CN106815943A - A kind of real object access method with from perception early warning security characteristic - Google Patents

A kind of real object access method with from perception early warning security characteristic Download PDF

Info

Publication number
CN106815943A
CN106815943A CN201611138141.5A CN201611138141A CN106815943A CN 106815943 A CN106815943 A CN 106815943A CN 201611138141 A CN201611138141 A CN 201611138141A CN 106815943 A CN106815943 A CN 106815943A
Authority
CN
China
Prior art keywords
real object
real
storage holder
specified
cabinet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611138141.5A
Other languages
Chinese (zh)
Inventor
高泽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201611138141.5A priority Critical patent/CN106815943A/en
Publication of CN106815943A publication Critical patent/CN106815943A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/10Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property
    • G07F17/12Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property comprising lockable containers, e.g. for accepting clothes to be cleaned
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes

Landscapes

  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Theoretical Computer Science (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

A kind of real object access method with from perception early warning security characteristic, every real object is independently stored in specified real object storage holder in interactive process;Real object is delivered using radio electronic label+Quick Response Code composition combination tag, the uninterrupted automatic identification scanning monitoring of RFID read heads, the full-time, state that real-time report real object is in intellectual access cabinet;User can only face specified real object file and be operated, and will not see, take, influenceing, the real object disturbed in other real object storage holders;The real object that user is taken in interactive process can only take out from specified real object storage holder;Every real object is independently stored in the specified real object storage holder in intellectual access cabinet, just for a specified real object, will not be seen, be taken, influenceing and can deposit, withdraw and stealing other real objects with illegal means.

Description

A kind of real object access method with from perception early warning security characteristic
Technical field
The present invention relates to a kind of with from the real object access method for perceiving early warning security characteristic, it is related to logistics field;It is real Object field of storage;Official document, files, drawing exchange field;Official document, files, drawing keeping field;Official document, files, drawing are borrowed Field;Firearms take care of field;Valuables take care of field.
Background technology
The intermediate transfer medium that the intelligent commuting case of material object circulation is exchanged as real object, outbox side and recipient only respectively with The intelligent commuting case of material object circulation carries out transmission in kind, state when this mode can only reflect that real object puts into, it is impossible to protect completely The phenomenons such as whether object is carried secretly, wrong throwing are confirmed, even if entrainment, the wrong problem thrown occur can only also be followed the trail of afterwards;Taking thing When cabinet door need to be opened, therefore typically can only by all real objects all take out, if only taking part real object, remaining real object meeting It is seen or takes away, it is impossible to ensures the possibility that real object is stolen well.
The content of the invention
In order to overcome the deficiencies in the prior art, the present invention to provide a kind of real object with from perception early warning security characteristic and deposit Take method.
A kind of real object access method with from perception early warning security characteristic, contains following steps;Interactive process In every real object be independently stored in specified real object storage holder;Real object is delivered using radio electronic label+Quick Response Code composition Combination tag, the uninterrupted automatic identification scanning monitoring of RFID read heads, the full-time, shape that real-time report real object is in intellectual access cabinet State;User can only face specified real object file and be operated, in not interfering with, disturbing other real object storage holders Real object;The real object that user is taken in interactive process can only take out from specified real object storage holder;Every material object Body is independently stored in the specified real object storage holder in intellectual access cabinet, just for a specified real object, is not influenceed and can Deposit, withdraw and steal other real objects with illegal means.
The advantage for using of the invention and good effect are:Realize in real object operating process fault avoidance, thing in early warning, thing in advance After can review, it is ensured that real object is passed in and out and the institute in totally-enclosed cabinet is stateful all the time in full-time, real-time monitoring and reporting During.Every real object through system authorization is independently stored in and taken out in specified real object storage holder in interactive process, User can only be operated in face of specified real object file in the process, while ensureing the material object in other storage holders Body is not visible, contacts, takes away.Radiofrequency signal does not leak in access cabinet, it is ensured that data safety.
Brief description of the drawings
When considered in conjunction with the accompanying drawings, by referring to following detailed description, can more completely more fully understand the present invention with And the adjoint advantage of many of which is easily learnt, but accompanying drawing described herein is used for providing a further understanding of the present invention, A part of the invention is constituted, schematic description and description of the invention is used to explain the present invention, does not constitute to this hair Bright improper restriction, such as figure are wherein:
Fig. 1 is radio electronic label of the present invention+Quick Response Code composition combination tag;
Fig. 2 (a) is present system initialization flowchart;
Fig. 2 (b) is one of intellectual access cabinet state of the present invention figure;
Fig. 3 (a) is that real object of the present invention is stored in operational flowchart;
Fig. 3 (b) is two figures of intellectual access cabinet state of the present invention;
Fig. 4 (a) is that flow chart is made in real object taking-up of the present invention;
Fig. 4 (b) is three figures of intellectual access cabinet state of the present invention;
Radio electronic label 1-1, Quick Response Code 1-2, combination tag 1-3, bin 2-1, access port 2-2, real object storage holder 2-3, real object 2-4,
The present invention is further described with reference to the accompanying drawings and examples.
Specific embodiment
Obviously, those skilled in the art belong to guarantor of the invention based on many modifications and variations that spirit of the invention is done Shield scope.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " " used herein, " one It is individual ", " described " and " being somebody's turn to do " may also comprise plural form.It is to be further understood that what is used in specification of the invention arranges Diction " including " refer to the presence of the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition One or more other features, integer, step, operation, element, component and/or their group.It should be understood that when title element, group When part is "connected" to another element, component, it can be directly connected to other elements or component, or can also exist Between element or component.Wording "and/or" used herein includes one or more associated any cells for listing item With whole combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific terminology) have with art in those of ordinary skill general understanding identical meaning.
For ease of the understanding to inventive embodiments, below in conjunction with being further explained explanation, and each embodiment is simultaneously The restriction to inventive embodiments is not constituted.
Embodiment 1:(a), Fig. 2 (b), Fig. 3 (a), Fig. 3 (b), Fig. 4 (a), Fig. 4 (b) are shown as shown in Figure 1, Figure 2, and one kind has Cabinet is accessed from the real object for perceiving early warning security characteristic, with radio electronic label 1-1, Quick Response Code 1-2, combination tag 1-3, case Cabinet 2-1, access port 2-2, real object storage holder 2-3 and real object 2-4,
Using radio electronic label+Quick Response Code composition combination tag, the uninterrupted automatic identification scanning of RFID read heads is monitored, entirely When, state of the real-time report real object in intellectual access cabinet.
The present invention realizes in real object operating process fault avoidance in early warning, thing in advance, can review afterwards, it is ensured that real object is passed in and out It is stateful all the time in full-time, real-time monitoring and during reporting with institute in totally-enclosed cabinet.
Every real object through system authorization is independently stored in and taken out in specified real object storage holder in interactive process, User can only be operated in face of specified real object file in the process, while ensureing the material object in other storage holders Body is not visible, contacts, takes away.
Radiofrequency signal does not leak in access cabinet, it is ensured that data safety.
Intellectual access cabinet is full-time, real-time monitoring bulk-mode in kind when system when being in normal operating conditions, real object access Cabinet is in full-time, real-time monitoring real object, knows and report the different conditions residing for real object.
Embodiment 2:(a), Fig. 2 (b), Fig. 3 (a), Fig. 3 (b), Fig. 4 (a), Fig. 4 (b) are shown as shown in Figure 1, Figure 2, and one kind has From the real object access method for perceiving early warning security characteristic, contain following steps;
When intellectual access cabinet real object enters cabinet pattern, when there is real object to need into cabinet, by the scanning means in equipment Whether the Quick Response Code to real object combination tag is scanned, by the system analysis bar code real object by system authorization, such as Fruit does not have, and exits;
If successfully resolved, system is specified vacant real object storage holder to move on to and deposits, withdraws a mouthful position;
Opening deposits, withdraws a mouthful gate inhibition;
The real object storage holder is ejected, real object is put into storage holder by fetcher;
Rebound the real object storage holder;
Rebound to be closed after finishing and deposit, withdraw a mouthful gate inhibition,
The real-time output state result of system, user is stored in completion.
Intellectual access cabinet real object offer for sale pattern when when there is real object to need to offer for sale, user card punching is verified, if Failure is directly exited;
User is verified by authentication, if failure is directly exited;
If the success of user's double authentication, fetcher takes pictures preservation;
System specifies corresponding storage holder in kind to move on to access port position, opens access port gate inhibition;
Eject the storage holder in kind;Material object is taken out storage holder by fetcher;
Rebound vacant storage holder;
Close access port gate inhibition;
The real-time output state result of system;
User takes out and completes.
Embodiment 3:(a), Fig. 2 (b), Fig. 3 (a), Fig. 3 (b), Fig. 4 (a), Fig. 4 (b) are shown as shown in Figure 1, Figure 2, and one kind has From the real object access method for perceiving early warning security characteristic, contain following steps;
Real object is delivered using radio electronic label+Quick Response Code composition combination tag, the uninterrupted automatic identification of RFID read heads Scanning monitoring, the full-time, state that real-time report real object is in intellectual access cabinet.
Every real object is independently stored in specified real object storage holder in interactive process;
The real object that user is taken in interactive process can only take out from specified real object storage holder;
User can only face specified real object file and be operated, and will not be seen, will not be removed, Bu Huiying Sound, the real object disturbed in other real object storage holders;
Every real object is independently stored in the specified real object storage holder in intellectual access cabinet, just for a specified reality Object, does not influence and can deposit, withdraw and steal other real objects with illegal means.
Using radio electronic label+Quick Response Code combination tag, kept away in early warning in advance, the thing that can really realize real object access It is wrong, can review afterwards.
Radiofrequency signal does not leak in access cabinet, it is ensured that data safety.
Embodiment 4:(a), Fig. 2 (b), Fig. 3 (a), Fig. 3 (b), Fig. 4 (a), Fig. 4 (b) are shown as shown in Figure 1, Figure 2, and one kind has Cabinet is accessed from the real object for perceiving early warning security characteristic, equipment is equipped with N number of real object storage holder, and can control each real object and deposited Put the position of folder.
Every real object is independently stored in the specified real object storage holder in intellectual access cabinet, deposit into, offer for sale during only For a specified real object, do not influence and other real objects can be deposited, withdrawed.
Deliver real object and use radio electronic label+Quick Response Code combination tag, RFID read head automatic identifications periodic scanning prison Survey, full-time, the real-time report state in intellectual access cabinet in kind.
Real object is delivered using radio electronic label+Quick Response Code composition combination tag, the uninterrupted automatic identification of RFID read heads Scanning monitoring, the full-time, state that real-time report real object is in intellectual access cabinet.
Every real object is independently stored in specified real object storage holder in interactive process
The real object that user is taken in interactive process can only take out from specified real object storage holder;
User can only face specified real object file and be operated, and will not be seen, will not be removed, Bu Huiying Sound, the real object disturbed in other real object storage holders;
Using radio electronic label+Quick Response Code combination tag, kept away in early warning in advance, the thing that can really realize real object access It is wrong, can review afterwards.
Preservation takes radiofrequency signal in cabinet and does not leak, it is ensured that data safety.
Described real object refer to all things of presence but be not limited to it is as described below such as:File, archives, folder, firearms, Jewelry, jewel etc..
Embodiment 5:(a), Fig. 2 (b), Fig. 3 (a), Fig. 3 (b), Fig. 4 (a), Fig. 4 (b) are shown as shown in Figure 1, Figure 2,
Combination tag shown in Fig. 1 is combined by radio electronic label 1-1 and Quick Response Code 1-2, radio electronic label The interrelated unique combination tag 1-3 of composition of 1-1 and Quick Response Code 1-2, once formation, it is as right with it for combination tag 1-3 The lifelong unique identities of real object 2-4 answered, it is interrelated.
Three models residing for intellectual access cabinet:
Intellectual access cabinet is full-time, real-time monitoring bulk-mode in kind;
Shown in Fig. 2 (a), Fig. 2 (b) when intellectual access cabinet bulk-mode in kind in full-time, real-time monitoring, the reality in object Object 2-4 carries out full-time, real-time monitoring, and reports the institute residing for real object 2-4 stateful;Carry out POST, testing equipment, Monitor in real time step in equipment initialization, cabinet.
Intellectual access cabinet real object enters cabinet pattern;
If Fig. 3 (a), Fig. 3 (b) are when there is real object 2-4 to need into bin 2-1, by the scanning means in equipment to reality The Quick Response Code of object combination tag 1-3 is scanned, by the system analysis bar code real object whether by system authorization, if No, exit;If successfully resolved system specifies vacant real object storage holder 2-3 to move on to access port 2-2;Open access port 2-2 Gate inhibition;Rebound real object storage holder 2-3;Rebound to be closed after finishing and deposit, withdraw a mouthful gate inhibition, the real-time output state result of system, User is stored in completion.
Intellectual access cabinet real object offers for sale pattern;
If Fig. 4 (a), Fig. 4 (b) are when there is real object to need to offer for sale, user card punching is verified, if failure is directly moved back Go out;If user's live body identity characteristic certification is successfully carried out, if it fails, exiting;If user's live body identity characteristic certification into Work(, fetcher takes pictures preservation;System specifies corresponding storage holder in kind to move on to access port position, opens the gate inhibition of access port 2-2; Eject real object storage holder 2-3;Material object is taken out real object storage holder 2-3 by fetcher;The real object storage holder for rebounding vacant 2-3;Close access port gate inhibition;The real-time output state result of system;User takes out and completes.
As described above, embodiments of the invention are explained, but as long as essentially without this hair of disengaging Bright inventive point and effect can have many deformations, and this will be readily apparent to persons skilled in the art.Therefore, this The variation of sample is also integrally incorporated within protection scope of the present invention.

Claims (3)

1. it is a kind of with the real object access method for perceiving early warning security characteristic certainly, it is characterised in that to contain following steps;It is man-machine Every real object is independently stored in specified real object storage holder in interaction;Deliver real object and use radio electronic label+two Dimension code composition combination tag, the uninterrupted automatic identification scanning monitoring of RFID read heads, full-time, real-time report real object is in intellectual access State in cabinet;User can only face specified real object file and be operated, and will not see, take, influence, disturb it Real object in its real object storage holder;The real object that user is taken in interactive process can only be deposited from specified real object Taken out in folder;Every real object is independently stored in the specified real object storage holder in intellectual access cabinet, just for specified one Real object, does not influence and can deposit, withdraw and steal other real objects with illegal means.
2. according to claim 1 a kind of with from the real object access method for perceiving early warning security characteristic, its feature exists When intellectual access cabinet real object enters cabinet pattern, when there is real object to need into cabinet, by the scanning means in equipment to material object The Quick Response Code of body combination tag is scanned, by the system analysis bar code real object whether by system authorization, if it did not, Exit;
If be certified authorized successfully, system is specified vacant real object storage holder to move on to and deposits, withdraws a mouthful position;
Opening deposits, withdraws a mouthful gate inhibition;
Rebound the real object storage holder;
Rebound to be closed after finishing and deposit, withdraw a mouthful gate inhibition,
Real object situation of change and output state result in system real-time detection cabinet, user are stored in completion.
3. according to claim 1 a kind of with from the real object access method for perceiving early warning security characteristic, its feature exists When intellectual access cabinet real object offers for sale pattern, when there is real object to need to offer for sale, user is verified by authentication, If failure is directly exited;
If the success of user's double authentication, fetcher takes pictures preservation;
System specifies corresponding storage holder in kind to move on to access port position, opens access port gate inhibition;
Eject the storage holder in kind;Material object is taken out storage holder by fetcher;
Rebound vacant storage holder;
Close access port gate inhibition;
The real-time output state result of system;
User takes out and completes.
CN201611138141.5A 2016-12-12 2016-12-12 A kind of real object access method with from perception early warning security characteristic Pending CN106815943A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611138141.5A CN106815943A (en) 2016-12-12 2016-12-12 A kind of real object access method with from perception early warning security characteristic

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611138141.5A CN106815943A (en) 2016-12-12 2016-12-12 A kind of real object access method with from perception early warning security characteristic

Publications (1)

Publication Number Publication Date
CN106815943A true CN106815943A (en) 2017-06-09

Family

ID=59108957

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611138141.5A Pending CN106815943A (en) 2016-12-12 2016-12-12 A kind of real object access method with from perception early warning security characteristic

Country Status (1)

Country Link
CN (1) CN106815943A (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101819689A (en) * 2009-02-17 2010-09-01 江苏云联科技有限公司 File management system based on RFID (Radio Frequency Identification Device)
CN202959473U (en) * 2012-11-27 2013-06-05 威海北洋电气集团股份有限公司 Cabinet and device of dense document management
CN103337110A (en) * 2012-08-15 2013-10-02 贾松仁 Locker system and method adopting locker system for goods storage and pickup
CN103793963A (en) * 2012-11-03 2014-05-14 威海北洋电气集团股份有限公司 File cabinet based on RFID technology and document management device based on the RFID technology
CN104986488A (en) * 2015-06-23 2015-10-21 重庆尚思为科技发展有限公司 Intelligent file cabinet and file access method thereof
CN105469174A (en) * 2014-08-28 2016-04-06 天津高思恩科技发展有限公司 Document management device and method based on RFID technology
CN205158531U (en) * 2015-11-30 2016-04-13 南京信息职业技术学院 Public article intelligent storage cabinet system
CN105549493A (en) * 2016-02-04 2016-05-04 安徽理工大学 Intelligent express package access cabinet
CN205608899U (en) * 2016-03-12 2016-09-28 长春信息技术职业学院 Electronic commerce intelligence cabinet
CN205644814U (en) * 2016-04-27 2016-10-12 上海观奇自动化系统有限公司 Material is automatic to be received and management system
CN106204947A (en) * 2016-07-05 2016-12-07 成都我来啦网格信息技术有限公司 The control system of a kind of locker and control method thereof
CN106204945A (en) * 2016-06-23 2016-12-07 浙江福源智能科技有限公司 Intelligence material evidence cabinet

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101819689A (en) * 2009-02-17 2010-09-01 江苏云联科技有限公司 File management system based on RFID (Radio Frequency Identification Device)
CN103337110A (en) * 2012-08-15 2013-10-02 贾松仁 Locker system and method adopting locker system for goods storage and pickup
CN103793963A (en) * 2012-11-03 2014-05-14 威海北洋电气集团股份有限公司 File cabinet based on RFID technology and document management device based on the RFID technology
CN202959473U (en) * 2012-11-27 2013-06-05 威海北洋电气集团股份有限公司 Cabinet and device of dense document management
CN105469174A (en) * 2014-08-28 2016-04-06 天津高思恩科技发展有限公司 Document management device and method based on RFID technology
CN104986488A (en) * 2015-06-23 2015-10-21 重庆尚思为科技发展有限公司 Intelligent file cabinet and file access method thereof
CN205158531U (en) * 2015-11-30 2016-04-13 南京信息职业技术学院 Public article intelligent storage cabinet system
CN105549493A (en) * 2016-02-04 2016-05-04 安徽理工大学 Intelligent express package access cabinet
CN205608899U (en) * 2016-03-12 2016-09-28 长春信息技术职业学院 Electronic commerce intelligence cabinet
CN205644814U (en) * 2016-04-27 2016-10-12 上海观奇自动化系统有限公司 Material is automatic to be received and management system
CN106204945A (en) * 2016-06-23 2016-12-07 浙江福源智能科技有限公司 Intelligence material evidence cabinet
CN106204947A (en) * 2016-07-05 2016-12-07 成都我来啦网格信息技术有限公司 The control system of a kind of locker and control method thereof

Similar Documents

Publication Publication Date Title
CN101283382B (en) Enhanced gaming ghips and table game security
Anderson Why cryptosystems fail
CN103733633B (en) Video analytic system
US20070296545A1 (en) System for management of ubiquitously deployed intelligent locks
CN101632081A (en) Cash tracking system
CN104743248A (en) Anti-fake wine package based on Internet of things and using method thereof
CN103824391B (en) Self-aided terminal is anti-to exchange chucking method and device
US20170053144A1 (en) Device and method for checking the integrity of physical objects
US11043049B2 (en) Access control system bypass for audit and electronic safe locks
CN103177524A (en) In-place state real-time monitoring device and method of monitored objects
CN106127894B (en) A kind of intelligent video analysis system
CN106815943A (en) A kind of real object access method with from perception early warning security characteristic
CN106093833B (en) Method and system for testing initialization function of charge control electric energy meter
CN105756473A (en) Anti-theft method for safe deposit box and safe deposit box
CN106355120B (en) A kind of method and apparatus for preventing card information to be replicated
CN210348575U (en) Bullet emergency unlocking management system
EP1614078A1 (en) Method and means for providing security
Purpura Internal Threats and Countermeasures
CN107247976A (en) The self-service extracting method of article and device based on RFID
Saket et al. ATM reliability and risk assessment issues based on fraud, security and safety
EP4172962B1 (en) Secure container for storing or transporting value documents, and system for securing storage and transportation of value documents
US20210182777A1 (en) Rolling encoding scheme for rfid tags
Filimon Anti-counterfeiting-prevention of counterfeit products with RFID
Alm et al. Security in access control systems using RFID
CN118261530A (en) Warehouse management device and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170609