CN109685483A - Key management system and key management method - Google Patents
Key management system and key management method Download PDFInfo
- Publication number
- CN109685483A CN109685483A CN201910098141.4A CN201910098141A CN109685483A CN 109685483 A CN109685483 A CN 109685483A CN 201910098141 A CN201910098141 A CN 201910098141A CN 109685483 A CN109685483 A CN 109685483A
- Authority
- CN
- China
- Prior art keywords
- key
- chain
- key chain
- information
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000007726 management method Methods 0.000 title claims abstract description 222
- 230000006870 function Effects 0.000 claims description 61
- 238000000034 method Methods 0.000 claims description 47
- 238000004590 computer program Methods 0.000 claims description 37
- 230000033001 locomotion Effects 0.000 claims description 27
- 238000004891 communication Methods 0.000 claims description 25
- 239000000284 extract Substances 0.000 claims description 8
- 238000001514 detection method Methods 0.000 claims description 5
- 238000012545 processing Methods 0.000 claims description 5
- 230000001960 triggered effect Effects 0.000 claims description 4
- 238000012360 testing method Methods 0.000 claims description 2
- 238000005516 engineering process Methods 0.000 abstract description 5
- 238000010586 diagram Methods 0.000 description 24
- 230000008569 process Effects 0.000 description 17
- 230000005540 biological transmission Effects 0.000 description 6
- 230000008901 benefit Effects 0.000 description 5
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000007306 turnover Effects 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000007123 defense Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/16—Real estate
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0645—Rental transactions; Leasing transactions
Landscapes
- Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Engineering & Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Economics (AREA)
- Marketing (AREA)
- Entrepreneurship & Innovation (AREA)
- General Business, Economics & Management (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Data Mining & Analysis (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Lock And Its Accessories (AREA)
Abstract
The embodiment of the present invention is suitable for information technology field, provides a kind of key management system and key management method, including key locker, key chain, key management platform and terminal device.Wherein, key management platform is examined for receiving application to key, and approval results information is sent to terminal device and key locker;Key locker is received request to key chain and is verified for receiving approval results information, and according to agreeing to receive information, if being verified, pop-up with agree to receive the key chain that information matches;Key chain is used for after leaving key locker, and the location information of itself is fed back to key management platform, and after receiving key and receiving request and be verified, pops up at least key being placed in key chain.The present embodiment can eliminate the human factor during key management by being intelligently managed to key to greatest extent, reduce the fault of key management, promote the efficiency of management.
Description
Technical field
The invention belongs to information technology fields, more particularly to a kind of key management system, a kind of key management method, one
Kind terminal device, a kind of key locker, a kind of key chain, a kind of key management platform and a kind of computer readable storage medium.
Background technique
The occasion managed concentratedly is needed in key, for example, second-hand house transaction and houses leasing market, owner would generally be by rooms
Room key is placed at intermediary, facilitates intermediary personnel that house purchaser or tenant scene is led to see room.Intermediary due to flow of personnel is big,
Heavy traffic, it is easy to the problems such as key loss occur or being replicated can thus bring huge property loss to owner,
Even influence the personal safety of owner.
Currently, there are the scheme and process of a set of key management in intermediary company substantially, but this way to manage is established
On basis by the implementation capacity of people, it cannot accomplish objective, intelligentized management for key.Due to the key of intermediary company
A possibility that spoon management system is the system of a set of management process based on " people ", is made a fault is larger, inefficient.Meanwhile
Key is often lack of standardization due to management as a kind of important daily management object, out the case where active, this agency
It is all an important loss for company or owner.Also, existing key management method, cannot timely feedback key
Position and use state cause turnover rate of the key in intermediate business active procedure not high, reduce the work of intermediary personnel
Efficiency.
In addition, the key of multiple communication base stations in a certain region can be collected to a fixed place in the communications field
It is managed concentratedly, similarly, in power domain and national defence etc., some region of multiple electric power facilities or national defense facility
Key can also be collected to a fixed place and be managed concentratedly.And in above-mentioned field, the management of key is still based on
The system of the management process of " people " similarly also will appear the fault in management process.
With the development of Internet of Things, many new and high technologies all promote traditional industries upgrading, improve efficiency, saved at
This, obtains good Social benefit and economic benefit.Therefore, the field also highly desirable progress for needing to manage concentratedly in key
Industrial upgrading promotes working efficiency and customer satisfaction using more intelligent key management method, saves management cost.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of key management system and key management method, it is existing to solve
Key management low efficiency and the problem of be easily lost in technology.
The first aspect of the embodiment of the present invention provides a kind of key management system, including key management equipment, key pipe
Platform and terminal device, the key management equipment include key locker and key chain, and positioning function is configured in the key chain
Energy and communication function;Wherein,
Key management platform receives application for receiving key, and after receiving application to the key and examining, will
Approval results information is sent to terminal device and key locker, and the approval results information includes agreeing to receive information;
Key locker, the approval results information sent for receiving the key management platform, and receiving terminal device
After the key chain of submission receives request, receives information according to the agreement request is received to the key chain and verify, if testing
Card passes through, then pop-up receives the key chain that information matches with the agreement;
Key chain, for being put down based on the positioning function and communication function to the key management after leaving key locker
Platform feeds back the location information of itself, and after the key for receiving terminal device submission is received request and is verified, pop-up is put
At least key being placed in the key chain;
Terminal device receives the key management platform for submitting key to receive application to the key management platform
The approval results information of feedback receives information according to the agreement and submits key chain to receive request, Xiang Suoshu to the key locker
Key chain submits key to receive request.
The second aspect of the embodiment of the present invention provides a kind of key management method, is applied to terminal device, the method
Include:
Determine that key to be received, the key to be received have corresponding key ID, the key ID and a key
Detaining ID has corresponding relationship;
According to User ID and the key chain ID, generates key and receive application;
The key is received into application and is sent to key management platform;
The approval results information of the key management platform feedback is received, the approval results information includes agreeing to receive letter
Breath;
Receive information according to the agreement submits key chain to receive request to key locker, with indicate key locker pop-up and
The corresponding key chain of the key chain ID;
In the preset range of target position, Xiang Suoshu key chain submits key to receive request, to indicate the key chain
At least key being placed in the key chain is popped up, the target position is the position of the assets to match with the key
It sets.
The third aspect of the embodiment of the present invention provides a kind of key management method, is applied to key locker, the method packet
It includes:
It receives the agreement that key management platform is sent and receives information, it includes User ID and key in information that the agreement, which is received,
Detaining ID, the key chain ID and at least one key ID has corresponding relationship;
After the key chain for receiving terminal device submission receives request, extracts the key chain and receive the user in requesting
ID and key chain ID;
Verify that the key chain receives User ID in request and key chain ID and user in information is received in the agreement
Whether ID and key chain ID are identical;
If so, determining the corresponding key chain of the key chain ID, and the key chain is popped up from the key locker,
An at least key corresponding with the key ID is placed in the key chain.
The fourth aspect of the embodiment of the present invention provides a kind of key management method, is applied to key chain, the key chain
In be configured with positioning function and communication function, which comprises
Whether detection key chain leaves key locker, and an at least key is placed in the key chain;
If whether the key chain leaves key locker, start positioning function, is based on the positioning function, acquisition is worked as in real time
Preceding location information;
Based on the communication function, the location information is sent to key management platform according to default frequency;
Receive terminal device submission key receive request after, according to the key receive request in User ID and
Key chain ID pops up at least key being placed in the key chain.
5th aspect of the embodiment of the present invention provides a kind of key management method, is applied to key management platform, described
Method includes:
The key that receiving terminal apparatus is sent receives apply, and the key is received in application including User ID and key ID,
A key ID and key chain ID has corresponding relationship;
Application is received to the key according to the User ID and key chain ID to examine, and generates approval results information;
The approval results information is sent to terminal device and key locker;
After the location information for receiving key chain acquisition, according to the location information, the movement of the key chain is drawn
Track.
6th aspect of the embodiment of the present invention provides a kind of terminal device, including memory, processor and is stored in
In the memory and the computer program that can run on the processor, when the processor executes the computer program
The step of realizing above-mentioned key management method.
7th aspect of the embodiment of the present invention provides a kind of key locker, including memory, processor and is stored in institute
The computer program that can be run in memory and on the processor is stated, the processor executes real when the computer program
The step of existing above-mentioned key management method.
The eighth aspect of the embodiment of the present invention provides a kind of key chain, including memory, processor and is stored in institute
The computer program that can be run in memory and on the processor is stated, the processor executes real when the computer program
The step of existing above-mentioned key management method.
9th aspect of the embodiment of the present invention provides a kind of key management platform, including memory, processor and deposits
The computer program that can be run in the memory and on the processor is stored up, the processor executes the computer journey
The step of above-mentioned key management method is realized when sequence.
Tenth aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage
Media storage has the step of computer program, the computer program realizes above-mentioned key management method when being executed by processor.
Compared with prior art, the embodiment of the present invention includes following advantages:
The embodiment of the present invention can eliminate key management mistake by being intelligently managed to key to greatest extent
Human factor in journey reduces the fault of key management, promotes the efficiency of management;It, can be real-time by being positioned to key
The working condition for solving key, improves the utilization rate and turnover rate of key, promotes the efficiency of business activity, and then promote economic benefit
Promotion.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art
Needed in attached drawing be briefly described.It should be evident that the accompanying drawings in the following description is only of the invention some
Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these
Attached drawing obtains other attached drawings.
Fig. 1 is a kind of schematic diagram of key management system of one embodiment of the invention;
Fig. 2 is a kind of system architecture schematic diagram of key management system of one embodiment of the invention;
Fig. 3 is a kind of operation flow schematic diagram of key management system of one embodiment of the invention;
Fig. 4 is a kind of step flow diagram of key management method of one embodiment of the invention;
Fig. 5 is the step flow diagram of another key management method of one embodiment of the invention;
Fig. 6 is the step flow diagram of another key management method of one embodiment of the invention;
Fig. 7 is the step flow diagram of another key management method of one embodiment of the invention;
Fig. 8 is a kind of schematic diagram of key management device of one embodiment of the invention;
Fig. 9 is the schematic diagram of another key management device of one embodiment of the invention;
Figure 10 is the schematic diagram of another key management device of one embodiment of the invention;
Figure 11 is the schematic diagram of another key management device of one embodiment of the invention;
Figure 12 is a kind of schematic diagram of terminal device of one embodiment of the invention.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed
Body details, to understand thoroughly the embodiment of the present invention.It should be apparent, however, to those skilled in the art that there is no these specific thin
The present invention also may be implemented in the other embodiments of section.In other cases, it omits to well-known system, device, circuit
And the detailed description of method, in case unnecessary details interferes description of the invention.
Illustrate technical solution of the present invention below by specific embodiment.
Referring to Fig.1, a kind of schematic diagram of key management system of one embodiment of the invention is shown, the key management system
System may include key management equipment, key management platform and terminal device.Above-mentioned key management equipment includes key locker and key
Key ring, wherein positioning function and communication function are configured in key chain.
It should be noted that key management system provided in this embodiment can be used for any needing to be managed key
Scene in.For example, house property medium is managed the key in owner house, alternatively, telecommunications room administrative staff are to each machine
The key in room is managed, etc..The present embodiment is not construed as limiting the concrete application scene of this system.
In order to make it easy to understand, the present embodiment carries out subsequent introduction and explanation by taking the key management of house property medium as an example.It can
With understanding, the key management system in the present embodiment is also applied to the communications field, power domain, national defence etc. and needs
In the occasion to be managed concentratedly to key.
In embodiments of the present invention, key management platform can receive key and receive application, and receive application to key
After being examined, approval results information is generated, so that approval results information is sent to terminal device and key locker, above-mentioned examination & approval
Result information may include agreeing to that receiving information or refusal receives information.
It should be noted that key management platform can be a kind of server platform, which can pass through terminal device
At least one user interface is externally provided, platform administrator is allowed to pass through the corresponding affairs of the user interface process.
In the concrete realization, key receive application can be user (i.e. house property medium personnel) pass through terminal device initiate
's.It is anti-can also to receive key management platform other than for submitting key to receive application to key management platform for terminal device
The approval results information of feedback, according to agreeing to that receive information submits key chain to receive request to key locker, to key chain submission key
Receive request etc..Above-mentioned terminal device can be the mobile terminals such as mobile phone, tablet computer, be also possible to the equipment such as PC machine.?
In the present embodiment, uniformly takes the mobile phone as an example and carry out subsequent introduction.
In general, intermediary personnel when receiving key, can submit my information i.e. by the service-specific APP on mobile phone
User ID, and key ID to be received.
It is the key by key management platform in general, needing first to register the key in key centralized management
Key ID is distributed, is then placed it in some key chain, which also has a key chain ID.
Therefore, key management platform can receive key registration request, for key registration request, distribute key for key
ID establishes the corresponding relationship between key ID and the key chain ID of particular key key ring.Above-mentioned key registration request can be by key
Spoon administrative staff initiate.
Certainly, key management platform can also be responsible for handling key cancellation matters.For example, after certain set house is sold,
The key of the rent needs to nullify in key management platform.At this point, key management personnel can initiate the cancellation of the key
Request.
Therefore, in embodiments of the present invention, key management platform can be after receiving key de-registration request, for key
De-registration request, nullifies the key ID of the key, and nullifies the corresponding relationship between key ID and key chain ID, by key chain
The corresponding key chain of ID is set as blank state.Above-mentioned blank state, which can be understood as the key chain, can be used for placing other keys
Spoon.
Similar, key management platform can also handle the matters such as registration and the cancellation of user.
That is, key management platform can receive user's registration request, requested for user's registration, for user's distributing user
ID, and when receiving the instruction of logging off users ID, nullify above-mentioned User ID.
It should be noted that above-mentioned User ID, key ID and key chain ID should all be uniquely, between each other mutually
It does not repeat.
Due between key ID and key chain ID there is corresponding relationship can pass through key after establishing above-mentioned corresponding relationship
Key ring ID, which is realized, is managed collectively key chain and placement key therein.
Therefore, key management platform can extract the key and receive the use in applying after receiving upper key and receiving application
Family ID and key chain ID, and it is verified.
In verifying, whether key management platform, which can verify the User ID and have, receives key chain ID and corresponds to key
Permission, and verify key chain ID and correspond to whether key is placed in key locker.That is, key management platform can be with agency people
Whether whether member allows to receive the key and the key, which is not received by other intermediaries personnel currently, is verified.
If above-mentioned User ID have receive key chain ID correspond to the permission of key and key chain ID correspond to key placement
In key locker, then key management platform can generate according to User ID and key chain ID and agree to receive information, and will have agreed to lead
Terminal device and key locker are sent to information.
If above-mentioned User ID does not have and receives that key chain ID corresponds to the permission of key or key chain ID corresponds to key
It not being placed in key locker, then key management platform equally can generate refusal according to User ID and key chain ID and receive information,
And refusal is received into information and is sent to terminal device, inform that the current key of intermediary personnel can not be received.
In embodiments of the present invention, key locker is a kind of equipment for containing key button and key.In general, a key
May include having multiple key positions in case, a key chain can be placed in each key position, be placed in each key chain to
A few key.
Above-mentioned key locker can be connect with key management Platform communication, and can receive examining for key management platform transmission
Result information is criticized, to receive information pair according to above-mentioned agreement after the key chain for receiving terminal device submission receives request
The key chain is received request and is verified, if being verified, pop-up receives the key chain that information matches with agreement.
In embodiments of the present invention, the key chain that terminal device is submitted, which is received request and be can be, scans key locker by mobile phone
The two dimensional code or bar code generating of offer at, above-mentioned key chain receive request in can also carry User ID and key chain ID.
After the two dimensional code or bar code that intermediary personnel scan that key locker provides, key locker can extract key chain and receive the use in requesting
Family ID and key chain ID, verifying key chain receive the User ID in requesting and key chain ID and receive letter with the agreement being previously received
Whether the User ID and key chain ID in breath are identical, if key chain receives User ID in request and use in information is received in agreement
Family ID is identical and key chain to receive key chain ID in request identical as agreeing to receive key chain ID in information, then it is assumed that verify
Pass through, key locker can determine the corresponding key chain of key chain ID, and the key chain is popped up from key locker.
In embodiments of the present invention, key chain can be after leaving key locker, based on the positioning function of configuration to key pipe
Platform feeds back the location information of itself, and after the key for receiving terminal device submission is received request and is verified, bullet
At least key being placed in key chain out.Above-mentioned positioning function can be by key chain configure positioning chip or
With what is realized using other modes, the present embodiment is not construed as limiting this.
It in embodiments of the present invention, can be according to key management in order to realize management of the key management platform to key chain
The instruction that platform issues carries out parameter configuration to key chain.
In the concrete realization, key management platform can be after receiving the request of key chain parameter setting, according to key chain
Parameter setting request generates key chain parameter setting instruction, and the key chain parameter setting instruction is issued to key chain, to refer to
Show that key chain carries out parameter configuration.For example, the configuration etc. of positional parameter.
In general, house key is exactly one block of metal strip, itself does not have anti-tamper, the ability of anti-copying.Therefore, this reality
It applies example and key is placed in the key chain with characteristics such as tamper, alarms, can only could open key chain by specific purpose tool,
Key is taken out, ensure that the safety of key.
In embodiments of the present invention, key chain can have anti-violence dismantling function.It is torn open in key chain itself by violence
Xie Shi can trigger dismantling-proof alarming information, and above-mentioned dismantling-proof alarming information is sent to key management platform, so that key management
Platform can position the key chain when receiving dismantling-proof alarming information.
In embodiments of the present invention, the service-specific APP scanning in mobile phone can be used in normal use in intermediary personnel
Two dimensional code on key chain, after verifying, key chain could pop up key.After key is finished, intermediary personnel are again by key
It promotes in key chain.
In embodiments of the present invention, it can also include target position in information that the agreement that key management platform generates, which is received,
The information of information, above-mentioned target position can be the location information of the assets to match with the key.For example, intermediary personnel are in band
Visitor sees the position in the house that room to be gone to.
The agreement can be received information and be forwarded to key chain by key locker after receiving agreement and receiving information.Therefore, key
Key ring can first verify that whether current location is located at target position after the key for receiving terminal device submission receives request
Preset range in.Above-mentioned preset range can be set according to actual needs, for example, can be set as the house to be seen 1 is public
In in etc., the present embodiment is not construed as limiting this.
If verified, current location is located in the preset range of target position, and key chain can extract key and receive request
In User ID and key chain ID, verify that the key receives User ID in request and key chain ID and key management platform generate
Agreement receive User ID in information and whether key chain ID identical.If the User ID that key is received in request is received with agreement
User ID in information is identical and key to receive the key chain ID that the key chain ID in request is received with agreement in information identical, then
Think to be verified, at least key being placed in key chain can be popped up.
In embodiments of the present invention, above-mentioned key chain can use preconfigured positioning function after leaving key locker,
Current location information, and the communication function based on configuration are acquired in real time, and location information is sent to key according to default frequency
Manage platform.For example, current location information can be sent to by key chain by every 30 seconds frequency primary or once every minute
Key management platform.
Key management platform can draw the motion track of key chain after receiving location information with above-mentioned location information,
To realize the real-time locating and monitoring to key chain and key.
In embodiments of the present invention, above-mentioned key management system can also include inquiry terminal, which can be
Terminal device, such as mobile phone used in the actual holder of the assets such as house etc..
Key management platform can push the motion track of above-mentioned key chain after drawing out the motion track of key chain
Into mobile phone used in main business, owner is allowed to determine corresponding key chain according to key ID, the shifting based on key chain
Dynamic rail mark inquires the location information of key, realizes the real-time positioning to key.
In embodiments of the present invention, in order to further ensure the safety of key, key management platform can also be to key chain
Motion track whether exceed predeterminable area and verified.If above-mentioned motion track has exceeded predeterminable area, rail can be generated
Mark warning message, and the track warning message is sent to key chain, instruction key chain triggers track warning function.
In the concrete realization, according to the specific location of the assets such as house, key management platform can be pre-generated from specified
Path profile of the position to the house.For example, the path profile comprising the track route from shops, intermediary to the house.Receiving key
The location information of key ring and after generating motion track, key management platform can verify whether the track has exceeded above-mentioned path profile
Range.If it was exceeded, it is considered that the key chain and key are not sent to house position according to preset route,
It is possible that being stolen or occurring other situations.At this point, key management platform can issue track warning message to key chain, key is indicated
Key ring triggers track warning function.
In embodiments of the present invention, intermediary personnel need to be placed back into key in key chain after having used key, and will
Key chain is placed back into key locker.
After key chain and its key are placed on key locker, key locker can be confirmed that the key chain ID of the key is first
No is identical as the key chain ID that first agreement is received in information.The key for confirming the key currently put back to and taking out before
It whether is same.
If so, key locker, which then can generate key according to key chain ID, gives back information, and gives back key to information and be sent to
Key management platform records event by key management platform, and that completes key entirely takes also process.
The present embodiment is by being intelligently managed key, during capable of eliminating key management to greatest extent
Human factor reduces the fault of key management, promotes the efficiency of management;By positioning to key, key can be understood in real time
Working condition, improve the utilization rate and turnover rate of key, promote the movable efficiency of intermediate business, promote economic benefit.
In order to make it easy to understand, with reference to the accompanying drawing, with a specific example, making to the key management system of the present embodiment
One complete description.
As shown in Fig. 2, being a kind of system architecture schematic diagram of key management system of one embodiment of the invention, the system
It include key chain, key locker, key management platform and respectively for intermediary personnel and owner's using terminal equipment, intermediary personnel
Respective function can be realized by different APP with owner.
In embodiments of the present invention, key chain assigns on key locker, and key locker can perceive key chain, and energy and key chain
Communication.Meanwhile key locker can be by LAN optimization to key management platform, and real time communication.
Key management platform may operate in LAN server or cloud network, which is able to record the institute of key
There is information, and key track is drawn according to location information.According to the operational characteristic and scale of intermediary company, key pipe can choose
All data are all pooled to server or cloud by the different running method of platform.
The key management system of the present embodiment can provide two APP, one be intermediary administrative staff and business personnel
The service-specific APP installed on mobile phone, the other is the owner installed on owner's mobile phone inquires APP.Two APP can pass through
Mobile phone mobile network obtains the positioning and use information of key from server or cloud network.
As shown in figure 3, being a kind of operation flow schematic diagram of key management system of one embodiment of the invention, above-mentioned industry
Process of being engaged in mainly includes three processes.
(1) key process is taken
1) intermediary personnel initiate key according to business demand on service-specific APP or personal work computer and receive Shen
Please;
2) key that administrative staff give an written reply intermediary personnel on service-specific APP or personal work computer receives Shen
Please;
3) key locker is received the agreement given an written reply by network and receives information, is got to intermediary personnel;
4) intermediary personnel by service-specific APP scan key locker on two dimensional code, key locker by verifying User ID and
Key chain ID confirms that the key of intermediary personnel is received application and given an written reply, pops up corresponding key chain.
(2) key track following process
1) key chain once leaves key locker, then starts to start location tracking function, and pass through mobile network or Internet of Things
Net network is the location of to server time-triggered report oneself;
2) after intermediary personnel arrive at the destination, the two dimensional code on key chain, key chain confirmation are scanned by service-specific APP
Intermediary personnel have authorized, then pop up key;
3) after the completion of related service activity, intermediary personnel promote key in key chain;
4) server stores the key positioner information data received, and these data informations are carried out map
Match, to complete real-time rendering and the tracking of track.
(3) key process is given back
1) after the activity of intermediary personnel finishing service, key locker is inserted a key into;
2) key chain closes location tracking function, starting charging and the communication with key locker;
3) key locker perception key playback, and confirm it is the outgoing key of authorization;
4) key locker, which records and sends key to server, gives back information, and key authorization is completed.
Referring to Fig. 4, a kind of step flow diagram of key management method of one embodiment of the invention is shown, specifically
It may include steps of:
S401, determine that key to be received, the key to be received have corresponding key ID, the key ID and one
Key chain ID has corresponding relationship;
S402, according to User ID and the key chain ID, generate key and receive application;
S403, it the key is received into application is sent to key management platform;
It should be noted that the present embodiment is the introduction carried out from terminal equipment side to above-mentioned key management method.
In embodiments of the present invention, above-mentioned terminal device can refer to mobile phone, tablet computer used in intermediary person etc.
Equipment.
Intermediary personnel can determine key ID to be received first, pass through the industry in mobile phone after needing to receive key
It is engaged in filling in User ID and key ID on dedicated APP, generates key and receive and apply and be committed to key management platform.Key ID with
One key chain ID is corresponding.
S404, the approval results information for receiving the key management platform feedback, the approval results information includes agreeing to
Receive information;
Key management platform can receive application to above-mentioned key and examine, and be confirmed whether that intermediary personnel is allowed to receive
The key.If agreeing to, intermediary personnel receive key, and key management platform can be generated agreement and receive information and send it to
The mobile phone of intermediary personnel and the key locker for storing the key.
S405, agree to that receive information submits key chain to receive request to key locker according to described, to indicate the key locker
Pop up key chain corresponding with the key chain ID;
When formally taking key, the two dimensional code of service-specific APP scanning key locker is can be used in intermediary personnel, submits key
Key ring receives request, which is that storage needs to be received the key chain of key.
Key locker after receiving key chain and receiving request, can by verifying User ID and key chain ID whether with key
User ID in information is received in the agreement that issues of management platform and key chain ID is identical, is confirmed whether to pop up corresponding key chain.
S406, in the preset range of target position, Xiang Suoshu key chain submit key receive request, to indicate the key
Key ring pops up at least key being placed in the key chain, and the target position is the assets to match with the key
Position.
Intermediary personnel can continue to use service-specific APP scanning key chain after holding key chain and going to target position
On two dimensional code, submit key receive request.Key chain can continue the body of agency personnel according to User ID and key chain ID
Part is verified, and key therein is stored in pop-up after being verified.
It should be noted that a more than key can be stored in a key chain.For example, to Mr. Yu's suite room, one
The more keys in the house can be stored in key chain, the present embodiment is not construed as limiting this.
Referring to Fig. 5, the step flow diagram of another key management method of one embodiment of the invention is shown, is had
Body may include steps of:
S501, the agreement for receiving the transmission of key management platform receive information, and it includes User ID in information that the agreement, which is received,
There is corresponding relationship with key chain ID, the key chain ID and at least one key ID;
It should be noted that the present embodiment is the introduction carried out from key locker side to above-mentioned key management method.
In embodiments of the present invention, agree to receive information and can be to be generated by key management platform and be issued to key locker
's.
S502, receive terminal device submission key chain receive request after, extract the key chain and receive in request
User ID and key chain ID;
In embodiments of the present invention, intermediary personnel can scan the side of key locker two dimensional code by using service-specific APP
Formula submits key chain to receive application to key locker, and this application may include User ID and key chain ID.
S503, the verifying key chain receive the User ID in requesting and key chain ID and the agreement is received in information
Whether User ID and key chain ID are identical;
Key locker can verify this application after receiving above-mentioned application, it is determined whether allow current intermediary
Personnel receive the key.
In the concrete realization, key locker can verify key chain receive User ID in request whether with formerly receive
Agree to that the User ID received in information is identical, key chain receives whether the key chain ID in request receives in information in agreement
Key chain ID is identical.Only in User ID and key chain ID all the same, just think that above-mentioned application is verified.
S504, if so, determine the corresponding key chain of the key chain ID, and by the key chain from the key locker
It pops up, is placed with an at least key corresponding with the key chain ID in the key chain.
In receiving after application is verified for key locker agency personnel, the key of storage key ID can be found out
Button, and the key chain is popped up from key locker, it is taken for intermediary personnel.
In embodiments of the present invention, whether key locker can also detect the corresponding key chain of above-mentioned key chain ID and its key
It is placed in key locker, that is, detects the key chain received and whether key is given back by intermediary personnel.
If so, can generate key according to key chain ID gives back information, and gives back key to information and be sent to key pipe
Platform records this key for key management platform and takes event.
Referring to Fig. 6, the step flow diagram of another key management method of one embodiment of the invention is shown, is had
Body may include steps of:
Whether S601, detection key chain leave key locker, and an at least key, the key are placed in the key chain
Positioning function and communication function are configured in button;
If whether S602, the key chain leave key locker, start positioning function, is based on the positioning function, in real time
Acquire current location information;
It should be noted that the present embodiment is the introduction carried out from key chain side to above-mentioned key management method.
In embodiments of the present invention, a positioning chip can be configured in key chain, realized by the positioning chip to key
The positioning of key ring.
It in the concrete realization, is usually safety in key locker since key chain is placed on.It therefore, can be only in key
After key ring leaves key locker, the automatic positioning function of unlocking key button, acquisition position information.
S603, it is based on the communication function, the location information is sent to key management platform according to default frequency;
In embodiments of the present invention, the location information of key chain can be sent to key management platform with certain frequency,
Key chain and key are positioned for key management platform.
S604, receive terminal device submission key receive request after, according to the key receive request in use
Family ID and key chain ID pops up at least key being placed in the key chain.
In embodiments of the present invention, key is received request and be can be by intermediary personnel by using service-specific APP scanning
What the two dimensional code on key chain was initiated.
Key chain receive terminal device submission key receive request after, can determine first current location whether position
In in the preset range of target position, above-mentioned target position can be the position of the assets to match with key.I.e. confirmation is current
Whether position is in a certain range of the assets such as house, in 1 kilometer.
If current location is located in the preset range of target position, key chain can receive request to above-mentioned key and carry out
Verifying.Specifically, it key can be verified receives User ID in request and key chain ID and receive letter with the agreement that is previously received
Whether the User ID and key chain ID in breath are identical, and above-mentioned agreement, which is received information and be can be, is transmitted to key chain by key locker.
If the User ID that above-mentioned key receives in request is received with agreement, the User ID in information is identical and key is received and asked
The key chain ID asked is identical as agreeing to receive key chain ID in information, it may be considered that being verified, can pop up placement
An at least key in the key chain.
In embodiments of the present invention, the location information that key management platform can be acquired according to key chain draws key chain
Motion track, and above-mentioned motion track and predeterminable area are compared.If above-mentioned motion track has exceeded predeterminable area model
It encloses, key management platform can generate track warning message simultaneously according to the motion track of key chain and the comparison result of predeterminable area
It is issued to key chain.
When receiving the track warning message of key management platform transmission, key chain can be touched according to track warning message
Hair alarm.
In embodiments of the present invention, when key chain itself is disassembled by violence, dismantling-proof alarming information can be triggered, and will
Dismantling-proof alarming information is sent to key management platform, by key management platform according to certain safe handling strategy to the key chain
Carry out location tracking.
Referring to Fig. 7, the step flow diagram of another key management method of one embodiment of the invention is shown, is had
Body may include steps of:
The key that S701, receiving terminal apparatus are sent receives application, and it includes User ID and key in application that the key, which is received,
Spoon ID, the key ID and a key chain ID have corresponding relationship;
It should be noted that the present embodiment is the introduction carried out from key management platform side to above-mentioned key management method.
In embodiments of the present invention, key management platform can be a kind of server platform, which can pass through terminal
Equipment externally provides at least one user interface, and platform administrator is allowed to pass through the corresponding affairs of the user interface process.
S702, it application is received to the key according to the User ID and key chain ID examines, generate approval results
Information;
In embodiments of the present invention, approval results information may include two kinds, and one is agreements to receive information, and one is refuse
Information is received absolutely.When the key of agency personnel is received application and examined, can verify User ID is key management platform
It is no have receive the permission that key chain ID corresponds to key, and, verify key chain ID and correspond to whether key is placed in key
In case.
If above-mentioned User ID have receive key chain ID correspond to the permission of key and key chain ID correspond to key placement
In key locker, then it can be generated according to User ID and key chain ID and agree to receive information;It is received if above-mentioned User ID does not have
Key chain ID corresponds to the permission of key or key chain ID corresponds to key and is not placed in key locker, then can be according to user
ID and key chain ID generates refusal and receives information.
S703, the approval results information is sent to terminal device and key locker;
Information is received in above-mentioned agreement or refusal is received information and can be sent on mobile phone used in intermediary personnel, simultaneously
Also key locker can be sent to.
S704, receive key chain acquisition location information after, according to the location information, draw the key chain
Motion track.
In embodiments of the present invention, key chain can use preconfigured positioning function, in real time after leaving key locker
Current location information is acquired, and based on configuration and the communication function in key chain, is sent location information according to default frequency
To key management platform.For example, key chain can be by every 30 seconds primary or frequency once every minute by current location information
It is sent to key management platform.
Key management platform can draw the motion track of key chain after receiving location information with above-mentioned location information,
To realize the real-time locating and monitoring to key chain and key.
In embodiments of the present invention, in order to further ensure the safety of key, key management platform can also be to key chain
Motion track whether exceed predeterminable area and verified.If above-mentioned motion track has exceeded predeterminable area, rail can be generated
Mark warning message, and the track warning message is sent to key chain, instruction key chain triggers track warning function.
In addition, key locker can give birth to after detecting that the corresponding key chain of key chain ID and its key are placed on key locker
Information is given back at key, the above-mentioned key that key management platform can receive key locker transmission gives back information, to this key
The event of taking recorded.
It should be noted that each embodiment of the method is similar with aforementioned system embodiment, and between each embodiment of the method,
And the realization details between each embodiment of the method and system embodiment can be mutually refering to each step in above-described embodiment
The size of serial number is not meant that the order of the execution order yet, and the execution sequence Ying Yiqi function and internal logic of each process are true
Fixed, the implementation process of the embodiments of the invention shall not be constituted with any limitation.
Referring to Fig. 8, a kind of schematic diagram of key management device of one embodiment of the invention is shown, is set applied to terminal
Standby, above-mentioned apparatus can specifically include following module:
Determining module 801, for determining that key to be received, the key to be received have corresponding key ID, institute
A key ID and key chain ID is stated with corresponding relationship;
Generation module 802, for generating key and receiving application according to User ID and the key chain ID;
Sending module 803 is sent to key management platform for the key to be received application;
Receiving module 804, for receiving the approval results information of the key management platform feedback, the approval results letter
Breath includes agreeing to receive information;
First submits module 805, submits key chain to receive request to key locker for receiving information according to the agreement, with
Indicate that the key locker pops up key chain corresponding with the key chain ID;
Second submits module 806, in the preset range of target position, Xiang Suoshu key chain to be submitted key to receive and asked
Ask, to indicate that the key chain pops up at least key being placed in the key chain, the target position be with it is described
The position for the assets that key matches.
Referring to Fig. 9, the schematic diagram of another key management device of one embodiment of the invention is shown, is applied to key
Case, above-mentioned apparatus can specifically include following module:
Information is received in receiving module 901, the agreement for receiving the transmission of key management platform, and the agreement is received in information
There is corresponding relationship including User ID and key chain ID, the key chain ID and at least one key ID;
Extraction module 902 extracts the key chain after receiving request in the key chain for receiving terminal device submission
Receive the User ID and key chain ID in request;
Authentication module 903 receives the User ID in requesting and key chain ID and the agreement for verifying the key chain
It receives User ID in information and whether key chain ID is identical;
Pop-up module 904 is used for if so, determine the corresponding key chain of the key chain ID, and by the key chain from
It is popped up in the key locker, an at least key corresponding with the key chain ID is placed in the key chain.
In embodiments of the present invention, described device can also include following module:
Detection module, for detecting whether the corresponding key chain of the key chain ID and its key are placed on the key
In case;
Sending module, for and the key being given back if so, generating key according to the key chain ID gives back information
Information is sent to the key management platform.
Referring to Fig.1 0, the schematic diagram of another key management device of one embodiment of the invention is shown, key is applied to
Key ring is configured with positioning function and communication function in the key chain, and above-mentioned apparatus can specifically include following module:
Detection module 1001 is placed at least one for detecting whether key chain leaves key locker in the key chain
Key;
Acquisition module 1002 starts positioning function if whether leaving key locker for the key chain, based on described fixed
Bit function acquires current location information in real time;
The location information is sent to key according to default frequency for being based on the communication function by sending module 1003
Spoon management platform;
Pop-up module 1004 is led after receiving request in the key for receiving terminal device submission according to the key
With the User ID and key chain ID in request, at least key being placed in the key chain is popped up.
In embodiments of the present invention, the pop-up module can specifically include following submodule:
It determines submodule, after receiving request in the key for receiving terminal device submission, whether determines current location
In the preset range of target position, the target position is the position of the assets to match with the key;
Submodule is verified, if being located in the preset range of the target position for the current location, described in verifying
Key receives User ID in request and key chain ID receives User ID and key chain in information with the agreement that is previously received
Whether ID is identical, and the agreement receives information and is transmitted to the key chain by key locker;
Submodule is popped up, agrees to receive the user in information with described if receiving the User ID in request for the key
ID is identical and the key to receive the key chain ID in request identical as the key chain ID for agreeing to receive in information, then pop up
At least key being placed in the key chain.
In embodiments of the present invention, described device can also include following module:
Track alarm module, for when receiving the track warning message that the key management platform is sent, according to institute
The triggering alarm of track warning message is stated, the track warning message is by the key management platform according to the movement of the key chain
The comparison result of track and predeterminable area generates, and the motion track of the key chain is by the key management platform according to the key
The location information of key ring acquisition is drawn.
In embodiments of the present invention, described device can also include following module:
Dismantling-proof alarming module, for when the key chain itself is disassembled by violence, triggering dismantling-proof alarming information, and will
The dismantling-proof alarming information is sent to the key management platform.
Referring to Fig.1 1, the schematic diagram of another key management device of one embodiment of the invention is shown, key is applied to
Spoon management platform, above-mentioned apparatus can specifically include following module:
Receiving module 1101, the key sent for receiving terminal apparatus receive application, and the key is received to be wrapped in application
Including User ID and key ID, the key ID and a key chain ID has corresponding relationship;
Generation module 1102 is examined for receiving application to the key according to the User ID and key chain ID,
Generate approval results information;
Sending module 1103, for the approval results information to be sent to terminal device and key locker;
Drafting module 1104, for according to the location information, drawing after the location information for receiving key chain acquisition
The motion track of the key chain.
In embodiments of the present invention, described device can also include following module:
Key registration request receiving module, for receiving key registration request;
Key ID distribution module distributes key ID for being directed to the key registration request for key;
Corresponding relation building module, for establishing the corresponding pass between the key ID and the key chain ID of particular key key ring
System.
In embodiments of the present invention, described device can also include following module:
Key de-registration request receiving module, for receiving key de-registration request;
Key cancellation module nullifies the key ID of the key, and nullify institute for being directed to the key de-registration request
State the corresponding relationship between key ID and the key chain ID;
Key chain state setting module, for setting blank state for the corresponding key chain of the key chain ID.
In embodiments of the present invention, described device can also include following module:
User's registration request receiving module, for receiving user's registration request;
User ID distribution module is user's distributing user ID for requesting for the user's registration;
User log off module, for nullifying the User ID when receiving the instruction for nullifying the User ID.
In embodiments of the present invention, the approval results information includes agreeing to that receiving information or refusal receives information, described
Generation module 1102 can specifically include following submodule:
Submodule is verified, for verifying whether the User ID has the permission received the key chain ID and correspond to key,
And it verifies the key chain ID and corresponds to whether key is placed in the key locker;
First generates submodule, receives permission and institute that the key chain ID corresponds to key if having for the User ID
It states key chain ID and corresponds to key and be placed in the key locker, then generated according to the User ID and key chain ID and agree to receive letter
Breath;
Second generate submodule, if do not have for the User ID receive the key chain ID correspond to key permission or
Key chain ID described in person corresponds to key and is not placed in the key locker, then generates refusal according to the User ID and key chain ID
Receive information.
In embodiments of the present invention, described device can also include following module:
Parameter setting request receiving module, for receiving the request of key chain parameter setting;
Parameter setting instruction generation module generates key chain parameter setting for requesting according to the key chain parameter setting
Instruction;
Parameter setting instruction sending module, for the key chain parameter setting instruction to be issued to the key chain, with
Indicate that the key chain carries out parameter configuration.
In embodiments of the present invention, described device can also include following module:
Whether authentication module, the motion track for verifying the key chain exceed predeterminable area;
Indicating module is used for if so, generating track warning message, and the track warning message is sent to the key
Key ring indicates the key chain triggering track warning function.
In embodiments of the present invention, described device can also include following module:
Key gives back information receiving module, and the key for receiving key locker transmission gives back information, and the key gives back letter
Breath is raw after detecting that the corresponding key chain of the key chain ID and its key are placed on the key locker by the key locker
At.
In embodiments of the present invention, described device can also include following module:
Key chain locating module, for when receiving the dismantling-proof alarming information that the key chain is sent, to the key
Button is positioned, and by the key chain, the triggering when itself is disassembled by violence generates the dismantling-proof alarming information.
For device embodiment, since it is basically similar to the method embodiment, related so describing fairly simple
Place referring to embodiment of the method part explanation.
Referring to Fig.1 2, show a kind of schematic diagram of terminal device of one embodiment of the invention.As shown in figure 12, this reality
The terminal device 1200 for applying example includes: processor 1210, memory 1220 and is stored in the memory 1220 and can be
The computer program 1221 run on the processor 1210.The processor 1210 executes real when the computer program 1221
Step in the existing above-mentioned each embodiment of key management method, such as step S401 to S406 shown in Fig. 4.Alternatively, the place
Reason device 1210 realizes the function of each module/unit in above-mentioned each Installation practice when executing the computer program 1221, such as
The function of module 801 to 806 shown in Fig. 8.
Illustratively, the computer program 1221 can be divided into one or more module/units, it is one or
Multiple module/the units of person are stored in the memory 1220, and are executed by the processor 1210, to complete the present invention.
One or more of module/units can be the series of computation machine program instruction section that can complete specific function, the instruction
Section can be used for describing implementation procedure of the computer program 1221 in the terminal device 1200.For example, the calculating
Machine program 1221 can be divided into determining module, generation module, sending module, receiving module, the first submission module and second
Module is submitted, each module concrete function is as follows:
Determining module, for determining that key to be received, the key to be received have corresponding key ID, the key
A spoon ID and key chain ID has corresponding relationship;
Generation module, for generating key and receiving application according to User ID and the key chain ID;
Sending module is sent to key management platform for the key to be received application;
Receiving module, for receiving the approval results information of the key management platform feedback, the approval results information
Including agreeing to receive information;
First submits module, submits key chain to receive request to key locker for receiving information according to the agreement, to refer to
Show that the key locker pops up key chain corresponding with the key chain ID;
Second submits module, and in the preset range of target position, Xiang Suoshu key chain submits key to receive request,
To indicate that the key chain pops up at least key being placed in the key chain, the target position is and the key
The position of the assets to match.
The terminal device 1200 can be the calculating such as desktop PC, notebook, palm PC and cloud server
Equipment.The terminal device 1200 may include, but be not limited only to, processor 1210, memory 1220.Those skilled in the art can
To understand, Figure 12 is only a kind of example of terminal device 1200, does not constitute the restriction to terminal device 1200, may include
Than illustrating more or fewer components, certain components or different components are perhaps combined, such as the terminal device 1200 is also
It may include input-output equipment, network access equipment, bus etc..
The processor 1210 can be central processing unit (Central Processing Unit, CPU), can be with
It is other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
Deng.
The memory 1220 can be the internal storage unit of the terminal device 1200, such as terminal device 1200
Hard disk or memory.The memory 1220 is also possible to the External memory equipment of the terminal device 1200, such as the terminal
The plug-in type hard disk being equipped in equipment 1200, intelligent memory card (Smart Media Card, SMC), secure digital (Secure
Digital, SD) card, flash card (Flash Card) etc..Further, the memory 1220 can also both include described
The internal storage unit of terminal device 1200 also includes External memory equipment.The memory 1220 is for storing the computer
Other programs and data needed for program 1221 and the terminal device 1200.The memory 1220 can be also used for temporarily
Ground stores the data that has exported or will export.
The embodiment of the invention also discloses a kind of key locker, including memory, processor and it is stored in the memory
In and the computer program that can run on the processor, the processor realize above-mentioned key when executing the computer program
The step of key management method of spoon case side.
The embodiment of the invention also discloses a kind of key chain, including memory, processor and it is stored in the memory
In and the computer program that can run on the processor, be configured with positioning chip in the key chain, the processor is held
The step of realizing the key management method of above-mentioned key chain side when the row computer program.
The embodiment of the invention also discloses a kind of key management platform, including memory, processor and it is stored in described
In memory and the computer program that can run on the processor, positioning chip, the place are configured in the key chain
The step of reason device realizes the key management method of above-mentioned key management platform side when executing the computer program.
The embodiment of the invention also discloses a kind of computer readable storage medium, the computer-readable recording medium storage
There are the step of computer program, the computer program realizes above-mentioned key management method when being executed by processor, above-mentioned calculating
Machine readable storage medium storing program for executing can be located in terminal device, key locker, key chain or key management platform.
Those skilled in the art can be understood that, for convenience of description and succinctly, only with above-mentioned each function
The division of unit, module is illustrated.In practical application, it can according to need and by above-mentioned function distribution by different function
Energy unit, module are completed, i.e., described device/terminal device internal structure is divided into different functional unit or module, with
Complete all or part of function described above.Each functional unit in embodiment, module can integrate single in a processing
In member, it is also possible to each unit and physically exists alone, can also be integrated in one unit with two or more units, on
It states integrated unit both and can take the form of hardware realization, can also realize in the form of software functional units.In addition, each
Functional unit, module specific name be also only for convenience of distinguishing each other, the protection scope being not intended to restrict the invention.On
The specific work process for stating unit in system, module, can refer to corresponding processes in the foregoing method embodiment, no longer superfluous herein
It states.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment
The part of load, reference can be made to the related descriptions of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed device/terminal device and method, it can be with
It realizes in other way.For example, device described above/terminal device embodiment is only schematical, for example, institute
The division of module or unit is stated, only a kind of logical function partition, there may be another division manner in actual implementation, such as
Multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately
On the one hand, shown or discussed mutual coupling or direct-coupling or communication connection can be through some interfaces, dress
It sets or the INDIRECT COUPLING or communication connection of unit, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or
In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation
All or part of the process in example method, can also instruct relevant hardware to complete, the calculating by computer program
Machine program can be stored in computer readable storage medium, and the computer program is when being executed by processor, it can be achieved that above-mentioned each
The step of a embodiment of the method.Wherein, the computer program includes computer program code, and the computer program code can
Think source code form, object identification code form, executable file or certain intermediate forms etc..The computer readable storage medium
It may include: any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic that can carry the computer program code
Dish, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM,
Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described
It is appropriate that the content that computer readable storage medium includes can be carried out according to the requirement made laws in jurisdiction with patent practice
Increase and decrease, such as do not include electric carrier wave according to legislation and patent practice, computer readable storage medium in certain jurisdictions
Signal and telecommunication signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations.Although referring to aforementioned reality
Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each
Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified
Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all
It is included within protection scope of the present invention.
Claims (34)
1. a kind of key management system, which is characterized in that including key management equipment, key management platform and terminal device, institute
Stating key management equipment includes key locker and key chain, is configured with positioning function and communication function in the key chain;Wherein,
Key management platform is received application for receiving key, and after receiving application to the key and examining, will be examined
Result information is sent to terminal device and key locker, and the approval results information includes agreeing to receive information;
Key locker, the approval results information sent for receiving the key management platform, and submitted receiving terminal device
Key chain receive request after, receive information according to the agreement request received to the key chain and verify, if verifying is logical
It crosses, then pop-up receives the key chain that information matches with the agreement;
Key chain, it is anti-to the key management platform based on the positioning function and communication function for after leaving key locker
The location information of itself is presented, and after the key for receiving terminal device submission is received request and is verified, pop-up is placed in
An at least key in the key chain;
Terminal device receives the key management platform feedback for submitting key to receive application to the key management platform
Approval results information, according to it is described agreement receive information to the key locker submit key chain receive request, Xiang Suoshu key
Button submits key to receive request.
2. system according to claim 1, which is characterized in that any key chain has corresponding key chain ID;
The key management platform, is also used to receive key registration request, for the key registration request, distributes key for key
Spoon ID, establishes the corresponding relationship between the key ID and the key chain ID of particular key key ring.
3. system according to claim 2, which is characterized in that
The key management platform, is also used to receive key de-registration request, for the key de-registration request, nullifies the key
Key ID, and nullify the corresponding relationship between the key ID and key chain ID, the key chain ID is corresponding
Key chain is set as blank state.
4. system according to claim 1, which is characterized in that
The key management platform is also used to receive user's registration request, requests for the user's registration, for the user point
With User ID, and when receiving the instruction for nullifying the User ID, the User ID is nullified.
5. system according to claim 1, which is characterized in that
The key management platform is also used to receive the request of key chain parameter setting, requests according to the key chain parameter setting
Key chain parameter setting instruction is generated, and the key chain parameter setting instruction is issued to the key chain, described in instruction
Key chain carries out parameter configuration.
6. system according to claim 1, which is characterized in that
The key management platform is also used to after receiving the key and receiving application, is extracted the key and is received in application
User ID and key chain ID, verify the User ID and whether have and receive the permission that the key chain ID corresponds to key, verify
The key chain ID corresponds to whether key is placed in the key locker, if the User ID, which has, is received ID pairs of the key chain
It answers the permission of key and the key chain ID corresponds to key and is placed in the key locker, then according to the User ID and key chain
ID, which is generated, to be agreed to receive information, and information is received in the agreement and is sent to terminal device and key locker.
If the User ID does not have and receives that the key chain ID corresponds to the permission of key or the key chain ID corresponds to key
It is not placed in the key locker, then generates refusal according to the User ID and key chain ID and receive information, the refusal is led
The terminal device is sent to information.
7. system according to claim 6, which is characterized in that
The key locker is also used to after the key chain for receiving terminal device submission receives request, extracts the key chain neck
With the User ID and key chain ID in request, verifies the key chain and receive the User ID in requesting and key chain ID and connect in advance
User ID in information is received in the agreement received and whether key chain ID is identical, if the key chain receives the use in request
Family ID and the agreement receive that User ID in information is identical and the key chain receives key chain ID in request and described same
The key chain ID that receives in information of anticipating is identical, it is determined that the corresponding key chain of the key chain ID, and by the key chain from institute
It states in key locker and pops up.
8. system according to claim 1, which is characterized in that
The key chain, is also used to after leaving key locker, is based on the positioning function, acquires current location information in real time,
And it is based on the communication function, the location information is sent to key management platform according to default frequency;
The key management platform, is also used to draw the motion track of the key chain according to the location information.
9. system according to claim 8, which is characterized in that the key management system further includes inquiry terminal, described
Terminal is inquired, for receiving the motion track of the key chain sent by the key management platform, is determined according to key ID
Corresponding key chain, the motion track based on the key chain inquire the location information of the key.
10. system according to claim 8, which is characterized in that
Whether the key management platform, the motion track for being also used to verify the key chain exceed predeterminable area, if so, raw
It is sent to the key chain at track warning message, and by the track warning message, indicates key chain triggering track report
Alert function.
11. system according to claim 8, which is characterized in that
The key locker is also used to agree to that receiving information is forwarded to the key chain for described, described to agree to receive in information also
Information including target position, the information of the target position are the location information of the assets to match with the key;
The key chain, be also used to receive terminal device submission key receive request after, verifying current location whether position
In in the preset range of the target position, if so, extracting the key receives the User ID in requesting and key chain ID, test
Demonstrate,prove that the key receives User ID in request and key chain ID and User ID and key chain ID in information are received in the agreement
It is whether identical, if the key receives the key identical and described with the User ID for agreeing to receive in information of the User ID in request
It is identical as the key chain ID that the agreement is received in information that spoon receives the key chain ID in requesting, then pop-up is placed in the key
An at least key in button.
12. system according to claim 6, which is characterized in that
The key locker is also used to after key chain and its key are placed on the key locker, confirms the key of the key
Whether button ID is identical as the key chain ID that the agreement is received in information, if so, according to key chain ID generation key
Information is given back, and gives back the key to information and is sent to the key management platform.
13. system according to claim 1, which is characterized in that
The key chain is also used to when the key chain itself is disassembled by violence, triggers dismantling-proof alarming information, and will be described
Dismantling-proof alarming information is sent to the key management platform;
The key management platform is also used to position the key chain when receiving the dismantling-proof alarming information.
14. a kind of key management method, which is characterized in that be applied to terminal device, which comprises
Determine that key to be received, the key to be received have corresponding key ID, the key ID and a key chain ID
With corresponding relationship;
According to User ID and the key chain ID, generates key and receive application;
The key is received into application and is sent to key management platform;
The approval results information of the key management platform feedback is received, the approval results information includes agreeing to receive information;
Receive information according to the agreement submits key chain to receive request to key locker, with indicate the key locker pop up with it is described
The corresponding key chain of key chain ID;
In the preset range of target position, Xiang Suoshu key chain submits key to receive request, to indicate the key chain pop-up
At least key being placed in the key chain, the target position are the position of the assets to match with the key.
15. a kind of key management method, which is characterized in that be applied to key locker, which comprises
It receives the agreement that key management platform is sent and receives information, it includes User ID and key chain in information that the agreement, which is received,
ID, the key chain ID and at least one key ID have corresponding relationship;
Receive terminal device submission key chain receive request after, extract the key chain receive request in User ID and
Key chain ID;
Verify the key chain receive User ID in request and key chain ID and the agreement receive User ID in information and
Whether key chain ID is identical;
If so, determining the corresponding key chain of the key chain ID, and the key chain is popped up from the key locker, it is described
An at least key corresponding with the key ID is placed in key chain.
16. according to the method for claim 15, which is characterized in that further include:
It detects the corresponding key chain of the key chain ID and its whether key is placed in the key locker;
If so, generating key according to the key chain ID gives back information, and gives back the key to information and be sent to the key
Spoon management platform.
17. a kind of key management method, which is characterized in that be applied to key chain, in the key chain configured with positioning function and
Communication function, which comprises
Whether detection key chain leaves key locker, and an at least key is placed in the key chain;
If whether the key chain leaves key locker, start positioning function, be based on the positioning function, acquires in real time currently
Location information;
Based on the communication function, the location information is sent to key management platform according to default frequency;
After the key for receiving terminal device submission receives request, the User ID and key in request are received according to the key
ID is detained, at least key being placed in the key chain is popped up.
18. according to the method for claim 17, which is characterized in that described to be received in the key for receiving terminal device submission
After request, User ID and key chain ID in request are received according to the key, pop-up is placed in the key chain at least
The step of one key includes:
After the key for receiving terminal device submission receives request, determine whether current location is located at the default model of target position
In enclosing, the target position is the position of the assets to match with the key;
If the current location is located in the preset range of the target position, verifies the key and receive the user in requesting
ID and key chain ID receives User ID in information with the agreement being previously received and whether key chain ID is identical, the agreement neck
The key chain is transmitted to by key locker with information;
If the key receives the User ID in request, the key identical and described with the User ID for agreeing to receive in information is led
Identical as the key chain ID for agreeing to receive in information with the key chain ID in request, then pop-up is placed in the key chain
An at least key.
19. according to the method for claim 17, which is characterized in that further include:
When receiving the track warning message that the key management platform is sent, is triggered and reported according to the track warning message
It is alert, the track warning message by the key management platform according to the motion track of the key chain compared with predeterminable area
As a result it generates, the motion track of the key chain is drawn by the key management platform according to the location information that the key chain acquires
It makes.
20. according to the method for claim 17, which is characterized in that further include:
When the key chain itself is disassembled by violence, dismantling-proof alarming information is triggered, and the dismantling-proof alarming information is sent
To the key management platform.
21. a kind of key management method, which is characterized in that be applied to key management platform, which comprises
The key that receiving terminal apparatus is sent receives apply, and the key is received including User ID and key ID in application, described
A key ID and key chain ID has corresponding relationship;
Application is received to the key according to the User ID and key chain ID to examine, and generates approval results information;
The approval results information is sent to terminal device and key locker;
After the location information for receiving key chain acquisition, according to the location information, the motion track of the key chain is drawn.
22. according to the method for claim 21, which is characterized in that further include:
Receive key registration request;
For the key registration request, key ID is distributed for key;
Establish the corresponding relationship between the key ID and the key chain ID of particular key key ring.
23. according to the method for claim 22, which is characterized in that further include:
Receive key de-registration request;
For the key de-registration request, the key ID of the key is nullified, and nullifies the key ID and the key chain
Corresponding relationship between ID;
Blank state is set by the corresponding key chain of the key chain ID.
24. according to the method for claim 22, which is characterized in that further include:
Receive user's registration request;
It is requested for the user's registration, is user's distributing user ID;
When receiving the instruction for nullifying the User ID, the User ID is nullified.
25. according to the method for claim 22, which is characterized in that the approval results information include agree to receive information or
Refusal receives information, described to receive application to the key according to the User ID and key chain ID and examine, and generates examination & approval
The step of result information includes:
It verifies the User ID and whether has and receive the permission that the key chain ID corresponds to key, and, verify the key chain
ID corresponds to whether key is placed in the key locker;
If the User ID have receive the key chain ID correspond to the permission of key and the key chain ID correspond to key placement
In the key locker, is then generated according to the User ID and key chain ID and agree to receive information;
If the User ID does not have and receives that the key chain ID corresponds to the permission of key or the key chain ID corresponds to key
It is not placed in the key locker, then generates refusal according to the User ID and key chain ID and receive information.
26. according to the method for claim 21, which is characterized in that further include:
Receive the request of key chain parameter setting;
It requests to generate key chain parameter setting instruction according to the key chain parameter setting;
The key chain parameter setting instruction is issued to the key chain, to indicate that the key chain carries out parameter configuration.
27. according to the method for claim 26, which is characterized in that further include:
Whether the motion track for verifying the key chain exceeds predeterminable area;
If so, generating track warning message, and the track warning message is sent to the key chain, indicates the key
Button triggering track warning function.
28. according to the method for claim 21, which is characterized in that further include:
It receives the key that key locker is sent and gives back information, the key gives back information and detecting the key by the key locker
The corresponding key chain of button ID and its key generate after being placed on the key locker.
29. according to the method for claim 21, which is characterized in that further include:
When receiving the dismantling-proof alarming information that the key chain is sent, the key chain is positioned, the dismantling-proof alarming
By the key chain, the triggering when itself is disassembled by violence generates information.
30. a kind of terminal device, including memory, processor and storage are in the memory and can be on the processor
The computer program of operation, which is characterized in that the processor is realized when executing the computer program such as claim 14 institute
The step of stating key management method.
31. a kind of key locker, including memory, processor and storage can transport in the memory and on the processor
Capable computer program, which is characterized in that the processor realizes that claim 15-16 such as appoints when executing the computer program
The step of one key management method.
32. a kind of key chain, including memory, processor and storage can transport in the memory and on the processor
Capable computer program, which is characterized in that positioning chip is configured in the key chain, the processor executes the computer
It is realized when program as described in claim any one of 17-20 the step of key management method.
33. a kind of key management platform, including memory, processor and storage are in the memory and can be in the processing
The computer program run on device, which is characterized in that positioning chip is configured in the key chain, described in the processor executes
It is realized when computer program as described in claim any one of 21-29 the step of key management method.
34. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists
In the step of realization key management method as described in claim any one of 14-29 when the computer program is executed by processor
Suddenly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910098141.4A CN109685483B (en) | 2019-01-31 | 2019-01-31 | Key management system and key management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910098141.4A CN109685483B (en) | 2019-01-31 | 2019-01-31 | Key management system and key management method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109685483A true CN109685483A (en) | 2019-04-26 |
CN109685483B CN109685483B (en) | 2021-08-10 |
Family
ID=66195450
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910098141.4A Active CN109685483B (en) | 2019-01-31 | 2019-01-31 | Key management system and key management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109685483B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110164005A (en) * | 2019-05-16 | 2019-08-23 | 东风小康汽车有限公司重庆分公司 | A kind of cancellation method and device of Intelligent key |
CN111445605A (en) * | 2020-04-14 | 2020-07-24 | 长园共创电力安全技术股份有限公司 | Unlocking key authorized unlocking method and device and storage medium |
CN111524343A (en) * | 2020-04-30 | 2020-08-11 | 金瓜子科技发展(北京)有限公司 | Vehicle monitoring method and device and monitoring equipment |
CN112422631A (en) * | 2020-10-22 | 2021-02-26 | 青岛珞宾智能信息技术有限公司 | Key management system based on Internet of things |
CN112767578A (en) * | 2020-12-29 | 2021-05-07 | 南方电网深圳数字电网研究院有限公司 | Authorization method, application method, unlocking method, terminal and storage medium |
CN113011808A (en) * | 2019-12-20 | 2021-06-22 | 杭州共享实验科技发展有限公司 | Intelligent management method for immobilized high-value antibody reagent |
CN113744432A (en) * | 2020-05-14 | 2021-12-03 | 高翠英 | Intelligent key cabinet management system for motor train unit |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201732990U (en) * | 2010-07-28 | 2011-02-02 | 太平湾发电厂 | Intelligent management key device |
CN102710016A (en) * | 2012-06-01 | 2012-10-03 | 江苏省电力公司检修分公司 | Intelligent remote hierarchical key management and control system |
CN103456065A (en) * | 2013-09-27 | 2013-12-18 | 李冬 | Unattended key management method |
US20150169570A1 (en) * | 2013-12-18 | 2015-06-18 | Samsung Electronics Co., Ltd. | Method and device for managing data |
CN106355718A (en) * | 2016-09-14 | 2017-01-25 | 山东科技大学 | Intelligent automobile electronic key system with antitheft and anti-lost functions |
CN107424339A (en) * | 2017-04-19 | 2017-12-01 | 宁波瑞奥物联技术股份有限公司 | A kind of intelligent key management system and method |
CN108109232A (en) * | 2017-12-06 | 2018-06-01 | 链家网(北京)科技有限公司 | Key management system and method |
CN108343315A (en) * | 2018-01-25 | 2018-07-31 | 国家电网公司 | Key management method and terminal device |
CN108661459A (en) * | 2018-03-19 | 2018-10-16 | 李平川 | A kind of intelligence handcuffss management system |
CN109035507A (en) * | 2018-07-10 | 2018-12-18 | 武汉瑞莱保能源技术有限公司 | A kind of intelligent key management system based on loss protecting |
-
2019
- 2019-01-31 CN CN201910098141.4A patent/CN109685483B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201732990U (en) * | 2010-07-28 | 2011-02-02 | 太平湾发电厂 | Intelligent management key device |
CN102710016A (en) * | 2012-06-01 | 2012-10-03 | 江苏省电力公司检修分公司 | Intelligent remote hierarchical key management and control system |
CN103456065A (en) * | 2013-09-27 | 2013-12-18 | 李冬 | Unattended key management method |
CN103456065B (en) * | 2013-09-27 | 2016-12-07 | 李冬 | A kind of unmanned key management method |
US20150169570A1 (en) * | 2013-12-18 | 2015-06-18 | Samsung Electronics Co., Ltd. | Method and device for managing data |
CN106355718A (en) * | 2016-09-14 | 2017-01-25 | 山东科技大学 | Intelligent automobile electronic key system with antitheft and anti-lost functions |
CN107424339A (en) * | 2017-04-19 | 2017-12-01 | 宁波瑞奥物联技术股份有限公司 | A kind of intelligent key management system and method |
CN108109232A (en) * | 2017-12-06 | 2018-06-01 | 链家网(北京)科技有限公司 | Key management system and method |
CN108343315A (en) * | 2018-01-25 | 2018-07-31 | 国家电网公司 | Key management method and terminal device |
CN108661459A (en) * | 2018-03-19 | 2018-10-16 | 李平川 | A kind of intelligence handcuffss management system |
CN109035507A (en) * | 2018-07-10 | 2018-12-18 | 武汉瑞莱保能源技术有限公司 | A kind of intelligent key management system based on loss protecting |
Non-Patent Citations (1)
Title |
---|
田华等: "基于物联网技术的钥匙智能管理系统的设计与实现", 《科技资讯 SCIENCE & TECHNOLOGY INFORMATION》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110164005A (en) * | 2019-05-16 | 2019-08-23 | 东风小康汽车有限公司重庆分公司 | A kind of cancellation method and device of Intelligent key |
CN110164005B (en) * | 2019-05-16 | 2021-04-02 | 东风小康汽车有限公司重庆分公司 | Method and device for logging off intelligent key |
CN113011808A (en) * | 2019-12-20 | 2021-06-22 | 杭州共享实验科技发展有限公司 | Intelligent management method for immobilized high-value antibody reagent |
CN111445605A (en) * | 2020-04-14 | 2020-07-24 | 长园共创电力安全技术股份有限公司 | Unlocking key authorized unlocking method and device and storage medium |
CN111524343A (en) * | 2020-04-30 | 2020-08-11 | 金瓜子科技发展(北京)有限公司 | Vehicle monitoring method and device and monitoring equipment |
CN113744432A (en) * | 2020-05-14 | 2021-12-03 | 高翠英 | Intelligent key cabinet management system for motor train unit |
CN112422631A (en) * | 2020-10-22 | 2021-02-26 | 青岛珞宾智能信息技术有限公司 | Key management system based on Internet of things |
CN112767578A (en) * | 2020-12-29 | 2021-05-07 | 南方电网深圳数字电网研究院有限公司 | Authorization method, application method, unlocking method, terminal and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109685483B (en) | 2021-08-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109685483A (en) | Key management system and key management method | |
CN109379369A (en) | Single-point logging method, device, server and storage medium | |
CN106303099B (en) | A kind of method, apparatus and system for verifying user's communicating number validity | |
CN108053042A (en) | A kind of outage information is reported and submitted and delivery system | |
CN104217288A (en) | Security management device and system for community comprehensive grid | |
CN110399533A (en) | Funds flow querying method and device | |
CN104751545A (en) | System, method and device for processing permissions of door lock | |
CN107146124A (en) | A kind of implementation method, system and the device of electronics one-way ticket | |
CN107123045A (en) | The data synchronous system and its method of data synchronization merchandised based on bond | |
CN108765905A (en) | Electric power cable well lid on-line intelligence prior-warning device based on NB-IoT | |
CN105933876B (en) | Recognition methods, mobile phone terminal, server and the system of counterfeit short message | |
CN109769244A (en) | Recognition methods, device, equipment and the readable storage medium storing program for executing of abnormal phonecard | |
CN109359037A (en) | A kind of management method of shared device, storage medium and server | |
CN109086628A (en) | A kind of order processing method and relevant apparatus | |
CN108123961A (en) | Information processing method, apparatus and system | |
CN107993050A (en) | A kind of employee information management method, device, terminal device and storage medium | |
CN108769220A (en) | Intelligent ammeter box environmental monitoring installation and monitoring method | |
CN106992916A (en) | A kind of electric power dispatching system and implementation method based on virtual private cloud | |
CN109005208A (en) | Method and apparatus for pushed information | |
CN103326935B (en) | The method and system that a kind of intelligence based on microblog is waited in turn | |
CN109818958A (en) | A kind of computer network intelligent monitor system | |
CN109495468A (en) | Authentication method, device, electronic equipment and storage medium | |
CN108920309B (en) | Method and apparatus for handling information | |
CN117151736A (en) | Anti-electricity fraud management early warning method and system | |
CN107705384B (en) | Attendance checking method, system, electronic device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20230406 Address after: Room 301, Building 2, No. 42 Dongzhong Road, East District, Guangzhou Economic and Technological Development Zone, Guangdong Province, 510000 Patentee after: TECHTOTOP MICROELECTRONICS Co.,Ltd. Address before: 510000 No. 483 Wushan Road, Tianhe District, Guangzhou City, Guangdong Province Patentee before: Zhang Yiqing |
|
TR01 | Transfer of patent right |