield scope.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " " used herein, " one
It is individual ", " described " and " being somebody's turn to do " may also comprise plural form.It is to be further understood that what is used in specification of the invention arranges
Diction " including " refer to the presence of the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition
One or more other features, integer, step, operation, element, component and/or their group.It should be understood that when title element, group
When part is "connected" to another element, component, it can be directly connected to other elements or component, or can also exist
Between element or component.Wording "and/or" used herein includes one or more associated any cells for listing item
With whole combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific terminology) have with art in those of ordinary skill general understanding identical meaning.
For ease of the understanding to inventive embodiments, below in conjunction with being further explained explanation, and each embodiment is simultaneously
The restriction to inventive embodiments is not constituted.
Embodiment 1:(a), Fig. 2 (b), Fig. 3 (a), Fig. 3 (b), Fig. 4 (a), Fig. 4 (b) are shown as shown in Figure 1, Figure 2, and one kind has
Cabinet is accessed from the real object for perceiving early warning security characteristic, with radio electronic label 1-1, Quick Response Code 1-2, combination tag 1-3, case
Cabinet 2-1, access port 2-2, real object storage holder 2-3 and real object 2-4,
Using radio electronic label+Quick Response Code composition combination tag, the uninterrupted automatic identification scanning of RFID read heads is monitored, entirely
When, state of the real-time report real object in intellectual access cabinet.
The present invention realizes in real object operating process fault avoidance in early warning, thing in advance, can review afterwards, it is ensured that real object is passed in and out
It is stateful all the time in full-time, real-time monitoring and during reporting with institute in totally-enclosed cabinet.
Every real object through system authorization is independently stored in and taken out in specified real object storage holder in interactive process,
User can only be operated in face of specified real object file in the process, while ensureing the material object in other storage holders
Body is not visible, contacts, takes away.
Radiofrequency signal does not leak in access cabinet, it is ensured that data safety.
Intellectual access cabinet is full-time, real-time monitoring bulk-mode in kind when system when being in normal operating conditions, real object access
Cabinet is in full-time, real-time monitoring real object, knows and report the different conditions residing for real object.
Embodiment 2:(a), Fig. 2 (b), Fig. 3 (a), Fig. 3 (b), Fig. 4 (a), Fig. 4 (b) are shown as shown in Figure 1, Figure 2, and one kind has
From the real object access method for perceiving early warning security characteristic, contain following steps;
When intellectual access cabinet real object enters cabinet pattern, when there is real object to need into cabinet, by the scanning means in equipment
Whether the Quick Response Code to real object combination tag is scanned, by the system analysis bar code real object by system authorization, such as
Fruit does not have, and exits;
If successfully resolved, system is specified vacant real object storage holder to move on to and deposits, withdraws a mouthful position;
Opening deposits, withdraws a mouthful gate inhibition;
The real object storage holder is ejected, real object is put into storage holder by fetcher;
Rebound the real object storage holder;
Rebound to be closed after finishing and deposit, withdraw a mouthful gate inhibition,
The real-time output state result of system, user is stored in completion.
Intellectual access cabinet real object offer for sale pattern when when there is real object to need to offer for sale, user card punching is verified, if
Failure is directly exited;
User is verified by authentication, if failure is directly exited;
If the success of user's double authentication, fetcher takes pictures preservation;
System specifies corresponding storage holder in kind to move on to access port position, opens access port gate inhibition;
Eject the storage holder in kind;Material object is taken out storage holder by fetcher;
Rebound vacant storage holder;
Close access port gate inhibition;
The real-time output state result of system;
User takes out and completes.
Embodiment 3:(a), Fig. 2 (b), Fig. 3 (a), Fig. 3 (b), Fig. 4 (a), Fig. 4 (b) are shown as shown in Figure 1, Figure 2, and one kind has
From the real object access method for perceiving early warning security characteristic, contain following steps;
Real object is delivered using radio electronic label+Quick Response Code composition combination tag, the uninterrupted automatic identification of RFID read heads
Scanning monitoring, the full-time, state that real-time report real object is in intellectual access cabinet.
Every real object is independently stored in specified real object storage holder in interactive process;
The real object that user is taken in interactive process can only take out from specified real object storage holder;
User can only face specified real object file and be operated, and will not be seen, will not be removed, Bu Huiying
Sound, the real object disturbed in other real object storage holders;
Every real object is independently stored in the specified real object storage holder in intellectual access cabinet, just for a specified reality
Object, does not influence and can deposit, withdraw and steal other real objects with illegal means.
Using radio electronic label+Quick Response Code combination tag, kept away in early warning in advance, the thing that can really realize real object access
It is wrong, can review afterwards.
Radiofrequency signal does not leak in access cabinet, it is ensured that data safety.
Embodiment 4:(a), Fig. 2 (b), Fig. 3 (a), Fig. 3 (b), Fig. 4 (a), Fig. 4 (b) are shown as shown in Figure 1, Figure 2, and one kind has
Cabinet is accessed from the real object for perceiving early warning security characteristic, equipment is equipped with N number of real object storage holder, and can control each real object and deposited
Put the position of folder.
Every real object is independently stored in the specified real object storage holder in intellectual access cabinet, deposit into, offer for sale during only
For a specified real object, do not influence and other real objects can be deposited, withdrawed.
Deliver real object and use radio electronic label+Quick Response Code combination tag, RFID read head automatic identifications periodic scanning prison
Survey, full-time, the real-time report state in intellectual access cabinet in kind.
Real object is delivered using radio electronic label+Quick Response Code composition combination tag, the uninterrupted automatic identification of RFID read heads
Scanning monitoring, the full-time, state that real-time report real object is in intellectual access cabinet.
Every real object is independently stored in specified real object storage holder in interactive process
The real object that user is taken in interactive process can only take out from specified real object storage holder;
User can only face specified real object file and be operated, and will not be seen, will not be removed, Bu Huiying
Sound, the real object disturbed in other real object storage holders;
Using radio electronic label+Quick Response Code combination tag, kept away in early warning in advance, the thing that can really realize real object access
It is wrong, can review afterwards.
Preservation takes radiofrequency signal in cabinet and does not leak, it is ensured that data safety.
Described real object refer to all things of presence but be not limited to it is as described below such as:File, archives, folder, firearms,
Jewelry, jewel etc..
Embodiment 5:(a), Fig. 2 (b), Fig. 3 (a), Fig. 3 (b), Fig. 4 (a), Fig. 4 (b) are shown as shown in Figure 1, Figure 2,
Combination tag shown in Fig. 1 is combined by radio electronic label 1-1 and Quick Response Code 1-2, radio electronic label
The interrelated unique combination tag 1-3 of composition of 1-1 and Quick Response Code 1-2, once formation, it is as right with it for combination tag 1-3
The lifelong unique identities of real object 2-4 answered, it is interrelated.
Three models residing for intellectual access cabinet:
Intellectual access cabinet is full-time, real-time monitoring bulk-mode in kind;
Shown in Fig. 2 (a), Fig. 2 (b) when intellectual access cabinet bulk-mode in kind in full-time, real-time monitoring, the reality in object
Object 2-4 carries out full-time, real-time monitoring, and reports the institute residing for real object 2-4 stateful;Carry out POST, testing equipment,
Monitor in real time step in equipment initialization, cabinet.
Intellectual access cabinet real object enters cabinet pattern;
If Fig. 3 (a), Fig. 3 (b) are when there is real object 2-4 to need into bin 2-1, by the scanning means in equipment to reality
The Quick Response Code of object combination tag 1-3 is scanned, by the system analysis bar code real object whether by system authorization, if
No, exit;If successfully resolved system specifies vacant real object storage holder 2-3 to move on to access port 2-2;Open access port 2-2
Gate inhibition;Rebound real object storage holder 2-3;Rebound to be closed after finishing and deposit, withdraw a mouthful gate inhibition, the real-time output state result of system,
User is stored in completion.
Intellectual access cabinet real object offers for sale pattern;
If Fig. 4 (a), Fig. 4 (b) are when there is real object to need to offer for sale, user card punching is verified, if failure is directly moved back
Go out;If user's live body identity characteristic certification is successfully carried out, if it fails, exiting;If user's live body identity characteristic certification into
Work(, fetcher takes pictures preservation;System specifies corresponding storage holder in kind to move on to access port position, opens the gate inhibition of access port 2-2;
Eject real object storage holder 2-3;Material object is taken out real object storage holder 2-3 by fetcher;The real object storage holder for rebounding vacant
2-3;Close access port gate inhibition;The real-time output state result of system;User takes out and completes.
As described above, embodiments of the invention are explained, but as long as essentially without this hair of disengaging
Bright inventive point and effect can have many deformations, and this will be readily apparent to persons skilled in the art.Therefore, this
The variation of sample is also integrally incorporated within protection scope of the present invention.
Claims (3)
1. it is a kind of with the real object access method for perceiving early warning security characteristic certainly, it is characterised in that to contain following steps;It is man-machine
Every real object is independently stored in specified real object storage holder in interaction;Deliver real object and use radio electronic label+two
Dimension code composition combination tag, the uninterrupted automatic identification scanning monitoring of RFID read heads, full-time, real-time report real object is in intellectual access
State in cabinet;User can only face specified real object file and be operated, and will not see, take, influence, disturb it
Real object in its real object storage holder;The real object that user is taken in interactive process can only be deposited from specified real object
Taken out in folder;Every real object is independently stored in the specified real object storage holder in intellectual access cabinet, just for specified one
Real object, does not influence and can deposit, withdraw and steal other real objects with illegal means.
2. according to claim 1 a kind of with from the real object access method for perceiving early warning security characteristic, its feature exists
When intellectual access cabinet real object enters cabinet pattern, when there is real object to need into cabinet, by the scanning means in equipment to material object
The Quick Response Code of body combination tag is scanned, by the system analysis bar code real object whether by system authorization, if it did not,
Exit;
If be certified authorized successfully, system is specified vacant real object storage holder to move on to and deposits, withdraws a mouthful position;
Opening deposits, withdraws a mouthful gate inhibition;
Rebound the real object storage holder;
Rebound to be closed after finishing and deposit, withdraw a mouthful gate inhibition,
Real object situation of change and output state result in system real-time detection cabinet, user are stored in completion.
3. according to claim 1 a kind of with from the real object access method for perceiving early warning security characteristic, its feature exists
When intellectual access cabinet real object offers for sale pattern, when there is real object to need to offer for sale, user is verified by authentication,
If failure is directly exited;
If the success of user's double authentication, fetcher takes pictures preservation;
System specifies corresponding storage holder in kind to move on to access port position, opens access port gate inhibition;
Eject the storage holder in kind;Material object is taken out storage holder by fetcher;
Rebound vacant storage holder;
Close access port gate inhibition;
The real-time output state result of system;
User takes out and completes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611138141.5A CN106815943A (en) | 2016-12-12 | 2016-12-12 | A kind of real object access method with from perception early warning security characteristic |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611138141.5A CN106815943A (en) | 2016-12-12 | 2016-12-12 | A kind of real object access method with from perception early warning security characteristic |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106815943A true CN106815943A (en) | 2017-06-09 |
Family
ID=59108957
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611138141.5A Pending CN106815943A (en) | 2016-12-12 | 2016-12-12 | A kind of real object access method with from perception early warning security characteristic |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106815943A (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101819689A (en) * | 2009-02-17 | 2010-09-01 | 江苏云联科技有限公司 | File management system based on RFID (Radio Frequency Identification Device) |
CN202959473U (en) * | 2012-11-27 | 2013-06-05 | 威海北洋电气集团股份有限公司 | Cabinet and device of dense document management |
CN103337110A (en) * | 2012-08-15 | 2013-10-02 | 贾松仁 | Locker system and method adopting locker system for goods storage and pickup |
CN103793963A (en) * | 2012-11-03 | 2014-05-14 | 威海北洋电气集团股份有限公司 | File cabinet based on RFID technology and document management device based on the RFID technology |
CN104986488A (en) * | 2015-06-23 | 2015-10-21 | 重庆尚思为科技发展有限公司 | Intelligent file cabinet and file access method thereof |
CN105469174A (en) * | 2014-08-28 | 2016-04-06 | 天津高思恩科技发展有限公司 | Document management device and method based on RFID technology |
CN205158531U (en) * | 2015-11-30 | 2016-04-13 | 南京信息职业技术学院 | Public article intelligent storage cabinet system |
CN105549493A (en) * | 2016-02-04 | 2016-05-04 | 安徽理工大学 | Intelligent express package access cabinet |
CN205608899U (en) * | 2016-03-12 | 2016-09-28 | 长春信息技术职业学院 | Electronic commerce intelligence cabinet |
CN205644814U (en) * | 2016-04-27 | 2016-10-12 | 上海观奇自动化系统有限公司 | Material is automatic to be received and management system |
CN106204947A (en) * | 2016-07-05 | 2016-12-07 | 成都我来啦网格信息技术有限公司 | The control system of a kind of locker and control method thereof |
CN106204945A (en) * | 2016-06-23 | 2016-12-07 | 浙江福源智能科技有限公司 | Intelligence material evidence cabinet |
-
2016
- 2016-12-12 CN CN201611138141.5A patent/CN106815943A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101819689A (en) * | 2009-02-17 | 2010-09-01 | 江苏云联科技有限公司 | File management system based on RFID (Radio Frequency Identification Device) |
CN103337110A (en) * | 2012-08-15 | 2013-10-02 | 贾松仁 | Locker system and method adopting locker system for goods storage and pickup |
CN103793963A (en) * | 2012-11-03 | 2014-05-14 | 威海北洋电气集团股份有限公司 | File cabinet based on RFID technology and document management device based on the RFID technology |
CN202959473U (en) * | 2012-11-27 | 2013-06-05 | 威海北洋电气集团股份有限公司 | Cabinet and device of dense document management |
CN105469174A (en) * | 2014-08-28 | 2016-04-06 | 天津高思恩科技发展有限公司 | Document management device and method based on RFID technology |
CN104986488A (en) * | 2015-06-23 | 2015-10-21 | 重庆尚思为科技发展有限公司 | Intelligent file cabinet and file access method thereof |
CN205158531U (en) * | 2015-11-30 | 2016-04-13 | 南京信息职业技术学院 | Public article intelligent storage cabinet system |
CN105549493A (en) * | 2016-02-04 | 2016-05-04 | 安徽理工大学 | Intelligent express package access cabinet |
CN205608899U (en) * | 2016-03-12 | 2016-09-28 | 长春信息技术职业学院 | Electronic commerce intelligence cabinet |
CN205644814U (en) * | 2016-04-27 | 2016-10-12 | 上海观奇自动化系统有限公司 | Material is automatic to be received and management system |
CN106204945A (en) * | 2016-06-23 | 2016-12-07 | 浙江福源智能科技有限公司 | Intelligence material evidence cabinet |
CN106204947A (en) * | 2016-07-05 | 2016-12-07 | 成都我来啦网格信息技术有限公司 | The control system of a kind of locker and control method thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101283382B (en) | Enhanced gaming ghips and table game security | |
Anderson | Why cryptosystems fail | |
CN103733633B (en) | Video analytic system | |
US20070296545A1 (en) | System for management of ubiquitously deployed intelligent locks | |
CN101632081A (en) | Cash tracking system | |
CN104743248A (en) | Anti-fake wine package based on Internet of things and using method thereof | |
CN103824391B (en) | Self-aided terminal is anti-to exchange chucking method and device | |
US20170053144A1 (en) | Device and method for checking the integrity of physical objects | |
US11043049B2 (en) | Access control system bypass for audit and electronic safe locks | |
CN103177524A (en) | In-place state real-time monitoring device and method of monitored objects | |
CN106127894B (en) | A kind of intelligent video analysis system | |
CN106815943A (en) | A kind of real object access method with from perception early warning security characteristic | |
CN106093833B (en) | Method and system for testing initialization function of charge control electric energy meter | |
CN105756473A (en) | Anti-theft method for safe deposit box and safe deposit box | |
CN106355120B (en) | A kind of method and apparatus for preventing card information to be replicated | |
CN210348575U (en) | Bullet emergency unlocking management system | |
EP1614078A1 (en) | Method and means for providing security | |
Purpura | Internal Threats and Countermeasures | |
CN107247976A (en) | The self-service extracting method of article and device based on RFID | |
Saket et al. | ATM reliability and risk assessment issues based on fraud, security and safety | |
EP4172962B1 (en) | Secure container for storing or transporting value documents, and system for securing storage and transportation of value documents | |
US20210182777A1 (en) | Rolling encoding scheme for rfid tags | |
Filimon | Anti-counterfeiting-prevention of counterfeit products with RFID | |
Alm et al. | Security in access control systems using RFID | |
CN118261530A (en) | Warehouse management device and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170609 |