CN108340691A - A kind of seal, seal application method and seal use system - Google Patents
A kind of seal, seal application method and seal use system Download PDFInfo
- Publication number
- CN108340691A CN108340691A CN201810195868.XA CN201810195868A CN108340691A CN 108340691 A CN108340691 A CN 108340691A CN 201810195868 A CN201810195868 A CN 201810195868A CN 108340691 A CN108340691 A CN 108340691A
- Authority
- CN
- China
- Prior art keywords
- seal
- processor
- user
- authentication
- authentication information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 76
- 238000013475 authorization Methods 0.000 claims abstract description 57
- 230000003993 interaction Effects 0.000 claims description 13
- 238000012545 processing Methods 0.000 description 7
- 230000003068 static effect Effects 0.000 description 7
- 238000012544 monitoring process Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 239000000203 mixture Substances 0.000 description 4
- 238000003860 storage Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000002045 lasting effect Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000011664 signaling Effects 0.000 description 2
- WHXSMMKQMYFTQS-UHFFFAOYSA-N Lithium Chemical compound [Li] WHXSMMKQMYFTQS-UHFFFAOYSA-N 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 238000004520 electroporation Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 229910052744 lithium Inorganic materials 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000013011 mating Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B41—PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
- B41K—STAMPS; STAMPING OR NUMBERING APPARATUS OR DEVICES
- B41K1/00—Portable hand-operated devices without means for supporting or locating the articles to be stamped, i.e. hand stamps; Inking devices or other accessories therefor
- B41K1/02—Portable hand-operated devices without means for supporting or locating the articles to be stamped, i.e. hand stamps; Inking devices or other accessories therefor with one or more flat stamping surfaces having fixed images
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B41—PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
- B41K—STAMPS; STAMPING OR NUMBERING APPARATUS OR DEVICES
- B41K1/00—Portable hand-operated devices without means for supporting or locating the articles to be stamped, i.e. hand stamps; Inking devices or other accessories therefor
- B41K1/36—Details
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention provides seal, seal application method and seals to use system.When user uses seal, which needs the input authentication information on the authentication information loader of seal;The authentication information of the user is sent to the processor of the seal by authentication information loader, the identity of the user is authenticated by processor, i.e., the authentication information received is compared with pre-stored authorization message in processor, when authentication information and authorization message match, determine that the authentication of the user passes through, processor is locked to seal sends open command, it notifies seal lock to open, exposes seal face seal for users to use.Therefore seal provided by the invention can effectively avoid use of the disabled user to it, improve the safety that seal uses.
Description
Technical field
The present invention relates to electroporation fields, and system is used more particularly to a kind of seal, seal application method and seal.
Background technology
Seal is also referred to as seal, for being printed on file, indicates the stationery of identification or signature.Seal is widely used
It is general, such as:Business unit, government department, administration, financial institution and public organization etc..Since seal can exercise this
The authority of office of the seal owner is the important documents and tool of clearly various rights and obligations relationships, and therefore, the safe handling of seal is non-
It is often important.
Currently, be all the access right that seal is administered by special messenger, when needing using seal, the use by special messenger to seal
Exercise supervision management and control.But the above method can not avoid the abuse of seal well.How the seal that uses of safety is current
Urgent problem to be solved.
Invention content
Present invention solves the technical problem that being to provide a kind of seal, seal application method and seal uses system, to
It can realize the intelligent control to seal, and then improve the safety that seal uses.
For this purpose, the technical solution that the present invention solves technical problem is:
In a first aspect, the present invention provides a kind of seal, which includes:
Authentication information loader, processor and seal lock;
Authentication information loader, receives authentication information input by user, and authentication information is sent to processor;
Processor, according to authentication information to user carry out authentication, when authentication information is matched with authorization message, to
The authentication at family passes through, and is locked to seal and sends open command;
Seal is locked, and is opened according to open command, to expose seal face.
Optionally, processor is locked to seal when seal locks unlatching, and meets closedown condition and sends out code;
Seal is locked, and is closed according to out code, to hide seal face.
Optionally, seal further includes:Pressure sensor;
Processor records the access times of seal by pressure sensor, is preset when the access times of seal reach
Mandate number when, meet closedown condition.
Optionally, seal further includes:Timer;
Processor, when the access times of seal do not reach preset mandate number, and the timing time of timer
When arrival was preset without the operating time, meet closedown condition.
Optionally, processor, when to the authentication of user by when, detect seal access times whether reach it is pre-
If mandate number, when not reaching preset mandate number, to seal lock send open command.
Optionally, seal further includes:Display shows the access times of seal, or unused time of display seal
Number.
Optionally, authentication information loader includes Fingerprint Identification Unit, and authentication information is the fingerprint of user.
Optionally, authentication information loader includes PIN PAD, and authentication information is the close of digital and/or character composition
Code.
Optionally, seal further includes:Communicator, processor carry out data friendship by communicator and control of stamping server
Mutually.
Optionally, seal further includes:Scanner, the information for the target object that scanning seal is used, by target object
Information is sent to processor;
The information of target object is sent to control of stamping server by processor by communicator.
Optionally, seal further includes:Locator, information the location of when acquisition seal is used, location information is sent out
It send to processor;
Location information is sent to control of stamping server by processor by communicator.
Optionally, seal further includes:Processor has been made the actual of seal by communicator after seal is returned
It is sent to control of stamping server with number.
Second aspect, the present invention also provides a kind of seals using system, which includes:
The seal and control of stamping server that first aspect present invention is provided, seal and control of stamping server are logical
It crosses network and carries out data interaction;
Control of stamping server by authorization message and authorizes number to be sent to seal after authorized user uses seal;And
And the information for the target object that the seal that seal is sent is used is received, the reality of the location of seal information and seal
Access times in any one or more.
The third aspect, the present invention also provides a kind of seal application method, this method includes:
Authentication information loader receives authentication information input by user;
Processor carries out authentication according to authentication information to user;
When authentication information is matched with authorization message, the authentication of user is passed through, processor sends to seal lock and opens
Instruction is opened, control seal lock is opened, to expose seal face.
Optionally, this method further includes:
When locking and open when seal, and meeting closedown condition, processor is locked to seal and sends out code, and seal is controlled
Lock is closed, to hide seal face.
Optionally, this method further includes:
Processor records the access times of seal by pressure sensor, when the arrival of access times of seal is preset
When authorizing number, meet closedown condition.
Optionally, this method further includes:
Before the access times of seal do not reach preset mandate number, processor obtains the timing time of timer,
When the timing time of timer, which reaches, to be preset without the operating time, meet closedown condition.
Optionally, this method further includes:
When to the authentication of user by when, whether the access times of processor detection seal reach preset mandate
Number is locked to seal when not reaching preset mandate number and sends open command.
Optionally, this method further includes:
Display shows the access times of seal, or the unused number of display seal.
Optionally, authentication information loader includes Fingerprint Identification Unit, and authentication information loader receives certification input by user
Information includes:
Fingerprint Identification Unit receives the fingerprint of user.
Optionally, authentication information loader includes PIN PAD, and authentication information loader receives certification input by user
Information includes:
PIN PAD receives the password of number input by user and/or character composition.
Optionally, this method further includes:
Processor carries out data interaction by communicator and control of stamping server.
Optionally, this method further includes:
The information for the target object that scanner scanning seal is used;
The information of target object is sent to control of stamping server by processor by communicator.
Optionally, this method further includes:
Information the location of when locator acquisition seal is used;
Location information is sent to control of stamping server by processor by communicator.
Optionally, this method further includes:
After seal is returned, the actual access times of seal are sent to control of stamping by processor by communicator
Server.
According to the above-mentioned technical solution, the method have the advantages that:
Seal provided by the invention includes:Authentication information loader, processor and seal lock.When user uses seal
When, first, which needs the input authentication information on the authentication information loader of seal;Then, authentication information loader will
The authentication information of the user is sent to the processor of the seal, is authenticated to the identity of the user by processor, that is, will receive
To authentication information be compared with pre-stored authorization message in processor, when authentication information and authorization message match
When, it determines that the authentication of the user passes through, at this point, processor is locked to seal sends open command, seal lock is notified to open,
Expose seal face seal for users to use.Conversely, when authentication information and authorization message mismatch, the body of the user is determined
Part certification does not pass through, at this point, processor will not be locked to seal sends open command, seal lock will not open the disabled user
It opens, therefore, seal provided by the invention can effectively avoid use of the disabled user to it, improve the safety that seal uses
Property.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
Obtain other attached drawings according to these attached drawings.
Fig. 1 is the structural schematic diagram for the seal that the embodiment of the present invention one provides;
Fig. 2 is the exemplary plot for another seal that the embodiment of the present invention one provides;
Fig. 3 is the schematic diagram that seal provided by Embodiment 2 of the present invention uses system;
Fig. 4 is the flow chart for the seal application method that the embodiment of the present invention three provides;
Fig. 5 is the signaling process figure of the application scenarios embodiment of seal application method provided by the invention.
Specific implementation mode
Since ancient times, seal is printed on the identification or signature that the seal owner can be indicated on file to this document content, and one
Seal is printed on denier file, this document is just provided with certain legal effect, that is, the owner of the seal must comply with this
Various rights and obligations relationships involved in file.Due to the effect unique of seal, therefore, each business unit, government department, administrative machine
It closes, financial institution and public organization etc., can manufacture and use can represent all kinds of seal of its authority of office.Currently, various types of
Seal be all to be administered by special messenger and controlled its access right, and carry out relevant supervision management and control.But the side that the special messenger administers
Method inevitably will appear the abuse of seal, and the use of seal is caused unsafe problem occur.
Based on this, in order to avoid abuse seal the case where, an embodiment of the present invention provides a kind of seal, seal application methods
And seal uses system, can realize the safe handling of seal.
When user uses seal, firstly, it is necessary to the input authentication information on the authentication information loader of seal;Then,
The identity of the user is authenticated by the processor of the seal, that is, deposit the authentication information received and the processor in advance
The authorization message of storage is compared, and when authentication information matches with authorization message, determines that the authentication of the user passes through, this
When, seal lock can receive processor transmission open command, notify the seal seal lock open, that is, expose seal face for
Family uses the seal.In addition, when the authentication of user not by when, then the user be the seal belong to disabled user, this is non-
Method user can not use the seal, effectively avoid use of the disabled user to the seal, improve the safety that seal uses
Property.
The embodiment of the present invention is illustrated below in conjunction with Figure of description, it should be understood that implementation described herein
Example is only for the purpose of illustrating and explaining the present invention and is not intended to limit the present invention.And in the absence of conflict, the reality in the present invention
The feature applied in example and embodiment can be combined with each other.
Embodiment one
It is a kind of structural schematic diagram of seal provided in this embodiment referring to Fig. 1.The seal 10 includes:Authentication information is defeated
Enter device 110, processor 120 and seal lock 130.
Wherein, which is sent to by authentication information loader 110 for receiving authentication information input by user
Processor 120.
Processor 120, for carrying out authentication to user according to authentication information, when authentication information is matched with authorization message
When, the authentication of the user is passed through, open command is sent to seal lock 130;
Seal lock 130, for being opened according to open command, to expose seal face.
It is understood that in the processor 120 of seal 10, it is previously stored with the authorization message of user.Authorization message,
Refer to user's typing, when can use the seal 10 as the user, carries out the check information of authentication.
When user uses the seal 10, first, user needs input authentication information.Wherein, authentication information refers to that user exists
The information inputted on the authentication information loader 110 of seal 10.The authentication information loader 110 being arranged on seal 10 is different, uses
The type of the authentication information of family input is also different.When specific implementation, the type of authentication information is consistent with the type of authorization message.
In one example, authentication information loader 110 can be arranged in the side of the seal body of seal 10, avoid when according to seal 10
Influence the work of authentication information loader 110.Certainly, authentication information loader 110 can also be arranged according to actual conditions and print
The other positions of chapter 10, which is not described herein again.
Then, carry out authentication of the processor 120 of seal 10 according to the authentication information to user judges that the user is
The no validated user for the seal 10.Specifically, if the authentication information that is inputted on authentication information loader 110 of user with
The authorization message stored in processor 120 matches, it is determined that the authentication of the user passes through, that is, the user is the seal
10 validated user;Otherwise, if the authentication information that user inputs on authentication information loader 110 is deposited with processor 120
The authorization message of storage mismatches, it is determined that the authentication of the user does not pass through, that is, the user is the illegal use of the seal 10
Family.
As an example, authentication information loader 110 may include Fingerprint Identification Unit, then, user believes in the certification
The authentication information inputted on breath loader 110 is the fingerprint of the user, i.e., the authorization message stored on processor 120 is also one
Fingerprint is denoted as authorizing fingerprint.
When specific implementation, when user uses seal 10, user can be by the Fingerprint Identification Unit typing fingerprint, as this
The authentication information of user;The fingerprint of user's typing is sent to processor 120 by Fingerprint Identification Unit, by processor 120 to the user
Carry out authentication.Specifically authentication procedures are:Fingerprint and place of the processor 120 by user by Fingerprint Identification Unit typing
The mandate fingerprint stored in reason device 120 is compared, when the fingerprint and mandate fingerprint phase that user passes through Fingerprint Identification Unit typing
Timing, processor 120 assert that the authentication of the user passes through;Otherwise, when user by the fingerprint of Fingerprint Identification Unit typing with
When fingerprint being authorized to mismatch, processor 120 assert that the authentication of the user does not pass through.
As another example, authentication information loader 110 can also include PIN PAD, then, user recognizes at this
The authentication information inputted on card information input device 110 can be the password of number and/or character composition, and authorization message is to handle
The password stored on device 120, is denoted as licencing key.
When specific implementation, when user uses seal 10, user can input password by the PIN PAD, as this
The authentication information of user;Password input by user is sent to processor 120 by the PIN PAD, by processor 120 to the use
Family carries out authentication.Specifically authentication procedures are:Processor 120 is by the password inputted by PIN PAD and processing
The licencing key stored in device 120 is compared, when the password inputted by PIN PAD matches with licencing key, place
Reason device 120 assert that the authentication of the user passes through;Otherwise, when the password that is inputted by PIN PAD and licencing key not
Timing, processor 120 assert that the authentication of the user does not pass through.
As another example, in order to further increase the safety of the seal 10, authentication information loader 110 can also
Simultaneously including Fingerprint Identification Unit and PIN PAD, then, the authentication information that user inputs on the authentication information loader 110
For the fingerprint and password of the user, authorization message is that stored on processor 120 is to authorize fingerprint and licencing key.
When specific implementation, when user uses seal 10, user can input password by the PIN PAD, pass through finger
Line identifier typing fingerprint, and by the fingerprint and password as the authentication information of the user;The Fingerprint Identification Unit and password are defeated
Processor 120 will be sent to by the fingerprint of Fingerprint Identification Unit typing and the password inputted by PIN PAD respectively by entering device,
Authentication is carried out to the user by processor 120.Specifically authentication procedures are:Processor 120 will pass through Password Input
The password of device input is compared with the licencing key stored in processor 120, and will pass through the finger of Fingerprint Identification Unit typing
Line is compared with the mandate fingerprint stored in processor 120, and when the rwo is matched, processor 120 assert the user's
Authentication passes through;Otherwise, when in both mismatches, or both there are one mismatching, processor 120 assert the user
Authentication do not pass through.
When in seal 10 processor 120 assert user authentication by when, print of the processor 120 to the seal 10
Chapter lock 130 sends unlocking instruction, is used to indicate seal lock 130 and opens, seal is showed out, for users to use the seal 10.When
Processor 120 in seal 10 assert the authentication of user not by when, the seal lock 130 of the seal 10 will keep lasting and close
Closed state, user cannot use the seal 10.
In the case of one kind, seal lock 130 can be a buckle being arranged on seal 10, when the seal of seal 10 is locked
130 when not opening, which locks in seal face in the inside of the seal body, i.e. seal face is embedded in seal body.When user passes through
When authentication, which receives unlocking instruction, opens buckle, and seal face is popped up from the inside of seal body, and user can make
With the seal;When user does not pass through authentication, which will not receive unlocking instruction, then buckle will keep lasting pass
Closed state, user cannot use the seal 10.
In another case, seal lock 130 can also be the openable seal lid being arranged on seal 10, work as seal
When 10 seal lock 130 is not opened, the lower end of the seal lid and seal body is completely mating, it is ensured that the seal face of the seal 10 will not
It is exposed to outer.When user passes through authentication, which receives unlocking instruction, opens seal lid, seal face from exposing,
User can use the seal;When user does not pass through authentication, which will not receive unlocking instruction, then seal lid
It will keep lasting closed state, user that cannot use the seal 10.
Seal 10 provided in this embodiment, user can be believed by 110 input authentication of authentication information loader of seal 10
Authentication information is sent to processor 120 by breath, authentication information loader 110, and processor 120 carries out authentication to the user,
That is, it is judged that whether the authentication information input by user matches with the authorization message stored in processor 120, if matched,
Indicate that the seal lock 130 of the seal 10 is opened, for users to use.As it can be seen that technical solution provided by the invention, the processing of seal 10
Device 120 can carry out authentication to user, effectively avoid use of the disabled user to the seal 10, improve seal 10
The safety used.
It describes in detail to the structure and operation principle of seal 10 provided in this embodiment with reference to Fig. 2.
It is the exemplary plot of seal 10 provided in this embodiment referring to Fig. 2.
It is understood that the structure of seal 10 includes seal face 101 and seal body 103.Wherein, on seal face 101
Carve the image and/or word of the owner's authority of office for representing the seal 10.
In specific implementation, authentication information loader 110 receives authentication information input by user, and authentication information is sent out
It send to processor 120;The processor 120 carries out authentication according to authentication information to the user, when the authentication information and mandate
When information matches, the authentication of the user is passed through, open command is sent to seal lock 130;Seal lock 130 is according to
Open command is opened, to expose seal face 101.
Wherein, authorization message is pre-stored in the processor 120 of seal 10.Processor 120 obtains the side of authorization message
Formula more than one is below introduced some of which realization method.Certainly, the authorization message can also be pre-stored with
Processor 120 carries out in the memory of data interaction, here without specifically limiting.
Under a kind of realization method, user before first time is using the seal 10, believe by the certification that user passes through the seal 10
Loader 110 is ceased, pre-enters the authorization message of the seal 10, which is sent to place by authentication information loader 110
Reason device 120 is preserved.It is understood that it is this using initial input information as the realization method of authorization message, for print
The owner of chapter 10 is the situation of individual, is more applicable in.
Wherein, which can be the fingerprint of user, which can also be pre-set one of user
Static password including character and/or number, the authorization message can also be the combination of the fingerprint and above-mentioned static password of user.
Under another realization method, in the scene that seal 10 is a seal that represent group's authority of office, the seal 10
User's more than one, the seal 10 is managed by control of stamping server.Before the use, by control of stamping server
By the authorization message of the user, it is sent in the processor 120 of seal 10 and is preserved.It should be noted that such seal 10
In further include a communicator 170, for realizing the data interaction between processor 120 and control of stamping server.
It is appreciated that when user is wanted using seal 10, need to be applied in corresponding control of stamping server have
The application process of body is:Application information → control of stamping server is filled on control of stamping server to examine application information
Batch → application is authorized to or application is rejected.
As an example, the user identifier and mandate that each user can be previously stored on control of stamping server are believed
Correspondence between breath, wherein authorization message includes fingerprint and/or a static password.When user is in control of stamping service
After application on device is authorized to, which finds user identifier correspondence by the user identifier of the user
Authorization message, and the authorization message is sent to seal 10 and is stored.
In the case of one kind, the corresponding authorization message of user identifier can only include fingerprint, be denoted as mandate fingerprint, specifically can be with
It is a fingerprint or multiple fingerprints.When the user uses the seal 10, user includes by authentication information loader 110
Fingerprint Identification Unit typing fingerprint, when the fingerprint matching of at least one of the fingerprint of the typing and above-mentioned mandate fingerprint, user's
Authentication passes through, and the otherwise authentication of the user cannot pass through.
In another case, the authorization message can also be an only static password including character and/or number, as
Licencing key.When the user uses the seal 10, user is defeated by the PIN PAD that authentication information loader 110 includes
Enter password, when the password of input is matched with above-mentioned licencing key, the authentication of user passes through, and otherwise the identity of the user is recognized
Card cannot pass through.
In the case of another, which had not only included fingerprint but also had included a static password, when the user uses the print
When chapter 10, user passes through authentication information loader 110 by the Fingerprint Identification Unit typing fingerprint in authentication information loader 110
In PIN PAD input password, when any one fingerprint matching in the fingerprint and authorization message of typing, and when input
Password when being matched with the static password in authorization message, the authentication of user just passes through, and otherwise the identity of the user is recognized
Card cannot pass through.
As another example, unlike above-mentioned example, the password in authorization message is not a static password, and
Be by the control of stamping server at random be the user configuration a dynamic password.When user is awarded in control of stamping server
The dynamic password generated at random is sent to seal 10 and stored by Quan Hou, control of stamping server, meanwhile, control of stamping service
The dynamic password that this is generated at random is also sent to user by device.
At this point, when the user uses the seal 10, user is defeated by the PIN PAD in authentication information loader 110
Enter a password, when the password of input is matched with the above-mentioned dynamic password stored in seal 10, the authentication of user passes through,
Otherwise the authentication of the user cannot pass through.
As another example, unlike above-mentioned example, includes not only a dynamic password in authorization message, also wrap
Include the fingerprint for the user for licensing seal.Specifically, be previously stored on control of stamping server the user identifier of user with
The correspondence of the fingerprint of user.After application of the user on control of stamping server is authorized to, the control of stamping server
By the user identifier of the user, the fingerprint of the user is found;Also, the control of stamping server will be also the user at random
Configure a dynamic password;The control of stamping server is using the fingerprint of the user and the dynamic password generated at random as mandate
Information is sent to seal 10 and is stored, meanwhile, the dynamic password that this is generated at random is also sent to use by control of stamping server
Family.
In the example, when the user uses the seal 10, user passes through the fingerprint recognition in authentication information loader 110
Device typing fingerprint inputs password, when the fingerprint and authorization message of typing by the PIN PAD in authentication information loader 110
In any one fingerprint matching, and when the password of input is matched with the dynamic password in authorization message, the identity of user
Certification just passes through, and the otherwise authentication of the user cannot pass through.
When in seal 10 processor 120 determine user authentication by when, print of the processor 120 to the seal 10
Chapter lock 130 sends unlocking instruction, is used to indicate seal lock 130 and opens.The seal lock 130 of seal 10 receives unlocking instruction
Afterwards, seal lock 130 is opened, seal is showed out, for users to use the seal 10.
But it after the seal of seal 10 lock 130 is opened, in order to ensure the safety that seal 10 uses, needs meeting
When closedown condition, processor 120 sends out code to seal lock 130, is used to indicate seal lock 130 and closes, to hide seal
Face 101.At this point, the seal face 101 of the seal 10 is locked in the inside of seal body 103, user can not use the seal 10.
The closedown condition of the seal 10 includes:Access times reach preset mandate number, alternatively, ought access times
Preset mandate number is not reached, but the time arrival that seal lock 130 is opened is default without the operating time.
As an example, after each user is authorized to the use of seal 10, in order to improve the peace that the seal 10 uses
Quan Xing needs to limit the access times of seal 10 this time of user.That is, it is secondary to record having used for seal 10 in real time
Number meets the closedown condition when the access times of the seal 10 reach preset mandate number.
Firstly, it is necessary to which pre-set the user at most allows the access times of seal 10 in the sub-authorization, it is denoted as presetting
Mandate number.Then, the access times of the seal 10 are recorded, wherein access times refer in seal 10
After seal lock 130 is opened, user can begin to use the seal 10, often use the primary seal 10 lid, one Zhang Yin, the seal
10 access times can add one, and current access times are denoted as the access times of the seal 10.Then, processor 120 passes through
The access times of the seal 10 of record, when judging whether the access times of seal 10 reach preset mandate number, if
It is, it is determined that seal 10 meets closedown condition.
In specific implementation, in order to record its access times, which further includes seal 10:Pressure sensor 140.
Specifically, when recording the access times of seal 10 using pressure sensor 140, in the case of a kind of, pressure sensor 140 is felt
It should directly transmit electric signal to after pressure to processor 120, be denoted as printing by receive electric signal by the processor 120
The first use of chapter 10, and add one on the access times of the seal 10, i.e., the use time of seal 10 is recorded by processor 120
Number.In another case, there are one counters for connection between pressure sensor 140 and processor 120.Pressure sensor 140 is felt
The use of the seal 10 should be counted by counter, and count results are made to electric signal after pressure, is sent to counter
It is sent to processor 120 for access times.
Whether the access times that processor 120 can be received with real-time judge and preset mandate number are identical, when
When access times are equal with preset mandate number, meet closedown condition.For example, in a sub-authorization, preset mandate number
It is 5 times.User is after authentication passes through, and using the seal 10, processor 120 has been made by what pressure sensor 140 recorded
Gradually add 1 since 0 with number, when the access times that processor 120 records the seal 10 are 5, judges access times
It is equal with preset mandate number, it is considered as and meets closedown condition.
Can also include a scalable dress it should be noted that as shown in Fig. 2, inside the seal body 103 of seal 10
102 are set, one end of the telescopic mounting 102 is connected with seal face 101, and the other end is connect with the Stamp handle of seal body 103.
The telescopic mounting 102 can be a spring, or other elastomeric elements.Wherein, which can set
Set between telescopic mounting 102 and seal face 101, can also be arranged telescopic device and seal body 103 Stamp handle it
Between, alternatively, can also be arranged in any position of telescopic mounting 102, the pressure for detecting user to seal body 103;Separately
Outside, which can also be arranged the 110 place planes in the top of the Stamp handle of seal body 103, i.e. Fig. 2
Any position, for user by pressing the top of seal 10, pressure sensor 140 can collect pressure signal.
As another example, after user begins to use seal 10, in some cases, the user is in adjacent lid twice
The time interval of chapter can be long, within this longer interval time, in order to avoid the seal 10 is abused by illegal user, carries
The safety that the high seal 10 uses can first close the seal of the seal 10 lock 130.In this case, the processing of seal 10
Device 120 is in addition to will limit the access times of seal 10 this time of user, it is also necessary to which monitoring is every time using after seal 10
Without the operating time.
Processor 120 need by record seal 10 access times, judge seal 10 access times whether
When reaching preset mandate number, before the access times of seal 10 do not reach preset mandate number, to default without operation
Time is monitored.Specifically, the seal 10 is other than including pressure sensor 140, it is also necessary to including:Timer 150.Meter
When device 150 be located in seal body 103.The timer 150 timing since user is affixed one's seal using the seal 10 every time, to lid next time
Chapter terminates, it is adjacent affix one's seal twice between without the operating time, as before the timing time once affixed one's seal.
Specifically, it is allowed to use the print twice adjacent in the sub-authorization firstly, it is necessary to pre-set the user
The longest interval time of chapter 10 is denoted as default without the operating time.Then, processor 120 is after seal 10 is affixed one's seal every time, triggering meter
When device 150 timing is carried out without the operating time to seal 10, once the timing time of the timer 150 reach it is default without operation
Time, then, processor 120 judge that the seal 10 meets closedown condition.
For example, in a sub-authorization, preset mandate number is 5 times, and it is 20 minutes to preset without the operating time.User is in body
After part certification passes through, affixed one's seal using seal 10, when the access times that pressure sensor 140 records are 3 times, timer
150 affix one's seal since the 3rd time after timing, when the timing time of timer 150 reaches 20 minutes, reach it is default without operation when
Between, the progress of seal 10 the 4th has not been used and affixes one's seal, then, processor 120 thinks that the seal 10 meets closedown condition at this time.
In addition, in order to allow user to can make full use of the permission in every sub-authorization, and save the application and examination & approval of seal
Flow, when seal 10 because the timing time of timer 150 reaches the default when of closing without the operating time, user can again into
Row authentication uses remaining number in preset mandate number.
In this case, when the authentication of user by when, processor 120 detect seal 10 access times whether arrive
Up to preset mandate number, when not reaching preset mandate number, which sends to open to seal lock 130 refers to
It enables, the seal 10 is reused for user.At this time, it may be necessary to which the pressure sensor 140 of the seal 10 records the seal 10 again
Access times.Until the access times of the seal 10 reach preset mandate number, alternatively, when use for seal 10 is secondary
Number does not reach preset mandate number, and the timing time of timer 150 reaches and presets usage time, and processor 120 is again
Secondary control seal lock 130 is closed, and when carrying out authentication again, licenses number since access times reach, i.e.,
Make certification that will not be opened by seal lock.
In specific implementation, in order to allow user to be better understood by the service condition of seal 10, which further includes:Display
Device 160.The display 160 can specifically be located at side or the seal body of the Stamp handle of the seal body 103 of the seal 10
The unused number of 103 other positions, the access times for showing seal 10, or display seal 10.
Wherein, the access times of seal 10, generally since 0, user is often once affixed one's seal using the seal 10, should
The access times of seal 10 will add one, and so on.For example, user uses the seal, after authentication passes through, the print for the first time
" access times can be shown on the display 160 of chapter 10:0 ", when user uses one chapter of the seal lid on text document
Afterwards, " access times can be shown on the display 160 of the seal 10:1 ", and so on, until reaching preset mandate time
Until number.
The access times for the seal 10 that the unused number of seal 10, which refers to the user, can use, but have not been used.
Specifically by the difference of preset mandate number and the access times of the current seal 10, it is denoted as that number is not used.Generally from default
Mandate number start, user is often once affixed one's seal using the seal 10, and the unused number of the seal 10 will subtract one, with this
Analogize.For example, user uses the seal for the first time, after authentication passes through, can be shown " not on the display 160 of the seal 10
Access times:5 ", it can be with after user uses one chapter of seal lid on text document, on the display 160 of the seal 10
" number is not used in display:4 ", and so on, until " number is not used in display:Until 0 ".
It is understood that processor 120 is in addition to can be by the access times of the seal 10 and/or the seal 10
Unused number is sent to outside the display 160 shown, can also show the user's when user carries out authentication
Identity authentication result;The on off state etc. that can also show the seal lock 130 of seal 10, provides more seals 10 to the user
Relevant information promotes the interactive experience of user and the seal 10.
In some implementations, in order to enable the seal 10 to be interacted with extraneous other equipment, the seal 10
Further include:Communicator 170.The communicator 170 can be established by internet 30 between seal 10 and control of stamping server 20
Data connection, it is ensured that processor 120 in the seal 10 carries out data interaction with control of stamping server 20.
Wherein, control of stamping server 20 is a server for managing seal 10, on the one hand, user can be at this
Application uses seal 10 on control of stamping server 20, also, applies after being authorized by control of stamping server 20, the control of stamping
The authorization message of the user can be sent to seal 10 by server 20 by network 30;Authorization message herein with it is mentioned above
Authorization message is consistent, and which is not described herein again.On the other hand, which can be sent with real-time reception seal 10
Some information facilitate the control of stamping server 20 to monitor 10 behaviour in service of seal in real time.
As an example, in order to allow the seal 10 the owner or manager more understand the seal 10 specifically at which
It is used in a file, to be monitored to the authority of office use occasion of the seal 10.The seal 10 further includes:Scanner 180.
Specifically, the scanner 180 can be a small-sized camera;As shown in Fig. 2, the scanner 180 may be mounted at the print
On the seal body 103 of chapter 10;In the inside of seal 10, which is connected with processor 120.
User can be before being affixed one's seal, first using seal 10, which scans the target that seal 10 is used
The information of object.Then, which can be sent to processor 120 by the information of target object;Then, processor 120
After receiving the information of target object of the transmission of scanner 180, the information of the target object is sent to by communicator 170
Control of stamping server.So as to judge the seal 10 use whether it is legal, to be monitored to the use of seal 10.
Wherein, target object refers to the file that the user is affixed one's seal using seal 10, then, the information of target object,
Content in the file as affixed one's seal.Specifically, using the scanner 180 of seal 10, in the file that will be affixed one's seal
Appearance is scanned, and scanning result is sent to processor 120, which is sent to by processor 120 by communicator 170
Control of stamping server, to judge whether the file that the seal 10 is affixed one's seal is legal, if it is, without processing;Such as
Fruit is no, then sends out code to seal 10 by the control of stamping server, and the seal lock 130 of instruction seal 10 is closed, and
This goes out warning in display 160.Furthermore, it is possible to trace the user by the control of stamping system, correlation is made in accordance with the law and is punished.
In an example, in order to monitor the geographical location that the seal 10 is used, if it is consistent with authorized address,
So that whether the use for understanding the seal 10 is legal, the seal 10 further includes:Locator 190.As shown in Fig. 2, the scanner
180 may be mounted at the inside of seal 10, and locator 190 is connected with processor 120.
In specific implementation, in seal 10 by use, locator 190 can obtain the location of seal 10 information,
And the location information is sent to processor 120;The location information that processor 120 will receive, by communicator 170 by the position
Confidence breath is sent to control of stamping server.So that seal 10 judges whether the location information is legal, so as to making to seal 10
With being monitored.If it is, without processing;It is closed if it is not, then being sent to seal 10 by the control of stamping server
The seal lock 130 of instruction, instruction seal 10 is closed, and this goes out warning in display 160.Furthermore, it is possible to pass through the seal pipe
Reason system traces the user, makes correlation in accordance with the law and punishes.
As an example, in order to allow what control of stamping server can further appreciate that the seal 10 to be actually used feelings
Condition, the processor 120, by the currently practical access times of the seal 10, can also pass through communication after seal 10 is returned
Device 17 is sent to control of stamping server, so as to the control of stamping server, is not reached in the access times for judging the user
When to preset mandate number, it is desirable that user submits the reasons why " access times are not up to preset mandate number ".
In addition, the seal 10 further includes power supply 105, for being the power supply for electrical equipment on the seal 10.It is implementing
When, in some realization methods, which can be powered with right and wrong charge power supply, such as lithium battery for the seal 10;Other
In realization method, which can also be charge power supply, then, need to configure charging on the seal body 103 of the seal 10
Mouthful, such as USB charging interface, for charging for the charge power supply of the seal 10.The concrete form of power supply on seal 10,
It is not especially limited in the present invention.
Seal 10 provided in this embodiment can realize the data between control of stamping server by communicator 170
Management of the control of stamping server to seal 10 is realized in interaction;Can by the data of pressure sensor 140 and timer 150,
Control by processor 120 to the on off state of the seal lock 130 of seal 10;User can be allowed to know this by display 160
The case where seal 10 is used promotes user experience;It can be realized to seal 10 by scanner 180 and locator 190
Positioning and the monitoring to 10 use occasion of seal, that is, monitor the seal 10 where, used in which file, it is convenient should
Monitoring of the manager or the owner of seal to its authority of office.
Therefore, in technical solution provided by the invention, seal 10 can be authenticated by identity, and integrate thereon
Various modules effectively avoid disabled user to the use of the seal 10, improve the safety that seal 10 uses.
Embodiment two
It is described in detail using the structure and operation principle of system to seal provided in this embodiment with reference to Fig. 3.
Referring to Fig. 3, the schematic diagram of system is used for seal provided in an embodiment of the present invention.
The seal other than including seal 10, further includes using system:Control of stamping server 20, the seal in the system
10 and control of stamping server 20 pass through network 30 carry out data interaction.
Wherein, control of stamping server 20 by authorization message and authorizes number after authorizing the user to use seal 10
It is sent to seal 10;Also, the information for the target object that the seal 10 that seal 10 is sent is used is received, the position residing for seal 10
Any one or more information in the actual access times of confidence breath and seal 10.
Foregoing description is the use process of seal 10, wherein the specific implementation of seal 10 may refer to embodiment one
In description, which is not described herein again.
Seal provided in an embodiment of the present invention uses system, since the seal is using including a kind of safe to use in system
The high seal 10 of property, therefore, which can be provided safe and reliable using system for the owner of seal 10 or manager
It ensures, and then ensures that the seal uses the safety of system.
Embodiment three
The embodiment of the present invention additionally provides a kind of seal application method, is seal provided in an embodiment of the present invention referring to Fig. 4
The flow chart of application method.This method includes:
Step 401, authentication information input 110 receives authentication information input by user;
Step 402, processing 120 carries out authentication according to authentication information to user;
Step 403, when authentication information is matched with authorization message, the authentication of user is passed through, handles 120 to seal
Lock 130 sends open command, and control seal lock 130 is opened, to expose seal face 101.
Optionally, this method further includes:
When seal lock 130 is opened, and meets closedown condition, processor 120 sends out code to seal lock 130,
It controls seal lock 130 to close, to hide seal face 101.
Optionally, this method further includes:
Processor 120 records the access times of seal 10 by pressure sensor 140, when the access times of seal 10
When reaching preset mandate number, meet closedown condition.
Optionally, this method further includes:
Before the access times of seal 10 do not reach preset mandate number, processor 120 obtains the meter of timer 150
When the time, when the timing time of timer 150 reach it is default without the operating time when, meet closedown condition.
Optionally, this method further includes:
When to the authentication of user by when, processor 120 detect seal 10 access times whether reach it is default
Mandate number, when not reaching preset mandate number, to seal lock 130 send open commands.
Optionally, this method further includes:
Display 160 shows the access times of seal 10, or the unused number of display seal 10.
Optionally, authentication information loader 110 includes Fingerprint Identification Unit, and authentication information loader 110 receives user's input
Authentication information include:Fingerprint Identification Unit receives the fingerprint of user.
Optionally, authentication information loader 110 includes PIN PAD, and authentication information loader 110 receives user's input
Authentication information include:PIN PAD receives the password of number input by user and/or character composition.
Optionally, this method further includes:
Processor 120 carries out data interaction by communicator 170 and control of stamping server 20.
Optionally, this method further includes:
Scanner 180 scans the information for the target object that seal 10 is used;
The information of target object is sent to control of stamping server 20 by processor 120 by communicator 1700.
Optionally, this method further includes:
Information the location of when the acquisition seal 10 of locator 190 is used;
Location information is sent to control of stamping server 20 by processor 120 by communicator 170.
Optionally, this method further includes:
After seal 10 is returned, processor 120 is sent the actual access times of seal 10 by communicator 170
To control of stamping server 20.
Foregoing description is the application method of seal 10, wherein the specific implementation of seal 10 may refer to embodiment one
In description, which is not described herein again.
Seal application method provided in an embodiment of the present invention, since the seal in the seal application method is a kind of safety
High seal 10, therefore, which provides more safe and reliable operational support for the use of seal 10, in turn
Ensure the owner of the seal 10 or the information security of manager.
Application scenarios embodiment
After describing seal application method provided in an embodiment of the present invention, clearly illustrate that the present invention carries in order to more
The seal of confession, seal uses system and seal application method, below with a concrete scene, from the angle introduction of signal interaction
The method that seal uses.
It is the signaling process figure of the application scenarios embodiment of the application method of seal 10 provided by the invention referring to Fig. 5.Tool
When body is realized, the application method of the seal 10 includes:
Step 501, user sends application information to control of stamping server 20, and application uses seal 10.
Step 502, after control of stamping server 20 receives the application information that user sends, application information is analyzed
And processing, decide whether to authorize, if authorized, thens follow the steps 503;Otherwise, inform that user applies for quilt in the form of short message etc.
It rejects, and rejected reason.
Step 503, control of stamping server 20 obtains the corresponding mandate letter of the user identifier by the mark of the user
Breath, and according to application information, determine preset mandate number and default without the operating time.
Wherein, the correspondence of user identifier and authorization message, the authorization message are stored in control of stamping server 20
Including fingerprint and password.
Step 504, control of stamping server 20 is by the authorization message of the user, preset mandate number and default without behaviour
It is sent to seal 10 as the time.
Step 505, seal 10 by the information storage received in the seal 10.
Step 506, user want use the seal 10, in the authentication information loader 110 of seal 10 respectively input with
The fingerprint and preset password that authorization message matches, as authentication information.
Step 507, the authentication information of user's typing is sent to processor 120 by authentication information loader 110, the processor
120 couples of users carry out authentication, that is, judge whether authentication information input by user matches with the authorization message of storage, if
Match, it is determined that the authentication of the user passes through, and control seal lock 130 is opened, and the pop-up of seal face is covered using seal 10
Chapter;Otherwise, authenticating user identification failure can be notified by forms such as the display 160 of seal 10 or short messages.
In specific implementation, can generally there are the default maximum times for allowing authentification failure, if it is less than the default maximum
Number then can notify user to re-type authentification of message information by display 160 or other modes;If it exceeds this is pre-
If maximum times, then the processor 120 of the seal 10 can send a warning message to user and control of stamping server 20, prompt
There may be problems for seal 10.
After seal lock 130 is opened, the seal face of seal 10 is popped up, and can be covered target object using the seal 10
Chapter, and record the number of affixing one's seal of seal 10.This content is described in detail in above-described embodiment, and the description with reference to examples detailed above is
Can, which is not described herein again.
Step 508, scanner 180 scans the information of target object, and is sent to processor 120.
Step 509, the information of target object is sent to control of stamping by the processor 120 of seal 10 by communicator 170
Server 20.
It should be noted that after information of the control of stamping server 20 according to the target object received, it can be determined that should
Whether the information of target object is legal, if it find that it is illegal, then it is sent at once to the processor 120 of seal 10 by internet
Control instruction indicates that the processor 120 of the seal, control seal lock 130 are closed, be abused to avoid seal 10.
Step 510, locator 190 positions the location information that the seal 10 is presently in, and is sent to processor 120.
Step 511, the location of the seal 10 information is sent to control of stamping clothes by seal 10 by communicator 170
Business device 20.
It should be noted that after the location information that control of stamping server 20 receives, it can be determined that the location information is
It is no legal, if it find that it is illegal, then control instruction is sent to the processor 120 of seal 10 by internet at once, instruction should
The processor 120 of seal, control seal lock 130 are closed, are abused to avoid seal 10.
Step 512, the processor 120 of seal 10 is sentenced according to pressure sensor 140 and the feedback of timer 150
Whether the disconnected seal 10 meets the condition of closing.
Concrete condition is respectively:On the one hand, which records the use of seal 10 by pressure sensor 140
Number meets closedown condition when the access times of seal 10 reach preset mandate number.
On the other hand, before the access times of seal 10 do not reach preset mandate number, processor 120 obtains timing
The timing time of device 150 meets closedown condition when the timing time of timer 150, which reaches, to be preset without the operating time.
In another aspect, closed without the operating time when seal 10 because the timing time of timer 150 reaches to preset, rather than
It being closed because the access times of seal 10 reach preset mandate number, then user can carry out authentication again, when
Authentication by when, whether the access times that processor 120 detects seal 10 reach preset mandate number, when not arriving
When up to preset mandate number, open command is sent to seal lock 130, until the access times of user reach preset mandate
Number, alternatively, being preset without the operating time until the timing time of the timer 150 of user reaches.
Step 513, when the judgement of processor 120, the user meets closedown condition to the use of seal 10, then, processor
120 send out code to seal lock 130, and instruction seal lock 130 is closed.
Step 514, the processor 120 of seal 10 indicates that user gives back seal 10, and enterprising in control of stamping server 20
Row logs in.
Step 515, the processor 120 of seal 10 to control of stamping server 20 send seal it is actual use it is secondary
Number.
Step 516, control of stamping server 20 is according to 10 feedack of seal, when the access times of seal are not up to
When preset mandate number, it is desirable that user fills in " access times are not up to preset mandate number " reason.
In the present embodiment, seal 10 can realize the data between control of stamping server 20 by communicator 170
Management of the control of stamping server 20 to seal 10 is realized in interaction;Seal 10 can also pass through pressure sensor 140 and timer
150 data, the control by processor 120 to the on off state of the seal lock 130 of seal 10;Seal 10 can pass through display
160, it allows user to know the case where seal 10 is used, promotes user experience;Scanner 180 and locator can be passed through
190, realize monitoring to the positioning of seal 10 and to 10 use occasion of seal, that is, monitor the seal 10 where, which
It is used in file, facilitates the monitoring of the manager or the owner of the seal to its authority of office.
Therefore, in the technical solution of seal application method provided in this embodiment, seal 10 by the identity to user into
Row certification, and various modules integrated thereon, the intelligent monitoring and control seal 10 effectively avoid disabled user to this
The use of seal 10 and legal authorized user improve the safety that seal 10 uses to its abuse.
It should be noted that the present invention above-mentioned all embodiments in, seal 10 to the authentication of user be by
What the processor 120 in seal 10 was completed, this is a kind of realization method of the present invention.It is realized as another kind, seal 10
Authentication can also be completed by control of stamping server 20.Specifically, after seal 10 receives the authentication information of user, also
The authentication information can be sent to control of stamping server 20 by communicator 170, by control of stamping server 20 by certification
Information is compared with the authorization message of the user, when authentication information matches with authorization message, control of stamping server 20
Unlocking instruction is generated, and unlocking instruction is sent to seal 10.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, without departing from the principle of the present invention, it can also make several improvements and retouch, these improvements and modifications are also answered
It is considered as protection scope of the present invention.
Claims (21)
1. a kind of seal, which is characterized in that the seal includes:
Authentication information loader, processor and seal lock;
The authentication information loader, receives authentication information input by user, and the authentication information is sent to the processor;
The processor carries out authentication according to the authentication information to the user, when the authentication information and mandate are believed
When breath matching, the authentication of the user is passed through, is locked to the seal and sends open command;
The seal lock, is opened according to the open command, to expose seal face.
2. seal according to claim 1, which is characterized in that
The processor is locked to the seal when the seal locks unlatching, and meets closedown condition and sends out code;
The seal lock, is closed according to the out code, to hide the seal face.
3. seal according to claim 2, which is characterized in that the seal further includes:
Pressure sensor;
The processor records the access times of the seal by the pressure sensor, when the use of the seal
When number reaches preset mandate number, meet the closedown condition.
4. seal according to claim 3, which is characterized in that the seal further includes:
Timer;
The processor, when the access times of the seal do not reach preset mandate number, and the timer
When timing time arrival was preset without the operating time, meet the closedown condition.
5. seal according to claim 4, which is characterized in that
The processor, when to the authentication of the user by when, whether the access times for detecting the seal reach
Preset mandate number is locked to the seal when not reaching preset mandate number and sends open command.
6. according to the seal described in claim 3-5 any one, which is characterized in that the seal further includes:
Display shows the access times of the seal, or the unused number of the display seal.
7. according to the seal described in claim 1-6 any one, which is characterized in that the seal further includes:
Communicator, the processor carry out data interaction by the communicator and control of stamping server.
8. seal according to claim 7, which is characterized in that the seal further includes:
Scanner scans the information for the target object that the seal is used, and the information of the target object is sent to described
Processor;
The information of the target object is sent to control of stamping server by the processor by the communicator.
9. seal according to claim 7, which is characterized in that the seal further includes:
Locator the location of obtains when the seal is used information, the location information is sent to the processor;
The location information is sent to control of stamping server by the processor by the communicator.
10. seal according to claim 7, which is characterized in that the seal further includes:
The processor, after the seal is returned, by the communicator by the actual access times of the seal
It is sent to control of stamping server.
11. a kind of seal uses system, which is characterized in that the system comprises:
Seal described in claim 7-10 any one and control of stamping server, the seal and the control of stamping
Server carries out data interaction by network;
The control of stamping server by authorization message and authorizes number to send after authorizing the user to use the seal
To the seal;Also, the information for the target object that the seal that the seal is sent is used is received, residing for the seal
Location information and the seal actual access times in any one or more.
12. a kind of seal application method, which is characterized in that the method includes:
Authentication information loader receives authentication information input by user;
Processor carries out authentication according to the authentication information to the user;
When the authentication information is matched with authorization message, the authentication of the user is passed through, processor is locked to seal to be sent out
Open command is sent, the seal lock is controlled and opens, to expose seal face.
13. according to the method for claim 12, which is characterized in that the method further includes:
When locking and open when the seal, and meeting closedown condition, the processor is locked to the seal and sends out code,
It controls the seal lock to close, to hide the seal face.
14. according to the method for claim 13, which is characterized in that the method further includes:
The processor records the access times of the seal by pressure sensor, when the access times of the seal arrive
When up to preset mandate number, meet the closedown condition.
15. according to the method for claim 13, which is characterized in that the method further includes:
Before the access times of the seal do not reach preset mandate number, when the processor obtains the timing of timer
Between, when the timing time of timer, which reaches, to be preset without the operating time, meet the closedown condition.
16. according to the method for claim 15, which is characterized in that the method further includes:
When to the authentication of the user by when, the processor detect the seal access times whether reach it is pre-
If mandate number, when not reaching preset mandate number, to the seal lock send open command.
17. according to the method described in claim 14-16 any one, which is characterized in that the method further includes:
Display shows the access times of the seal, or the unused number of the display seal.
18. according to the method described in claim 12-17 any one, which is characterized in that the method further includes:
The processor carries out data interaction by the communicator and control of stamping server.
19. according to the method for claim 18, which is characterized in that the method further includes:
Scanner scans the information for the target object that the seal is used;
The information of the target object is sent to control of stamping server by the processor by the communicator.
20. according to claim 18 the method, which is characterized in that the method further includes:
Information the location of when the locator acquisition seal is used;
The location information is sent to control of stamping server by the processor by the communicator.
21. according to the method for claim 18, which is characterized in that the method further includes:
After the seal is returned, the processor is sent out the actual access times of the seal by the communicator
It send to control of stamping server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810195868.XA CN108340691A (en) | 2018-03-09 | 2018-03-09 | A kind of seal, seal application method and seal use system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810195868.XA CN108340691A (en) | 2018-03-09 | 2018-03-09 | A kind of seal, seal application method and seal use system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108340691A true CN108340691A (en) | 2018-07-31 |
Family
ID=62958003
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810195868.XA Pending CN108340691A (en) | 2018-03-09 | 2018-03-09 | A kind of seal, seal application method and seal use system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108340691A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108995410A (en) * | 2018-08-27 | 2018-12-14 | 武汉矽感科技有限公司 | A kind of seal and its impress control method and system based on narrowband Internet of Things |
CN109159557A (en) * | 2018-08-01 | 2019-01-08 | 福州智闽科技有限公司 | A kind of the Internet of Things wire mark control instrument implementation method and device of band scanning |
CN109318612A (en) * | 2018-09-25 | 2019-02-12 | 平安科技(深圳)有限公司 | A kind of method for anti-counterfeit of seal, device and intelligent seal |
CN109334283A (en) * | 2018-09-17 | 2019-02-15 | 平安科技(深圳)有限公司 | A kind of method for anti-counterfeit of seal, device and intelligent seal |
CN109544818A (en) * | 2018-11-08 | 2019-03-29 | 深圳市新群欣实业有限公司 | A kind of official seal management method and system |
CN111275864A (en) * | 2020-03-20 | 2020-06-12 | 慧章信息科技(上海)有限公司 | Seal with fingerprint unblock |
CN111923619A (en) * | 2020-07-22 | 2020-11-13 | 邵阳市中心医院 | Official seal supervision operating system and official seal supervision operating cabinet |
CN112905725A (en) * | 2021-01-28 | 2021-06-04 | 王仲楷 | Internet big data information processing system |
CN113071231A (en) * | 2020-01-06 | 2021-07-06 | 无疆(青岛)高新科技有限公司 | Intelligent seal and use method thereof |
CN114312068A (en) * | 2022-01-13 | 2022-04-12 | 北京鸿游科技有限公司 | Seal management device |
CN114819438A (en) * | 2021-01-27 | 2022-07-29 | 邓学胜 | Intelligent seal management method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005173810A (en) * | 2003-12-09 | 2005-06-30 | Fuji Xerox Co Ltd | Electronic seal system and method therefor |
CN104156809A (en) * | 2014-07-31 | 2014-11-19 | 王东 | Intelligent stamp protection control device and stamp management system |
CN204719806U (en) * | 2015-06-12 | 2015-10-21 | 娲石水泥集团武汉万世科技有限公司 | A kind of intelligent official seal |
CN106056313A (en) * | 2016-06-30 | 2016-10-26 | 江西省硕果投资管理有限公司 | Stamp information control method and system, and stamp |
CN107128088A (en) * | 2017-03-27 | 2017-09-05 | 武汉矽感科技有限公司 | The safe verification method and seal of seal |
CN207059529U (en) * | 2017-08-04 | 2018-03-02 | 福建强闽信息科技有限公司 | A kind of arrowband Internet of Things intelligence seal |
-
2018
- 2018-03-09 CN CN201810195868.XA patent/CN108340691A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005173810A (en) * | 2003-12-09 | 2005-06-30 | Fuji Xerox Co Ltd | Electronic seal system and method therefor |
CN104156809A (en) * | 2014-07-31 | 2014-11-19 | 王东 | Intelligent stamp protection control device and stamp management system |
CN204719806U (en) * | 2015-06-12 | 2015-10-21 | 娲石水泥集团武汉万世科技有限公司 | A kind of intelligent official seal |
CN106056313A (en) * | 2016-06-30 | 2016-10-26 | 江西省硕果投资管理有限公司 | Stamp information control method and system, and stamp |
CN107128088A (en) * | 2017-03-27 | 2017-09-05 | 武汉矽感科技有限公司 | The safe verification method and seal of seal |
CN207059529U (en) * | 2017-08-04 | 2018-03-02 | 福建强闽信息科技有限公司 | A kind of arrowband Internet of Things intelligence seal |
Non-Patent Citations (1)
Title |
---|
梁川;李志蜀;史云宾;李琰;: "交通稽征业务指纹认证电子报批系统" * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109159557A (en) * | 2018-08-01 | 2019-01-08 | 福州智闽科技有限公司 | A kind of the Internet of Things wire mark control instrument implementation method and device of band scanning |
CN109159557B (en) * | 2018-08-01 | 2020-04-10 | 福州智闽科技有限公司 | Method and device for realizing Internet of things screen printing control instrument with scanning function |
CN108995410A (en) * | 2018-08-27 | 2018-12-14 | 武汉矽感科技有限公司 | A kind of seal and its impress control method and system based on narrowband Internet of Things |
CN109334283A (en) * | 2018-09-17 | 2019-02-15 | 平安科技(深圳)有限公司 | A kind of method for anti-counterfeit of seal, device and intelligent seal |
CN109334283B (en) * | 2018-09-17 | 2022-01-28 | 平安科技(深圳)有限公司 | Anti-counterfeiting method and device for seal and intelligent seal |
CN109318612A (en) * | 2018-09-25 | 2019-02-12 | 平安科技(深圳)有限公司 | A kind of method for anti-counterfeit of seal, device and intelligent seal |
CN109544818A (en) * | 2018-11-08 | 2019-03-29 | 深圳市新群欣实业有限公司 | A kind of official seal management method and system |
CN113071231A (en) * | 2020-01-06 | 2021-07-06 | 无疆(青岛)高新科技有限公司 | Intelligent seal and use method thereof |
CN113071231B (en) * | 2020-01-06 | 2024-02-23 | 青岛无疆技术有限公司 | Intelligent seal and application method thereof |
CN111275864A (en) * | 2020-03-20 | 2020-06-12 | 慧章信息科技(上海)有限公司 | Seal with fingerprint unblock |
CN111923619A (en) * | 2020-07-22 | 2020-11-13 | 邵阳市中心医院 | Official seal supervision operating system and official seal supervision operating cabinet |
CN114819438A (en) * | 2021-01-27 | 2022-07-29 | 邓学胜 | Intelligent seal management method |
CN112905725A (en) * | 2021-01-28 | 2021-06-04 | 王仲楷 | Internet big data information processing system |
CN112905725B (en) * | 2021-01-28 | 2023-12-05 | 深圳市易行网数字科技有限公司 | Internet big data information processing system |
CN114312068A (en) * | 2022-01-13 | 2022-04-12 | 北京鸿游科技有限公司 | Seal management device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108340691A (en) | A kind of seal, seal application method and seal use system | |
US7907753B2 (en) | Access control system with symbol recognition | |
WO2011062364A2 (en) | User authentication system, user authentication apparatus, smart card, and user authentication method for ubiquitous authentication management | |
CN105761347B (en) | The electric system Special anti-theft electromagnetism lock system verified based on two dimensional code and GPS | |
CN108830502A (en) | A kind of seal system | |
CN108712389B (en) | Intelligent lock system | |
CN105447931B (en) | The methods, devices and systems of gate inhibition's remote authorization | |
CN103295341A (en) | POS (point-of-sales) safety certification device, POS safety certification system and POS device safety certification method | |
CN105701885A (en) | Face identification access control system and implementation method thereof | |
CN106097492A (en) | A kind of gate inhibition's access control method and gate control system | |
CN205959237U (en) | Long -range mandate affix with seal device and system | |
Olaniyi et al. | Design of secure electronic voting system using fingerprint biometrics and crypto-watermarking approach | |
CN110164012A (en) | A kind of community's access control system and working method thereof | |
CN110688643A (en) | Processing method for platform identity identification and authority authentication | |
CN105913513A (en) | Control method and system for door lock system | |
CN110599653B (en) | Access control unlocking method, device and storage medium | |
CN109741509A (en) | A kind of the face access control system and information authentication method of double authentication | |
CN106572082A (en) | Approval signature verifying method, mobile device, terminal device and system | |
CN106650361A (en) | Unblocking method and device | |
CN109334283A (en) | A kind of method for anti-counterfeit of seal, device and intelligent seal | |
CN113971849A (en) | Dynamic coded lock with management system | |
CN108230525A (en) | Access control management method and gate inhibition management apparatus | |
CN112511484A (en) | U shield safety control management system | |
CN109064675A (en) | Luggage Deposit verification method, device and intelligent inbox | |
CN108206832A (en) | Access control system and management method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180731 |