CN109685483B - Key management system and key management method - Google Patents

Key management system and key management method Download PDF

Info

Publication number
CN109685483B
CN109685483B CN201910098141.4A CN201910098141A CN109685483B CN 109685483 B CN109685483 B CN 109685483B CN 201910098141 A CN201910098141 A CN 201910098141A CN 109685483 B CN109685483 B CN 109685483B
Authority
CN
China
Prior art keywords
key
ring
key ring
information
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910098141.4A
Other languages
Chinese (zh)
Other versions
CN109685483A (en
Inventor
张义青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Techtotop Microelectronics Co Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201910098141.4A priority Critical patent/CN109685483B/en
Publication of CN109685483A publication Critical patent/CN109685483A/en
Application granted granted Critical
Publication of CN109685483B publication Critical patent/CN109685483B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/16Real estate
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Business, Economics & Management (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the invention is suitable for the technical field of information, and provides a key management system and a key management method. The key management platform is used for examining and approving the key acceptance application and sending the examination and approval result information to the terminal equipment and the key box; the key box is used for receiving the approval result information, verifying the key ring acceptance request according to the acceptance information, and popping up the key ring matched with the acceptance information if the verification is passed; the key ring is used for feeding back self positioning information to the key management platform after leaving the key box, and popping up at least one key placed in the key ring after receiving a key receiving request and passing verification. The embodiment manages the key intelligently, can eliminate human factors in the key management process to the maximum extent, reduces the error of key management and improves the management efficiency.

Description

Key management system and key management method
Technical Field
The invention belongs to the technical field of information, and particularly relates to a key management system, a key management method, a terminal device, a key box, a key ring, a key management platform and a computer-readable storage medium.
Background
In situations where the key needs to be managed centrally, such as second-hand room trading and house renting markets, the owner usually places the house key at the broker, so that the broker can take the house buyer or the house renter to see the house on site. The intermediary has the problems that due to large personnel flow and heavy business, keys are easily lost or copied, and the like, so that huge property loss is brought to the owner, and even the personal safety of the owner is influenced.
At present, an intermediary company basically has a set of key management scheme and flow, but the management mode is established on the basis of relying on the execution force of people, and objective and intelligent management cannot be realized on keys. Because the key management system of the intermediary company is a system based on a human management flow, the possibility of errors is high, and the efficiency is not high. Meanwhile, as an important daily management object, the key is often lost due to non-standardization of management, which is an important loss for the intermediary companies or owners. In addition, the existing key management method cannot feed back the position and the use state of the key in time, so that the turnover rate of the key in the intermediary business activity process is low, and the working efficiency of intermediary personnel is reduced.
In the communication field, keys of a plurality of communication base stations in a certain area are collected in a fixed place and collectively managed, and similarly, in the power field, the defense field, and the like, keys of a plurality of power facilities or defense facilities in a certain area are collected in a fixed place and collectively managed. In the above-mentioned field, the management of keys is still based on a "human" management process, and similarly, errors may occur in the management process.
With the development of the internet of things, a plurality of high and new technologies promote the upgrading of the traditional industry, the efficiency is improved, the cost is saved, and good social benefit and economic benefit are obtained. Therefore, the industrial upgrading is also urgently expected in the field of key centralized management, the work efficiency and the customer satisfaction are improved by adopting a more intelligent key management method, and the management cost is saved.
Disclosure of Invention
In view of this, embodiments of the present invention provide a key management system and a key management method to solve the problems of low key management efficiency and easy loss in the prior art.
The first aspect of the embodiment of the invention provides a key management system, which comprises key management equipment, a key management platform and terminal equipment, wherein the key management equipment comprises a key box and a key ring, and a positioning function and a communication function are configured in the key ring; wherein the content of the first and second substances,
the key management platform is used for receiving a key acceptance application, and sending approval result information to the terminal equipment and the key box after the key acceptance application is approved, wherein the approval result information comprises acceptance information;
the key box is used for receiving the approval result information sent by the key management platform, verifying the key ring acceptance request according to the acceptance information after receiving the key ring acceptance request submitted by the terminal equipment, and popping up a key ring matched with the acceptance information if the verification is passed;
the key ring is used for feeding back self positioning information to the key management platform based on the positioning function and the communication function after leaving the key box, and popping up at least one key placed in the key ring after receiving a key receiving request submitted by the terminal equipment and passing verification;
and the terminal equipment is used for submitting a key acceptance application to the key management platform, receiving approval result information fed back by the key management platform, submitting a key ring acceptance request to the key box according to the acceptance information, and submitting the key acceptance request to the key ring.
A second aspect of the embodiments of the present invention provides a key management method, which is applied to a terminal device, and the method includes:
determining a key to be received, wherein the key to be received has a corresponding key ID, and the key ID has a corresponding relation with a key ring ID;
generating a key application according to the user ID and the key ring ID;
sending the key acceptance application to a key management platform;
receiving approval result information fed back by the key management platform, wherein the approval result information comprises acceptance information;
submitting a key ring acceptance request to a key box according to the acceptance information so as to indicate the key box to pop up a key ring corresponding to the key ring ID;
submitting a key getting request to the key ring within a preset range of a target position to indicate the key ring to eject at least one key placed in the key ring, wherein the target position is the position of an asset matched with the key.
A third aspect of the embodiments of the present invention provides a key management method applied to a key box, the method including:
receiving acceptance information sent by a key management platform, wherein the acceptance information comprises a user ID and a key ring ID, and the key ring ID has a corresponding relationship with at least one key ID;
after a key ring reception request submitted by terminal equipment is received, extracting a user ID and a key ring ID in the key ring reception request;
verifying whether the user ID and the key ring ID in the key ring reception request are the same as the user ID and the key ring ID in the consent reception information;
if yes, determining a key ring corresponding to the key ring ID, popping up the key ring from the key box, and placing at least one key corresponding to the key ID in the key ring.
A fourth aspect of an embodiment of the present invention provides a key management method, which is applied to a key ring, where a positioning function and a communication function are configured in the key ring, and the method includes:
detecting whether the key ring leaves a key box or not, wherein at least one key is placed in the key ring;
if the key ring leaves the key box, starting a positioning function, and acquiring current position information in real time based on the positioning function;
based on the communication function, the position information is sent to a key management platform according to a preset frequency;
and after receiving a key receiving request submitted by the terminal equipment, popping up at least one key placed in the key ring according to the user ID and the key ring ID in the key receiving request.
A fifth aspect of the embodiments of the present invention provides a key management method, which is applied to a key management platform, and the method includes:
receiving a key receiving application sent by terminal equipment, wherein the key receiving application comprises a user ID and a key ID, and the key ID has a corresponding relation with a key ring ID;
examining and approving the key acceptance application according to the user ID and the key ring ID to generate examination and approval result information;
sending the approval result information to terminal equipment and a key box;
after the position information collected by the key ring is received, drawing the moving track of the key ring according to the position information.
A sixth aspect of the embodiments of the present invention provides a terminal device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of the key management method when executing the computer program.
A seventh aspect of embodiments of the present invention provides a key fob comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the key management method described above when executing the computer program.
An eighth aspect of the embodiments of the present invention provides a key ring, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the steps of the key management method when executing the computer program.
A ninth aspect of the embodiments of the present invention provides a key management platform, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of the key management method when executing the computer program.
A tenth aspect of the embodiments of the present invention provides a computer-readable storage medium storing a computer program that, when executed by a processor, implements the steps of the key management method described above.
Compared with the prior art, the embodiment of the invention has the following advantages:
according to the embodiment of the invention, by intelligently managing the key, human factors in the key management process can be eliminated to the maximum extent, the error of key management is reduced, and the management efficiency is improved; through fixing a position the key, can know the operating condition of key in real time, improve the rate of utilization and the turnover rate of key, promote the efficiency of business activity, and then promote economic benefits's promotion.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings used in the embodiments or the description of the prior art will be briefly described below. It is obvious that the drawings in the following description are only some embodiments of the invention, and that for a person skilled in the art, other drawings can be derived from them without inventive effort.
FIG. 1 is a schematic view of a key management system according to one embodiment of the present invention;
FIG. 2 is a system architecture diagram of a key management system according to an embodiment of the present invention;
FIG. 3 is a schematic business flow diagram of a key management system according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating steps of a key management method according to an embodiment of the present invention;
FIG. 5 is a flowchart illustrating steps of another key management method according to an embodiment of the present invention;
FIG. 6 is a flowchart illustrating steps of a method for key management according to another embodiment of the present invention;
FIG. 7 is a flowchart illustrating steps of yet another method for key management according to an embodiment of the present invention;
FIG. 8 is a schematic view of a key management device according to one embodiment of the present invention;
FIG. 9 is a schematic view of another key management device in accordance with one embodiment of the present invention;
FIG. 10 is a schematic view of yet another key management device in accordance with an embodiment of the present invention;
FIG. 11 is a schematic view of yet another key management device in accordance with an embodiment of the present invention;
fig. 12 is a schematic diagram of a terminal device according to an embodiment of the present invention.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
The technical solution of the present invention will be described below by way of specific examples.
Referring to fig. 1, there is shown a schematic diagram of a key management system according to an embodiment of the present invention, which may include a key management device, a key management platform, and a terminal device. The key management device comprises a key box and a key ring, wherein the key ring is provided with a positioning function and a communication function.
It should be noted that the key management system provided in this embodiment may be used in any scene where a key needs to be managed. For example, a property broker manages keys for owner's premises, or a telecommunications room manager manages keys for individual rooms, and so on. The present embodiment does not limit the specific application scenario of the present system.
For ease of understanding, the present embodiment will be described and illustrated with reference to the key management of a property broker. It is understood that the key management system in the present embodiment may also be applied to occasions requiring centralized management of keys, such as the communication field, the power field, the defense field, and the like.
In the embodiment of the invention, the key management platform can receive the key acceptance application and generate the approval result information after approving the key acceptance application, so that the approval result information is sent to the terminal equipment and the key box, and the approval result information can comprise the acceptance information or the rejection information.
It should be noted that the key management platform may be a server platform, and the platform may provide at least one user interface to the outside through the terminal device, so that a platform administrator may process corresponding transactions through the user interface.
In a specific implementation, the key pick-up application may be initiated by the user (i.e., the property broker) through the terminal device. The terminal equipment is used for submitting a key getting application to the key management platform, receiving approval result information fed back by the key management platform, submitting a key ring getting request to the key box according to the approval getting information, submitting the key getting request to the key ring and the like. The terminal device may be a mobile terminal such as a mobile phone and a tablet computer, or may be a device such as a PC. In this embodiment, the following description is given by taking a mobile phone as an example.
Usually, when receiving a key, a broker can submit his/her information, i.e. a user ID, and a key ID to be received through a service-specific APP on a mobile phone.
Generally, when a key is centrally managed, the key needs to be registered first, assigned a key ID by a key management platform, and then placed in a certain key holder, which also has a key holder ID.
Therefore, the key management platform can receive the key registration request, assign a key ID to the key according to the key registration request, and establish the corresponding relation between the key ID and the key ring ID of the specific key ring. The key registration request may be initiated by a key administrator.
Of course, the key management platform may also be responsible for handling key logout issues. For example, after a certain suite of houses is sold, the keys of the tenants need to be logged off in the key management platform. At this point, the key manager may initiate a logoff request for the key.
Therefore, in the embodiment of the present invention, after receiving the key logout request, the key management platform may logout the key ID of the key and logout the correspondence between the key ID and the key ring ID with respect to the key logout request, and set the key ring corresponding to the key ring ID to the vacant state. The above-mentioned empty state is understood to mean that the key fob may be used to hold other keys.
Similarly, the key management platform can also handle the matters of registration and logout of the user.
That is, the key management platform may receive a user registration request, assign a user ID to the user for the user registration request, and log out the user ID when receiving an instruction to log out the user ID.
It should be noted that the user ID, the key ID, and the key ring ID are unique and not repeated.
Because the key ID and the key ring ID have a corresponding relationship, after the corresponding relationship is established, the key ring and the keys placed in the key ring ID can be managed in a unified way through the key ring ID.
Therefore, after receiving the key acceptance application, the key management platform can extract the user ID and the key ring ID in the key acceptance application and verify the user ID and the key ring ID.
During verification, the key management platform can verify whether the user ID has the right to receive the key corresponding to the key ring ID and verify whether the key corresponding to the key ring ID is placed in the key box. That is, the key management platform may verify whether the broker has permission to receive the key and whether the key is currently not being received by other brokers.
If the user ID has the right of accepting the key corresponding to the key ring ID and the key corresponding to the key ring ID is placed in the key box, the key management platform can generate acceptance information according to the user ID and the key ring ID and send the acceptance information to the terminal device and the key box.
If the user ID does not have the permission to receive the key corresponding to the key ring ID or the key corresponding to the key ring ID is not placed in the key box, the key management platform can also generate refusal receiving information according to the user ID and the key ring ID, and send the refusal receiving information to the terminal equipment to inform the intermediary that the key is unavailable at present.
In an embodiment of the invention, the key box is a device for holding a key fob and keys. Typically, a key box may include a plurality of key locations, each of which may have a key fob disposed therein, with at least one key being disposed in each key fob.
The key box can be in communication connection with the key management platform and can receive approval result information sent by the key management platform, so that the key ring acceptance request is verified according to the acceptance information after the key ring acceptance request submitted by the terminal equipment is received, and if the key ring acceptance request passes the verification, a key ring matched with the acceptance information is popped up.
In the embodiment of the invention, the key ring getting request submitted by the terminal device can be generated by scanning a two-dimensional code or a bar code provided by a key box through a mobile phone, and the key ring getting request can also carry a user ID and a key ring ID. After the broker scans the two-dimensional code or the bar code provided by the key box, the key box can extract the user ID and the key ring ID in the key ring reception request, verify whether the user ID and the key ring ID in the key ring reception request are the same as the user ID and the key ring ID in the previously received reception approval information, and if the user ID in the key ring reception request is the same as the user ID in the reception approval information and the key ring ID in the key ring reception request is the same as the key ring ID in the reception approval information, the verification is considered to be passed, and the key box can determine the key ring corresponding to the key ring ID and pop up the key ring from the key box.
In the embodiment of the invention, after the key chain leaves the key box, the key management platform can feed back the positioning information of the key chain based on the configured positioning function, and at least one key placed in the key chain is popped up after a key receiving request submitted by the terminal equipment is received and the key is verified. The positioning function may be implemented by configuring a positioning chip in the key ring or by using other methods, which is not limited in this embodiment.
In the embodiment of the invention, in order to realize the management of the key ring by the key management platform, the key ring can be subjected to parameter configuration according to an instruction issued by the key management platform.
In a specific implementation, the key management platform may generate a key ring parameter setting instruction according to the key ring parameter setting request after receiving the key ring parameter setting request, and issue the key ring parameter setting instruction to the key ring to instruct the key ring to perform parameter configuration. E.g., configuration of positioning parameters, etc.
Typically, a house key is a piece of metal strip that does not have the ability to be tamper proof and copy proof in itself. Therefore, the key is placed in the key ring with characteristics such as prevent tearing open, reporting to the police with this embodiment, can only open the key ring through specialized tool, takes out the key, has guaranteed the security of key.
In the embodiment of the invention, the key ring can have the function of violence-proof disassembly. When the key ring is disassembled by violence, the anti-disassembling alarm information can be triggered, and the anti-disassembling alarm information is sent to the key management platform, so that the key management platform can position the key ring when receiving the anti-disassembling alarm information.
In the embodiment of the invention, when the intermediary personnel normally use the key ring, the intermediary personnel can scan the two-dimensional code on the key ring by using the special APP for the business in the mobile phone, and the key ring can pop up the key after verification. After the key is used up, the agent pushes the key into the key ring.
In the embodiment of the present invention, the consent-use information generated by the key management platform may further include information of a target location, where the information of the target location may be location information of an asset matched with the key. For example, the agent can visit the location of the house to which the guest is going.
After receiving the acceptance information, the key box can forward the acceptance information to the key ring. Therefore, after receiving the key availability request submitted by the terminal device, the key fob can first verify whether the current location is within the preset range of the target location. The preset range may be set according to actual needs, for example, may be set to be within 1 km of a house to be watched, and the like, which is not limited in this embodiment.
If the current position is verified to be located in the preset range of the target position, the key ring can extract the user ID and the key ring ID in the key receiving request, and whether the user ID and the key ring ID in the key receiving request are the same as the user ID and the key ring ID in the acceptance information generated by the key management platform is verified. If the user ID in the key reception request is the same as the user ID in the acceptance information and the key ring ID in the key reception request is the same as the key ring ID in the acceptance information, the verification is considered to be passed, and at least one key placed in the key ring can be popped up.
In the embodiment of the present invention, after the key fob leaves the key box, the key fob may adopt a pre-configured positioning function to acquire the current location information in real time, and based on the configured communication function, send the location information to the key management platform according to the preset frequency. For example, the key fob may send current location information to the key management platform as often as once every 30 seconds or once every minute.
After the key management platform receives the position information, the key management platform can draw the moving track of the key ring through the position information, so that the key ring and the key can be positioned and monitored in real time.
In the embodiment of the present invention, the key management system may further include an inquiry terminal, where the inquiry terminal may be a terminal device, such as a mobile phone, used by an actual owner of an asset such as a house.
After the key management platform draws the moving track of the key ring, the moving track of the key ring can be pushed to a mobile phone used by a proprietor, so that the proprietor can determine the corresponding key ring according to the key ID, inquire the position information of the key based on the moving track of the key ring, and realize the real-time positioning of the key.
In the embodiment of the invention, in order to further ensure the safety of the key, the key management platform can also verify whether the moving track of the key ring exceeds a preset area. If the movement track exceeds a preset area, track alarm information can be generated and sent to the key ring, and the key ring is indicated to trigger a track alarm function.
In particular implementations, the key management platform may pre-generate a path map from a specified location to the premises based on the particular location of the asset, such as the premises. For example, a path diagram containing a walking route from an intermediate store to the house. After receiving the position information of the key ring and generating the movement track, the key management platform can verify whether the track exceeds the range of the path diagram. If the key chain and the key are beyond the preset range, the key chain and the key are not sent to the position of the house according to the preset route, and the key chain and the key are possibly stolen or other situations occur. At this moment, the key management platform can issue the orbit alarm information to the key ring, instructs the key ring to trigger the orbit alarming function.
In the embodiment of the invention, after the intermediary personnel use the key, the intermediary personnel need to put the key back into the key ring and put the key ring back into the key box.
After the key fob and its keys are placed in the key locker, the key locker can first confirm whether the key fob ID of the key is the same as the key fob ID in the prior consent access message. That is, it is confirmed whether the currently replaced key is identical to the previously removed key.
If yes, the key box can generate key returning information according to the key ring ID, the key returning information is sent to the key management platform, the key management platform records events, and the whole key taking and returning process is completed.
According to the key management method and the key management system, the keys are intelligently managed, human factors in the key management process can be eliminated to the maximum extent, errors in key management are reduced, and the management efficiency is improved; through fixing a position the key, can know the operating condition of key in real time, improve the rate of utilization and the turnover rate of key, promote the efficiency of intermediary's business activity, promote economic benefits.
For the sake of understanding, the key management system of the present embodiment will be described in detail with reference to the accompanying drawings.
Fig. 2 is a schematic diagram of a system architecture of a key management system according to an embodiment of the present invention, where the system includes a key ring, a key box, a key management platform, and terminal devices for use by an intermediary and an owner, and the intermediary and the owner may implement their respective functions through different APPs.
In the embodiment of the invention, the key ring is inserted into the key box, and the key box can sense the key ring and can communicate with the key ring. Meanwhile, the key box can be accessed to the key management platform through the local area network and is communicated in real time.
The key management platform can run on a local area network server or a cloud network, and the platform can record all information of the key and draw a key track according to the positioning information. According to the operation characteristics and the scale of the intermediary company, different operation modes of the key management platform can be selected, and all data are collected to the server or the cloud.
The key management system of this embodiment can provide two APPs, one is the special APP of the business of installing on the administrator of intermediary and business personnel's cell-phone, and another is the owner's inquiry APP of installing on owner's cell-phone. The two APPs can acquire the positioning and use information of the key from a server or a cloud network through a mobile phone network.
Fig. 3 is a schematic diagram of a business process of a key management system according to an embodiment of the present invention, where the business process mainly includes three processes.
(one) Key picking Process
1) The intermediary personnel initiates a key acceptance application on the business special APP or the personal work computer according to business requirements;
2) the manager replies the key receiving application of the agent on the special APP or the personal work computer;
3) the key box receives the repeated information of agreeing to pick up through the network and the person waiting for the intermediary picks up the information;
4) the intermediary personnel scan the two-dimensional code on the key box through the special APP of business, and the key box confirms that the application of key acceptance of the intermediary personnel has been approved after verifying user ID and key ring ID, pops up corresponding key ring.
(II) Key trajectory tracking procedure
1) Once the key chain leaves the key box, starting a positioning and tracking function, and regularly reporting the position of the key chain to a server through a mobile network or an Internet of things network;
2) after the intermediary personnel arrive at the destination, scanning the two-dimensional code on the key ring through the APP special for the service, and popping up the key when the key ring confirms that the intermediary personnel are authorized;
3) after the related business activities are completed, the intermediary personnel push the key into the key ring;
4) and the server stores the received key positioning information data and performs map matching on the data information, thereby completing the real-time drawing and tracking of the track.
(III) Return-to-Key Process
1) After the intermediary personnel finish the business activity, insert the key into the key box;
2) the key ring closes the positioning and tracking function, and starts charging and communication with the key box;
3) the key box senses the homing of the key and confirms that the key is authorized to go out;
4) and the key box records and sends the key return information to the server, and the key authorization is completed.
Referring to fig. 4, a schematic flow chart illustrating steps of a key management method according to an embodiment of the present invention is shown, which may specifically include the following steps:
s401, determining a key to be received, wherein the key to be received has a corresponding key ID, and the key ID has a corresponding relation with a key ring ID;
s402, generating a key application according to the user ID and the key ring ID;
s403, sending the key acceptance application to a key management platform;
in the present embodiment, the key management method is described from the terminal device side.
In the embodiment of the present invention, the terminal device may refer to a device used by an intermediary, such as a mobile phone and a tablet computer.
After the intermediary staff needs to receive the key, the intermediary staff can firstly determine the ID of the key to be received, and generate a key receiving application and submit the key receiving application to the key management platform by filling the user ID and the key ID in the special APP of the mobile phone. The key ID corresponds to a key fob ID.
S404, receiving approval result information fed back by the key management platform, wherein the approval result information comprises acceptance information;
the key management platform can approve the key acceptance application and confirm whether the intermediary personnel is allowed to accept the key. If the intermediary is approved to receive the key, the key management platform can generate approval receiving information and send the approval receiving information to the mobile phone of the intermediary and the key box for storing the key.
S405, submitting a key ring acceptance request to a key box according to the acceptance information so as to indicate the key box to pop up a key ring corresponding to the key ring ID;
when formally taking the key, the intermediary personnel can use the special APP of business to scan the two-dimensional code of key case, submit the key ring and receive the request, and this key ring is the key ring of depositing the key that remains to receive promptly.
After receiving the key ring acceptance request, the key box can confirm whether the corresponding key ring is popped up or not by verifying whether the user ID and the key ring ID are the same as the user ID and the key ring ID in the acceptance information issued by the key management platform.
S406, submitting a key getting request to the key ring within a preset range of a target position to indicate the key ring to pop up at least one key placed in the key ring, wherein the target position is the position of an asset matched with the key.
After the intermediary personnel carry the key ring to the target position, can continue to use special APP of business to scan the two-dimensional code on the key ring, submit the key and receive the request. The key ring can continuously verify the identity of the intermediary personnel according to the user ID and the key ring ID, and ejects the key stored in the key ring after the verification is passed.
It should be noted that more than one key may be stored in a key fob. For example, for a certain set of house, a plurality of keys of the house can be stored in one key ring, which is not limited in this embodiment.
Referring to fig. 5, a schematic flowchart illustrating steps of another key management method according to an embodiment of the present invention is shown, which may specifically include the following steps:
s501, accepting information sent by a key management platform, wherein the accepting information comprises a user ID and a key ring ID, and the key ring ID and at least one key ID have a corresponding relationship;
in the present embodiment, the key management method is described from the key box side.
In the embodiment of the present invention, the acceptance information may be generated by the key management platform and sent to the key box.
S502, after a key ring getting request submitted by terminal equipment is received, extracting a user ID and a key ring ID in the key ring getting request;
in the embodiment of the invention, the intermediary personnel can submit the key ring acceptance application to the key box by using the business-specific APP to scan the two-dimensional code of the key box, wherein the application can comprise the user ID and the key ring ID.
S503, verifying whether the user ID and the key ring ID in the key ring reception request are the same as the user ID and the key ring ID in the consent reception information;
after receiving the request, the key box can verify the request and determine whether the current agent is allowed to use the key.
In particular implementations, the key fob may verify whether the user ID in the key fob claim is the same as the user ID in the previously received consent claim information, and whether the key fob ID in the key fob claim is the same as the key fob ID in the consent claim information. The application is only considered to be validated if the user ID and the key fob ID are the same.
S504, if yes, determining a key ring corresponding to the key ring ID, popping up the key ring from the key box, and placing at least one key corresponding to the key ring ID in the key ring.
After the key box passes the verification of the application for getting to the intermediary, the key ring storing the key ID can be found out, and the key ring is popped out from the key box for the intermediary to take.
In the embodiment of the present invention, the key box may further detect whether the key ring corresponding to the key ring ID and the key thereof are placed in the key box, that is, whether the received key ring and key are returned by the intermediary.
If yes, key returning information can be generated according to the key ring ID, and the key returning information is sent to the key management platform for the key management platform to record the key taking event.
Referring to fig. 6, a schematic flowchart illustrating steps of another key management method according to an embodiment of the present invention is shown, which may specifically include the following steps:
s601, detecting whether the key ring leaves a key box or not, wherein at least one key is placed in the key ring, and a positioning function and a communication function are configured in the key ring;
s602, if the key ring leaves the key box, starting a positioning function, and acquiring current position information in real time based on the positioning function;
in the present embodiment, the key management method is described from the key ring side.
In the embodiment of the invention, a positioning chip can be configured in the key ring, and the key ring can be positioned through the positioning chip.
In a particular implementation, it is generally safe because the key fob is placed in the key box. Therefore, the automatic positioning function of the key ring can be started only after the key ring leaves the key box, and the position information is collected.
S603, based on the communication function, sending the position information to a key management platform according to a preset frequency;
in the embodiment of the invention, the position information of the key ring can be sent to the key management platform at a certain frequency, so that the key management platform can position the key ring and the key.
S604, after receiving a key receiving request submitted by the terminal equipment, popping up at least one key placed in the key ring according to the user ID and the key ring ID in the key receiving request.
In an embodiment of the present invention, the key pick-up request may be initiated by the broker by scanning the two-dimensional code on the key fob using the service-specific APP.
After receiving a key request submitted by a terminal device, a key fob may first determine whether a current location is within a preset range of a target location, where the target location may be a location of an asset matched with a key. I.e. to confirm whether the current location is within a certain range, e.g. 1 km, of the assets, e.g. houses.
If the current position is within the preset range of the target position, the key ring can verify the key acceptance request. Specifically, it may be verified whether the user ID and the key fob ID in the key reception request are the same as the user ID and the key fob ID in the previously received consent reception information, which may be transmitted from the key fob to the key fob.
If the user ID in the key reception request is the same as the user ID in the acceptance information and the key ring ID in the key reception request is the same as the key ring ID in the acceptance information, the verification is considered to be passed, and at least one key placed in the key ring can be ejected.
In the embodiment of the invention, the key management platform can draw the moving track of the key ring according to the position information collected by the key ring and compare the moving track with the preset area. If the movement track exceeds the range of the preset area, the key management platform can generate track alarm information according to the comparison result of the movement track of the key ring and the preset area and sends the track alarm information to the key ring.
When receiving the orbit alarm information that key management platform sent, the key ring can trigger the warning according to orbit alarm information.
In the embodiment of the invention, when the key ring is violently disassembled, the anti-disassembling alarm information can be triggered and sent to the key management platform, and the key management platform carries out positioning tracking on the key ring according to a certain safety processing strategy.
Referring to fig. 7, a schematic flowchart illustrating steps of another key management method according to an embodiment of the present invention is shown, which may specifically include the following steps:
s701, receiving a key receiving application sent by a terminal device, wherein the key receiving application comprises a user ID and a key ID, and the key ID has a corresponding relation with a key ring ID;
in the present embodiment, the key management method is described from the side of the key management platform.
In the embodiment of the present invention, the key management platform may be a server platform, and the platform may provide at least one user interface to the outside through the terminal device, so that a platform administrator may process a corresponding transaction through the user interface.
S702, examining and approving the key acceptance application according to the user ID and the key ring ID to generate examination and approval result information;
in the embodiment of the present invention, the approval result information may include two types, one is acceptance information and one is rejection information. When the key management platform approves the key acceptance application of the intermediary personnel, whether the user ID has the permission of accepting the key corresponding to the key ring ID or not can be verified, and whether the key corresponding to the key ring ID is placed in the key box or not can be verified.
If the user ID has the right of accepting the key corresponding to the key ring ID and the key corresponding to the key ring ID is placed in the key box, the acceptance information can be generated according to the user ID and the key ring ID; if the user ID does not have the right to receive the key corresponding to the key ring ID or the key corresponding to the key ring ID is not placed in the key box, the information for refusing to receive can be generated according to the user ID and the key ring ID.
S703, sending the approval result information to terminal equipment and a key box;
the acceptance or rejection information may be sent to a cell phone used by the agent and also to the key box.
And S704, after the position information collected by the key ring is received, drawing the moving track of the key ring according to the position information.
In the embodiment of the invention, after the key ring leaves the key box, the current position information can be acquired in real time by adopting a pre-configured positioning function, and the position information is sent to the key management platform according to the preset frequency based on the communication function in the key ring and the configuration. For example, the key fob may send current location information to the key management platform as often as once every 30 seconds or once every minute.
After the key management platform receives the position information, the key management platform can draw the moving track of the key ring through the position information, so that the key ring and the key can be positioned and monitored in real time.
In the embodiment of the invention, in order to further ensure the safety of the key, the key management platform can also verify whether the moving track of the key ring exceeds a preset area. If the movement track exceeds a preset area, track alarm information can be generated and sent to the key ring, and the key ring is indicated to trigger a track alarm function.
In addition, the key box can generate key returning information after detecting that the key ring corresponding to the key ring ID and the key thereof are placed in the key box, and the key management platform can receive the key returning information sent by the key box and record the taking event of the key.
It should be noted that, each method embodiment is similar to the foregoing system embodiment, and details of implementation between each method embodiment and each system embodiment may be mutually referred to, and the size of the sequence number of each step in the foregoing embodiments does not mean the execution sequence, and the execution sequence of each process should be determined by its function and internal logic, but should not constitute any limitation on the implementation process of the embodiment of the present invention.
Referring to fig. 8, a schematic diagram of a key management apparatus according to an embodiment of the present invention is shown, and the key management apparatus is applied to a terminal device, and the apparatus may specifically include the following modules:
a determining module 801, configured to determine a key to be received, where the key to be received has a corresponding key ID, and the key ID has a corresponding relationship with a key ring ID;
a generating module 802, configured to generate a key acceptance application according to the user ID and the key ring ID;
a sending module 803, configured to send the key acceptance application to a key management platform;
a receiving module 804, configured to receive approval result information fed back by the key management platform, where the approval result information includes acceptance information;
a first submitting module 805, configured to submit a key ring acceptance request to a key box according to the acceptance information to instruct the key box to eject a key ring corresponding to the key ring ID;
a second submitting module 806, configured to submit a key acceptance request to the key fob within a preset range of a target location to instruct the key fob to eject at least one key placed in the key fob, where the target location is a location of an asset matched with the key.
Referring to fig. 9, a schematic diagram of another key management device according to an embodiment of the present invention is shown, and the device is applied to a key box, and the device may specifically include the following modules:
the receiving module 901 is configured to receive consent information sent by a key management platform, where the consent information includes a user ID and a key ring ID, and the key ring ID and at least one key ID have a corresponding relationship;
the extracting module 902 is configured to, after receiving a key fob getting request submitted by a terminal device, extract a user ID and a key fob ID in the key fob getting request;
a verification module 903, configured to verify whether the user ID and the key ring ID in the key ring acceptance request are the same as the user ID and the key ring ID in the consent acceptance information;
and the popping module 904 is configured to determine a key ring corresponding to the key ring ID if the key ring ID is the key ring, and pop up the key ring from the key box, where at least one key corresponding to the key ring ID is placed in the key ring.
In the embodiment of the present invention, the apparatus may further include the following modules:
the detection module is used for detecting whether the key ring corresponding to the key ring ID and the key thereof are placed in the key box;
and the sending module is used for generating key returning information according to the key ring ID and sending the key returning information to the key management platform if the key returning information is positive.
Referring to fig. 10, a schematic diagram of another key management device according to an embodiment of the present invention is shown, which is applied to a key ring, and the key ring is configured with a positioning function and a communication function, and the device may specifically include the following modules:
the key chain detection system comprises a detection module 1001, a key box and a key box, wherein the detection module is used for detecting whether a key chain leaves the key box or not, and at least one key is placed in the key chain;
the acquisition module 1002 is configured to start a positioning function if the key chain leaves the key box, and acquire current position information in real time based on the positioning function;
a sending module 1003, configured to send the location information to a key management platform according to a preset frequency based on the communication function;
the popping module 1004 is configured to, after receiving a key availability request submitted by a terminal device, pop up at least one key placed in the key fob according to a user ID and a key ring ID in the key availability request.
In the embodiment of the present invention, the pop-up module may specifically include the following sub-modules:
the determining submodule is used for determining whether the current position is located in a preset range of a target position after a key receiving request submitted by the terminal equipment is received, wherein the target position is the position of an asset matched with the key;
the verification submodule is used for verifying whether the user ID and the key ring ID in the key receiving request are the same as the user ID and the key ring ID in the previously received acceptance information or not if the current position is within the preset range of the target position, and the acceptance information is transmitted to the key ring by the key box;
and the popup submodule is used for popping up at least one key placed in the key ring if the user ID in the key reception request is the same as the user ID in the acceptance information and the key ring ID in the key reception request is the same as the key ring ID in the acceptance information.
In the embodiment of the present invention, the apparatus may further include the following modules:
and the track alarm module is used for triggering alarm according to the track alarm information when receiving the track alarm information sent by the key management platform, the track alarm information is generated by the key management platform according to the comparison result of the moving track of the key ring and a preset area, and the moving track of the key ring is drawn by the key management platform according to the position information collected by the key ring.
In the embodiment of the present invention, the apparatus may further include the following modules:
and the anti-dismantling alarm module is used for triggering anti-dismantling alarm information when the key ring is disassembled by violence, and sending the anti-dismantling alarm information to the key management platform.
Referring to fig. 11, a schematic diagram of another key management device according to an embodiment of the present invention is shown, and the key management device is applied to a key management platform, where the key management device specifically includes the following modules:
the receiving module 1101 is configured to receive a key request application sent by a terminal device, where the key request application includes a user ID and a key ID, and the key ID has a corresponding relationship with a key ring ID;
the generating module 1102 is configured to examine and approve the key acceptance application according to the user ID and the key ring ID, and generate examination and approval result information;
a sending module 1103, configured to send the approval result information to the terminal device and the key box;
the drawing module 1104 is configured to draw the movement track of the key ring according to the position information after the position information collected by the key ring is received.
In the embodiment of the present invention, the apparatus may further include the following modules:
a key registration request receiving module for receiving a key registration request;
a key ID assignment module configured to assign a key ID to the key in response to the key registration request;
and the corresponding relation establishing module is used for establishing the corresponding relation between the key ID and the key ring ID of the specific key ring.
In the embodiment of the present invention, the apparatus may further include the following modules:
the key logout request receiving module is used for receiving a key logout request;
the key logout module is used for logging out the key ID of the key and logging out the corresponding relation between the key ID and the key ring ID aiming at the key logout request;
and the key ring state setting module is used for setting the key ring corresponding to the key ring ID into a vacant state.
In the embodiment of the present invention, the apparatus may further include the following modules:
a user registration request receiving module for receiving a user registration request;
a user ID distribution module, configured to distribute a user ID to the user according to the user registration request;
and the user logout module is used for logging out the user ID when receiving a command of logging out the user ID.
In this embodiment of the present invention, the approval result information includes information of agreeing to receive or refusing to receive, and the generating module 1102 may specifically include the following sub-modules:
the verification submodule is used for verifying whether the user ID has the right of getting the key corresponding to the key ring ID and verifying whether the key corresponding to the key ring ID is placed in the key box;
the first generation submodule is used for generating approval acceptance information according to the user ID and the key ring ID if the user ID has the permission of accepting the key corresponding to the key ring ID and the key corresponding to the key ring ID is placed in the key box;
and the second generation submodule is used for generating refusal-to-receive information according to the user ID and the key ring ID if the user ID does not have the permission to receive the key corresponding to the key ring ID or the key corresponding to the key ring ID is not placed in the key box.
In the embodiment of the present invention, the apparatus may further include the following modules:
the key ring parameter setting module is used for receiving a key ring parameter setting request;
the key ring parameter setting request generation module is used for generating a key ring parameter setting request according to the key ring parameter setting request;
and the parameter setting instruction sending module is used for issuing the key ring parameter setting instruction to the key ring so as to indicate the key ring to carry out parameter configuration.
In the embodiment of the present invention, the apparatus may further include the following modules:
the verification module is used for verifying whether the moving track of the key ring exceeds a preset area or not;
and the indicating module is used for generating track alarm information if the key ring is in the key ring state, sending the track alarm information to the key ring and indicating the key ring to trigger a track alarm function.
In the embodiment of the present invention, the apparatus may further include the following modules:
the key return information receiving module is used for receiving key return information sent by a key box, and the key return information is generated by the key box after the key box detects that a key ring corresponding to the key ring ID and a key thereof are placed in the key box.
In the embodiment of the present invention, the apparatus may further include the following modules:
the key ring positioning module is used for receiving the anti-dismantling alarm information sent by the key ring, and the key ring is positioned, and the anti-dismantling alarm information is generated by triggering the key ring when the key ring is dismantled by violence.
For the apparatus embodiment, since it is substantially similar to the method embodiment, it is described relatively simply, and reference may be made to the description of the method embodiment section for relevant points.
Referring to fig. 12, a schematic diagram of a terminal device according to an embodiment of the present invention is shown. As shown in fig. 12, the terminal apparatus 1200 of the present embodiment includes: a processor 1210, a memory 1220, and a computer program 1221 stored in the memory 1220 and operable on the processor 1210. The processor 1210, when executing the computer program 1221, implements the steps in the various embodiments of the key management method described above, such as steps S401 to S406 shown in fig. 4. Alternatively, the processor 1210, when executing the computer program 1221, implements the functions of the modules/units in the above-described device embodiments, for example, the functions of the modules 801 to 806 shown in fig. 8.
Illustratively, the computer program 1221 may be partitioned into one or more modules/units that are stored in the memory 1220 and executed by the processor 1210 to implement the present invention. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which may be used to describe the execution process of the computer program 1221 in the terminal device 1200. For example, the computer program 1221 may be divided into a determining module, a generating module, a sending module, a receiving module, a first submitting module, and a second submitting module, and the specific functions of each module are as follows:
the key receiving module is used for receiving a key ID corresponding to the key to be received, and the key ID is corresponding to the key ring ID;
the generation module is used for generating a key acceptance application according to the user ID and the key ring ID;
the sending module is used for sending the key acceptance application to a key management platform;
the receiving module is used for receiving approval result information fed back by the key management platform, and the approval result information comprises acceptance information;
the first submitting module is used for submitting a key ring acceptance request to a key box according to the acceptance information so as to indicate the key box to pop up a key ring corresponding to the key ring ID;
the second submitting module is used for submitting a key getting request to the key ring within a preset range of a target position so as to indicate the key ring to eject at least one key placed in the key ring, and the target position is the position of an asset matched with the key.
The terminal device 1200 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The terminal device 1200 may include, but is not limited to, a processor 1210 and a memory 1220. Those skilled in the art will appreciate that fig. 12 is only one example of a terminal device 1200 and does not constitute a limitation of the terminal device 1200, and may include more or less components than those shown, or combine some components, or different components, for example, the terminal device 1200 may further include input and output devices, network access devices, buses, etc.
The Processor 1210 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 1220 may be an internal storage unit of the terminal device 1200, such as a hard disk or a memory of the terminal device 1200. The memory 1220 may also be an external storage device of the terminal device 1200, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, provided on the terminal device 1200. Further, the memory 1220 may also include both an internal storage unit and an external storage device of the terminal device 1200. The memory 1220 is used for storing the computer program 1221 and other programs and data required by the terminal device 1200. The memory 1220 may also be used to temporarily store data that has been output or is to be output.
The embodiment of the invention also discloses a key box, which comprises a memory, a processor and a computer program which is stored in the memory and can run on the processor, wherein the processor realizes the steps of the key management method on the side of the key box when executing the computer program.
The embodiment of the invention also discloses a key ring, which comprises a memory, a processor and a computer program which is stored in the memory and can run on the processor, wherein a positioning chip is configured in the key ring, and the processor realizes the steps of the key management method of the key ring side when executing the computer program.
The embodiment of the invention also discloses a key management platform, which comprises a memory, a processor and a computer program which is stored in the memory and can run on the processor, wherein a positioning chip is configured in the key ring, and the processor realizes the steps of the key management method at the side of the key management platform when executing the computer program.
The embodiment of the invention also discloses a computer readable storage medium, wherein a computer program is stored in the computer readable storage medium, the steps of the key management method are realized when the computer program is executed by a processor, and the computer readable storage medium can be positioned in the terminal equipment, the key box, the key ring or the key management platform.
It will be apparent to those skilled in the art that the foregoing division of the functional units and modules is merely illustrative for the convenience and simplicity of description. In practical applications, the above function allocation may be performed by different functional units or modules as needed, that is, the internal structure of the apparatus/terminal device is divided into different functional units or modules, so as to perform all or part of the above described functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present invention. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. On the other hand, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method according to the above embodiments may be implemented by a computer program, which may be stored in a computer readable storage medium and used by a processor to implement the steps of the above embodiments of the method. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable storage medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable storage medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable storage media that does not include electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same. Although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (34)

1. A key management system is characterized by comprising key management equipment, a key management platform and terminal equipment, wherein the key management equipment comprises a key box and a key ring, and a positioning function and a communication function are configured in the key ring; wherein the content of the first and second substances,
the key management platform is used for receiving a key acceptance application and sending approval result information to the terminal equipment and the key box after the key acceptance application is approved, wherein the approval result information comprises acceptance approval information, the acceptance information comprises information of a target position, and the information of the target position is position information of an asset matched with a key;
the key box is used for receiving the approval result information sent by the key management platform, verifying the key ring acceptance request according to the acceptance information after receiving the key ring acceptance request submitted by the terminal equipment, and popping up a key ring matched with the acceptance information if the verification is passed;
the key ring is used for feeding back self positioning information to the key management platform based on the positioning function and the communication function after leaving the key box, receiving a key receiving request submitted by the terminal equipment in a preset range of the target position, and popping up at least one key placed in the key ring after the key receiving request passes verification;
and the terminal equipment is used for submitting a key acceptance application to the key management platform, receiving approval result information fed back by the key management platform, submitting a key ring acceptance request to the key box according to the acceptance information, and submitting the key acceptance request to the key ring.
2. The system of claim 1, wherein any key fob has a corresponding key fob ID;
the key management platform is further used for receiving a key registration request, assigning a key ID to the key according to the key registration request, and establishing a corresponding relation between the key ID and a key ring ID of a specific key ring.
3. The system of claim 2,
the key management platform is further used for receiving a key logout request, logging out the key ID of the key according to the key logout request, logging out the corresponding relation between the key ID and the key ring ID, and setting the key ring corresponding to the key ring ID to be in an idle state.
4. The system of claim 1,
the key management platform is further configured to receive a user registration request, assign a user ID to the user for the user registration request, and cancel the user ID when receiving an instruction to cancel the user ID.
5. The system of claim 1,
the key management platform is further used for receiving a key ring parameter setting request, generating a key ring parameter setting instruction according to the key ring parameter setting request, and issuing the key ring parameter setting instruction to the key ring so as to indicate the key ring to carry out parameter configuration.
6. The system of claim 1,
the key management platform is further used for extracting a user ID and a key ring ID in the key acceptance application after receiving the key acceptance application, verifying whether the user ID has the right to accept the key corresponding to the key ring ID, verifying whether the key corresponding to the key ring ID is placed in the key box, if the user ID has the right to accept the key corresponding to the key ring ID and the key corresponding to the key ring ID is placed in the key box, generating acceptance information according to the user ID and the key ring ID, and sending the acceptance information to a terminal device and the key box;
and if the user ID does not have the permission of getting the key corresponding to the key ring ID or the key corresponding to the key ring ID is not placed in the key box, generating refusal getting information according to the user ID and the key ring ID, and sending the refusal getting information to the terminal equipment.
7. The system of claim 6,
the key box is further used for extracting the user ID and the key ring ID in the key ring reception request after receiving the key ring reception request submitted by the terminal device, verifying whether the user ID and the key ring ID in the key ring reception request are the same as the user ID and the key ring ID in the acceptance information received in advance, if the user ID in the key ring reception request is the same as the user ID in the acceptance information and the key ring ID in the key ring reception request is the same as the key ring ID in the acceptance information, determining the key ring corresponding to the key ring ID, and popping up the key ring from the key box.
8. The system of claim 1,
the key ring is also used for acquiring current position information in real time based on the positioning function after leaving the key box, and sending the position information to a key management platform according to a preset frequency based on the communication function;
and the key management platform is also used for drawing the moving track of the key ring according to the position information.
9. The system of claim 8, wherein the key management system further comprises an inquiry terminal, and the inquiry terminal is configured to receive the movement track of the key ring sent by the key management platform, determine a corresponding key ring according to a key ID, and inquire the position information of the key based on the movement track of the key ring.
10. The system of claim 8,
the key management platform is further used for verifying whether the moving track of the key ring exceeds a preset area, if so, track alarm information is generated and sent to the key ring, and the key ring is instructed to trigger a track alarm function.
11. The system of claim 8,
the key box is also used for forwarding the acceptance information to the key ring;
the key ring is further used for verifying whether the current position is located in a preset range of the target position after receiving a key reception request submitted by a terminal device, if so, extracting a user ID and a key ring ID in the key reception request, verifying whether the user ID and the key ring ID in the key reception request are the same as the user ID and the key ring ID in the acceptance information, and if the user ID in the key reception request is the same as the user ID in the acceptance information and the key ring ID in the key reception request is the same as the key ring ID in the acceptance information, popping up at least one key placed in the key ring.
12. The system of claim 6,
the key box is also used for confirming whether the key ring ID of the key is the same as the key ring ID in the information agreeing to be received or not after the key ring and the key thereof are placed in the key box, if so, generating key returning information according to the key ring ID, and sending the key returning information to the key management platform.
13. The system of claim 1,
the key ring is also used for triggering anti-dismantling alarm information when the key ring is violently dismantled, and sending the anti-dismantling alarm information to the key management platform;
the key management platform is further used for positioning the key ring when the anti-dismantling alarm information is received.
14. A key management method is applied to a terminal device, and comprises the following steps:
determining a key to be received, wherein the key to be received has a corresponding key ID, and the key ID has a corresponding relation with a key ring ID;
generating a key application according to the user ID and the key ring ID;
sending the key acceptance application to a key management platform;
receiving approval result information fed back by the key management platform, wherein the approval result information comprises acceptance information, the acceptance information comprises information of a target position, and the information of the target position is position information of an asset matched with a key;
submitting a key ring acceptance request to a key box according to the acceptance information so as to indicate the key box to pop up a key ring corresponding to the key ring ID;
submitting a key getting request to the key ring to indicate that the key ring is in a preset range of the target position, and ejecting at least one key placed in the key ring.
15. A key management method, applied to a key box, the method comprising:
receiving acceptance information sent by a key management platform, wherein the acceptance information comprises a user ID and a key ring ID, the key ring ID has a corresponding relationship with at least one key ID, the acceptance information also comprises information of a target position, and the information of the target position is position information of an asset matched with the key;
after a key ring reception request submitted by terminal equipment is received, extracting a user ID and a key ring ID in the key ring reception request;
verifying whether the user ID and the key ring ID in the key ring reception request are the same as the user ID and the key ring ID in the consent reception information;
and if so, determining a key ring corresponding to the key ring ID, popping up the key ring from the key box, wherein the key ring is used for popping up at least one key which is placed in the key ring and corresponds to the key ID after receiving a key receiving request submitted by the terminal equipment within a preset range of the target position and passing verification.
16. The method of claim 15, further comprising:
detecting whether a key ring corresponding to the key ring ID and keys thereof are placed in the key box;
and if so, generating key returning information according to the key ring ID, and sending the key returning information to the key management platform.
17. A key management method is applied to a key ring, and a positioning function and a communication function are configured in the key ring, and the method comprises the following steps:
detecting whether the key ring leaves a key box or not, wherein at least one key is placed in the key ring;
if the key ring leaves the key box, starting a positioning function, and acquiring current position information in real time based on the positioning function;
based on the communication function, the position information is sent to a key management platform according to a preset frequency;
and popping up at least one key placed in the key buckle according to the user ID and the key ring ID in the key receiving request after the key ring is received and verified within a preset range of the target position of the key ring, wherein the target position is the position of an asset matched with the key.
18. The method as claimed in claim 17, wherein the step of popping up at least one key placed in the key fob according to the user ID and the key fob ID in the key pick-up request after the key pick-up request submitted by the terminal device is received and verified within the preset range of the key fob located at the target location comprises:
after receiving a key getting request submitted by the terminal equipment, determining whether the current position is located within a preset range of a target position;
if the current position is located in the preset range of the target position, verifying whether the user ID and the key ring ID in the key getting request are the same as the user ID and the key ring ID in the pre-received acceptance information, and transmitting the acceptance information to the key ring by a key box;
and popping up at least one key placed in the key ring if the user ID in the key reception request is the same as the user ID in the acceptance information and the key ring ID in the key reception request is the same as the key ring ID in the acceptance information.
19. The method of claim 17, further comprising:
when receiving the track alarm information that key management platform sent, according to the warning is triggered to the track alarm information, the track alarm information by key management platform basis the moving trajectory of key ring with predetermine regional comparative result and generate, the moving trajectory of key ring by key management platform basis the position information that the key ring gathered forms.
20. The method of claim 17, further comprising:
when the key ring is disassembled by violence, the anti-disassembling alarm information is triggered and sent to the key management platform.
21. A key management method is applied to a key management platform, and comprises the following steps:
receiving a key receiving application sent by terminal equipment, wherein the key receiving application comprises a user ID and a key ID, and the key ID has a corresponding relation with a key ring ID;
according to the user ID and the key ring ID, the key acceptance application is approved to generate approval result information, the approval result information comprises acceptance approval information or acceptance refusal information, the acceptance information comprises target position information, and the target position information is position information of an asset matched with the key;
the approval result information is sent to a terminal device and a key box to indicate that the key box verifies the key ring acceptance request according to the acceptance information after receiving the key ring acceptance request submitted by the terminal device, and pops up a key ring matched with the acceptance information after the verification is passed, wherein the key ring is used for popping up at least one key which is placed in the key ring and corresponds to the ID of the key after receiving the key acceptance request submitted by the terminal device within the preset range of the target position and passing the verification;
after the position information collected by the key ring is received, drawing the moving track of the key ring according to the position information.
22. The method of claim 21, further comprising:
receiving a key registration request;
assigning a key ID to the key for the key registration request;
establishing a correspondence between the key ID and a key fob ID of a particular key fob.
23. The method of claim 22, further comprising:
receiving a key logout request;
for the key logout request, logging out the key ID of the key and logging out the corresponding relation between the key ID and the key ring ID;
and setting the key ring corresponding to the key ring ID to be in a vacant state.
24. The method of claim 22, further comprising:
receiving a user registration request;
allocating a user ID to the user aiming at the user registration request;
and when receiving an instruction of logging off the user ID, logging off the user ID.
25. The method of claim 22, wherein the step of approving the key claim application based on the user ID and the key fob ID and generating approval result information comprises:
verifying whether the user ID has the right to receive the key corresponding to the key ring ID and verifying whether the key corresponding to the key ring ID is placed in the key box;
if the user ID has the permission to receive the key corresponding to the key ring ID and the key corresponding to the key ring ID is placed in the key box, generating approval receiving information according to the user ID and the key ring ID;
and if the user ID does not have the permission of getting the key corresponding to the key ring ID or the key corresponding to the key ring ID is not placed in the key box, generating the information of refusing to get the key according to the user ID and the key ring ID.
26. The method of claim 21, further comprising:
receiving a key ring parameter setting request;
generating a key ring parameter setting instruction according to the key ring parameter setting request;
and issuing the key ring parameter setting instruction to the key ring so as to indicate the key ring to carry out parameter configuration.
27. The method of claim 26, further comprising:
verifying whether the moving track of the key ring exceeds a preset area or not;
if yes, generating track alarm information, sending the track alarm information to the key ring, and indicating the key ring to trigger a track alarm function.
28. The method of claim 21, further comprising:
and receiving key returning information sent by a key box, wherein the key returning information is generated by the key box after the key box detects that the key ring corresponding to the key ring ID and the key thereof are placed in the key box.
29. The method of claim 21, further comprising:
receiving when the key ring sends prevent tearing open alarm information, it is right the key ring is fixed a position, prevent tearing open alarm information by the key ring triggers the generation when self receives the violence to disassemble.
30. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor implements the steps of the key management method according to claim 14 when executing the computer program.
31. A key fob comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor when executing the computer program implements the steps of the key management method of any of claims 15-16.
32. A key fob comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the key fob is provided with a positioning chip, the processor implementing the steps of the key management method according to any one of claims 17 to 20 when executing the computer program.
33. A key management platform comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein a positioning chip is configured in the key fob, and the processor implements the steps of the key management method according to any one of claims 21 to 29 when executing the computer program.
34. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the key management method according to any one of claims 14 to 29.
CN201910098141.4A 2019-01-31 2019-01-31 Key management system and key management method Active CN109685483B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910098141.4A CN109685483B (en) 2019-01-31 2019-01-31 Key management system and key management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910098141.4A CN109685483B (en) 2019-01-31 2019-01-31 Key management system and key management method

Publications (2)

Publication Number Publication Date
CN109685483A CN109685483A (en) 2019-04-26
CN109685483B true CN109685483B (en) 2021-08-10

Family

ID=66195450

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910098141.4A Active CN109685483B (en) 2019-01-31 2019-01-31 Key management system and key management method

Country Status (1)

Country Link
CN (1) CN109685483B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110164005B (en) * 2019-05-16 2021-04-02 东风小康汽车有限公司重庆分公司 Method and device for logging off intelligent key
CN113011808A (en) * 2019-12-20 2021-06-22 杭州共享实验科技发展有限公司 Intelligent management method for immobilized high-value antibody reagent
CN111445605A (en) * 2020-04-14 2020-07-24 长园共创电力安全技术股份有限公司 Unlocking key authorized unlocking method and device and storage medium
CN111524343B (en) * 2020-04-30 2021-08-31 金瓜子科技发展(北京)有限公司 Vehicle monitoring method and device and monitoring equipment
CN113744432A (en) * 2020-05-14 2021-12-03 高翠英 Intelligent key cabinet management system for motor train unit
CN112422631A (en) * 2020-10-22 2021-02-26 青岛珞宾智能信息技术有限公司 Key management system based on Internet of things
CN112767578A (en) * 2020-12-29 2021-05-07 南方电网深圳数字电网研究院有限公司 Authorization method, application method, unlocking method, terminal and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201732990U (en) * 2010-07-28 2011-02-02 太平湾发电厂 Intelligent management key device
CN102710016A (en) * 2012-06-01 2012-10-03 江苏省电力公司检修分公司 Intelligent remote hierarchical key management and control system
CN103456065A (en) * 2013-09-27 2013-12-18 李冬 Unattended key management method
CN106355718A (en) * 2016-09-14 2017-01-25 山东科技大学 Intelligent automobile electronic key system with antitheft and anti-lost functions
CN108109232A (en) * 2017-12-06 2018-06-01 链家网(北京)科技有限公司 Key management system and method
CN109035507A (en) * 2018-07-10 2018-12-18 武汉瑞莱保能源技术有限公司 A kind of intelligent key management system based on loss protecting

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20150071500A (en) * 2013-12-18 2015-06-26 삼성전자주식회사 Method and Apparatus for Managing Data
CN107424339A (en) * 2017-04-19 2017-12-01 宁波瑞奥物联技术股份有限公司 A kind of intelligent key management system and method
CN108343315A (en) * 2018-01-25 2018-07-31 国家电网公司 Key management method and terminal device
CN108661459B (en) * 2018-03-19 2023-06-27 李平川 Intelligent handcuff management system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201732990U (en) * 2010-07-28 2011-02-02 太平湾发电厂 Intelligent management key device
CN102710016A (en) * 2012-06-01 2012-10-03 江苏省电力公司检修分公司 Intelligent remote hierarchical key management and control system
CN103456065A (en) * 2013-09-27 2013-12-18 李冬 Unattended key management method
CN106355718A (en) * 2016-09-14 2017-01-25 山东科技大学 Intelligent automobile electronic key system with antitheft and anti-lost functions
CN108109232A (en) * 2017-12-06 2018-06-01 链家网(北京)科技有限公司 Key management system and method
CN109035507A (en) * 2018-07-10 2018-12-18 武汉瑞莱保能源技术有限公司 A kind of intelligent key management system based on loss protecting

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于物联网技术的钥匙智能管理系统的设计与实现;田华等;《科技资讯 SCIENCE & TECHNOLOGY INFORMATION》;20171231;第1-2页 *

Also Published As

Publication number Publication date
CN109685483A (en) 2019-04-26

Similar Documents

Publication Publication Date Title
CN109685483B (en) Key management system and key management method
US11605051B2 (en) System for parcel transport and tracking operated responsive to data bearing records
CN108764901B (en) Leasing method, system, equipment and storage medium based on block chain technology
CA3120888A1 (en) Enforcing data consistency in a transportation network
US11429924B2 (en) System for parcel transport and tracking operated responsive to data bearing records
US11375840B2 (en) System for parcel transport and tracking operated responsive to data bearing records
CN110516824B (en) Management system and method for aviation maintenance tool and equipment
US20190266568A1 (en) Blockchain-based system and method for crowdsourced delivery
CN108256721A (en) A kind of method for scheduling task, terminal device and medium
US11868946B2 (en) System for parcel transport operated responsive to data bearing records
CN109754292A (en) Stop self-service billing method, device and electronic equipment
US11568696B2 (en) System operated responsive to data bearing records
US11748697B2 (en) System for parcel pickup and delivery operated responsive to data bearing records
CN114117387A (en) Substation tool monitoring method and device, computer equipment and storage medium
CN109948813B (en) Maintenance equipment sharing method and device based on block chain and server
US11531956B2 (en) System for parcel transport and tracking operated responsive to data bearing records
US11521163B2 (en) System for parcel transport and tracking operated responsive to data bearing records
US11521164B2 (en) System for parcel transport and tracking operated responsive to data bearing records
CA3119278C (en) System for parcel transport and tracking operated responsive to data bearing records
CA3110992C (en) System for parcel transport and tracking operated responsive to data bearing records
CA3105762C (en) System for parcel transport and tracking operated responsive to data bearing records
US20210183198A1 (en) System For Parcel Transport And Tracking Operated Responsive To Data Bearing Records
CA3114527A1 (en) System for parcel transport and tracking operated responsive to data bearing records
CA3119682A1 (en) System for parcel pickup and delivery operated responsive to data bearing records
CA3153163A1 (en) System for parcel transport operated responsive to data bearing records

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230406

Address after: Room 301, Building 2, No. 42 Dongzhong Road, East District, Guangzhou Economic and Technological Development Zone, Guangdong Province, 510000

Patentee after: TECHTOTOP MICROELECTRONICS Co.,Ltd.

Address before: 510000 No. 483 Wushan Road, Tianhe District, Guangzhou City, Guangdong Province

Patentee before: Zhang Yiqing