CN109753254A - Duplicator secrecy management and control system based on RFID - Google Patents

Duplicator secrecy management and control system based on RFID Download PDF

Info

Publication number
CN109753254A
CN109753254A CN201910028552.6A CN201910028552A CN109753254A CN 109753254 A CN109753254 A CN 109753254A CN 201910028552 A CN201910028552 A CN 201910028552A CN 109753254 A CN109753254 A CN 109753254A
Authority
CN
China
Prior art keywords
information
duplicating
duplicator
module
subscriber identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910028552.6A
Other languages
Chinese (zh)
Inventor
鲜明
罗笑冰
刘建
王会梅
廖灵志
吴魏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN201910028552.6A priority Critical patent/CN109753254A/en
Publication of CN109753254A publication Critical patent/CN109753254A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a copier privacy control system based on RFID, which comprises an information acquisition subsystem, a copy control subsystem and a control center server, wherein the copy control subsystem is respectively connected with the control center server and the information acquisition subsystem; the information acquisition subsystem sends the acquired information to the copier control subsystem so as to upload the information to the server through the copier control subsystem, and the user identity authentication result and the confidentiality condition of the original copied document are obtained. When the original copy document is a confidential document, update information may be generated based on the current copy operation-related information, the user identity information, and the copy original information, so as to facilitate subsequent inquiry of the copy record.

Description

A kind of duplicator secrecy managing and control system based on RFID
Technical field
The present invention relates to field of terminal technology, and concretely, the present invention relates to a kind of, and the duplicator secrecy based on RFID is managed Control system.
Background technique
Digital duplicating machine steps into each office realm, while bringing convenience quick, also exists for information material Stolen leakage in reproduction process has buried hidden danger, especially military domain with high confidentiality, be related to national security and Social public security.
Currently, duplicator has become indispensable equipment in routine office work, can duplicate text by duplicator user Part.But at present in duplicator field, the duplicating flow management and control especially when being directed to hard-copy file concerning security matters is still not rigorous enough, The user for be easy to causeing the leakage of confidential document or not had permission duplicates, and secrecy technology is caused to be leaked, peace Full property is not high.In addition, user completes not achieve after duplicating, the subsequent service condition that can not also check duplicator and go through History duplicates situation.
Summary of the invention
It is an object of the invention to solve to duplicate safety problem existing for digital duplicating machine, provide a kind of based on RFID's Duplicator secrecy managing and control system.
According to an embodiment of the invention, providing a kind of duplicator secrecy managing and control system based on RFID, comprising:
Information gathering subsystem duplicates control subsystem and control centre's server, the duplicating control subsystem difference It is connect with control centre's server and the information gathering subsystem;Wherein,
The information gathering subsystem is for acquiring subscriber identity information and duplicating original part information, the user identity letter Breath is sent to the duplicating control subsystem, is serviced with being sent to the control centre by the duplicating control subsystem Device;
Control centre's server is used to receive the subscriber identity information, and to according to the subscriber identity information Letter verifying user identity, and the corresponding Permission Levels of the subscriber identity information are obtained when subscriber authentication passes through;
The duplicating control subsystem is also used to when subscriber authentication passes through, and the duplicating original part information is sent Extremely control centre's server, so that the server judges the original duplicating text according to the duplicating original part information Whether part is classified document, and when determining the original hard-copy file is classified document, obtains the original hard-copy file Security classification;
When control centre's server sends out the matching result of the security classification and the Permission Levels to match When sending to the duplicating control subsystem, the duplicating control subsystem controls the duplicator starting, and is duplicated based on current It operates relevant information, the subscriber identity information and duplicates original part information and generate more new information, and the more new information is sent To control centre's server.
Optionally, the information gathering subsystem includes:
User information collector, the user information collector are connect with the duplicating control subsystem, are used for acquiring Family identity information, and it is sent to the duplicating control subsystem.
Optionally, the information gathering subsystem includes:
RFID reader, the RFID reader are connect with the duplicating control subsystem, for reading original duplicating text RFID label tag on part, and the label substance read is sent to the duplicating control subsystem, the label substance includes Duplicate original part information and/or subscriber identity information;
And/or dimensional code scanner, the dimensional code scanner is connect with the duplicating control subsystem, for scanning Two-dimensional barcode information on original hard-copy file, and the two-dimensional barcode information is sent to the duplicating control subsystem.
Optionally, the duplicating control subsystem includes:
Main control module, it is described for controlling the duplicator starting.
Network Interface Module, the Network Interface Module are used and are established between duplicating control subsystem and the server Communication connection.
Power module, the power module are used to include that the duplicator for duplicating control system is powered.
First receiving module, first receiving module is for receiving the subscriber identity information and the duplicating original part Information;
Second receiving module, second receiving module is for receiving verifying knot of the server about user identity The matching instruction that fruit, the server are generated when the security classification matches with the Permission Levels;
Sending module, the sending module is for sending the subscriber identity information, the duplicating original part information and described More new information;
RFID module, the RFID module be used for according to current copy operation relevant information, the subscriber identity information and The duplicating original part information generates more new information.
Optionally, the duplicating control subsystem further include:
Two dimensional code module, the two dimensional code module are used to be believed according to current copy operation relevant information, the user identity Breath and the duplicating original part information generate more new information, and obtain updated two dimensional code mark.
Optionally, control centre's server subsystem includes:
First receiving module, for receiving subscriber identity information;
Authentication module, for verifying user identity according to the subscriber identity information, and when subscriber authentication passes through Obtain the corresponding Permission Levels of the subscriber identity information;
First sending module, for sending the verification result of subscriber identity information, so that duplicator is according to the verifying As a result it is read based on the RFID label tag on original hard-copy file and duplicates original part information;
Second receiving module, for receiving the duplicating original part information, and according to duplicating original part information judgement Whether original hard-copy file is classified document, to obtain described original when determining the original hard-copy file as classified document The security classification of hard-copy file;
Matching module, for matching the security classification and the Permission Levels, and in the security classification and the power The matching instruction generated when limit rank matching;
Second sending module, for sending the matching instruction to the duplicator, so that the duplicator starts, And more new information is obtained according to current copy operation relevant information, the duplicating original part information and subscriber identity information;
Third receiving module, for receiving the more new information, and according to the update information update database.
Optionally, the current copy operation relevant information include it is following at least one of:
The moment is duplicated, number is duplicated, duplicator ID, duplicates duration.
The medicine have the advantages that
User identity is verified before duplicating, guarantees the user identity legitimacy for making duplicator, avoids non-managing and control system The interior user that puts on record is promoted using duplicator and is duplicated safety;
The copy function that duplicator is opened in the matching of Permission Levels and security classification, further strengthens to duplicating The control of journey improves the safety of hard-copy file.
Based on current copy operation relevant information, subscriber identity information and the more new information quilt for duplicating the generation of original part information It is sent to control centre's server, so that control centre's server carries out data update, convenient for servicing subsequently through control centre Device inquires hard-copy log, realizes the retrospect to hard-copy log.
Detailed description of the invention
Fig. 1 is a kind of flow chart of copy method of the present invention;
Fig. 2 is the flow chart of another copy method of the present invention;
Fig. 3 is a kind of copy method interaction diagrams of the present invention;
Fig. 4 is the structure chart that managing and control system is duplicated in the present invention;
Fig. 5 is a kind of structural block diagram that managing and control system is duplicated in the present invention;
Fig. 6 is a kind of example view of two dimensional code of the present invention;
Fig. 7 is another structural block diagram that managing and control system is duplicated in the present invention;
Fig. 8 is a kind of structural block diagram of duplicator control subsystem of the invention.
Specific embodiment
The present invention is described in detail below.A kind of retrospective copy method provided by the invention, may include with Lower step:
In a step 101, subscriber identity information is obtained.
In a step 102, it will acquire the subscriber identity information and be sent to server, so that the server root User identity is verified according to the subscriber identity information, and obtains the subscriber identity information pair when subscriber authentication passes through The Permission Levels answered.
In the present embodiment, subscriber identity information may include user fingerprints information, iris information and facial structure information In one or more;The subscriber identity information is also possible to swipe the card the ID card information of pickup.The subscriber identity information can be with It is uploaded to server and carries out identity information comparison, prestore letter with what subscriber identity information matched when being matched in the server When breath, it is determined as subscriber authentication and passes through, otherwise not passes through.
Wherein, Permission Levels are corresponding with subscriber identity information, and different users can have different Permission Levels.Example Such as, the high user of Permission Levels can duplicate the high file of security classification, the lower user of Permission Levels can only then duplicate secrecy The lower file of rank.
In step 103, verification result of the server about user identity is received, and logical in subscriber authentication It is out-of-date, based on original hard-copy file RFID label tag and two dimensional code mark obtain reading duplicate original part information.
It in the present embodiment, can be by reading RFID (the Radio Frequency on hard-copy file Identification, radio frequency identification) label, it obtains and duplicates original part information.RFID mark on original hard-copy file Label can be active radio frequency label, or be also possible to passive RF label, herein and be not limited.Preferably can be Passive RF label.
At step 104, the duplicating original part information is sent to the server so that the server according to The duplicating original part information judges whether the original hard-copy file is classified document, and is determining the original hard-copy file When for classified document, the security classification of the original hard-copy file is obtained.
In the present embodiment, it can will duplicate original part information and be sent to server, by server according to the duplicating received Original part information judges whether hard-copy file is classified document.When original hard-copy file is classified document, server further may be used To obtain the security classification of original hard-copy file.
In step 105, that the server is generated when the security classification matches with the Permission Levels is obtained With instruction, the duplicator starting is controlled.
In this embodiment it is assumed that the rank of security classification 1- security classification 10 is gradually increased, Permission Levels 1- permission grade Other 10 rank is gradually increased, then.Permission Levels are matched with security classification it is to be understood that Permission Levels are not less than secrecy Rank can successively determine that user has operating right, is able to carry out the copy operation for the original hard-copy file.
In step 106, according to current copy operation relevant information, the duplicating original part information and subscriber identity information More new information is obtained, and the more new information is sent to the server, so that the server is according to the more new information Carry out data update.
In the present embodiment, after determining that user has access right, the duplicating function of duplicator can on the one hand be opened Can, execute copy operation;On the other hand it can determine current copy operation relevant information, duplicate number and duplicate identity letter Breath obtains more new information, which can be sent to server, and can be updated according to acquisition of information is updated Label substance, and estimate to print RFID label tag with updated label substance, to identify on each copy.It, can with this To cover RFID label tag on obtained copy, be conducive to it is subsequent carry out inquiry and again based on the copy duplicated when Obtain relevant information
The copying process of classified document can be managed, and can protected based on technical solution provided by the invention It deposits and updates and perform the relevant informations such as user, moment and duplicator ID of copy operation for classified document, in order to rear Continuous inquiry hard-copy log, realizes the retrospect to duplicating history, is conducive to search and duplicate in process there are loophole, improves to duplicate and pacify Entirely.
As shown in Fig. 2, a kind of retrospective copy method provided by the invention, may comprise steps of:
In step 201, subscriber identity information is received.
In in this embodiment, which can pass through the fingerprint sensor on duplicating or camera etc. Sensor obtains.
In step 202, user identity is verified according to the subscriber identity information, and when subscriber authentication passes through Obtain the corresponding Permission Levels of the subscriber identity information.
In the present embodiment, subscriber identity information may include user fingerprints information, iris information and facial structure information In one or more;The subscriber identity information is also possible to swipe the card the ID card information of pickup.The subscriber identity information can be with It is uploaded to server and carries out identity information comparison, prestore letter with what subscriber identity information matched when being matched in the server When breath, it is determined as subscriber authentication and passes through, otherwise not passes through.
Wherein, Permission Levels are corresponding with subscriber identity information, and different users can have different Permission Levels.Example Such as, the high user of Permission Levels can duplicate the high file of security classification, the lower user of Permission Levels can only then duplicate secrecy The lower file of rank.
In step 203, the verification result of subscriber identity information is sent, so that duplicator is according to the verification result Based on the RFID label tag and two dimensional code mark reading duplicating original part information on original hard-copy file.
In the present embodiment, duplicator can be by reading RFID (the Radio Frequency on hard-copy file Identification, radio frequency identification) label and two dimensional code mark, obtain duplicate original part information, the duplicating original part information Server can be sent to by duplicator.
In step 204, the duplicating original part information is received, and is judged according to the duplicating original part information described original Whether hard-copy file is classified document, to obtain the original duplicating when determining the original hard-copy file as classified document The security classification of file.
In step 205, the security classification and the Permission Levels are matched, and in the security classification and the power The matching instruction generated when limit rank matching.
In this embodiment it is assumed that the rank of security classification 1- security classification 10 is gradually increased, Permission Levels 1- permission grade Other 10 rank is gradually increased, then.Permission Levels are matched with security classification it is to be understood that Permission Levels are not less than secrecy Rank can successively determine that user has operating right, is able to carry out the copy operation for the original hard-copy file.
In step 206, the matching instruction is sent to the duplicator, so that the duplicator starts, and according to Current copy operation relevant information, the duplicating original part information and subscriber identity information obtain more new information.
In step 207, the more new information is received, and with the update information update database.
In the present embodiment, server updates the database of itself according to the more new information received, convenient for it is subsequent from Server download data directly inquires data by server, historical record is duplicated to determine, convenient for retrospect.
Fig. 3 is another flow chart based on RFID copy method, the interaction being related between duplicator and server, such as Shown in Fig. 3:
In step 301, the finger print information of user is obtained.
In the present embodiment, use can be taken by the Fingerprint Identification Unit or fingerprint capturer being arranged inside duplicator The finger print information at family.Certainly, it is only illustrated by taking finger print information as an example herein, it can also be using other use in other information Family information carries out authentication.
In step 302, the finger print information is matched.
In the present embodiment, server can receive the finger print information of duplicator transmission, and the finger print information that will be received It is matched with the pre-matching information of storage inside, obtains matching result, which can be sent to duplicator, make It obtains duplicator and different operation is executed according to matching result.
For example, duplicator can execute step 304 according to matching result when finger print information and pre-matching information matches; When finger print information and pre-matching information mismatch, duplicator, which may remind the user that, re-types finger print information.
In step 304, the RFID label tag and two dimensional code mark on original hard-copy file are scanned, obtains and duplicates original part letter Breath.
In the present embodiment, which can be the passive RF label for being pasted onto and duplicating on original part.The duplicating is former Part information may include the related contents such as classified information, the security classification for duplicating original part.
In step 305, judge original hard-copy file for confidential document according to duplicating original part information.
In the present embodiment, server can receive the duplicating original part information of duplicator transmission, and believe according to original part is duplicated Breath judges whether original hard-copy file is confidential document.
For example, step 306 is executed when original hard-copy file is confidential document, when original hard-copy file is not concerning security matters text When part, judging result can be sent to duplicator, duplicator executes common copy operation.
Within step 306, judge that Permission Levels are matched with the security classification for duplicating original part.
In the present embodiment, Permission Levels are matched with security classification, then illustrate that user has for the original hard-copy file Execute the permission of copy operation.
When Permission Levels and security classification mismatch, unmatched result can be sent to duplicator, duplicator is reminded User does not have permission.
In step 307, starting is duplicated in control, starts to duplicate.
In the present embodiment, after duplicator starting, user can input in input interface and duplicate the relevant informations such as number.
In step 308, it is generated according to current copy operation relevant information, subscriber identity information and duplicating original part information More new information.
In the present embodiment, current copy operation relevant information may include duplicating number, duplicating moment, duplicator ID Etc. information.Duplicator may further be based on the update information update label substance, thus by the tag identifier after content update On copy.
In a step 309, more new information is received.
In the step 310, according to the update confidence more new database received.
In the present embodiment, server can be according to information update database be updated, so that subsequent can pass through server Historical record is duplicated in inquiry, and situation is duplicated in retrospect, is conducive to search hard-copy file leakage reason.
The duplicating managing and control system architecture diagram based on RFID that the present invention also provides a kind of.As shown in Fig. 4-Fig. 8,
Duplicator secrecy managing and control system 100 disclosed by the invention based on RFID may include positioned at duplicating the of generator terminal One copy system 101 and the second copy system 102 positioned at server end, first copy system 101 and the second copy system Interaction between 102.
Specifically, the first copy system 101 may include information gathering subsystem 1 and connect with information gathering subsystem 1 The duplicating control subsystem 2 connect, the second copy system 102 may include control centre's server 3, the duplicating control subsystem 2 It is communicated to connect respectively with control centre server 3 and information gathering subsystem 1.
Wherein, information gathering subsystem 1 is for acquiring subscriber identity information and duplicating original part information, collected user Identity information, which can be sent to, duplicates control subsystem 2, to be sent out subscriber identity information by duplicating control subsystem 2 It send to control centre's server 3, the subscriber identity information received is directed to by control centre's server 3, to user identity It is verified.
When control centre's server 3 verify user identity by when obtain the corresponding Permission Levels of subscriber identity information, and By verification result return instruction to control subsystem 2 is duplicated, duplicates control subsystem 2 and receive verification result, indicate information collection Subsystem 1, which obtains, duplicates original part information, and is sent to and duplicates control subsystem 2, which will duplicate original part Information is sent to control centre's server 3, and control centre's server 3 receives the duplicating original part information, and according to the duplicating Original part information judges whether the original hard-copy file is classified document, to determine the original hard-copy file for secrecy text When part, the security classification of the original hard-copy file is obtained, and matches the security classification and the Permission Levels, and in institute State the matching instruction generated when security classification matches with the Permission Levels.The reception matching instruction of control subsystem 2 is duplicated to open It is dynamic, and more new information is obtained according to current copy operation relevant information, the duplicating original part information and subscriber identity information.
One side duplicator can be marked according to the content of the update information update electronic tag, and by updated RFID Label and two dimensional code mark are identified on copy;On the other hand control centre's server can be sent by more new information 3, control centre's server 3 receives more new information and according to the update information update database, realizes to duplicating historical record Retrospect.
The identity of user can be verified before the copy function of starting duplicator based on this, guarantee to make The user identity legitimacy of duplicator avoids the user that puts on record in non-managing and control system from using duplicator;In addition, being controlled by duplicating Subsystem 2 is according to currently performed copy operation, subscriber identity information and duplicates original part information generation more new information, the update Information can make control centre's server 3 synchronize update, the subsequent duplicating situation that can trace and inquire duplicator, Convenient for obtaining the source information duplicated, since more new information can be identified on copy, in other users by the copy When being duplicated as duplicating original part, it can still be identified by duplicator.
Information gathering subsystem 1 may include user information collector 11, user information collector 11 and duplicating control System 2 connects, and for acquiring subscriber identity information, and is sent to the duplicating control subsystem 2.For example, which believes Breath collector 11 may include fingerprint capturer, iris capturing device, recognition of face device or speech recognition device etc., correspondingly, with Family identity information may include finger print information, iris information, face information or password content.
Information gathering subsystem 1 can also include that (Radio Frequency Identification, is wirelessly penetrated RFID Frequency be by) reader 12, the RFID reader 12 can with duplicate control subsystem 2 communicate to connect, when duplicate original part be positioned Afterwards, which can identify the electronic tag duplicated on original part, and the electronic tag content read is sent to duplicating Control subsystem 2.The electronic tag content includes duplicating original part information.The electronic tag duplicated on original part can be active electricity Subtab or passive electronic label, are not defined herein.
Similar, which can be also used for reading subscriber identity information.For example, user can hold ID ID card has RFID reader 12 to read ID ID card, and to obtain subscriber identity information, which can be used In verifying user identity.For example, RFID reader 12 can choose the radio frequency identification module of 13.56M.
Information gathering subsystem 1 can also include dimensional code scanner 13, which can control with duplicating Subsystem 2 communicates to connect, and after duplicating original part is positioned, which can identify two duplicated on original part Code mark is tieed up, the electronic tag content read, which is sent to, duplicates control subsystem 2.
Copy system 100 based on RFID of the invention can also carry out cost control, the number that each user can duplicate 60,000 are limited, more than also needing using then being expanded by management;Limitation uses the time, can set working time section, prevent Non-working time uses duplicator;Time-out exits, and machine is unmanned after opening to be used, more than 3 minutes after system automatically exit from pass It closes.It prevents from other people from falsely using to duplicate.
Control subsystem 2 is duplicated to realize using general purpose computer, single-chip microcontroller or ARM plate.For example, can use STC15F2K60S2 chip microcontroller.As shown in fig. 6, the duplicating control subsystem 2 may include:
Main control module 21, the main control module 21 and information gathering subsystem 1 communicate to connect, to be used to indicate the information The starting of acquisition subsystem 1 operates the acquisition of subscriber identity information and duplicating original part information.For example, can be on duplicator Switch button is pressed or is when recognizing user, and instruction information acquisition system obtains subscriber identity information.The master control Module 21 is to duplicate the core of control subsystem 2, can control duplicator and is started, can be completed and the life in computer Order exchanges, data transmission and the duplicating signal detection of entire duplicator, duplicator state instruction, two dimensional code are generated and shown Show, the disengaging of paper detection etc. functions.
Network Interface Module 22, the Network Interface Module 22 duplicate control subsystem 2 and control centre's server with foundation Communication connection between 3.Network Interface Module 22 is the unique passage that control subsystem is communicated with computer foundation, main The functions such as data packing, the data parsing of TCP network protocol are completed, the CPU in master board transmits computer Data identified.
Power module 23, the power module 23 are used to include that the duplicator of duplicating control system is powered.The electricity Source module 23 can use the AC-DC switch power module 23 of compact, and alternating current is converted into DC3.3V for subsystem just Often operation.The module has the characteristics that small in size, light-weight, high conversion efficiency, calorific value are small, cost performance is high, stability is good.
First receiving module 24, first receiving module are former for receiving the subscriber identity information and the duplicating Part information;
Second receiving module 25, second receiving module is for receiving verifying of the server about user identity As a result, the matching instruction that the server is generated when the security classification matches with the Permission Levels;
Sending module 26, the sending module is for sending the subscriber identity information, the duplicating original part information and institute State more new information;
Detection module 27, detection module 27 is for detecting whether the duplicator is in copy mode, so that the master Control module 21 judges whether to acquire subscriber identity information and duplicates original part information according to the state.Specifically, the detection module Whether 27 can detecte paper, which enters, carries out duplicating this movement in duplicator, determines whether duplicator is in copy mode.Inspection Survey module 27 whether paper can be entered carry out duplicating in duplicator this movement can be converted a certain transformation number letter Number amount, so that the CPU in main control module 21 is able to carry out identification.In duplicating control subsystem 2, the digital signal amount is direct It is taken from the inside of duplicator, and light-coupled isolation is added in the part that it is connected with CPU, it is ensured that paper signal is between the two Normal transmission and opposite independence, so that it does not interfere with each other, be independent of each other.
RFID module 28, the RFID module 26 can be based on current copy operations, the subscriber identity information and described It duplicates original part information and generates updated RFID label tag, and the updated RFID label tag can be identified to copy.
Wherein, RFID information acquisition module closely identifies since the present invention is directed to, has selected frequency opposite The radio frequency identification module of lower 13.56M.Its specific targets are as follows:
Product type: MIFARE522_MODULE;
Operating current: 13~26mA/ direct current 3.3V;
Idle current: 10~13mA/ direct current 3.3;
Quiescent current: < 80uA;
Peak point current: < 30mA;
Working frequency: 13.56MHz;
Card reading distance: 0~65mm;
Interface: UART TTL;
Baud rate 9600;
Message transmission rate: maximum 10Mbit/s;
Card reading speed: reading ID 7 times per second, reads block number according to 3 times per second;
Size: 50mm × 50mm;
Ambient operating temperature: -20~80 degree Celsius;
Storage temperature: -40~85 degree Celsius;
Humidity: relative humidity 5%~95%;
Agreement: meeting ISO14443A standard, supports Mifare1S50, S70 (ID number of four bytes).
Two dimensional code module 29, the two dimensional code module 29 can be believed based on current copy operation relevant information, user identity Breath and duplicating original part information generate two dimensional code mark, and the two-dimensional barcode information of generation are shown, and the two dimensional code identifies It can be copied on paper.Two dimensional code module 28 can be formed using DSP architecture, carry the solution of various one-dimension codes and two dimensional code Code algorithm and corresponding error correction algorithm, can fast and accurately identify and parse the information for including in two-dimension code pattern.Two Dimension code is shown can be completed using the TFT of the 128*128 resolution ratio of 160,000 colors of high speed, which can be clearly by two dimensional code It shows and is identified by duplicator, thus duplicate onto paper, meanwhile, in order to consider to reduce whole system power consumption, the back of the TFT Light controls its open and close by main control module 21.
Specifically, the modulus rule of two dimensional code are as follows: use QR code, (error-correction level 7%) feature size is 21*21 picture Vegetarian refreshments, (from left to right, the left side is a high position to modulus rule, and black pixel point 1, white pixel point is 0, and the end of every row is by whole Number section has more three and mends 0), is converted into 16 system formats with byte (Byte) as minimum unit.
Such as: as two dimensional code (information 1234567890abcdef) picture in Fig. 7 the first row modulus after should obtain 3 bytes, 0xfe, 0x03,0xf8.
Its specific targets is as follows:
Scanning sensor: 752 × 480CMOS sensor;
Move tolerance: 4 inch per seconds;
Rotation sensitivity: 360 ° of omnidirectionals read;
Visual angle: ± 40 °;
Environment photo-adaptive: under complete darkness to Full daylight (100,000 lux);
Illuminate feux rouges: 626nm ± 30nm;
Sight line: feux rouges: 526nm ± 30nm laser: 650nm ± 10nm;
Illuminate (sight line) classification: 5080LED sight line (LED Aimer);
Code system supports (all general peacekeeping two dimensional codes):
Two dimensional code: PDF417, MicroPDF417, MaxiCode, Data Matrix, QR Code, Aztec, Aztec Mesa, Code 49, UCC Composite
One-dimension code: Code 39, Code 128, Codabar, UPC, EAN intersect 25 yards, Reduced Space Symbology, Code 93, Codablock
Postal code: Postnet (US), Planet Code, BPO 4State, Canadian Post, Japanese Post, KIX (Netherlands) Post
OCR format: OCR-A and OCR-B.
Duplicator state indicator module 210, the duplicator state indicator module 210 may include two different colours Highlighted low-power consumption LED composition, is mounted in the control panel of duplicator, can be used to show that duplicator present mode (maintains secrecy or general It is logical), TFT backlight state etc. in duplicator.
It duplicates signal identification module 211 and duplicates signal control module 212, obtained by duplicating signal identification module 211 The duplicating of user is requested, and duplicating request signal is sent to the CPU of main control module 21 by duplicating signal control module 212 to, together When be responsible for by CPU send start duplicate signal send duplicator to.It is duplicating signal identification module 211 and is duplicating signal control In molding block 212, in order to reach the reliable detection of signal, reliable transmission, be independent of each other, equally also use optocoupler carry out every From.
Wherein, the communication between the 3 of duplicator control subsystem 2 and control centre's server includes control centre's server 3 It holds to duplicator control subsystem 2 and transmits data and duplicator control subsystem 2 answering to control centre's server end 3 It answers.Communication interface uses two kinds of forms of RJ45 network interface and UART serial ports.
Specifically it is shown in Table 1:
Table 1
Frame head: 0xff, 0x55 immobilize;
Data length: to the sum of postamble, all data bytes since command byte;
Order: 0x00 normally receives data;
0x01 cancels current number of copies immediately and stops duplicating;
0x02 transmission has currently duplicated the page number to PC;
0xaa duplicator is set to security schema;
0xa0 duplicator is set to general mode;
Number of pages: current document needs the page number duplicated;
Number of pages radix-minus-one complement: mainly playing verification, such as currently needing the number of pages duplicated is 0x02, then radix-minus-one complement is 0xff- 0x02=0xfd;
Postamble: 0xff, 0xaa immobilize.
(2) duplicator control module can be replied first in any case to control centre's server end response (2Byte) Success or not is received, is then replied by order.Specifically it is shown in Table 2.
Table 2
Specifically as shown in fig. 7, the Fig. 7 illustrates control centre's server admin flow chart.To administrator when software starts Identity is verified, and is arranged username and password two, can be logged in management system by verifying, be shown main interface.The main boundary Face can show user management, file management and duplicate the correlated identities such as management, but when user triggers any mark can Transfer the corresponding content in background data base.
Control centre's server 3 may include:
First receiving module 31, for receiving subscriber identity information;
Authentication module 32 for verifying user identity according to the subscriber identity information, and passes through in subscriber authentication When obtain the corresponding Permission Levels of the subscriber identity information;
First sending module 33, for sending the verification result of subscriber identity information, so that duplicator is tested according to Result is demonstrate,proved based on the RFID label tag and two dimensional code mark reading duplicating original part information on original hard-copy file;
Second receiving module 34 judges institute for receiving the duplicating original part information, and according to the duplicating original part information State whether original hard-copy file is classified document, to obtain the original when determining the original hard-copy file as classified document The security classification of beginning hard-copy file;
Matching module 35, for matching the security classification and the Permission Levels, and the security classification with it is described The matching instruction that Permission Levels generate when matching;
Second sending module 36, for sending the matching instruction to the duplicator, so that the duplicator opens It is dynamic, and more new information is obtained according to current copy operation relevant information, the duplicating original part information and subscriber identity information;
Third receiving module 37, for receiving the more new information, and according to the update information update database.
Login module 38 can verify administrator's identity by the way that username and password is arranged.When user name with it is close When code matching, control centre's server 3 can be logged in, with query-related information.
User management module 39 realizes the management to personal information is duplicated, and the user management module 32 is for storing user Number, name, position, user class, telephone number and affiliated function, wherein the user class corresponds to hard-copy file Level of confidentiality power.It can also include function bar, which includes increasing newly, inquiry, modification, saving, delete, six Xiang Gongneng of closing, pipe Reason person can choose new new-added item addition user, and query term is selected to search user and realize modification after lookup and delete function.
Document management module 310, document management module 310 are used for store-updated information, the two-dimensional barcode information packet Include hard-copy file number, hard-copy file title, level of confidentiality, access times, telephone number, department.
Hard-copy log management module 311, the hard-copy log management module 311 may include using for storing hard-copy log Family number, file name, duplicates number, duplicates the time reference number of a document, realizes relevant inquiring function, including be based on querying individual Which kind of file record when hard-copy log, i.e. inquiry user duplicate, and inquiry file copy record, i.e., same file is assorted The information whom time used by.

Claims (7)

1. a kind of duplicator secrecy managing and control system based on RFID characterized by comprising information gathering subsystem duplicates control Subsystem and control centre's server, the duplicating control subsystem respectively with control centre's server and the information Acquisition subsystem connection;Wherein,
The information gathering subsystem for acquiring subscriber identity information and duplicating original part information, sent out by the subscriber identity information It send to the duplicating control subsystem, to be sent to control centre's server by the duplicating control subsystem;
Control centre's server is verified for receiving the subscriber identity information, and to being believed according to the subscriber identity information User identity, and the corresponding Permission Levels of the subscriber identity information are obtained when subscriber authentication passes through;
The duplicating control subsystem is also used to when subscriber authentication passes through, and the duplicating original part information is sent to described Control centre's server, so that whether the server judges the original hard-copy file according to the duplicating original part information For classified document, and when determining the original hard-copy file is classified document, the confidential of the original hard-copy file is obtained Not;
When the security classification and the matching result of the Permission Levels to match are sent to by control centre's server When the duplicating control subsystem, the duplicating control subsystem controls the duplicator starting, and is based on current copy operation Relevant information, the subscriber identity information and duplicating original part information generate more new information, and the more new information is sent to institute State control centre's server.
2. duplicator secrecy managing and control system according to claim 1, which is characterized in that the information gathering subsystem packet It includes:
User information collector, the user information collector is connect with the duplicating control subsystem, for acquiring user's body Part information, and it is sent to the duplicating control subsystem.
3. duplicator secrecy managing and control system according to claim 1, which is characterized in that the information gathering subsystem packet It includes:
RFID reader, the RFID reader is connect with the duplicating control subsystem, for reading original hard-copy file RFID label tag, and the label substance read is sent to the duplicating control subsystem, the label substance includes duplicating Original part information and/or subscriber identity information;
And/or dimensional code scanner, the dimensional code scanner is connect with the duplicating control subsystem, original for scanning Two-dimensional barcode information on hard-copy file, and the two-dimensional barcode information is sent to the duplicating control subsystem.
4. duplicator secrecy managing and control system according to claim 1, which is characterized in that the duplicating control subsystem packet It includes:
Main control module, it is described for controlling the duplicator starting.
Network Interface Module, the Network Interface Module communication link established between the duplicating control subsystem and server It connects.
Power module, the power module are used to include that the duplicator for duplicating control system is powered.
First receiving module, first receiving module is for receiving the subscriber identity information and the duplicating original part information;
Second receiving module, second receiving module are used to receive verification result of the server about user identity, institute State the matching instruction that server is generated when the security classification matches with the Permission Levels;
Sending module, the sending module is for sending the subscriber identity information, the duplicating original part information and the update Information;
RFID module, the RFID module are used for according to current copy operation relevant information, the subscriber identity information and described It duplicates original part information and generates more new information.
5. duplicator secrecy managing and control system according to claim 1, which is characterized in that the duplicating control subsystem is also wrapped It includes:
Two dimensional code module, the two dimensional code module be used for according to current copy operation relevant information, the subscriber identity information and The duplicating original part information generates more new information, and obtains updated two dimensional code mark.
6. duplicator secrecy managing and control system according to claim 1, which is characterized in that control centre's server subsystem packet It includes:
First receiving module, for receiving subscriber identity information;
Authentication module, for verifying user identity, and the acquisition when subscriber authentication passes through according to the subscriber identity information The corresponding Permission Levels of the subscriber identity information;
First sending module, for sending the verification result of subscriber identity information, so that duplicator is according to the verification result It is read based on the RFID label tag on original hard-copy file and duplicates original part information;
Second receiving module for receiving the duplicating original part information, and judges according to the duplicating original part information described original Whether hard-copy file is classified document, to obtain the original duplicating when determining the original hard-copy file as classified document The security classification of file;
Matching module, for matching the security classification and the Permission Levels, and in the security classification and the permission grade Not Pi Pei when the matching instruction that generates;
Second sending module, for sending the matching instruction to the duplicator, so that the duplicator starts, and according to Current copy operation relevant information, the duplicating original part information and subscriber identity information obtain more new information;
Third receiving module, for receiving the more new information, and according to the update information update database.
7. duplicator secrecy managing and control system according to claim 1, which is characterized in that the current copy operation correlation letter Breath include it is following at least one of:
The moment is duplicated, number is duplicated, duplicator ID, duplicates duration.
CN201910028552.6A 2019-01-11 2019-01-11 Duplicator secrecy management and control system based on RFID Pending CN109753254A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910028552.6A CN109753254A (en) 2019-01-11 2019-01-11 Duplicator secrecy management and control system based on RFID

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910028552.6A CN109753254A (en) 2019-01-11 2019-01-11 Duplicator secrecy management and control system based on RFID

Publications (1)

Publication Number Publication Date
CN109753254A true CN109753254A (en) 2019-05-14

Family

ID=66405455

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910028552.6A Pending CN109753254A (en) 2019-01-11 2019-01-11 Duplicator secrecy management and control system based on RFID

Country Status (1)

Country Link
CN (1) CN109753254A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101819689A (en) * 2009-02-17 2010-09-01 江苏云联科技有限公司 File management system based on RFID (Radio Frequency Identification Device)
CN201681271U (en) * 2010-03-24 2010-12-22 北京立思辰新技术有限公司 Duplicator safety control terminal
CN104809388A (en) * 2015-04-30 2015-07-29 北京立思辰计算机技术有限公司 Method and device for tracing information source of copied document as well as information security type copier
CN104834853A (en) * 2015-04-30 2015-08-12 北京立思辰计算机技术有限公司 Identity recognition method, identity recognition device and information security type copy machine
CN107977584A (en) * 2017-12-14 2018-05-01 中铁信安(北京)信息安全技术有限公司 The safe copy system of desktop type
CN108153496A (en) * 2016-12-06 2018-06-12 西宁金智电子有限公司 A kind of identity card dedicated secret duplicator for identifying client identity

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101819689A (en) * 2009-02-17 2010-09-01 江苏云联科技有限公司 File management system based on RFID (Radio Frequency Identification Device)
CN201681271U (en) * 2010-03-24 2010-12-22 北京立思辰新技术有限公司 Duplicator safety control terminal
CN104809388A (en) * 2015-04-30 2015-07-29 北京立思辰计算机技术有限公司 Method and device for tracing information source of copied document as well as information security type copier
CN104834853A (en) * 2015-04-30 2015-08-12 北京立思辰计算机技术有限公司 Identity recognition method, identity recognition device and information security type copy machine
CN108153496A (en) * 2016-12-06 2018-06-12 西宁金智电子有限公司 A kind of identity card dedicated secret duplicator for identifying client identity
CN107977584A (en) * 2017-12-14 2018-05-01 中铁信安(北京)信息安全技术有限公司 The safe copy system of desktop type

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
柴天天: "基于二维条码QR码的安全复印系统设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Similar Documents

Publication Publication Date Title
CN102156853B (en) Certificate reading system and certificate reading method
CN109726783A (en) A kind of invoice acquisition management system and method based on OCR image recognition technology
Harris et al. Biometric authentication: assuring access to information
CN109656112A (en) Traceable copying method and system
US20020131636A1 (en) Palm office assistants
US7840571B2 (en) System and method for information management using handwritten identifiers
CN109525745A (en) Copying method and system based on two-dimensional code
US20050091490A1 (en) Information storage server and information storage program
CN107680294A (en) House property information querying method, system, terminal device and storage medium
GB2412154A (en) Digital pen with a reader/writer for a document having a memory tag and a personal identification device having an e-signature
CN107170093A (en) Authentication gate control system
WO2012057459A1 (en) Random-type multilayer identification, and system using same
CA2142227A1 (en) Combination radiofrequency identification card - fingerprint identification system
CN110363891A (en) A kind of intelligent visitor system suitable for more scenes
CN208141417U (en) A kind of identity recognition terminal
CN106096552A (en) The finger print matching method of intelligent fingerprint punched-card machine, fingerprint punch card system
CN206274408U (en) A kind of intelligent caller machine
CN109753254A (en) Duplicator secrecy management and control system based on RFID
CN109740368A (en) Copying method and system based on RFID
CN207458050U (en) A kind of multi-function desktop intelligent terminal
CN107563842A (en) A kind of ticket-booking system and booking method based on fingerprint recognition
CN206212038U (en) The Login Register system of distributed palm print identity authentication
CN201828977U (en) Multifunctional non-local personnel registering system
CN110400433A (en) A kind of intelligent bookshelf brush book, which checks out, self-service borrows method and system
CN202110562U (en) Certificate identifying-reading device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190514