CN108340691A - A kind of seal, seal application method and seal use system - Google Patents

A kind of seal, seal application method and seal use system Download PDF

Info

Publication number
CN108340691A
CN108340691A CN201810195868.XA CN201810195868A CN108340691A CN 108340691 A CN108340691 A CN 108340691A CN 201810195868 A CN201810195868 A CN 201810195868A CN 108340691 A CN108340691 A CN 108340691A
Authority
CN
China
Prior art keywords
seal
processor
user
authentication
authentication information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810195868.XA
Other languages
Chinese (zh)
Inventor
王建林
胡庆格
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Huada Zhibao Electronic System Co Ltd
Original Assignee
Beijing Huada Zhibao Electronic System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Huada Zhibao Electronic System Co Ltd filed Critical Beijing Huada Zhibao Electronic System Co Ltd
Priority to CN201810195868.XA priority Critical patent/CN108340691A/en
Publication of CN108340691A publication Critical patent/CN108340691A/en
Pending legal-status Critical Current

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B41PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
    • B41KSTAMPS; STAMPING OR NUMBERING APPARATUS OR DEVICES
    • B41K1/00Portable hand-operated devices without means for supporting or locating the articles to be stamped, i.e. hand stamps; Inking devices or other accessories therefor
    • B41K1/02Portable hand-operated devices without means for supporting or locating the articles to be stamped, i.e. hand stamps; Inking devices or other accessories therefor with one or more flat stamping surfaces having fixed images
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B41PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
    • B41KSTAMPS; STAMPING OR NUMBERING APPARATUS OR DEVICES
    • B41K1/00Portable hand-operated devices without means for supporting or locating the articles to be stamped, i.e. hand stamps; Inking devices or other accessories therefor
    • B41K1/36Details
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention provides seal, seal application method and seals to use system.When user uses seal, which needs the input authentication information on the authentication information loader of seal;The authentication information of the user is sent to the processor of the seal by authentication information loader, the identity of the user is authenticated by processor, i.e., the authentication information received is compared with pre-stored authorization message in processor, when authentication information and authorization message match, determine that the authentication of the user passes through, processor is locked to seal sends open command, it notifies seal lock to open, exposes seal face seal for users to use.Therefore seal provided by the invention can effectively avoid use of the disabled user to it, improve the safety that seal uses.

Description

A kind of seal, seal application method and seal use system
Technical field
The present invention relates to electroporation fields, and system is used more particularly to a kind of seal, seal application method and seal.
Background technology
Seal is also referred to as seal, for being printed on file, indicates the stationery of identification or signature.Seal is widely used It is general, such as:Business unit, government department, administration, financial institution and public organization etc..Since seal can exercise this The authority of office of the seal owner is the important documents and tool of clearly various rights and obligations relationships, and therefore, the safe handling of seal is non- It is often important.
Currently, be all the access right that seal is administered by special messenger, when needing using seal, the use by special messenger to seal Exercise supervision management and control.But the above method can not avoid the abuse of seal well.How the seal that uses of safety is current Urgent problem to be solved.
Invention content
Present invention solves the technical problem that being to provide a kind of seal, seal application method and seal uses system, to It can realize the intelligent control to seal, and then improve the safety that seal uses.
For this purpose, the technical solution that the present invention solves technical problem is:
In a first aspect, the present invention provides a kind of seal, which includes:
Authentication information loader, processor and seal lock;
Authentication information loader, receives authentication information input by user, and authentication information is sent to processor;
Processor, according to authentication information to user carry out authentication, when authentication information is matched with authorization message, to The authentication at family passes through, and is locked to seal and sends open command;
Seal is locked, and is opened according to open command, to expose seal face.
Optionally, processor is locked to seal when seal locks unlatching, and meets closedown condition and sends out code;
Seal is locked, and is closed according to out code, to hide seal face.
Optionally, seal further includes:Pressure sensor;
Processor records the access times of seal by pressure sensor, is preset when the access times of seal reach Mandate number when, meet closedown condition.
Optionally, seal further includes:Timer;
Processor, when the access times of seal do not reach preset mandate number, and the timing time of timer When arrival was preset without the operating time, meet closedown condition.
Optionally, processor, when to the authentication of user by when, detect seal access times whether reach it is pre- If mandate number, when not reaching preset mandate number, to seal lock send open command.
Optionally, seal further includes:Display shows the access times of seal, or unused time of display seal Number.
Optionally, authentication information loader includes Fingerprint Identification Unit, and authentication information is the fingerprint of user.
Optionally, authentication information loader includes PIN PAD, and authentication information is the close of digital and/or character composition Code.
Optionally, seal further includes:Communicator, processor carry out data friendship by communicator and control of stamping server Mutually.
Optionally, seal further includes:Scanner, the information for the target object that scanning seal is used, by target object Information is sent to processor;
The information of target object is sent to control of stamping server by processor by communicator.
Optionally, seal further includes:Locator, information the location of when acquisition seal is used, location information is sent out It send to processor;
Location information is sent to control of stamping server by processor by communicator.
Optionally, seal further includes:Processor has been made the actual of seal by communicator after seal is returned It is sent to control of stamping server with number.
Second aspect, the present invention also provides a kind of seals using system, which includes:
The seal and control of stamping server that first aspect present invention is provided, seal and control of stamping server are logical It crosses network and carries out data interaction;
Control of stamping server by authorization message and authorizes number to be sent to seal after authorized user uses seal;And And the information for the target object that the seal that seal is sent is used is received, the reality of the location of seal information and seal Access times in any one or more.
The third aspect, the present invention also provides a kind of seal application method, this method includes:
Authentication information loader receives authentication information input by user;
Processor carries out authentication according to authentication information to user;
When authentication information is matched with authorization message, the authentication of user is passed through, processor sends to seal lock and opens Instruction is opened, control seal lock is opened, to expose seal face.
Optionally, this method further includes:
When locking and open when seal, and meeting closedown condition, processor is locked to seal and sends out code, and seal is controlled Lock is closed, to hide seal face.
Optionally, this method further includes:
Processor records the access times of seal by pressure sensor, when the arrival of access times of seal is preset When authorizing number, meet closedown condition.
Optionally, this method further includes:
Before the access times of seal do not reach preset mandate number, processor obtains the timing time of timer, When the timing time of timer, which reaches, to be preset without the operating time, meet closedown condition.
Optionally, this method further includes:
When to the authentication of user by when, whether the access times of processor detection seal reach preset mandate Number is locked to seal when not reaching preset mandate number and sends open command.
Optionally, this method further includes:
Display shows the access times of seal, or the unused number of display seal.
Optionally, authentication information loader includes Fingerprint Identification Unit, and authentication information loader receives certification input by user Information includes:
Fingerprint Identification Unit receives the fingerprint of user.
Optionally, authentication information loader includes PIN PAD, and authentication information loader receives certification input by user Information includes:
PIN PAD receives the password of number input by user and/or character composition.
Optionally, this method further includes:
Processor carries out data interaction by communicator and control of stamping server.
Optionally, this method further includes:
The information for the target object that scanner scanning seal is used;
The information of target object is sent to control of stamping server by processor by communicator.
Optionally, this method further includes:
Information the location of when locator acquisition seal is used;
Location information is sent to control of stamping server by processor by communicator.
Optionally, this method further includes:
After seal is returned, the actual access times of seal are sent to control of stamping by processor by communicator Server.
According to the above-mentioned technical solution, the method have the advantages that:
Seal provided by the invention includes:Authentication information loader, processor and seal lock.When user uses seal When, first, which needs the input authentication information on the authentication information loader of seal;Then, authentication information loader will The authentication information of the user is sent to the processor of the seal, is authenticated to the identity of the user by processor, that is, will receive To authentication information be compared with pre-stored authorization message in processor, when authentication information and authorization message match When, it determines that the authentication of the user passes through, at this point, processor is locked to seal sends open command, seal lock is notified to open, Expose seal face seal for users to use.Conversely, when authentication information and authorization message mismatch, the body of the user is determined Part certification does not pass through, at this point, processor will not be locked to seal sends open command, seal lock will not open the disabled user It opens, therefore, seal provided by the invention can effectively avoid use of the disabled user to it, improve the safety that seal uses Property.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is the structural schematic diagram for the seal that the embodiment of the present invention one provides;
Fig. 2 is the exemplary plot for another seal that the embodiment of the present invention one provides;
Fig. 3 is the schematic diagram that seal provided by Embodiment 2 of the present invention uses system;
Fig. 4 is the flow chart for the seal application method that the embodiment of the present invention three provides;
Fig. 5 is the signaling process figure of the application scenarios embodiment of seal application method provided by the invention.
Specific implementation mode
Since ancient times, seal is printed on the identification or signature that the seal owner can be indicated on file to this document content, and one Seal is printed on denier file, this document is just provided with certain legal effect, that is, the owner of the seal must comply with this Various rights and obligations relationships involved in file.Due to the effect unique of seal, therefore, each business unit, government department, administrative machine It closes, financial institution and public organization etc., can manufacture and use can represent all kinds of seal of its authority of office.Currently, various types of Seal be all to be administered by special messenger and controlled its access right, and carry out relevant supervision management and control.But the side that the special messenger administers Method inevitably will appear the abuse of seal, and the use of seal is caused unsafe problem occur.
Based on this, in order to avoid abuse seal the case where, an embodiment of the present invention provides a kind of seal, seal application methods And seal uses system, can realize the safe handling of seal.
When user uses seal, firstly, it is necessary to the input authentication information on the authentication information loader of seal;Then, The identity of the user is authenticated by the processor of the seal, that is, deposit the authentication information received and the processor in advance The authorization message of storage is compared, and when authentication information matches with authorization message, determines that the authentication of the user passes through, this When, seal lock can receive processor transmission open command, notify the seal seal lock open, that is, expose seal face for Family uses the seal.In addition, when the authentication of user not by when, then the user be the seal belong to disabled user, this is non- Method user can not use the seal, effectively avoid use of the disabled user to the seal, improve the safety that seal uses Property.
The embodiment of the present invention is illustrated below in conjunction with Figure of description, it should be understood that implementation described herein Example is only for the purpose of illustrating and explaining the present invention and is not intended to limit the present invention.And in the absence of conflict, the reality in the present invention The feature applied in example and embodiment can be combined with each other.
Embodiment one
It is a kind of structural schematic diagram of seal provided in this embodiment referring to Fig. 1.The seal 10 includes:Authentication information is defeated Enter device 110, processor 120 and seal lock 130.
Wherein, which is sent to by authentication information loader 110 for receiving authentication information input by user Processor 120.
Processor 120, for carrying out authentication to user according to authentication information, when authentication information is matched with authorization message When, the authentication of the user is passed through, open command is sent to seal lock 130;
Seal lock 130, for being opened according to open command, to expose seal face.
It is understood that in the processor 120 of seal 10, it is previously stored with the authorization message of user.Authorization message, Refer to user's typing, when can use the seal 10 as the user, carries out the check information of authentication.
When user uses the seal 10, first, user needs input authentication information.Wherein, authentication information refers to that user exists The information inputted on the authentication information loader 110 of seal 10.The authentication information loader 110 being arranged on seal 10 is different, uses The type of the authentication information of family input is also different.When specific implementation, the type of authentication information is consistent with the type of authorization message. In one example, authentication information loader 110 can be arranged in the side of the seal body of seal 10, avoid when according to seal 10 Influence the work of authentication information loader 110.Certainly, authentication information loader 110 can also be arranged according to actual conditions and print The other positions of chapter 10, which is not described herein again.
Then, carry out authentication of the processor 120 of seal 10 according to the authentication information to user judges that the user is The no validated user for the seal 10.Specifically, if the authentication information that is inputted on authentication information loader 110 of user with The authorization message stored in processor 120 matches, it is determined that the authentication of the user passes through, that is, the user is the seal 10 validated user;Otherwise, if the authentication information that user inputs on authentication information loader 110 is deposited with processor 120 The authorization message of storage mismatches, it is determined that the authentication of the user does not pass through, that is, the user is the illegal use of the seal 10 Family.
As an example, authentication information loader 110 may include Fingerprint Identification Unit, then, user believes in the certification The authentication information inputted on breath loader 110 is the fingerprint of the user, i.e., the authorization message stored on processor 120 is also one Fingerprint is denoted as authorizing fingerprint.
When specific implementation, when user uses seal 10, user can be by the Fingerprint Identification Unit typing fingerprint, as this The authentication information of user;The fingerprint of user's typing is sent to processor 120 by Fingerprint Identification Unit, by processor 120 to the user Carry out authentication.Specifically authentication procedures are:Fingerprint and place of the processor 120 by user by Fingerprint Identification Unit typing The mandate fingerprint stored in reason device 120 is compared, when the fingerprint and mandate fingerprint phase that user passes through Fingerprint Identification Unit typing Timing, processor 120 assert that the authentication of the user passes through;Otherwise, when user by the fingerprint of Fingerprint Identification Unit typing with When fingerprint being authorized to mismatch, processor 120 assert that the authentication of the user does not pass through.
As another example, authentication information loader 110 can also include PIN PAD, then, user recognizes at this The authentication information inputted on card information input device 110 can be the password of number and/or character composition, and authorization message is to handle The password stored on device 120, is denoted as licencing key.
When specific implementation, when user uses seal 10, user can input password by the PIN PAD, as this The authentication information of user;Password input by user is sent to processor 120 by the PIN PAD, by processor 120 to the use Family carries out authentication.Specifically authentication procedures are:Processor 120 is by the password inputted by PIN PAD and processing The licencing key stored in device 120 is compared, when the password inputted by PIN PAD matches with licencing key, place Reason device 120 assert that the authentication of the user passes through;Otherwise, when the password that is inputted by PIN PAD and licencing key not Timing, processor 120 assert that the authentication of the user does not pass through.
As another example, in order to further increase the safety of the seal 10, authentication information loader 110 can also Simultaneously including Fingerprint Identification Unit and PIN PAD, then, the authentication information that user inputs on the authentication information loader 110 For the fingerprint and password of the user, authorization message is that stored on processor 120 is to authorize fingerprint and licencing key.
When specific implementation, when user uses seal 10, user can input password by the PIN PAD, pass through finger Line identifier typing fingerprint, and by the fingerprint and password as the authentication information of the user;The Fingerprint Identification Unit and password are defeated Processor 120 will be sent to by the fingerprint of Fingerprint Identification Unit typing and the password inputted by PIN PAD respectively by entering device, Authentication is carried out to the user by processor 120.Specifically authentication procedures are:Processor 120 will pass through Password Input The password of device input is compared with the licencing key stored in processor 120, and will pass through the finger of Fingerprint Identification Unit typing Line is compared with the mandate fingerprint stored in processor 120, and when the rwo is matched, processor 120 assert the user's Authentication passes through;Otherwise, when in both mismatches, or both there are one mismatching, processor 120 assert the user Authentication do not pass through.
When in seal 10 processor 120 assert user authentication by when, print of the processor 120 to the seal 10 Chapter lock 130 sends unlocking instruction, is used to indicate seal lock 130 and opens, seal is showed out, for users to use the seal 10.When Processor 120 in seal 10 assert the authentication of user not by when, the seal lock 130 of the seal 10 will keep lasting and close Closed state, user cannot use the seal 10.
In the case of one kind, seal lock 130 can be a buckle being arranged on seal 10, when the seal of seal 10 is locked 130 when not opening, which locks in seal face in the inside of the seal body, i.e. seal face is embedded in seal body.When user passes through When authentication, which receives unlocking instruction, opens buckle, and seal face is popped up from the inside of seal body, and user can make With the seal;When user does not pass through authentication, which will not receive unlocking instruction, then buckle will keep lasting pass Closed state, user cannot use the seal 10.
In another case, seal lock 130 can also be the openable seal lid being arranged on seal 10, work as seal When 10 seal lock 130 is not opened, the lower end of the seal lid and seal body is completely mating, it is ensured that the seal face of the seal 10 will not It is exposed to outer.When user passes through authentication, which receives unlocking instruction, opens seal lid, seal face from exposing, User can use the seal;When user does not pass through authentication, which will not receive unlocking instruction, then seal lid It will keep lasting closed state, user that cannot use the seal 10.
Seal 10 provided in this embodiment, user can be believed by 110 input authentication of authentication information loader of seal 10 Authentication information is sent to processor 120 by breath, authentication information loader 110, and processor 120 carries out authentication to the user, That is, it is judged that whether the authentication information input by user matches with the authorization message stored in processor 120, if matched, Indicate that the seal lock 130 of the seal 10 is opened, for users to use.As it can be seen that technical solution provided by the invention, the processing of seal 10 Device 120 can carry out authentication to user, effectively avoid use of the disabled user to the seal 10, improve seal 10 The safety used.
It describes in detail to the structure and operation principle of seal 10 provided in this embodiment with reference to Fig. 2.
It is the exemplary plot of seal 10 provided in this embodiment referring to Fig. 2.
It is understood that the structure of seal 10 includes seal face 101 and seal body 103.Wherein, on seal face 101 Carve the image and/or word of the owner's authority of office for representing the seal 10.
In specific implementation, authentication information loader 110 receives authentication information input by user, and authentication information is sent out It send to processor 120;The processor 120 carries out authentication according to authentication information to the user, when the authentication information and mandate When information matches, the authentication of the user is passed through, open command is sent to seal lock 130;Seal lock 130 is according to Open command is opened, to expose seal face 101.
Wherein, authorization message is pre-stored in the processor 120 of seal 10.Processor 120 obtains the side of authorization message Formula more than one is below introduced some of which realization method.Certainly, the authorization message can also be pre-stored with Processor 120 carries out in the memory of data interaction, here without specifically limiting.
Under a kind of realization method, user before first time is using the seal 10, believe by the certification that user passes through the seal 10 Loader 110 is ceased, pre-enters the authorization message of the seal 10, which is sent to place by authentication information loader 110 Reason device 120 is preserved.It is understood that it is this using initial input information as the realization method of authorization message, for print The owner of chapter 10 is the situation of individual, is more applicable in.
Wherein, which can be the fingerprint of user, which can also be pre-set one of user Static password including character and/or number, the authorization message can also be the combination of the fingerprint and above-mentioned static password of user.
Under another realization method, in the scene that seal 10 is a seal that represent group's authority of office, the seal 10 User's more than one, the seal 10 is managed by control of stamping server.Before the use, by control of stamping server By the authorization message of the user, it is sent in the processor 120 of seal 10 and is preserved.It should be noted that such seal 10 In further include a communicator 170, for realizing the data interaction between processor 120 and control of stamping server.
It is appreciated that when user is wanted using seal 10, need to be applied in corresponding control of stamping server have The application process of body is:Application information → control of stamping server is filled on control of stamping server to examine application information Batch → application is authorized to or application is rejected.
As an example, the user identifier and mandate that each user can be previously stored on control of stamping server are believed Correspondence between breath, wherein authorization message includes fingerprint and/or a static password.When user is in control of stamping service After application on device is authorized to, which finds user identifier correspondence by the user identifier of the user Authorization message, and the authorization message is sent to seal 10 and is stored.
In the case of one kind, the corresponding authorization message of user identifier can only include fingerprint, be denoted as mandate fingerprint, specifically can be with It is a fingerprint or multiple fingerprints.When the user uses the seal 10, user includes by authentication information loader 110 Fingerprint Identification Unit typing fingerprint, when the fingerprint matching of at least one of the fingerprint of the typing and above-mentioned mandate fingerprint, user's Authentication passes through, and the otherwise authentication of the user cannot pass through.
In another case, the authorization message can also be an only static password including character and/or number, as Licencing key.When the user uses the seal 10, user is defeated by the PIN PAD that authentication information loader 110 includes Enter password, when the password of input is matched with above-mentioned licencing key, the authentication of user passes through, and otherwise the identity of the user is recognized Card cannot pass through.
In the case of another, which had not only included fingerprint but also had included a static password, when the user uses the print When chapter 10, user passes through authentication information loader 110 by the Fingerprint Identification Unit typing fingerprint in authentication information loader 110 In PIN PAD input password, when any one fingerprint matching in the fingerprint and authorization message of typing, and when input Password when being matched with the static password in authorization message, the authentication of user just passes through, and otherwise the identity of the user is recognized Card cannot pass through.
As another example, unlike above-mentioned example, the password in authorization message is not a static password, and Be by the control of stamping server at random be the user configuration a dynamic password.When user is awarded in control of stamping server The dynamic password generated at random is sent to seal 10 and stored by Quan Hou, control of stamping server, meanwhile, control of stamping service The dynamic password that this is generated at random is also sent to user by device.
At this point, when the user uses the seal 10, user is defeated by the PIN PAD in authentication information loader 110 Enter a password, when the password of input is matched with the above-mentioned dynamic password stored in seal 10, the authentication of user passes through, Otherwise the authentication of the user cannot pass through.
As another example, unlike above-mentioned example, includes not only a dynamic password in authorization message, also wrap Include the fingerprint for the user for licensing seal.Specifically, be previously stored on control of stamping server the user identifier of user with The correspondence of the fingerprint of user.After application of the user on control of stamping server is authorized to, the control of stamping server By the user identifier of the user, the fingerprint of the user is found;Also, the control of stamping server will be also the user at random Configure a dynamic password;The control of stamping server is using the fingerprint of the user and the dynamic password generated at random as mandate Information is sent to seal 10 and is stored, meanwhile, the dynamic password that this is generated at random is also sent to use by control of stamping server Family.
In the example, when the user uses the seal 10, user passes through the fingerprint recognition in authentication information loader 110 Device typing fingerprint inputs password, when the fingerprint and authorization message of typing by the PIN PAD in authentication information loader 110 In any one fingerprint matching, and when the password of input is matched with the dynamic password in authorization message, the identity of user Certification just passes through, and the otherwise authentication of the user cannot pass through.
When in seal 10 processor 120 determine user authentication by when, print of the processor 120 to the seal 10 Chapter lock 130 sends unlocking instruction, is used to indicate seal lock 130 and opens.The seal lock 130 of seal 10 receives unlocking instruction Afterwards, seal lock 130 is opened, seal is showed out, for users to use the seal 10.
But it after the seal of seal 10 lock 130 is opened, in order to ensure the safety that seal 10 uses, needs meeting When closedown condition, processor 120 sends out code to seal lock 130, is used to indicate seal lock 130 and closes, to hide seal Face 101.At this point, the seal face 101 of the seal 10 is locked in the inside of seal body 103, user can not use the seal 10.
The closedown condition of the seal 10 includes:Access times reach preset mandate number, alternatively, ought access times Preset mandate number is not reached, but the time arrival that seal lock 130 is opened is default without the operating time.
As an example, after each user is authorized to the use of seal 10, in order to improve the peace that the seal 10 uses Quan Xing needs to limit the access times of seal 10 this time of user.That is, it is secondary to record having used for seal 10 in real time Number meets the closedown condition when the access times of the seal 10 reach preset mandate number.
Firstly, it is necessary to which pre-set the user at most allows the access times of seal 10 in the sub-authorization, it is denoted as presetting Mandate number.Then, the access times of the seal 10 are recorded, wherein access times refer in seal 10 After seal lock 130 is opened, user can begin to use the seal 10, often use the primary seal 10 lid, one Zhang Yin, the seal 10 access times can add one, and current access times are denoted as the access times of the seal 10.Then, processor 120 passes through The access times of the seal 10 of record, when judging whether the access times of seal 10 reach preset mandate number, if It is, it is determined that seal 10 meets closedown condition.
In specific implementation, in order to record its access times, which further includes seal 10:Pressure sensor 140. Specifically, when recording the access times of seal 10 using pressure sensor 140, in the case of a kind of, pressure sensor 140 is felt It should directly transmit electric signal to after pressure to processor 120, be denoted as printing by receive electric signal by the processor 120 The first use of chapter 10, and add one on the access times of the seal 10, i.e., the use time of seal 10 is recorded by processor 120 Number.In another case, there are one counters for connection between pressure sensor 140 and processor 120.Pressure sensor 140 is felt The use of the seal 10 should be counted by counter, and count results are made to electric signal after pressure, is sent to counter It is sent to processor 120 for access times.
Whether the access times that processor 120 can be received with real-time judge and preset mandate number are identical, when When access times are equal with preset mandate number, meet closedown condition.For example, in a sub-authorization, preset mandate number It is 5 times.User is after authentication passes through, and using the seal 10, processor 120 has been made by what pressure sensor 140 recorded Gradually add 1 since 0 with number, when the access times that processor 120 records the seal 10 are 5, judges access times It is equal with preset mandate number, it is considered as and meets closedown condition.
Can also include a scalable dress it should be noted that as shown in Fig. 2, inside the seal body 103 of seal 10 102 are set, one end of the telescopic mounting 102 is connected with seal face 101, and the other end is connect with the Stamp handle of seal body 103. The telescopic mounting 102 can be a spring, or other elastomeric elements.Wherein, which can set Set between telescopic mounting 102 and seal face 101, can also be arranged telescopic device and seal body 103 Stamp handle it Between, alternatively, can also be arranged in any position of telescopic mounting 102, the pressure for detecting user to seal body 103;Separately Outside, which can also be arranged the 110 place planes in the top of the Stamp handle of seal body 103, i.e. Fig. 2 Any position, for user by pressing the top of seal 10, pressure sensor 140 can collect pressure signal.
As another example, after user begins to use seal 10, in some cases, the user is in adjacent lid twice The time interval of chapter can be long, within this longer interval time, in order to avoid the seal 10 is abused by illegal user, carries The safety that the high seal 10 uses can first close the seal of the seal 10 lock 130.In this case, the processing of seal 10 Device 120 is in addition to will limit the access times of seal 10 this time of user, it is also necessary to which monitoring is every time using after seal 10 Without the operating time.
Processor 120 need by record seal 10 access times, judge seal 10 access times whether When reaching preset mandate number, before the access times of seal 10 do not reach preset mandate number, to default without operation Time is monitored.Specifically, the seal 10 is other than including pressure sensor 140, it is also necessary to including:Timer 150.Meter When device 150 be located in seal body 103.The timer 150 timing since user is affixed one's seal using the seal 10 every time, to lid next time Chapter terminates, it is adjacent affix one's seal twice between without the operating time, as before the timing time once affixed one's seal.
Specifically, it is allowed to use the print twice adjacent in the sub-authorization firstly, it is necessary to pre-set the user The longest interval time of chapter 10 is denoted as default without the operating time.Then, processor 120 is after seal 10 is affixed one's seal every time, triggering meter When device 150 timing is carried out without the operating time to seal 10, once the timing time of the timer 150 reach it is default without operation Time, then, processor 120 judge that the seal 10 meets closedown condition.
For example, in a sub-authorization, preset mandate number is 5 times, and it is 20 minutes to preset without the operating time.User is in body After part certification passes through, affixed one's seal using seal 10, when the access times that pressure sensor 140 records are 3 times, timer 150 affix one's seal since the 3rd time after timing, when the timing time of timer 150 reaches 20 minutes, reach it is default without operation when Between, the progress of seal 10 the 4th has not been used and affixes one's seal, then, processor 120 thinks that the seal 10 meets closedown condition at this time.
In addition, in order to allow user to can make full use of the permission in every sub-authorization, and save the application and examination & approval of seal Flow, when seal 10 because the timing time of timer 150 reaches the default when of closing without the operating time, user can again into Row authentication uses remaining number in preset mandate number.
In this case, when the authentication of user by when, processor 120 detect seal 10 access times whether arrive Up to preset mandate number, when not reaching preset mandate number, which sends to open to seal lock 130 refers to It enables, the seal 10 is reused for user.At this time, it may be necessary to which the pressure sensor 140 of the seal 10 records the seal 10 again Access times.Until the access times of the seal 10 reach preset mandate number, alternatively, when use for seal 10 is secondary Number does not reach preset mandate number, and the timing time of timer 150 reaches and presets usage time, and processor 120 is again Secondary control seal lock 130 is closed, and when carrying out authentication again, licenses number since access times reach, i.e., Make certification that will not be opened by seal lock.
In specific implementation, in order to allow user to be better understood by the service condition of seal 10, which further includes:Display Device 160.The display 160 can specifically be located at side or the seal body of the Stamp handle of the seal body 103 of the seal 10 The unused number of 103 other positions, the access times for showing seal 10, or display seal 10.
Wherein, the access times of seal 10, generally since 0, user is often once affixed one's seal using the seal 10, should The access times of seal 10 will add one, and so on.For example, user uses the seal, after authentication passes through, the print for the first time " access times can be shown on the display 160 of chapter 10:0 ", when user uses one chapter of the seal lid on text document Afterwards, " access times can be shown on the display 160 of the seal 10:1 ", and so on, until reaching preset mandate time Until number.
The access times for the seal 10 that the unused number of seal 10, which refers to the user, can use, but have not been used. Specifically by the difference of preset mandate number and the access times of the current seal 10, it is denoted as that number is not used.Generally from default Mandate number start, user is often once affixed one's seal using the seal 10, and the unused number of the seal 10 will subtract one, with this Analogize.For example, user uses the seal for the first time, after authentication passes through, can be shown " not on the display 160 of the seal 10 Access times:5 ", it can be with after user uses one chapter of seal lid on text document, on the display 160 of the seal 10 " number is not used in display:4 ", and so on, until " number is not used in display:Until 0 ".
It is understood that processor 120 is in addition to can be by the access times of the seal 10 and/or the seal 10 Unused number is sent to outside the display 160 shown, can also show the user's when user carries out authentication Identity authentication result;The on off state etc. that can also show the seal lock 130 of seal 10, provides more seals 10 to the user Relevant information promotes the interactive experience of user and the seal 10.
In some implementations, in order to enable the seal 10 to be interacted with extraneous other equipment, the seal 10 Further include:Communicator 170.The communicator 170 can be established by internet 30 between seal 10 and control of stamping server 20 Data connection, it is ensured that processor 120 in the seal 10 carries out data interaction with control of stamping server 20.
Wherein, control of stamping server 20 is a server for managing seal 10, on the one hand, user can be at this Application uses seal 10 on control of stamping server 20, also, applies after being authorized by control of stamping server 20, the control of stamping The authorization message of the user can be sent to seal 10 by server 20 by network 30;Authorization message herein with it is mentioned above Authorization message is consistent, and which is not described herein again.On the other hand, which can be sent with real-time reception seal 10 Some information facilitate the control of stamping server 20 to monitor 10 behaviour in service of seal in real time.
As an example, in order to allow the seal 10 the owner or manager more understand the seal 10 specifically at which It is used in a file, to be monitored to the authority of office use occasion of the seal 10.The seal 10 further includes:Scanner 180. Specifically, the scanner 180 can be a small-sized camera;As shown in Fig. 2, the scanner 180 may be mounted at the print On the seal body 103 of chapter 10;In the inside of seal 10, which is connected with processor 120.
User can be before being affixed one's seal, first using seal 10, which scans the target that seal 10 is used The information of object.Then, which can be sent to processor 120 by the information of target object;Then, processor 120 After receiving the information of target object of the transmission of scanner 180, the information of the target object is sent to by communicator 170 Control of stamping server.So as to judge the seal 10 use whether it is legal, to be monitored to the use of seal 10.
Wherein, target object refers to the file that the user is affixed one's seal using seal 10, then, the information of target object, Content in the file as affixed one's seal.Specifically, using the scanner 180 of seal 10, in the file that will be affixed one's seal Appearance is scanned, and scanning result is sent to processor 120, which is sent to by processor 120 by communicator 170 Control of stamping server, to judge whether the file that the seal 10 is affixed one's seal is legal, if it is, without processing;Such as Fruit is no, then sends out code to seal 10 by the control of stamping server, and the seal lock 130 of instruction seal 10 is closed, and This goes out warning in display 160.Furthermore, it is possible to trace the user by the control of stamping system, correlation is made in accordance with the law and is punished.
In an example, in order to monitor the geographical location that the seal 10 is used, if it is consistent with authorized address, So that whether the use for understanding the seal 10 is legal, the seal 10 further includes:Locator 190.As shown in Fig. 2, the scanner 180 may be mounted at the inside of seal 10, and locator 190 is connected with processor 120.
In specific implementation, in seal 10 by use, locator 190 can obtain the location of seal 10 information, And the location information is sent to processor 120;The location information that processor 120 will receive, by communicator 170 by the position Confidence breath is sent to control of stamping server.So that seal 10 judges whether the location information is legal, so as to making to seal 10 With being monitored.If it is, without processing;It is closed if it is not, then being sent to seal 10 by the control of stamping server The seal lock 130 of instruction, instruction seal 10 is closed, and this goes out warning in display 160.Furthermore, it is possible to pass through the seal pipe Reason system traces the user, makes correlation in accordance with the law and punishes.
As an example, in order to allow what control of stamping server can further appreciate that the seal 10 to be actually used feelings Condition, the processor 120, by the currently practical access times of the seal 10, can also pass through communication after seal 10 is returned Device 17 is sent to control of stamping server, so as to the control of stamping server, is not reached in the access times for judging the user When to preset mandate number, it is desirable that user submits the reasons why " access times are not up to preset mandate number ".
In addition, the seal 10 further includes power supply 105, for being the power supply for electrical equipment on the seal 10.It is implementing When, in some realization methods, which can be powered with right and wrong charge power supply, such as lithium battery for the seal 10;Other In realization method, which can also be charge power supply, then, need to configure charging on the seal body 103 of the seal 10 Mouthful, such as USB charging interface, for charging for the charge power supply of the seal 10.The concrete form of power supply on seal 10, It is not especially limited in the present invention.
Seal 10 provided in this embodiment can realize the data between control of stamping server by communicator 170 Management of the control of stamping server to seal 10 is realized in interaction;Can by the data of pressure sensor 140 and timer 150, Control by processor 120 to the on off state of the seal lock 130 of seal 10;User can be allowed to know this by display 160 The case where seal 10 is used promotes user experience;It can be realized to seal 10 by scanner 180 and locator 190 Positioning and the monitoring to 10 use occasion of seal, that is, monitor the seal 10 where, used in which file, it is convenient should Monitoring of the manager or the owner of seal to its authority of office.
Therefore, in technical solution provided by the invention, seal 10 can be authenticated by identity, and integrate thereon Various modules effectively avoid disabled user to the use of the seal 10, improve the safety that seal 10 uses.
Embodiment two
It is described in detail using the structure and operation principle of system to seal provided in this embodiment with reference to Fig. 3.
Referring to Fig. 3, the schematic diagram of system is used for seal provided in an embodiment of the present invention.
The seal other than including seal 10, further includes using system:Control of stamping server 20, the seal in the system 10 and control of stamping server 20 pass through network 30 carry out data interaction.
Wherein, control of stamping server 20 by authorization message and authorizes number after authorizing the user to use seal 10 It is sent to seal 10;Also, the information for the target object that the seal 10 that seal 10 is sent is used is received, the position residing for seal 10 Any one or more information in the actual access times of confidence breath and seal 10.
Foregoing description is the use process of seal 10, wherein the specific implementation of seal 10 may refer to embodiment one In description, which is not described herein again.
Seal provided in an embodiment of the present invention uses system, since the seal is using including a kind of safe to use in system The high seal 10 of property, therefore, which can be provided safe and reliable using system for the owner of seal 10 or manager It ensures, and then ensures that the seal uses the safety of system.
Embodiment three
The embodiment of the present invention additionally provides a kind of seal application method, is seal provided in an embodiment of the present invention referring to Fig. 4 The flow chart of application method.This method includes:
Step 401, authentication information input 110 receives authentication information input by user;
Step 402, processing 120 carries out authentication according to authentication information to user;
Step 403, when authentication information is matched with authorization message, the authentication of user is passed through, handles 120 to seal Lock 130 sends open command, and control seal lock 130 is opened, to expose seal face 101.
Optionally, this method further includes:
When seal lock 130 is opened, and meets closedown condition, processor 120 sends out code to seal lock 130, It controls seal lock 130 to close, to hide seal face 101.
Optionally, this method further includes:
Processor 120 records the access times of seal 10 by pressure sensor 140, when the access times of seal 10 When reaching preset mandate number, meet closedown condition.
Optionally, this method further includes:
Before the access times of seal 10 do not reach preset mandate number, processor 120 obtains the meter of timer 150 When the time, when the timing time of timer 150 reach it is default without the operating time when, meet closedown condition.
Optionally, this method further includes:
When to the authentication of user by when, processor 120 detect seal 10 access times whether reach it is default Mandate number, when not reaching preset mandate number, to seal lock 130 send open commands.
Optionally, this method further includes:
Display 160 shows the access times of seal 10, or the unused number of display seal 10.
Optionally, authentication information loader 110 includes Fingerprint Identification Unit, and authentication information loader 110 receives user's input Authentication information include:Fingerprint Identification Unit receives the fingerprint of user.
Optionally, authentication information loader 110 includes PIN PAD, and authentication information loader 110 receives user's input Authentication information include:PIN PAD receives the password of number input by user and/or character composition.
Optionally, this method further includes:
Processor 120 carries out data interaction by communicator 170 and control of stamping server 20.
Optionally, this method further includes:
Scanner 180 scans the information for the target object that seal 10 is used;
The information of target object is sent to control of stamping server 20 by processor 120 by communicator 1700.
Optionally, this method further includes:
Information the location of when the acquisition seal 10 of locator 190 is used;
Location information is sent to control of stamping server 20 by processor 120 by communicator 170.
Optionally, this method further includes:
After seal 10 is returned, processor 120 is sent the actual access times of seal 10 by communicator 170 To control of stamping server 20.
Foregoing description is the application method of seal 10, wherein the specific implementation of seal 10 may refer to embodiment one In description, which is not described herein again.
Seal application method provided in an embodiment of the present invention, since the seal in the seal application method is a kind of safety High seal 10, therefore, which provides more safe and reliable operational support for the use of seal 10, in turn Ensure the owner of the seal 10 or the information security of manager.
Application scenarios embodiment
After describing seal application method provided in an embodiment of the present invention, clearly illustrate that the present invention carries in order to more The seal of confession, seal uses system and seal application method, below with a concrete scene, from the angle introduction of signal interaction The method that seal uses.
It is the signaling process figure of the application scenarios embodiment of the application method of seal 10 provided by the invention referring to Fig. 5.Tool When body is realized, the application method of the seal 10 includes:
Step 501, user sends application information to control of stamping server 20, and application uses seal 10.
Step 502, after control of stamping server 20 receives the application information that user sends, application information is analyzed And processing, decide whether to authorize, if authorized, thens follow the steps 503;Otherwise, inform that user applies for quilt in the form of short message etc. It rejects, and rejected reason.
Step 503, control of stamping server 20 obtains the corresponding mandate letter of the user identifier by the mark of the user Breath, and according to application information, determine preset mandate number and default without the operating time.
Wherein, the correspondence of user identifier and authorization message, the authorization message are stored in control of stamping server 20 Including fingerprint and password.
Step 504, control of stamping server 20 is by the authorization message of the user, preset mandate number and default without behaviour It is sent to seal 10 as the time.
Step 505, seal 10 by the information storage received in the seal 10.
Step 506, user want use the seal 10, in the authentication information loader 110 of seal 10 respectively input with The fingerprint and preset password that authorization message matches, as authentication information.
Step 507, the authentication information of user's typing is sent to processor 120 by authentication information loader 110, the processor 120 couples of users carry out authentication, that is, judge whether authentication information input by user matches with the authorization message of storage, if Match, it is determined that the authentication of the user passes through, and control seal lock 130 is opened, and the pop-up of seal face is covered using seal 10 Chapter;Otherwise, authenticating user identification failure can be notified by forms such as the display 160 of seal 10 or short messages.
In specific implementation, can generally there are the default maximum times for allowing authentification failure, if it is less than the default maximum Number then can notify user to re-type authentification of message information by display 160 or other modes;If it exceeds this is pre- If maximum times, then the processor 120 of the seal 10 can send a warning message to user and control of stamping server 20, prompt There may be problems for seal 10.
After seal lock 130 is opened, the seal face of seal 10 is popped up, and can be covered target object using the seal 10 Chapter, and record the number of affixing one's seal of seal 10.This content is described in detail in above-described embodiment, and the description with reference to examples detailed above is Can, which is not described herein again.
Step 508, scanner 180 scans the information of target object, and is sent to processor 120.
Step 509, the information of target object is sent to control of stamping by the processor 120 of seal 10 by communicator 170 Server 20.
It should be noted that after information of the control of stamping server 20 according to the target object received, it can be determined that should Whether the information of target object is legal, if it find that it is illegal, then it is sent at once to the processor 120 of seal 10 by internet Control instruction indicates that the processor 120 of the seal, control seal lock 130 are closed, be abused to avoid seal 10.
Step 510, locator 190 positions the location information that the seal 10 is presently in, and is sent to processor 120.
Step 511, the location of the seal 10 information is sent to control of stamping clothes by seal 10 by communicator 170 Business device 20.
It should be noted that after the location information that control of stamping server 20 receives, it can be determined that the location information is It is no legal, if it find that it is illegal, then control instruction is sent to the processor 120 of seal 10 by internet at once, instruction should The processor 120 of seal, control seal lock 130 are closed, are abused to avoid seal 10.
Step 512, the processor 120 of seal 10 is sentenced according to pressure sensor 140 and the feedback of timer 150 Whether the disconnected seal 10 meets the condition of closing.
Concrete condition is respectively:On the one hand, which records the use of seal 10 by pressure sensor 140 Number meets closedown condition when the access times of seal 10 reach preset mandate number.
On the other hand, before the access times of seal 10 do not reach preset mandate number, processor 120 obtains timing The timing time of device 150 meets closedown condition when the timing time of timer 150, which reaches, to be preset without the operating time.
In another aspect, closed without the operating time when seal 10 because the timing time of timer 150 reaches to preset, rather than It being closed because the access times of seal 10 reach preset mandate number, then user can carry out authentication again, when Authentication by when, whether the access times that processor 120 detects seal 10 reach preset mandate number, when not arriving When up to preset mandate number, open command is sent to seal lock 130, until the access times of user reach preset mandate Number, alternatively, being preset without the operating time until the timing time of the timer 150 of user reaches.
Step 513, when the judgement of processor 120, the user meets closedown condition to the use of seal 10, then, processor 120 send out code to seal lock 130, and instruction seal lock 130 is closed.
Step 514, the processor 120 of seal 10 indicates that user gives back seal 10, and enterprising in control of stamping server 20 Row logs in.
Step 515, the processor 120 of seal 10 to control of stamping server 20 send seal it is actual use it is secondary Number.
Step 516, control of stamping server 20 is according to 10 feedack of seal, when the access times of seal are not up to When preset mandate number, it is desirable that user fills in " access times are not up to preset mandate number " reason.
In the present embodiment, seal 10 can realize the data between control of stamping server 20 by communicator 170 Management of the control of stamping server 20 to seal 10 is realized in interaction;Seal 10 can also pass through pressure sensor 140 and timer 150 data, the control by processor 120 to the on off state of the seal lock 130 of seal 10;Seal 10 can pass through display 160, it allows user to know the case where seal 10 is used, promotes user experience;Scanner 180 and locator can be passed through 190, realize monitoring to the positioning of seal 10 and to 10 use occasion of seal, that is, monitor the seal 10 where, which It is used in file, facilitates the monitoring of the manager or the owner of the seal to its authority of office.
Therefore, in the technical solution of seal application method provided in this embodiment, seal 10 by the identity to user into Row certification, and various modules integrated thereon, the intelligent monitoring and control seal 10 effectively avoid disabled user to this The use of seal 10 and legal authorized user improve the safety that seal 10 uses to its abuse.
It should be noted that the present invention above-mentioned all embodiments in, seal 10 to the authentication of user be by What the processor 120 in seal 10 was completed, this is a kind of realization method of the present invention.It is realized as another kind, seal 10 Authentication can also be completed by control of stamping server 20.Specifically, after seal 10 receives the authentication information of user, also The authentication information can be sent to control of stamping server 20 by communicator 170, by control of stamping server 20 by certification Information is compared with the authorization message of the user, when authentication information matches with authorization message, control of stamping server 20 Unlocking instruction is generated, and unlocking instruction is sent to seal 10.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, without departing from the principle of the present invention, it can also make several improvements and retouch, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (21)

1. a kind of seal, which is characterized in that the seal includes:
Authentication information loader, processor and seal lock;
The authentication information loader, receives authentication information input by user, and the authentication information is sent to the processor;
The processor carries out authentication according to the authentication information to the user, when the authentication information and mandate are believed When breath matching, the authentication of the user is passed through, is locked to the seal and sends open command;
The seal lock, is opened according to the open command, to expose seal face.
2. seal according to claim 1, which is characterized in that
The processor is locked to the seal when the seal locks unlatching, and meets closedown condition and sends out code;
The seal lock, is closed according to the out code, to hide the seal face.
3. seal according to claim 2, which is characterized in that the seal further includes:
Pressure sensor;
The processor records the access times of the seal by the pressure sensor, when the use of the seal When number reaches preset mandate number, meet the closedown condition.
4. seal according to claim 3, which is characterized in that the seal further includes:
Timer;
The processor, when the access times of the seal do not reach preset mandate number, and the timer When timing time arrival was preset without the operating time, meet the closedown condition.
5. seal according to claim 4, which is characterized in that
The processor, when to the authentication of the user by when, whether the access times for detecting the seal reach Preset mandate number is locked to the seal when not reaching preset mandate number and sends open command.
6. according to the seal described in claim 3-5 any one, which is characterized in that the seal further includes:
Display shows the access times of the seal, or the unused number of the display seal.
7. according to the seal described in claim 1-6 any one, which is characterized in that the seal further includes:
Communicator, the processor carry out data interaction by the communicator and control of stamping server.
8. seal according to claim 7, which is characterized in that the seal further includes:
Scanner scans the information for the target object that the seal is used, and the information of the target object is sent to described Processor;
The information of the target object is sent to control of stamping server by the processor by the communicator.
9. seal according to claim 7, which is characterized in that the seal further includes:
Locator the location of obtains when the seal is used information, the location information is sent to the processor;
The location information is sent to control of stamping server by the processor by the communicator.
10. seal according to claim 7, which is characterized in that the seal further includes:
The processor, after the seal is returned, by the communicator by the actual access times of the seal It is sent to control of stamping server.
11. a kind of seal uses system, which is characterized in that the system comprises:
Seal described in claim 7-10 any one and control of stamping server, the seal and the control of stamping Server carries out data interaction by network;
The control of stamping server by authorization message and authorizes number to send after authorizing the user to use the seal To the seal;Also, the information for the target object that the seal that the seal is sent is used is received, residing for the seal Location information and the seal actual access times in any one or more.
12. a kind of seal application method, which is characterized in that the method includes:
Authentication information loader receives authentication information input by user;
Processor carries out authentication according to the authentication information to the user;
When the authentication information is matched with authorization message, the authentication of the user is passed through, processor is locked to seal to be sent out Open command is sent, the seal lock is controlled and opens, to expose seal face.
13. according to the method for claim 12, which is characterized in that the method further includes:
When locking and open when the seal, and meeting closedown condition, the processor is locked to the seal and sends out code, It controls the seal lock to close, to hide the seal face.
14. according to the method for claim 13, which is characterized in that the method further includes:
The processor records the access times of the seal by pressure sensor, when the access times of the seal arrive When up to preset mandate number, meet the closedown condition.
15. according to the method for claim 13, which is characterized in that the method further includes:
Before the access times of the seal do not reach preset mandate number, when the processor obtains the timing of timer Between, when the timing time of timer, which reaches, to be preset without the operating time, meet the closedown condition.
16. according to the method for claim 15, which is characterized in that the method further includes:
When to the authentication of the user by when, the processor detect the seal access times whether reach it is pre- If mandate number, when not reaching preset mandate number, to the seal lock send open command.
17. according to the method described in claim 14-16 any one, which is characterized in that the method further includes:
Display shows the access times of the seal, or the unused number of the display seal.
18. according to the method described in claim 12-17 any one, which is characterized in that the method further includes:
The processor carries out data interaction by the communicator and control of stamping server.
19. according to the method for claim 18, which is characterized in that the method further includes:
Scanner scans the information for the target object that the seal is used;
The information of the target object is sent to control of stamping server by the processor by the communicator.
20. according to claim 18 the method, which is characterized in that the method further includes:
Information the location of when the locator acquisition seal is used;
The location information is sent to control of stamping server by the processor by the communicator.
21. according to the method for claim 18, which is characterized in that the method further includes:
After the seal is returned, the processor is sent out the actual access times of the seal by the communicator It send to control of stamping server.
CN201810195868.XA 2018-03-09 2018-03-09 A kind of seal, seal application method and seal use system Pending CN108340691A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810195868.XA CN108340691A (en) 2018-03-09 2018-03-09 A kind of seal, seal application method and seal use system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810195868.XA CN108340691A (en) 2018-03-09 2018-03-09 A kind of seal, seal application method and seal use system

Publications (1)

Publication Number Publication Date
CN108340691A true CN108340691A (en) 2018-07-31

Family

ID=62958003

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810195868.XA Pending CN108340691A (en) 2018-03-09 2018-03-09 A kind of seal, seal application method and seal use system

Country Status (1)

Country Link
CN (1) CN108340691A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108995410A (en) * 2018-08-27 2018-12-14 武汉矽感科技有限公司 A kind of seal and its impress control method and system based on narrowband Internet of Things
CN109159557A (en) * 2018-08-01 2019-01-08 福州智闽科技有限公司 A kind of the Internet of Things wire mark control instrument implementation method and device of band scanning
CN109318612A (en) * 2018-09-25 2019-02-12 平安科技(深圳)有限公司 A kind of method for anti-counterfeit of seal, device and intelligent seal
CN109334283A (en) * 2018-09-17 2019-02-15 平安科技(深圳)有限公司 A kind of method for anti-counterfeit of seal, device and intelligent seal
CN109544818A (en) * 2018-11-08 2019-03-29 深圳市新群欣实业有限公司 A kind of official seal management method and system
CN111275864A (en) * 2020-03-20 2020-06-12 慧章信息科技(上海)有限公司 Seal with fingerprint unblock
CN111923619A (en) * 2020-07-22 2020-11-13 邵阳市中心医院 Official seal supervision operating system and official seal supervision operating cabinet
CN112905725A (en) * 2021-01-28 2021-06-04 王仲楷 Internet big data information processing system
CN113071231A (en) * 2020-01-06 2021-07-06 无疆(青岛)高新科技有限公司 Intelligent seal and use method thereof
CN114312068A (en) * 2022-01-13 2022-04-12 北京鸿游科技有限公司 Seal management device
CN114819438A (en) * 2021-01-27 2022-07-29 邓学胜 Intelligent seal management method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005173810A (en) * 2003-12-09 2005-06-30 Fuji Xerox Co Ltd Electronic seal system and method therefor
CN104156809A (en) * 2014-07-31 2014-11-19 王东 Intelligent stamp protection control device and stamp management system
CN204719806U (en) * 2015-06-12 2015-10-21 娲石水泥集团武汉万世科技有限公司 A kind of intelligent official seal
CN106056313A (en) * 2016-06-30 2016-10-26 江西省硕果投资管理有限公司 Stamp information control method and system, and stamp
CN107128088A (en) * 2017-03-27 2017-09-05 武汉矽感科技有限公司 The safe verification method and seal of seal
CN207059529U (en) * 2017-08-04 2018-03-02 福建强闽信息科技有限公司 A kind of arrowband Internet of Things intelligence seal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005173810A (en) * 2003-12-09 2005-06-30 Fuji Xerox Co Ltd Electronic seal system and method therefor
CN104156809A (en) * 2014-07-31 2014-11-19 王东 Intelligent stamp protection control device and stamp management system
CN204719806U (en) * 2015-06-12 2015-10-21 娲石水泥集团武汉万世科技有限公司 A kind of intelligent official seal
CN106056313A (en) * 2016-06-30 2016-10-26 江西省硕果投资管理有限公司 Stamp information control method and system, and stamp
CN107128088A (en) * 2017-03-27 2017-09-05 武汉矽感科技有限公司 The safe verification method and seal of seal
CN207059529U (en) * 2017-08-04 2018-03-02 福建强闽信息科技有限公司 A kind of arrowband Internet of Things intelligence seal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
梁川;李志蜀;史云宾;李琰;: "交通稽征业务指纹认证电子报批系统" *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109159557A (en) * 2018-08-01 2019-01-08 福州智闽科技有限公司 A kind of the Internet of Things wire mark control instrument implementation method and device of band scanning
CN109159557B (en) * 2018-08-01 2020-04-10 福州智闽科技有限公司 Method and device for realizing Internet of things screen printing control instrument with scanning function
CN108995410A (en) * 2018-08-27 2018-12-14 武汉矽感科技有限公司 A kind of seal and its impress control method and system based on narrowband Internet of Things
CN109334283A (en) * 2018-09-17 2019-02-15 平安科技(深圳)有限公司 A kind of method for anti-counterfeit of seal, device and intelligent seal
CN109334283B (en) * 2018-09-17 2022-01-28 平安科技(深圳)有限公司 Anti-counterfeiting method and device for seal and intelligent seal
CN109318612A (en) * 2018-09-25 2019-02-12 平安科技(深圳)有限公司 A kind of method for anti-counterfeit of seal, device and intelligent seal
CN109544818A (en) * 2018-11-08 2019-03-29 深圳市新群欣实业有限公司 A kind of official seal management method and system
CN113071231A (en) * 2020-01-06 2021-07-06 无疆(青岛)高新科技有限公司 Intelligent seal and use method thereof
CN113071231B (en) * 2020-01-06 2024-02-23 青岛无疆技术有限公司 Intelligent seal and application method thereof
CN111275864A (en) * 2020-03-20 2020-06-12 慧章信息科技(上海)有限公司 Seal with fingerprint unblock
CN111923619A (en) * 2020-07-22 2020-11-13 邵阳市中心医院 Official seal supervision operating system and official seal supervision operating cabinet
CN114819438A (en) * 2021-01-27 2022-07-29 邓学胜 Intelligent seal management method
CN112905725A (en) * 2021-01-28 2021-06-04 王仲楷 Internet big data information processing system
CN112905725B (en) * 2021-01-28 2023-12-05 深圳市易行网数字科技有限公司 Internet big data information processing system
CN114312068A (en) * 2022-01-13 2022-04-12 北京鸿游科技有限公司 Seal management device

Similar Documents

Publication Publication Date Title
CN108340691A (en) A kind of seal, seal application method and seal use system
US7907753B2 (en) Access control system with symbol recognition
WO2011062364A2 (en) User authentication system, user authentication apparatus, smart card, and user authentication method for ubiquitous authentication management
CN105761347B (en) The electric system Special anti-theft electromagnetism lock system verified based on two dimensional code and GPS
CN108830502A (en) A kind of seal system
CN108712389B (en) Intelligent lock system
CN105447931B (en) The methods, devices and systems of gate inhibition's remote authorization
CN103295341A (en) POS (point-of-sales) safety certification device, POS safety certification system and POS device safety certification method
CN105701885A (en) Face identification access control system and implementation method thereof
CN106097492A (en) A kind of gate inhibition's access control method and gate control system
CN205959237U (en) Long -range mandate affix with seal device and system
Olaniyi et al. Design of secure electronic voting system using fingerprint biometrics and crypto-watermarking approach
CN110164012A (en) A kind of community's access control system and working method thereof
CN110688643A (en) Processing method for platform identity identification and authority authentication
CN105913513A (en) Control method and system for door lock system
CN110599653B (en) Access control unlocking method, device and storage medium
CN109741509A (en) A kind of the face access control system and information authentication method of double authentication
CN106572082A (en) Approval signature verifying method, mobile device, terminal device and system
CN106650361A (en) Unblocking method and device
CN109334283A (en) A kind of method for anti-counterfeit of seal, device and intelligent seal
CN113971849A (en) Dynamic coded lock with management system
CN108230525A (en) Access control management method and gate inhibition management apparatus
CN112511484A (en) U shield safety control management system
CN109064675A (en) Luggage Deposit verification method, device and intelligent inbox
CN108206832A (en) Access control system and management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180731