CN109685483A - Key management system and key management method - Google Patents

Key management system and key management method Download PDF

Info

Publication number
CN109685483A
CN109685483A CN201910098141.4A CN201910098141A CN109685483A CN 109685483 A CN109685483 A CN 109685483A CN 201910098141 A CN201910098141 A CN 201910098141A CN 109685483 A CN109685483 A CN 109685483A
Authority
CN
China
Prior art keywords
key
chain
key chain
information
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910098141.4A
Other languages
Chinese (zh)
Other versions
CN109685483B (en
Inventor
张义青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Techtotop Microelectronics Co Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201910098141.4A priority Critical patent/CN109685483B/en
Publication of CN109685483A publication Critical patent/CN109685483A/en
Application granted granted Critical
Publication of CN109685483B publication Critical patent/CN109685483B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/16Real estate
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Business, Economics & Management (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the present invention is suitable for information technology field, provides a kind of key management system and key management method, including key locker, key chain, key management platform and terminal device.Wherein, key management platform is examined for receiving application to key, and approval results information is sent to terminal device and key locker;Key locker is received request to key chain and is verified for receiving approval results information, and according to agreeing to receive information, if being verified, pop-up with agree to receive the key chain that information matches;Key chain is used for after leaving key locker, and the location information of itself is fed back to key management platform, and after receiving key and receiving request and be verified, pops up at least key being placed in key chain.The present embodiment can eliminate the human factor during key management by being intelligently managed to key to greatest extent, reduce the fault of key management, promote the efficiency of management.

Description

Key management system and key management method
Technical field
The invention belongs to information technology fields, more particularly to a kind of key management system, a kind of key management method, one Kind terminal device, a kind of key locker, a kind of key chain, a kind of key management platform and a kind of computer readable storage medium.
Background technique
The occasion managed concentratedly is needed in key, for example, second-hand house transaction and houses leasing market, owner would generally be by rooms Room key is placed at intermediary, facilitates intermediary personnel that house purchaser or tenant scene is led to see room.Intermediary due to flow of personnel is big, Heavy traffic, it is easy to the problems such as key loss occur or being replicated can thus bring huge property loss to owner, Even influence the personal safety of owner.
Currently, there are the scheme and process of a set of key management in intermediary company substantially, but this way to manage is established On basis by the implementation capacity of people, it cannot accomplish objective, intelligentized management for key.Due to the key of intermediary company A possibility that spoon management system is the system of a set of management process based on " people ", is made a fault is larger, inefficient.Meanwhile Key is often lack of standardization due to management as a kind of important daily management object, out the case where active, this agency It is all an important loss for company or owner.Also, existing key management method, cannot timely feedback key Position and use state cause turnover rate of the key in intermediate business active procedure not high, reduce the work of intermediary personnel Efficiency.
In addition, the key of multiple communication base stations in a certain region can be collected to a fixed place in the communications field It is managed concentratedly, similarly, in power domain and national defence etc., some region of multiple electric power facilities or national defense facility Key can also be collected to a fixed place and be managed concentratedly.And in above-mentioned field, the management of key is still based on The system of the management process of " people " similarly also will appear the fault in management process.
With the development of Internet of Things, many new and high technologies all promote traditional industries upgrading, improve efficiency, saved at This, obtains good Social benefit and economic benefit.Therefore, the field also highly desirable progress for needing to manage concentratedly in key Industrial upgrading promotes working efficiency and customer satisfaction using more intelligent key management method, saves management cost.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of key management system and key management method, it is existing to solve Key management low efficiency and the problem of be easily lost in technology.
The first aspect of the embodiment of the present invention provides a kind of key management system, including key management equipment, key pipe Platform and terminal device, the key management equipment include key locker and key chain, and positioning function is configured in the key chain Energy and communication function;Wherein,
Key management platform receives application for receiving key, and after receiving application to the key and examining, will Approval results information is sent to terminal device and key locker, and the approval results information includes agreeing to receive information;
Key locker, the approval results information sent for receiving the key management platform, and receiving terminal device After the key chain of submission receives request, receives information according to the agreement request is received to the key chain and verify, if testing Card passes through, then pop-up receives the key chain that information matches with the agreement;
Key chain, for being put down based on the positioning function and communication function to the key management after leaving key locker Platform feeds back the location information of itself, and after the key for receiving terminal device submission is received request and is verified, pop-up is put At least key being placed in the key chain;
Terminal device receives the key management platform for submitting key to receive application to the key management platform The approval results information of feedback receives information according to the agreement and submits key chain to receive request, Xiang Suoshu to the key locker Key chain submits key to receive request.
The second aspect of the embodiment of the present invention provides a kind of key management method, is applied to terminal device, the method Include:
Determine that key to be received, the key to be received have corresponding key ID, the key ID and a key Detaining ID has corresponding relationship;
According to User ID and the key chain ID, generates key and receive application;
The key is received into application and is sent to key management platform;
The approval results information of the key management platform feedback is received, the approval results information includes agreeing to receive letter Breath;
Receive information according to the agreement submits key chain to receive request to key locker, with indicate key locker pop-up and The corresponding key chain of the key chain ID;
In the preset range of target position, Xiang Suoshu key chain submits key to receive request, to indicate the key chain At least key being placed in the key chain is popped up, the target position is the position of the assets to match with the key It sets.
The third aspect of the embodiment of the present invention provides a kind of key management method, is applied to key locker, the method packet It includes:
It receives the agreement that key management platform is sent and receives information, it includes User ID and key in information that the agreement, which is received, Detaining ID, the key chain ID and at least one key ID has corresponding relationship;
After the key chain for receiving terminal device submission receives request, extracts the key chain and receive the user in requesting ID and key chain ID;
Verify that the key chain receives User ID in request and key chain ID and user in information is received in the agreement Whether ID and key chain ID are identical;
If so, determining the corresponding key chain of the key chain ID, and the key chain is popped up from the key locker, An at least key corresponding with the key ID is placed in the key chain.
The fourth aspect of the embodiment of the present invention provides a kind of key management method, is applied to key chain, the key chain In be configured with positioning function and communication function, which comprises
Whether detection key chain leaves key locker, and an at least key is placed in the key chain;
If whether the key chain leaves key locker, start positioning function, is based on the positioning function, acquisition is worked as in real time Preceding location information;
Based on the communication function, the location information is sent to key management platform according to default frequency;
Receive terminal device submission key receive request after, according to the key receive request in User ID and Key chain ID pops up at least key being placed in the key chain.
5th aspect of the embodiment of the present invention provides a kind of key management method, is applied to key management platform, described Method includes:
The key that receiving terminal apparatus is sent receives apply, and the key is received in application including User ID and key ID, A key ID and key chain ID has corresponding relationship;
Application is received to the key according to the User ID and key chain ID to examine, and generates approval results information;
The approval results information is sent to terminal device and key locker;
After the location information for receiving key chain acquisition, according to the location information, the movement of the key chain is drawn Track.
6th aspect of the embodiment of the present invention provides a kind of terminal device, including memory, processor and is stored in In the memory and the computer program that can run on the processor, when the processor executes the computer program The step of realizing above-mentioned key management method.
7th aspect of the embodiment of the present invention provides a kind of key locker, including memory, processor and is stored in institute The computer program that can be run in memory and on the processor is stated, the processor executes real when the computer program The step of existing above-mentioned key management method.
The eighth aspect of the embodiment of the present invention provides a kind of key chain, including memory, processor and is stored in institute The computer program that can be run in memory and on the processor is stated, the processor executes real when the computer program The step of existing above-mentioned key management method.
9th aspect of the embodiment of the present invention provides a kind of key management platform, including memory, processor and deposits The computer program that can be run in the memory and on the processor is stored up, the processor executes the computer journey The step of above-mentioned key management method is realized when sequence.
Tenth aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage Media storage has the step of computer program, the computer program realizes above-mentioned key management method when being executed by processor.
Compared with prior art, the embodiment of the present invention includes following advantages:
The embodiment of the present invention can eliminate key management mistake by being intelligently managed to key to greatest extent Human factor in journey reduces the fault of key management, promotes the efficiency of management;It, can be real-time by being positioned to key The working condition for solving key, improves the utilization rate and turnover rate of key, promotes the efficiency of business activity, and then promote economic benefit Promotion.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described.It should be evident that the accompanying drawings in the following description is only of the invention some Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is a kind of schematic diagram of key management system of one embodiment of the invention;
Fig. 2 is a kind of system architecture schematic diagram of key management system of one embodiment of the invention;
Fig. 3 is a kind of operation flow schematic diagram of key management system of one embodiment of the invention;
Fig. 4 is a kind of step flow diagram of key management method of one embodiment of the invention;
Fig. 5 is the step flow diagram of another key management method of one embodiment of the invention;
Fig. 6 is the step flow diagram of another key management method of one embodiment of the invention;
Fig. 7 is the step flow diagram of another key management method of one embodiment of the invention;
Fig. 8 is a kind of schematic diagram of key management device of one embodiment of the invention;
Fig. 9 is the schematic diagram of another key management device of one embodiment of the invention;
Figure 10 is the schematic diagram of another key management device of one embodiment of the invention;
Figure 11 is the schematic diagram of another key management device of one embodiment of the invention;
Figure 12 is a kind of schematic diagram of terminal device of one embodiment of the invention.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed Body details, to understand thoroughly the embodiment of the present invention.It should be apparent, however, to those skilled in the art that there is no these specific thin The present invention also may be implemented in the other embodiments of section.In other cases, it omits to well-known system, device, circuit And the detailed description of method, in case unnecessary details interferes description of the invention.
Illustrate technical solution of the present invention below by specific embodiment.
Referring to Fig.1, a kind of schematic diagram of key management system of one embodiment of the invention is shown, the key management system System may include key management equipment, key management platform and terminal device.Above-mentioned key management equipment includes key locker and key Key ring, wherein positioning function and communication function are configured in key chain.
It should be noted that key management system provided in this embodiment can be used for any needing to be managed key Scene in.For example, house property medium is managed the key in owner house, alternatively, telecommunications room administrative staff are to each machine The key in room is managed, etc..The present embodiment is not construed as limiting the concrete application scene of this system.
In order to make it easy to understand, the present embodiment carries out subsequent introduction and explanation by taking the key management of house property medium as an example.It can With understanding, the key management system in the present embodiment is also applied to the communications field, power domain, national defence etc. and needs In the occasion to be managed concentratedly to key.
In embodiments of the present invention, key management platform can receive key and receive application, and receive application to key After being examined, approval results information is generated, so that approval results information is sent to terminal device and key locker, above-mentioned examination & approval Result information may include agreeing to that receiving information or refusal receives information.
It should be noted that key management platform can be a kind of server platform, which can pass through terminal device At least one user interface is externally provided, platform administrator is allowed to pass through the corresponding affairs of the user interface process.
In the concrete realization, key receive application can be user (i.e. house property medium personnel) pass through terminal device initiate 's.It is anti-can also to receive key management platform other than for submitting key to receive application to key management platform for terminal device The approval results information of feedback, according to agreeing to that receive information submits key chain to receive request to key locker, to key chain submission key Receive request etc..Above-mentioned terminal device can be the mobile terminals such as mobile phone, tablet computer, be also possible to the equipment such as PC machine.? In the present embodiment, uniformly takes the mobile phone as an example and carry out subsequent introduction.
In general, intermediary personnel when receiving key, can submit my information i.e. by the service-specific APP on mobile phone User ID, and key ID to be received.
It is the key by key management platform in general, needing first to register the key in key centralized management Key ID is distributed, is then placed it in some key chain, which also has a key chain ID.
Therefore, key management platform can receive key registration request, for key registration request, distribute key for key ID establishes the corresponding relationship between key ID and the key chain ID of particular key key ring.Above-mentioned key registration request can be by key Spoon administrative staff initiate.
Certainly, key management platform can also be responsible for handling key cancellation matters.For example, after certain set house is sold, The key of the rent needs to nullify in key management platform.At this point, key management personnel can initiate the cancellation of the key Request.
Therefore, in embodiments of the present invention, key management platform can be after receiving key de-registration request, for key De-registration request, nullifies the key ID of the key, and nullifies the corresponding relationship between key ID and key chain ID, by key chain The corresponding key chain of ID is set as blank state.Above-mentioned blank state, which can be understood as the key chain, can be used for placing other keys Spoon.
Similar, key management platform can also handle the matters such as registration and the cancellation of user.
That is, key management platform can receive user's registration request, requested for user's registration, for user's distributing user ID, and when receiving the instruction of logging off users ID, nullify above-mentioned User ID.
It should be noted that above-mentioned User ID, key ID and key chain ID should all be uniquely, between each other mutually It does not repeat.
Due between key ID and key chain ID there is corresponding relationship can pass through key after establishing above-mentioned corresponding relationship Key ring ID, which is realized, is managed collectively key chain and placement key therein.
Therefore, key management platform can extract the key and receive the use in applying after receiving upper key and receiving application Family ID and key chain ID, and it is verified.
In verifying, whether key management platform, which can verify the User ID and have, receives key chain ID and corresponds to key Permission, and verify key chain ID and correspond to whether key is placed in key locker.That is, key management platform can be with agency people Whether whether member allows to receive the key and the key, which is not received by other intermediaries personnel currently, is verified.
If above-mentioned User ID have receive key chain ID correspond to the permission of key and key chain ID correspond to key placement In key locker, then key management platform can generate according to User ID and key chain ID and agree to receive information, and will have agreed to lead Terminal device and key locker are sent to information.
If above-mentioned User ID does not have and receives that key chain ID corresponds to the permission of key or key chain ID corresponds to key It not being placed in key locker, then key management platform equally can generate refusal according to User ID and key chain ID and receive information, And refusal is received into information and is sent to terminal device, inform that the current key of intermediary personnel can not be received.
In embodiments of the present invention, key locker is a kind of equipment for containing key button and key.In general, a key May include having multiple key positions in case, a key chain can be placed in each key position, be placed in each key chain to A few key.
Above-mentioned key locker can be connect with key management Platform communication, and can receive examining for key management platform transmission Result information is criticized, to receive information pair according to above-mentioned agreement after the key chain for receiving terminal device submission receives request The key chain is received request and is verified, if being verified, pop-up receives the key chain that information matches with agreement.
In embodiments of the present invention, the key chain that terminal device is submitted, which is received request and be can be, scans key locker by mobile phone The two dimensional code or bar code generating of offer at, above-mentioned key chain receive request in can also carry User ID and key chain ID. After the two dimensional code or bar code that intermediary personnel scan that key locker provides, key locker can extract key chain and receive the use in requesting Family ID and key chain ID, verifying key chain receive the User ID in requesting and key chain ID and receive letter with the agreement being previously received Whether the User ID and key chain ID in breath are identical, if key chain receives User ID in request and use in information is received in agreement Family ID is identical and key chain to receive key chain ID in request identical as agreeing to receive key chain ID in information, then it is assumed that verify Pass through, key locker can determine the corresponding key chain of key chain ID, and the key chain is popped up from key locker.
In embodiments of the present invention, key chain can be after leaving key locker, based on the positioning function of configuration to key pipe Platform feeds back the location information of itself, and after the key for receiving terminal device submission is received request and is verified, bullet At least key being placed in key chain out.Above-mentioned positioning function can be by key chain configure positioning chip or With what is realized using other modes, the present embodiment is not construed as limiting this.
It in embodiments of the present invention, can be according to key management in order to realize management of the key management platform to key chain The instruction that platform issues carries out parameter configuration to key chain.
In the concrete realization, key management platform can be after receiving the request of key chain parameter setting, according to key chain Parameter setting request generates key chain parameter setting instruction, and the key chain parameter setting instruction is issued to key chain, to refer to Show that key chain carries out parameter configuration.For example, the configuration etc. of positional parameter.
In general, house key is exactly one block of metal strip, itself does not have anti-tamper, the ability of anti-copying.Therefore, this reality It applies example and key is placed in the key chain with characteristics such as tamper, alarms, can only could open key chain by specific purpose tool, Key is taken out, ensure that the safety of key.
In embodiments of the present invention, key chain can have anti-violence dismantling function.It is torn open in key chain itself by violence Xie Shi can trigger dismantling-proof alarming information, and above-mentioned dismantling-proof alarming information is sent to key management platform, so that key management Platform can position the key chain when receiving dismantling-proof alarming information.
In embodiments of the present invention, the service-specific APP scanning in mobile phone can be used in normal use in intermediary personnel Two dimensional code on key chain, after verifying, key chain could pop up key.After key is finished, intermediary personnel are again by key It promotes in key chain.
In embodiments of the present invention, it can also include target position in information that the agreement that key management platform generates, which is received, The information of information, above-mentioned target position can be the location information of the assets to match with the key.For example, intermediary personnel are in band Visitor sees the position in the house that room to be gone to.
The agreement can be received information and be forwarded to key chain by key locker after receiving agreement and receiving information.Therefore, key Key ring can first verify that whether current location is located at target position after the key for receiving terminal device submission receives request Preset range in.Above-mentioned preset range can be set according to actual needs, for example, can be set as the house to be seen 1 is public In in etc., the present embodiment is not construed as limiting this.
If verified, current location is located in the preset range of target position, and key chain can extract key and receive request In User ID and key chain ID, verify that the key receives User ID in request and key chain ID and key management platform generate Agreement receive User ID in information and whether key chain ID identical.If the User ID that key is received in request is received with agreement User ID in information is identical and key to receive the key chain ID that the key chain ID in request is received with agreement in information identical, then Think to be verified, at least key being placed in key chain can be popped up.
In embodiments of the present invention, above-mentioned key chain can use preconfigured positioning function after leaving key locker, Current location information, and the communication function based on configuration are acquired in real time, and location information is sent to key according to default frequency Manage platform.For example, current location information can be sent to by key chain by every 30 seconds frequency primary or once every minute Key management platform.
Key management platform can draw the motion track of key chain after receiving location information with above-mentioned location information, To realize the real-time locating and monitoring to key chain and key.
In embodiments of the present invention, above-mentioned key management system can also include inquiry terminal, which can be Terminal device, such as mobile phone used in the actual holder of the assets such as house etc..
Key management platform can push the motion track of above-mentioned key chain after drawing out the motion track of key chain Into mobile phone used in main business, owner is allowed to determine corresponding key chain according to key ID, the shifting based on key chain Dynamic rail mark inquires the location information of key, realizes the real-time positioning to key.
In embodiments of the present invention, in order to further ensure the safety of key, key management platform can also be to key chain Motion track whether exceed predeterminable area and verified.If above-mentioned motion track has exceeded predeterminable area, rail can be generated Mark warning message, and the track warning message is sent to key chain, instruction key chain triggers track warning function.
In the concrete realization, according to the specific location of the assets such as house, key management platform can be pre-generated from specified Path profile of the position to the house.For example, the path profile comprising the track route from shops, intermediary to the house.Receiving key The location information of key ring and after generating motion track, key management platform can verify whether the track has exceeded above-mentioned path profile Range.If it was exceeded, it is considered that the key chain and key are not sent to house position according to preset route, It is possible that being stolen or occurring other situations.At this point, key management platform can issue track warning message to key chain, key is indicated Key ring triggers track warning function.
In embodiments of the present invention, intermediary personnel need to be placed back into key in key chain after having used key, and will Key chain is placed back into key locker.
After key chain and its key are placed on key locker, key locker can be confirmed that the key chain ID of the key is first No is identical as the key chain ID that first agreement is received in information.The key for confirming the key currently put back to and taking out before It whether is same.
If so, key locker, which then can generate key according to key chain ID, gives back information, and gives back key to information and be sent to Key management platform records event by key management platform, and that completes key entirely takes also process.
The present embodiment is by being intelligently managed key, during capable of eliminating key management to greatest extent Human factor reduces the fault of key management, promotes the efficiency of management;By positioning to key, key can be understood in real time Working condition, improve the utilization rate and turnover rate of key, promote the movable efficiency of intermediate business, promote economic benefit.
In order to make it easy to understand, with reference to the accompanying drawing, with a specific example, making to the key management system of the present embodiment One complete description.
As shown in Fig. 2, being a kind of system architecture schematic diagram of key management system of one embodiment of the invention, the system It include key chain, key locker, key management platform and respectively for intermediary personnel and owner's using terminal equipment, intermediary personnel Respective function can be realized by different APP with owner.
In embodiments of the present invention, key chain assigns on key locker, and key locker can perceive key chain, and energy and key chain Communication.Meanwhile key locker can be by LAN optimization to key management platform, and real time communication.
Key management platform may operate in LAN server or cloud network, which is able to record the institute of key There is information, and key track is drawn according to location information.According to the operational characteristic and scale of intermediary company, key pipe can choose All data are all pooled to server or cloud by the different running method of platform.
The key management system of the present embodiment can provide two APP, one be intermediary administrative staff and business personnel The service-specific APP installed on mobile phone, the other is the owner installed on owner's mobile phone inquires APP.Two APP can pass through Mobile phone mobile network obtains the positioning and use information of key from server or cloud network.
As shown in figure 3, being a kind of operation flow schematic diagram of key management system of one embodiment of the invention, above-mentioned industry Process of being engaged in mainly includes three processes.
(1) key process is taken
1) intermediary personnel initiate key according to business demand on service-specific APP or personal work computer and receive Shen Please;
2) key that administrative staff give an written reply intermediary personnel on service-specific APP or personal work computer receives Shen Please;
3) key locker is received the agreement given an written reply by network and receives information, is got to intermediary personnel;
4) intermediary personnel by service-specific APP scan key locker on two dimensional code, key locker by verifying User ID and Key chain ID confirms that the key of intermediary personnel is received application and given an written reply, pops up corresponding key chain.
(2) key track following process
1) key chain once leaves key locker, then starts to start location tracking function, and pass through mobile network or Internet of Things Net network is the location of to server time-triggered report oneself;
2) after intermediary personnel arrive at the destination, the two dimensional code on key chain, key chain confirmation are scanned by service-specific APP Intermediary personnel have authorized, then pop up key;
3) after the completion of related service activity, intermediary personnel promote key in key chain;
4) server stores the key positioner information data received, and these data informations are carried out map Match, to complete real-time rendering and the tracking of track.
(3) key process is given back
1) after the activity of intermediary personnel finishing service, key locker is inserted a key into;
2) key chain closes location tracking function, starting charging and the communication with key locker;
3) key locker perception key playback, and confirm it is the outgoing key of authorization;
4) key locker, which records and sends key to server, gives back information, and key authorization is completed.
Referring to Fig. 4, a kind of step flow diagram of key management method of one embodiment of the invention is shown, specifically It may include steps of:
S401, determine that key to be received, the key to be received have corresponding key ID, the key ID and one Key chain ID has corresponding relationship;
S402, according to User ID and the key chain ID, generate key and receive application;
S403, it the key is received into application is sent to key management platform;
It should be noted that the present embodiment is the introduction carried out from terminal equipment side to above-mentioned key management method.
In embodiments of the present invention, above-mentioned terminal device can refer to mobile phone, tablet computer used in intermediary person etc. Equipment.
Intermediary personnel can determine key ID to be received first, pass through the industry in mobile phone after needing to receive key It is engaged in filling in User ID and key ID on dedicated APP, generates key and receive and apply and be committed to key management platform.Key ID with One key chain ID is corresponding.
S404, the approval results information for receiving the key management platform feedback, the approval results information includes agreeing to Receive information;
Key management platform can receive application to above-mentioned key and examine, and be confirmed whether that intermediary personnel is allowed to receive The key.If agreeing to, intermediary personnel receive key, and key management platform can be generated agreement and receive information and send it to The mobile phone of intermediary personnel and the key locker for storing the key.
S405, agree to that receive information submits key chain to receive request to key locker according to described, to indicate the key locker Pop up key chain corresponding with the key chain ID;
When formally taking key, the two dimensional code of service-specific APP scanning key locker is can be used in intermediary personnel, submits key Key ring receives request, which is that storage needs to be received the key chain of key.
Key locker after receiving key chain and receiving request, can by verifying User ID and key chain ID whether with key User ID in information is received in the agreement that issues of management platform and key chain ID is identical, is confirmed whether to pop up corresponding key chain.
S406, in the preset range of target position, Xiang Suoshu key chain submit key receive request, to indicate the key Key ring pops up at least key being placed in the key chain, and the target position is the assets to match with the key Position.
Intermediary personnel can continue to use service-specific APP scanning key chain after holding key chain and going to target position On two dimensional code, submit key receive request.Key chain can continue the body of agency personnel according to User ID and key chain ID Part is verified, and key therein is stored in pop-up after being verified.
It should be noted that a more than key can be stored in a key chain.For example, to Mr. Yu's suite room, one The more keys in the house can be stored in key chain, the present embodiment is not construed as limiting this.
Referring to Fig. 5, the step flow diagram of another key management method of one embodiment of the invention is shown, is had Body may include steps of:
S501, the agreement for receiving the transmission of key management platform receive information, and it includes User ID in information that the agreement, which is received, There is corresponding relationship with key chain ID, the key chain ID and at least one key ID;
It should be noted that the present embodiment is the introduction carried out from key locker side to above-mentioned key management method.
In embodiments of the present invention, agree to receive information and can be to be generated by key management platform and be issued to key locker 's.
S502, receive terminal device submission key chain receive request after, extract the key chain and receive in request User ID and key chain ID;
In embodiments of the present invention, intermediary personnel can scan the side of key locker two dimensional code by using service-specific APP Formula submits key chain to receive application to key locker, and this application may include User ID and key chain ID.
S503, the verifying key chain receive the User ID in requesting and key chain ID and the agreement is received in information Whether User ID and key chain ID are identical;
Key locker can verify this application after receiving above-mentioned application, it is determined whether allow current intermediary Personnel receive the key.
In the concrete realization, key locker can verify key chain receive User ID in request whether with formerly receive Agree to that the User ID received in information is identical, key chain receives whether the key chain ID in request receives in information in agreement Key chain ID is identical.Only in User ID and key chain ID all the same, just think that above-mentioned application is verified.
S504, if so, determine the corresponding key chain of the key chain ID, and by the key chain from the key locker It pops up, is placed with an at least key corresponding with the key chain ID in the key chain.
In receiving after application is verified for key locker agency personnel, the key of storage key ID can be found out Button, and the key chain is popped up from key locker, it is taken for intermediary personnel.
In embodiments of the present invention, whether key locker can also detect the corresponding key chain of above-mentioned key chain ID and its key It is placed in key locker, that is, detects the key chain received and whether key is given back by intermediary personnel.
If so, can generate key according to key chain ID gives back information, and gives back key to information and be sent to key pipe Platform records this key for key management platform and takes event.
Referring to Fig. 6, the step flow diagram of another key management method of one embodiment of the invention is shown, is had Body may include steps of:
Whether S601, detection key chain leave key locker, and an at least key, the key are placed in the key chain Positioning function and communication function are configured in button;
If whether S602, the key chain leave key locker, start positioning function, is based on the positioning function, in real time Acquire current location information;
It should be noted that the present embodiment is the introduction carried out from key chain side to above-mentioned key management method.
In embodiments of the present invention, a positioning chip can be configured in key chain, realized by the positioning chip to key The positioning of key ring.
It in the concrete realization, is usually safety in key locker since key chain is placed on.It therefore, can be only in key After key ring leaves key locker, the automatic positioning function of unlocking key button, acquisition position information.
S603, it is based on the communication function, the location information is sent to key management platform according to default frequency;
In embodiments of the present invention, the location information of key chain can be sent to key management platform with certain frequency, Key chain and key are positioned for key management platform.
S604, receive terminal device submission key receive request after, according to the key receive request in use Family ID and key chain ID pops up at least key being placed in the key chain.
In embodiments of the present invention, key is received request and be can be by intermediary personnel by using service-specific APP scanning What the two dimensional code on key chain was initiated.
Key chain receive terminal device submission key receive request after, can determine first current location whether position In in the preset range of target position, above-mentioned target position can be the position of the assets to match with key.I.e. confirmation is current Whether position is in a certain range of the assets such as house, in 1 kilometer.
If current location is located in the preset range of target position, key chain can receive request to above-mentioned key and carry out Verifying.Specifically, it key can be verified receives User ID in request and key chain ID and receive letter with the agreement that is previously received Whether the User ID and key chain ID in breath are identical, and above-mentioned agreement, which is received information and be can be, is transmitted to key chain by key locker.
If the User ID that above-mentioned key receives in request is received with agreement, the User ID in information is identical and key is received and asked The key chain ID asked is identical as agreeing to receive key chain ID in information, it may be considered that being verified, can pop up placement An at least key in the key chain.
In embodiments of the present invention, the location information that key management platform can be acquired according to key chain draws key chain Motion track, and above-mentioned motion track and predeterminable area are compared.If above-mentioned motion track has exceeded predeterminable area model It encloses, key management platform can generate track warning message simultaneously according to the motion track of key chain and the comparison result of predeterminable area It is issued to key chain.
When receiving the track warning message of key management platform transmission, key chain can be touched according to track warning message Hair alarm.
In embodiments of the present invention, when key chain itself is disassembled by violence, dismantling-proof alarming information can be triggered, and will Dismantling-proof alarming information is sent to key management platform, by key management platform according to certain safe handling strategy to the key chain Carry out location tracking.
Referring to Fig. 7, the step flow diagram of another key management method of one embodiment of the invention is shown, is had Body may include steps of:
The key that S701, receiving terminal apparatus are sent receives application, and it includes User ID and key in application that the key, which is received, Spoon ID, the key ID and a key chain ID have corresponding relationship;
It should be noted that the present embodiment is the introduction carried out from key management platform side to above-mentioned key management method.
In embodiments of the present invention, key management platform can be a kind of server platform, which can pass through terminal Equipment externally provides at least one user interface, and platform administrator is allowed to pass through the corresponding affairs of the user interface process.
S702, it application is received to the key according to the User ID and key chain ID examines, generate approval results Information;
In embodiments of the present invention, approval results information may include two kinds, and one is agreements to receive information, and one is refuse Information is received absolutely.When the key of agency personnel is received application and examined, can verify User ID is key management platform It is no have receive the permission that key chain ID corresponds to key, and, verify key chain ID and correspond to whether key is placed in key In case.
If above-mentioned User ID have receive key chain ID correspond to the permission of key and key chain ID correspond to key placement In key locker, then it can be generated according to User ID and key chain ID and agree to receive information;It is received if above-mentioned User ID does not have Key chain ID corresponds to the permission of key or key chain ID corresponds to key and is not placed in key locker, then can be according to user ID and key chain ID generates refusal and receives information.
S703, the approval results information is sent to terminal device and key locker;
Information is received in above-mentioned agreement or refusal is received information and can be sent on mobile phone used in intermediary personnel, simultaneously Also key locker can be sent to.
S704, receive key chain acquisition location information after, according to the location information, draw the key chain Motion track.
In embodiments of the present invention, key chain can use preconfigured positioning function, in real time after leaving key locker Current location information is acquired, and based on configuration and the communication function in key chain, is sent location information according to default frequency To key management platform.For example, key chain can be by every 30 seconds primary or frequency once every minute by current location information It is sent to key management platform.
Key management platform can draw the motion track of key chain after receiving location information with above-mentioned location information, To realize the real-time locating and monitoring to key chain and key.
In embodiments of the present invention, in order to further ensure the safety of key, key management platform can also be to key chain Motion track whether exceed predeterminable area and verified.If above-mentioned motion track has exceeded predeterminable area, rail can be generated Mark warning message, and the track warning message is sent to key chain, instruction key chain triggers track warning function.
In addition, key locker can give birth to after detecting that the corresponding key chain of key chain ID and its key are placed on key locker Information is given back at key, the above-mentioned key that key management platform can receive key locker transmission gives back information, to this key The event of taking recorded.
It should be noted that each embodiment of the method is similar with aforementioned system embodiment, and between each embodiment of the method, And the realization details between each embodiment of the method and system embodiment can be mutually refering to each step in above-described embodiment The size of serial number is not meant that the order of the execution order yet, and the execution sequence Ying Yiqi function and internal logic of each process are true Fixed, the implementation process of the embodiments of the invention shall not be constituted with any limitation.
Referring to Fig. 8, a kind of schematic diagram of key management device of one embodiment of the invention is shown, is set applied to terminal Standby, above-mentioned apparatus can specifically include following module:
Determining module 801, for determining that key to be received, the key to be received have corresponding key ID, institute A key ID and key chain ID is stated with corresponding relationship;
Generation module 802, for generating key and receiving application according to User ID and the key chain ID;
Sending module 803 is sent to key management platform for the key to be received application;
Receiving module 804, for receiving the approval results information of the key management platform feedback, the approval results letter Breath includes agreeing to receive information;
First submits module 805, submits key chain to receive request to key locker for receiving information according to the agreement, with Indicate that the key locker pops up key chain corresponding with the key chain ID;
Second submits module 806, in the preset range of target position, Xiang Suoshu key chain to be submitted key to receive and asked Ask, to indicate that the key chain pops up at least key being placed in the key chain, the target position be with it is described The position for the assets that key matches.
Referring to Fig. 9, the schematic diagram of another key management device of one embodiment of the invention is shown, is applied to key Case, above-mentioned apparatus can specifically include following module:
Information is received in receiving module 901, the agreement for receiving the transmission of key management platform, and the agreement is received in information There is corresponding relationship including User ID and key chain ID, the key chain ID and at least one key ID;
Extraction module 902 extracts the key chain after receiving request in the key chain for receiving terminal device submission Receive the User ID and key chain ID in request;
Authentication module 903 receives the User ID in requesting and key chain ID and the agreement for verifying the key chain It receives User ID in information and whether key chain ID is identical;
Pop-up module 904 is used for if so, determine the corresponding key chain of the key chain ID, and by the key chain from It is popped up in the key locker, an at least key corresponding with the key chain ID is placed in the key chain.
In embodiments of the present invention, described device can also include following module:
Detection module, for detecting whether the corresponding key chain of the key chain ID and its key are placed on the key In case;
Sending module, for and the key being given back if so, generating key according to the key chain ID gives back information Information is sent to the key management platform.
Referring to Fig.1 0, the schematic diagram of another key management device of one embodiment of the invention is shown, key is applied to Key ring is configured with positioning function and communication function in the key chain, and above-mentioned apparatus can specifically include following module:
Detection module 1001 is placed at least one for detecting whether key chain leaves key locker in the key chain Key;
Acquisition module 1002 starts positioning function if whether leaving key locker for the key chain, based on described fixed Bit function acquires current location information in real time;
The location information is sent to key according to default frequency for being based on the communication function by sending module 1003 Spoon management platform;
Pop-up module 1004 is led after receiving request in the key for receiving terminal device submission according to the key With the User ID and key chain ID in request, at least key being placed in the key chain is popped up.
In embodiments of the present invention, the pop-up module can specifically include following submodule:
It determines submodule, after receiving request in the key for receiving terminal device submission, whether determines current location In the preset range of target position, the target position is the position of the assets to match with the key;
Submodule is verified, if being located in the preset range of the target position for the current location, described in verifying Key receives User ID in request and key chain ID receives User ID and key chain in information with the agreement that is previously received Whether ID is identical, and the agreement receives information and is transmitted to the key chain by key locker;
Submodule is popped up, agrees to receive the user in information with described if receiving the User ID in request for the key ID is identical and the key to receive the key chain ID in request identical as the key chain ID for agreeing to receive in information, then pop up At least key being placed in the key chain.
In embodiments of the present invention, described device can also include following module:
Track alarm module, for when receiving the track warning message that the key management platform is sent, according to institute The triggering alarm of track warning message is stated, the track warning message is by the key management platform according to the movement of the key chain The comparison result of track and predeterminable area generates, and the motion track of the key chain is by the key management platform according to the key The location information of key ring acquisition is drawn.
In embodiments of the present invention, described device can also include following module:
Dismantling-proof alarming module, for when the key chain itself is disassembled by violence, triggering dismantling-proof alarming information, and will The dismantling-proof alarming information is sent to the key management platform.
Referring to Fig.1 1, the schematic diagram of another key management device of one embodiment of the invention is shown, key is applied to Spoon management platform, above-mentioned apparatus can specifically include following module:
Receiving module 1101, the key sent for receiving terminal apparatus receive application, and the key is received to be wrapped in application Including User ID and key ID, the key ID and a key chain ID has corresponding relationship;
Generation module 1102 is examined for receiving application to the key according to the User ID and key chain ID, Generate approval results information;
Sending module 1103, for the approval results information to be sent to terminal device and key locker;
Drafting module 1104, for according to the location information, drawing after the location information for receiving key chain acquisition The motion track of the key chain.
In embodiments of the present invention, described device can also include following module:
Key registration request receiving module, for receiving key registration request;
Key ID distribution module distributes key ID for being directed to the key registration request for key;
Corresponding relation building module, for establishing the corresponding pass between the key ID and the key chain ID of particular key key ring System.
In embodiments of the present invention, described device can also include following module:
Key de-registration request receiving module, for receiving key de-registration request;
Key cancellation module nullifies the key ID of the key, and nullify institute for being directed to the key de-registration request State the corresponding relationship between key ID and the key chain ID;
Key chain state setting module, for setting blank state for the corresponding key chain of the key chain ID.
In embodiments of the present invention, described device can also include following module:
User's registration request receiving module, for receiving user's registration request;
User ID distribution module is user's distributing user ID for requesting for the user's registration;
User log off module, for nullifying the User ID when receiving the instruction for nullifying the User ID.
In embodiments of the present invention, the approval results information includes agreeing to that receiving information or refusal receives information, described Generation module 1102 can specifically include following submodule:
Submodule is verified, for verifying whether the User ID has the permission received the key chain ID and correspond to key, And it verifies the key chain ID and corresponds to whether key is placed in the key locker;
First generates submodule, receives permission and institute that the key chain ID corresponds to key if having for the User ID It states key chain ID and corresponds to key and be placed in the key locker, then generated according to the User ID and key chain ID and agree to receive letter Breath;
Second generate submodule, if do not have for the User ID receive the key chain ID correspond to key permission or Key chain ID described in person corresponds to key and is not placed in the key locker, then generates refusal according to the User ID and key chain ID Receive information.
In embodiments of the present invention, described device can also include following module:
Parameter setting request receiving module, for receiving the request of key chain parameter setting;
Parameter setting instruction generation module generates key chain parameter setting for requesting according to the key chain parameter setting Instruction;
Parameter setting instruction sending module, for the key chain parameter setting instruction to be issued to the key chain, with Indicate that the key chain carries out parameter configuration.
In embodiments of the present invention, described device can also include following module:
Whether authentication module, the motion track for verifying the key chain exceed predeterminable area;
Indicating module is used for if so, generating track warning message, and the track warning message is sent to the key Key ring indicates the key chain triggering track warning function.
In embodiments of the present invention, described device can also include following module:
Key gives back information receiving module, and the key for receiving key locker transmission gives back information, and the key gives back letter Breath is raw after detecting that the corresponding key chain of the key chain ID and its key are placed on the key locker by the key locker At.
In embodiments of the present invention, described device can also include following module:
Key chain locating module, for when receiving the dismantling-proof alarming information that the key chain is sent, to the key Button is positioned, and by the key chain, the triggering when itself is disassembled by violence generates the dismantling-proof alarming information.
For device embodiment, since it is basically similar to the method embodiment, related so describing fairly simple Place referring to embodiment of the method part explanation.
Referring to Fig.1 2, show a kind of schematic diagram of terminal device of one embodiment of the invention.As shown in figure 12, this reality The terminal device 1200 for applying example includes: processor 1210, memory 1220 and is stored in the memory 1220 and can be The computer program 1221 run on the processor 1210.The processor 1210 executes real when the computer program 1221 Step in the existing above-mentioned each embodiment of key management method, such as step S401 to S406 shown in Fig. 4.Alternatively, the place Reason device 1210 realizes the function of each module/unit in above-mentioned each Installation practice when executing the computer program 1221, such as The function of module 801 to 806 shown in Fig. 8.
Illustratively, the computer program 1221 can be divided into one or more module/units, it is one or Multiple module/the units of person are stored in the memory 1220, and are executed by the processor 1210, to complete the present invention. One or more of module/units can be the series of computation machine program instruction section that can complete specific function, the instruction Section can be used for describing implementation procedure of the computer program 1221 in the terminal device 1200.For example, the calculating Machine program 1221 can be divided into determining module, generation module, sending module, receiving module, the first submission module and second Module is submitted, each module concrete function is as follows:
Determining module, for determining that key to be received, the key to be received have corresponding key ID, the key A spoon ID and key chain ID has corresponding relationship;
Generation module, for generating key and receiving application according to User ID and the key chain ID;
Sending module is sent to key management platform for the key to be received application;
Receiving module, for receiving the approval results information of the key management platform feedback, the approval results information Including agreeing to receive information;
First submits module, submits key chain to receive request to key locker for receiving information according to the agreement, to refer to Show that the key locker pops up key chain corresponding with the key chain ID;
Second submits module, and in the preset range of target position, Xiang Suoshu key chain submits key to receive request, To indicate that the key chain pops up at least key being placed in the key chain, the target position is and the key The position of the assets to match.
The terminal device 1200 can be the calculating such as desktop PC, notebook, palm PC and cloud server Equipment.The terminal device 1200 may include, but be not limited only to, processor 1210, memory 1220.Those skilled in the art can To understand, Figure 12 is only a kind of example of terminal device 1200, does not constitute the restriction to terminal device 1200, may include Than illustrating more or fewer components, certain components or different components are perhaps combined, such as the terminal device 1200 is also It may include input-output equipment, network access equipment, bus etc..
The processor 1210 can be central processing unit (Central Processing Unit, CPU), can be with It is other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng.
The memory 1220 can be the internal storage unit of the terminal device 1200, such as terminal device 1200 Hard disk or memory.The memory 1220 is also possible to the External memory equipment of the terminal device 1200, such as the terminal The plug-in type hard disk being equipped in equipment 1200, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further, the memory 1220 can also both include described The internal storage unit of terminal device 1200 also includes External memory equipment.The memory 1220 is for storing the computer Other programs and data needed for program 1221 and the terminal device 1200.The memory 1220 can be also used for temporarily Ground stores the data that has exported or will export.
The embodiment of the invention also discloses a kind of key locker, including memory, processor and it is stored in the memory In and the computer program that can run on the processor, the processor realize above-mentioned key when executing the computer program The step of key management method of spoon case side.
The embodiment of the invention also discloses a kind of key chain, including memory, processor and it is stored in the memory In and the computer program that can run on the processor, be configured with positioning chip in the key chain, the processor is held The step of realizing the key management method of above-mentioned key chain side when the row computer program.
The embodiment of the invention also discloses a kind of key management platform, including memory, processor and it is stored in described In memory and the computer program that can run on the processor, positioning chip, the place are configured in the key chain The step of reason device realizes the key management method of above-mentioned key management platform side when executing the computer program.
The embodiment of the invention also discloses a kind of computer readable storage medium, the computer-readable recording medium storage There are the step of computer program, the computer program realizes above-mentioned key management method when being executed by processor, above-mentioned calculating Machine readable storage medium storing program for executing can be located in terminal device, key locker, key chain or key management platform.
Those skilled in the art can be understood that, for convenience of description and succinctly, only with above-mentioned each function The division of unit, module is illustrated.In practical application, it can according to need and by above-mentioned function distribution by different function Energy unit, module are completed, i.e., described device/terminal device internal structure is divided into different functional unit or module, with Complete all or part of function described above.Each functional unit in embodiment, module can integrate single in a processing In member, it is also possible to each unit and physically exists alone, can also be integrated in one unit with two or more units, on It states integrated unit both and can take the form of hardware realization, can also realize in the form of software functional units.In addition, each Functional unit, module specific name be also only for convenience of distinguishing each other, the protection scope being not intended to restrict the invention.On The specific work process for stating unit in system, module, can refer to corresponding processes in the foregoing method embodiment, no longer superfluous herein It states.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment The part of load, reference can be made to the related descriptions of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed device/terminal device and method, it can be with It realizes in other way.For example, device described above/terminal device embodiment is only schematical, for example, institute The division of module or unit is stated, only a kind of logical function partition, there may be another division manner in actual implementation, such as Multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately On the one hand, shown or discussed mutual coupling or direct-coupling or communication connection can be through some interfaces, dress It sets or the INDIRECT COUPLING or communication connection of unit, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation All or part of the process in example method, can also instruct relevant hardware to complete, the calculating by computer program Machine program can be stored in computer readable storage medium, and the computer program is when being executed by processor, it can be achieved that above-mentioned each The step of a embodiment of the method.Wherein, the computer program includes computer program code, and the computer program code can Think source code form, object identification code form, executable file or certain intermediate forms etc..The computer readable storage medium It may include: any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic that can carry the computer program code Dish, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described It is appropriate that the content that computer readable storage medium includes can be carried out according to the requirement made laws in jurisdiction with patent practice Increase and decrease, such as do not include electric carrier wave according to legislation and patent practice, computer readable storage medium in certain jurisdictions Signal and telecommunication signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations.Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (34)

1. a kind of key management system, which is characterized in that including key management equipment, key management platform and terminal device, institute Stating key management equipment includes key locker and key chain, is configured with positioning function and communication function in the key chain;Wherein,
Key management platform is received application for receiving key, and after receiving application to the key and examining, will be examined Result information is sent to terminal device and key locker, and the approval results information includes agreeing to receive information;
Key locker, the approval results information sent for receiving the key management platform, and submitted receiving terminal device Key chain receive request after, receive information according to the agreement request received to the key chain and verify, if verifying is logical It crosses, then pop-up receives the key chain that information matches with the agreement;
Key chain, it is anti-to the key management platform based on the positioning function and communication function for after leaving key locker The location information of itself is presented, and after the key for receiving terminal device submission is received request and is verified, pop-up is placed in An at least key in the key chain;
Terminal device receives the key management platform feedback for submitting key to receive application to the key management platform Approval results information, according to it is described agreement receive information to the key locker submit key chain receive request, Xiang Suoshu key Button submits key to receive request.
2. system according to claim 1, which is characterized in that any key chain has corresponding key chain ID;
The key management platform, is also used to receive key registration request, for the key registration request, distributes key for key Spoon ID, establishes the corresponding relationship between the key ID and the key chain ID of particular key key ring.
3. system according to claim 2, which is characterized in that
The key management platform, is also used to receive key de-registration request, for the key de-registration request, nullifies the key Key ID, and nullify the corresponding relationship between the key ID and key chain ID, the key chain ID is corresponding Key chain is set as blank state.
4. system according to claim 1, which is characterized in that
The key management platform is also used to receive user's registration request, requests for the user's registration, for the user point With User ID, and when receiving the instruction for nullifying the User ID, the User ID is nullified.
5. system according to claim 1, which is characterized in that
The key management platform is also used to receive the request of key chain parameter setting, requests according to the key chain parameter setting Key chain parameter setting instruction is generated, and the key chain parameter setting instruction is issued to the key chain, described in instruction Key chain carries out parameter configuration.
6. system according to claim 1, which is characterized in that
The key management platform is also used to after receiving the key and receiving application, is extracted the key and is received in application User ID and key chain ID, verify the User ID and whether have and receive the permission that the key chain ID corresponds to key, verify The key chain ID corresponds to whether key is placed in the key locker, if the User ID, which has, is received ID pairs of the key chain It answers the permission of key and the key chain ID corresponds to key and is placed in the key locker, then according to the User ID and key chain ID, which is generated, to be agreed to receive information, and information is received in the agreement and is sent to terminal device and key locker.
If the User ID does not have and receives that the key chain ID corresponds to the permission of key or the key chain ID corresponds to key It is not placed in the key locker, then generates refusal according to the User ID and key chain ID and receive information, the refusal is led The terminal device is sent to information.
7. system according to claim 6, which is characterized in that
The key locker is also used to after the key chain for receiving terminal device submission receives request, extracts the key chain neck With the User ID and key chain ID in request, verifies the key chain and receive the User ID in requesting and key chain ID and connect in advance User ID in information is received in the agreement received and whether key chain ID is identical, if the key chain receives the use in request Family ID and the agreement receive that User ID in information is identical and the key chain receives key chain ID in request and described same The key chain ID that receives in information of anticipating is identical, it is determined that the corresponding key chain of the key chain ID, and by the key chain from institute It states in key locker and pops up.
8. system according to claim 1, which is characterized in that
The key chain, is also used to after leaving key locker, is based on the positioning function, acquires current location information in real time, And it is based on the communication function, the location information is sent to key management platform according to default frequency;
The key management platform, is also used to draw the motion track of the key chain according to the location information.
9. system according to claim 8, which is characterized in that the key management system further includes inquiry terminal, described Terminal is inquired, for receiving the motion track of the key chain sent by the key management platform, is determined according to key ID Corresponding key chain, the motion track based on the key chain inquire the location information of the key.
10. system according to claim 8, which is characterized in that
Whether the key management platform, the motion track for being also used to verify the key chain exceed predeterminable area, if so, raw It is sent to the key chain at track warning message, and by the track warning message, indicates key chain triggering track report Alert function.
11. system according to claim 8, which is characterized in that
The key locker is also used to agree to that receiving information is forwarded to the key chain for described, described to agree to receive in information also Information including target position, the information of the target position are the location information of the assets to match with the key;
The key chain, be also used to receive terminal device submission key receive request after, verifying current location whether position In in the preset range of the target position, if so, extracting the key receives the User ID in requesting and key chain ID, test Demonstrate,prove that the key receives User ID in request and key chain ID and User ID and key chain ID in information are received in the agreement It is whether identical, if the key receives the key identical and described with the User ID for agreeing to receive in information of the User ID in request It is identical as the key chain ID that the agreement is received in information that spoon receives the key chain ID in requesting, then pop-up is placed in the key An at least key in button.
12. system according to claim 6, which is characterized in that
The key locker is also used to after key chain and its key are placed on the key locker, confirms the key of the key Whether button ID is identical as the key chain ID that the agreement is received in information, if so, according to key chain ID generation key Information is given back, and gives back the key to information and is sent to the key management platform.
13. system according to claim 1, which is characterized in that
The key chain is also used to when the key chain itself is disassembled by violence, triggers dismantling-proof alarming information, and will be described Dismantling-proof alarming information is sent to the key management platform;
The key management platform is also used to position the key chain when receiving the dismantling-proof alarming information.
14. a kind of key management method, which is characterized in that be applied to terminal device, which comprises
Determine that key to be received, the key to be received have corresponding key ID, the key ID and a key chain ID With corresponding relationship;
According to User ID and the key chain ID, generates key and receive application;
The key is received into application and is sent to key management platform;
The approval results information of the key management platform feedback is received, the approval results information includes agreeing to receive information;
Receive information according to the agreement submits key chain to receive request to key locker, with indicate the key locker pop up with it is described The corresponding key chain of key chain ID;
In the preset range of target position, Xiang Suoshu key chain submits key to receive request, to indicate the key chain pop-up At least key being placed in the key chain, the target position are the position of the assets to match with the key.
15. a kind of key management method, which is characterized in that be applied to key locker, which comprises
It receives the agreement that key management platform is sent and receives information, it includes User ID and key chain in information that the agreement, which is received, ID, the key chain ID and at least one key ID have corresponding relationship;
Receive terminal device submission key chain receive request after, extract the key chain receive request in User ID and Key chain ID;
Verify the key chain receive User ID in request and key chain ID and the agreement receive User ID in information and Whether key chain ID is identical;
If so, determining the corresponding key chain of the key chain ID, and the key chain is popped up from the key locker, it is described An at least key corresponding with the key ID is placed in key chain.
16. according to the method for claim 15, which is characterized in that further include:
It detects the corresponding key chain of the key chain ID and its whether key is placed in the key locker;
If so, generating key according to the key chain ID gives back information, and gives back the key to information and be sent to the key Spoon management platform.
17. a kind of key management method, which is characterized in that be applied to key chain, in the key chain configured with positioning function and Communication function, which comprises
Whether detection key chain leaves key locker, and an at least key is placed in the key chain;
If whether the key chain leaves key locker, start positioning function, be based on the positioning function, acquires in real time currently Location information;
Based on the communication function, the location information is sent to key management platform according to default frequency;
After the key for receiving terminal device submission receives request, the User ID and key in request are received according to the key ID is detained, at least key being placed in the key chain is popped up.
18. according to the method for claim 17, which is characterized in that described to be received in the key for receiving terminal device submission After request, User ID and key chain ID in request are received according to the key, pop-up is placed in the key chain at least The step of one key includes:
After the key for receiving terminal device submission receives request, determine whether current location is located at the default model of target position In enclosing, the target position is the position of the assets to match with the key;
If the current location is located in the preset range of the target position, verifies the key and receive the user in requesting ID and key chain ID receives User ID in information with the agreement being previously received and whether key chain ID is identical, the agreement neck The key chain is transmitted to by key locker with information;
If the key receives the User ID in request, the key identical and described with the User ID for agreeing to receive in information is led Identical as the key chain ID for agreeing to receive in information with the key chain ID in request, then pop-up is placed in the key chain An at least key.
19. according to the method for claim 17, which is characterized in that further include:
When receiving the track warning message that the key management platform is sent, is triggered and reported according to the track warning message It is alert, the track warning message by the key management platform according to the motion track of the key chain compared with predeterminable area As a result it generates, the motion track of the key chain is drawn by the key management platform according to the location information that the key chain acquires It makes.
20. according to the method for claim 17, which is characterized in that further include:
When the key chain itself is disassembled by violence, dismantling-proof alarming information is triggered, and the dismantling-proof alarming information is sent To the key management platform.
21. a kind of key management method, which is characterized in that be applied to key management platform, which comprises
The key that receiving terminal apparatus is sent receives apply, and the key is received including User ID and key ID in application, described A key ID and key chain ID has corresponding relationship;
Application is received to the key according to the User ID and key chain ID to examine, and generates approval results information;
The approval results information is sent to terminal device and key locker;
After the location information for receiving key chain acquisition, according to the location information, the motion track of the key chain is drawn.
22. according to the method for claim 21, which is characterized in that further include:
Receive key registration request;
For the key registration request, key ID is distributed for key;
Establish the corresponding relationship between the key ID and the key chain ID of particular key key ring.
23. according to the method for claim 22, which is characterized in that further include:
Receive key de-registration request;
For the key de-registration request, the key ID of the key is nullified, and nullifies the key ID and the key chain Corresponding relationship between ID;
Blank state is set by the corresponding key chain of the key chain ID.
24. according to the method for claim 22, which is characterized in that further include:
Receive user's registration request;
It is requested for the user's registration, is user's distributing user ID;
When receiving the instruction for nullifying the User ID, the User ID is nullified.
25. according to the method for claim 22, which is characterized in that the approval results information include agree to receive information or Refusal receives information, described to receive application to the key according to the User ID and key chain ID and examine, and generates examination & approval The step of result information includes:
It verifies the User ID and whether has and receive the permission that the key chain ID corresponds to key, and, verify the key chain ID corresponds to whether key is placed in the key locker;
If the User ID have receive the key chain ID correspond to the permission of key and the key chain ID correspond to key placement In the key locker, is then generated according to the User ID and key chain ID and agree to receive information;
If the User ID does not have and receives that the key chain ID corresponds to the permission of key or the key chain ID corresponds to key It is not placed in the key locker, then generates refusal according to the User ID and key chain ID and receive information.
26. according to the method for claim 21, which is characterized in that further include:
Receive the request of key chain parameter setting;
It requests to generate key chain parameter setting instruction according to the key chain parameter setting;
The key chain parameter setting instruction is issued to the key chain, to indicate that the key chain carries out parameter configuration.
27. according to the method for claim 26, which is characterized in that further include:
Whether the motion track for verifying the key chain exceeds predeterminable area;
If so, generating track warning message, and the track warning message is sent to the key chain, indicates the key Button triggering track warning function.
28. according to the method for claim 21, which is characterized in that further include:
It receives the key that key locker is sent and gives back information, the key gives back information and detecting the key by the key locker The corresponding key chain of button ID and its key generate after being placed on the key locker.
29. according to the method for claim 21, which is characterized in that further include:
When receiving the dismantling-proof alarming information that the key chain is sent, the key chain is positioned, the dismantling-proof alarming By the key chain, the triggering when itself is disassembled by violence generates information.
30. a kind of terminal device, including memory, processor and storage are in the memory and can be on the processor The computer program of operation, which is characterized in that the processor is realized when executing the computer program such as claim 14 institute The step of stating key management method.
31. a kind of key locker, including memory, processor and storage can transport in the memory and on the processor Capable computer program, which is characterized in that the processor realizes that claim 15-16 such as appoints when executing the computer program The step of one key management method.
32. a kind of key chain, including memory, processor and storage can transport in the memory and on the processor Capable computer program, which is characterized in that positioning chip is configured in the key chain, the processor executes the computer It is realized when program as described in claim any one of 17-20 the step of key management method.
33. a kind of key management platform, including memory, processor and storage are in the memory and can be in the processing The computer program run on device, which is characterized in that positioning chip is configured in the key chain, described in the processor executes It is realized when computer program as described in claim any one of 21-29 the step of key management method.
34. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In the step of realization key management method as described in claim any one of 14-29 when the computer program is executed by processor Suddenly.
CN201910098141.4A 2019-01-31 2019-01-31 Key management system and key management method Active CN109685483B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910098141.4A CN109685483B (en) 2019-01-31 2019-01-31 Key management system and key management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910098141.4A CN109685483B (en) 2019-01-31 2019-01-31 Key management system and key management method

Publications (2)

Publication Number Publication Date
CN109685483A true CN109685483A (en) 2019-04-26
CN109685483B CN109685483B (en) 2021-08-10

Family

ID=66195450

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910098141.4A Active CN109685483B (en) 2019-01-31 2019-01-31 Key management system and key management method

Country Status (1)

Country Link
CN (1) CN109685483B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110164005A (en) * 2019-05-16 2019-08-23 东风小康汽车有限公司重庆分公司 A kind of cancellation method and device of Intelligent key
CN111445605A (en) * 2020-04-14 2020-07-24 长园共创电力安全技术股份有限公司 Unlocking key authorized unlocking method and device and storage medium
CN111524343A (en) * 2020-04-30 2020-08-11 金瓜子科技发展(北京)有限公司 Vehicle monitoring method and device and monitoring equipment
CN112422631A (en) * 2020-10-22 2021-02-26 青岛珞宾智能信息技术有限公司 Key management system based on Internet of things
CN112767578A (en) * 2020-12-29 2021-05-07 南方电网深圳数字电网研究院有限公司 Authorization method, application method, unlocking method, terminal and storage medium
CN113011808A (en) * 2019-12-20 2021-06-22 杭州共享实验科技发展有限公司 Intelligent management method for immobilized high-value antibody reagent
CN113744432A (en) * 2020-05-14 2021-12-03 高翠英 Intelligent key cabinet management system for motor train unit

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201732990U (en) * 2010-07-28 2011-02-02 太平湾发电厂 Intelligent management key device
CN102710016A (en) * 2012-06-01 2012-10-03 江苏省电力公司检修分公司 Intelligent remote hierarchical key management and control system
CN103456065A (en) * 2013-09-27 2013-12-18 李冬 Unattended key management method
US20150169570A1 (en) * 2013-12-18 2015-06-18 Samsung Electronics Co., Ltd. Method and device for managing data
CN106355718A (en) * 2016-09-14 2017-01-25 山东科技大学 Intelligent automobile electronic key system with antitheft and anti-lost functions
CN107424339A (en) * 2017-04-19 2017-12-01 宁波瑞奥物联技术股份有限公司 A kind of intelligent key management system and method
CN108109232A (en) * 2017-12-06 2018-06-01 链家网(北京)科技有限公司 Key management system and method
CN108343315A (en) * 2018-01-25 2018-07-31 国家电网公司 Key management method and terminal device
CN108661459A (en) * 2018-03-19 2018-10-16 李平川 A kind of intelligence handcuffss management system
CN109035507A (en) * 2018-07-10 2018-12-18 武汉瑞莱保能源技术有限公司 A kind of intelligent key management system based on loss protecting

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201732990U (en) * 2010-07-28 2011-02-02 太平湾发电厂 Intelligent management key device
CN102710016A (en) * 2012-06-01 2012-10-03 江苏省电力公司检修分公司 Intelligent remote hierarchical key management and control system
CN103456065A (en) * 2013-09-27 2013-12-18 李冬 Unattended key management method
CN103456065B (en) * 2013-09-27 2016-12-07 李冬 A kind of unmanned key management method
US20150169570A1 (en) * 2013-12-18 2015-06-18 Samsung Electronics Co., Ltd. Method and device for managing data
CN106355718A (en) * 2016-09-14 2017-01-25 山东科技大学 Intelligent automobile electronic key system with antitheft and anti-lost functions
CN107424339A (en) * 2017-04-19 2017-12-01 宁波瑞奥物联技术股份有限公司 A kind of intelligent key management system and method
CN108109232A (en) * 2017-12-06 2018-06-01 链家网(北京)科技有限公司 Key management system and method
CN108343315A (en) * 2018-01-25 2018-07-31 国家电网公司 Key management method and terminal device
CN108661459A (en) * 2018-03-19 2018-10-16 李平川 A kind of intelligence handcuffss management system
CN109035507A (en) * 2018-07-10 2018-12-18 武汉瑞莱保能源技术有限公司 A kind of intelligent key management system based on loss protecting

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
田华等: "基于物联网技术的钥匙智能管理系统的设计与实现", 《科技资讯 SCIENCE & TECHNOLOGY INFORMATION》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110164005A (en) * 2019-05-16 2019-08-23 东风小康汽车有限公司重庆分公司 A kind of cancellation method and device of Intelligent key
CN110164005B (en) * 2019-05-16 2021-04-02 东风小康汽车有限公司重庆分公司 Method and device for logging off intelligent key
CN113011808A (en) * 2019-12-20 2021-06-22 杭州共享实验科技发展有限公司 Intelligent management method for immobilized high-value antibody reagent
CN111445605A (en) * 2020-04-14 2020-07-24 长园共创电力安全技术股份有限公司 Unlocking key authorized unlocking method and device and storage medium
CN111524343A (en) * 2020-04-30 2020-08-11 金瓜子科技发展(北京)有限公司 Vehicle monitoring method and device and monitoring equipment
CN113744432A (en) * 2020-05-14 2021-12-03 高翠英 Intelligent key cabinet management system for motor train unit
CN112422631A (en) * 2020-10-22 2021-02-26 青岛珞宾智能信息技术有限公司 Key management system based on Internet of things
CN112767578A (en) * 2020-12-29 2021-05-07 南方电网深圳数字电网研究院有限公司 Authorization method, application method, unlocking method, terminal and storage medium

Also Published As

Publication number Publication date
CN109685483B (en) 2021-08-10

Similar Documents

Publication Publication Date Title
CN109685483A (en) Key management system and key management method
CN109379369A (en) Single-point logging method, device, server and storage medium
CN106303099B (en) A kind of method, apparatus and system for verifying user's communicating number validity
CN108053042A (en) A kind of outage information is reported and submitted and delivery system
CN104217288A (en) Security management device and system for community comprehensive grid
CN110399533A (en) Funds flow querying method and device
CN104751545A (en) System, method and device for processing permissions of door lock
CN107146124A (en) A kind of implementation method, system and the device of electronics one-way ticket
CN107123045A (en) The data synchronous system and its method of data synchronization merchandised based on bond
CN108765905A (en) Electric power cable well lid on-line intelligence prior-warning device based on NB-IoT
CN105933876B (en) Recognition methods, mobile phone terminal, server and the system of counterfeit short message
CN109769244A (en) Recognition methods, device, equipment and the readable storage medium storing program for executing of abnormal phonecard
CN109359037A (en) A kind of management method of shared device, storage medium and server
CN109086628A (en) A kind of order processing method and relevant apparatus
CN108123961A (en) Information processing method, apparatus and system
CN107993050A (en) A kind of employee information management method, device, terminal device and storage medium
CN108769220A (en) Intelligent ammeter box environmental monitoring installation and monitoring method
CN106992916A (en) A kind of electric power dispatching system and implementation method based on virtual private cloud
CN109005208A (en) Method and apparatus for pushed information
CN103326935B (en) The method and system that a kind of intelligence based on microblog is waited in turn
CN109818958A (en) A kind of computer network intelligent monitor system
CN109495468A (en) Authentication method, device, electronic equipment and storage medium
CN108920309B (en) Method and apparatus for handling information
CN117151736A (en) Anti-electricity fraud management early warning method and system
CN107705384B (en) Attendance checking method, system, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230406

Address after: Room 301, Building 2, No. 42 Dongzhong Road, East District, Guangzhou Economic and Technological Development Zone, Guangdong Province, 510000

Patentee after: TECHTOTOP MICROELECTRONICS Co.,Ltd.

Address before: 510000 No. 483 Wushan Road, Tianhe District, Guangzhou City, Guangdong Province

Patentee before: Zhang Yiqing

TR01 Transfer of patent right