CN109753254A - Duplicator secrecy management and control system based on RFID - Google Patents
Duplicator secrecy management and control system based on RFID Download PDFInfo
- Publication number
- CN109753254A CN109753254A CN201910028552.6A CN201910028552A CN109753254A CN 109753254 A CN109753254 A CN 109753254A CN 201910028552 A CN201910028552 A CN 201910028552A CN 109753254 A CN109753254 A CN 109753254A
- Authority
- CN
- China
- Prior art keywords
- information
- duplicating
- duplicator
- module
- subscriber identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides a copier privacy control system based on RFID, which comprises an information acquisition subsystem, a copy control subsystem and a control center server, wherein the copy control subsystem is respectively connected with the control center server and the information acquisition subsystem; the information acquisition subsystem sends the acquired information to the copier control subsystem so as to upload the information to the server through the copier control subsystem, and the user identity authentication result and the confidentiality condition of the original copied document are obtained. When the original copy document is a confidential document, update information may be generated based on the current copy operation-related information, the user identity information, and the copy original information, so as to facilitate subsequent inquiry of the copy record.
Description
Technical field
The present invention relates to field of terminal technology, and concretely, the present invention relates to a kind of, and the duplicator secrecy based on RFID is managed
Control system.
Background technique
Digital duplicating machine steps into each office realm, while bringing convenience quick, also exists for information material
Stolen leakage in reproduction process has buried hidden danger, especially military domain with high confidentiality, be related to national security and
Social public security.
Currently, duplicator has become indispensable equipment in routine office work, can duplicate text by duplicator user
Part.But at present in duplicator field, the duplicating flow management and control especially when being directed to hard-copy file concerning security matters is still not rigorous enough,
The user for be easy to causeing the leakage of confidential document or not had permission duplicates, and secrecy technology is caused to be leaked, peace
Full property is not high.In addition, user completes not achieve after duplicating, the subsequent service condition that can not also check duplicator and go through
History duplicates situation.
Summary of the invention
It is an object of the invention to solve to duplicate safety problem existing for digital duplicating machine, provide a kind of based on RFID's
Duplicator secrecy managing and control system.
According to an embodiment of the invention, providing a kind of duplicator secrecy managing and control system based on RFID, comprising:
Information gathering subsystem duplicates control subsystem and control centre's server, the duplicating control subsystem difference
It is connect with control centre's server and the information gathering subsystem;Wherein,
The information gathering subsystem is for acquiring subscriber identity information and duplicating original part information, the user identity letter
Breath is sent to the duplicating control subsystem, is serviced with being sent to the control centre by the duplicating control subsystem
Device;
Control centre's server is used to receive the subscriber identity information, and to according to the subscriber identity information
Letter verifying user identity, and the corresponding Permission Levels of the subscriber identity information are obtained when subscriber authentication passes through;
The duplicating control subsystem is also used to when subscriber authentication passes through, and the duplicating original part information is sent
Extremely control centre's server, so that the server judges the original duplicating text according to the duplicating original part information
Whether part is classified document, and when determining the original hard-copy file is classified document, obtains the original hard-copy file
Security classification;
When control centre's server sends out the matching result of the security classification and the Permission Levels to match
When sending to the duplicating control subsystem, the duplicating control subsystem controls the duplicator starting, and is duplicated based on current
It operates relevant information, the subscriber identity information and duplicates original part information and generate more new information, and the more new information is sent
To control centre's server.
Optionally, the information gathering subsystem includes:
User information collector, the user information collector are connect with the duplicating control subsystem, are used for acquiring
Family identity information, and it is sent to the duplicating control subsystem.
Optionally, the information gathering subsystem includes:
RFID reader, the RFID reader are connect with the duplicating control subsystem, for reading original duplicating text
RFID label tag on part, and the label substance read is sent to the duplicating control subsystem, the label substance includes
Duplicate original part information and/or subscriber identity information;
And/or dimensional code scanner, the dimensional code scanner is connect with the duplicating control subsystem, for scanning
Two-dimensional barcode information on original hard-copy file, and the two-dimensional barcode information is sent to the duplicating control subsystem.
Optionally, the duplicating control subsystem includes:
Main control module, it is described for controlling the duplicator starting.
Network Interface Module, the Network Interface Module are used and are established between duplicating control subsystem and the server
Communication connection.
Power module, the power module are used to include that the duplicator for duplicating control system is powered.
First receiving module, first receiving module is for receiving the subscriber identity information and the duplicating original part
Information;
Second receiving module, second receiving module is for receiving verifying knot of the server about user identity
The matching instruction that fruit, the server are generated when the security classification matches with the Permission Levels;
Sending module, the sending module is for sending the subscriber identity information, the duplicating original part information and described
More new information;
RFID module, the RFID module be used for according to current copy operation relevant information, the subscriber identity information and
The duplicating original part information generates more new information.
Optionally, the duplicating control subsystem further include:
Two dimensional code module, the two dimensional code module are used to be believed according to current copy operation relevant information, the user identity
Breath and the duplicating original part information generate more new information, and obtain updated two dimensional code mark.
Optionally, control centre's server subsystem includes:
First receiving module, for receiving subscriber identity information;
Authentication module, for verifying user identity according to the subscriber identity information, and when subscriber authentication passes through
Obtain the corresponding Permission Levels of the subscriber identity information;
First sending module, for sending the verification result of subscriber identity information, so that duplicator is according to the verifying
As a result it is read based on the RFID label tag on original hard-copy file and duplicates original part information;
Second receiving module, for receiving the duplicating original part information, and according to duplicating original part information judgement
Whether original hard-copy file is classified document, to obtain described original when determining the original hard-copy file as classified document
The security classification of hard-copy file;
Matching module, for matching the security classification and the Permission Levels, and in the security classification and the power
The matching instruction generated when limit rank matching;
Second sending module, for sending the matching instruction to the duplicator, so that the duplicator starts,
And more new information is obtained according to current copy operation relevant information, the duplicating original part information and subscriber identity information;
Third receiving module, for receiving the more new information, and according to the update information update database.
Optionally, the current copy operation relevant information include it is following at least one of:
The moment is duplicated, number is duplicated, duplicator ID, duplicates duration.
The medicine have the advantages that
User identity is verified before duplicating, guarantees the user identity legitimacy for making duplicator, avoids non-managing and control system
The interior user that puts on record is promoted using duplicator and is duplicated safety;
The copy function that duplicator is opened in the matching of Permission Levels and security classification, further strengthens to duplicating
The control of journey improves the safety of hard-copy file.
Based on current copy operation relevant information, subscriber identity information and the more new information quilt for duplicating the generation of original part information
It is sent to control centre's server, so that control centre's server carries out data update, convenient for servicing subsequently through control centre
Device inquires hard-copy log, realizes the retrospect to hard-copy log.
Detailed description of the invention
Fig. 1 is a kind of flow chart of copy method of the present invention;
Fig. 2 is the flow chart of another copy method of the present invention;
Fig. 3 is a kind of copy method interaction diagrams of the present invention;
Fig. 4 is the structure chart that managing and control system is duplicated in the present invention;
Fig. 5 is a kind of structural block diagram that managing and control system is duplicated in the present invention;
Fig. 6 is a kind of example view of two dimensional code of the present invention;
Fig. 7 is another structural block diagram that managing and control system is duplicated in the present invention;
Fig. 8 is a kind of structural block diagram of duplicator control subsystem of the invention.
Specific embodiment
The present invention is described in detail below.A kind of retrospective copy method provided by the invention, may include with
Lower step:
In a step 101, subscriber identity information is obtained.
In a step 102, it will acquire the subscriber identity information and be sent to server, so that the server root
User identity is verified according to the subscriber identity information, and obtains the subscriber identity information pair when subscriber authentication passes through
The Permission Levels answered.
In the present embodiment, subscriber identity information may include user fingerprints information, iris information and facial structure information
In one or more;The subscriber identity information is also possible to swipe the card the ID card information of pickup.The subscriber identity information can be with
It is uploaded to server and carries out identity information comparison, prestore letter with what subscriber identity information matched when being matched in the server
When breath, it is determined as subscriber authentication and passes through, otherwise not passes through.
Wherein, Permission Levels are corresponding with subscriber identity information, and different users can have different Permission Levels.Example
Such as, the high user of Permission Levels can duplicate the high file of security classification, the lower user of Permission Levels can only then duplicate secrecy
The lower file of rank.
In step 103, verification result of the server about user identity is received, and logical in subscriber authentication
It is out-of-date, based on original hard-copy file RFID label tag and two dimensional code mark obtain reading duplicate original part information.
It in the present embodiment, can be by reading RFID (the Radio Frequency on hard-copy file
Identification, radio frequency identification) label, it obtains and duplicates original part information.RFID mark on original hard-copy file
Label can be active radio frequency label, or be also possible to passive RF label, herein and be not limited.Preferably can be
Passive RF label.
At step 104, the duplicating original part information is sent to the server so that the server according to
The duplicating original part information judges whether the original hard-copy file is classified document, and is determining the original hard-copy file
When for classified document, the security classification of the original hard-copy file is obtained.
In the present embodiment, it can will duplicate original part information and be sent to server, by server according to the duplicating received
Original part information judges whether hard-copy file is classified document.When original hard-copy file is classified document, server further may be used
To obtain the security classification of original hard-copy file.
In step 105, that the server is generated when the security classification matches with the Permission Levels is obtained
With instruction, the duplicator starting is controlled.
In this embodiment it is assumed that the rank of security classification 1- security classification 10 is gradually increased, Permission Levels 1- permission grade
Other 10 rank is gradually increased, then.Permission Levels are matched with security classification it is to be understood that Permission Levels are not less than secrecy
Rank can successively determine that user has operating right, is able to carry out the copy operation for the original hard-copy file.
In step 106, according to current copy operation relevant information, the duplicating original part information and subscriber identity information
More new information is obtained, and the more new information is sent to the server, so that the server is according to the more new information
Carry out data update.
In the present embodiment, after determining that user has access right, the duplicating function of duplicator can on the one hand be opened
Can, execute copy operation;On the other hand it can determine current copy operation relevant information, duplicate number and duplicate identity letter
Breath obtains more new information, which can be sent to server, and can be updated according to acquisition of information is updated
Label substance, and estimate to print RFID label tag with updated label substance, to identify on each copy.It, can with this
To cover RFID label tag on obtained copy, be conducive to it is subsequent carry out inquiry and again based on the copy duplicated when
Obtain relevant information
The copying process of classified document can be managed, and can protected based on technical solution provided by the invention
It deposits and updates and perform the relevant informations such as user, moment and duplicator ID of copy operation for classified document, in order to rear
Continuous inquiry hard-copy log, realizes the retrospect to duplicating history, is conducive to search and duplicate in process there are loophole, improves to duplicate and pacify
Entirely.
As shown in Fig. 2, a kind of retrospective copy method provided by the invention, may comprise steps of:
In step 201, subscriber identity information is received.
In in this embodiment, which can pass through the fingerprint sensor on duplicating or camera etc.
Sensor obtains.
In step 202, user identity is verified according to the subscriber identity information, and when subscriber authentication passes through
Obtain the corresponding Permission Levels of the subscriber identity information.
In the present embodiment, subscriber identity information may include user fingerprints information, iris information and facial structure information
In one or more;The subscriber identity information is also possible to swipe the card the ID card information of pickup.The subscriber identity information can be with
It is uploaded to server and carries out identity information comparison, prestore letter with what subscriber identity information matched when being matched in the server
When breath, it is determined as subscriber authentication and passes through, otherwise not passes through.
Wherein, Permission Levels are corresponding with subscriber identity information, and different users can have different Permission Levels.Example
Such as, the high user of Permission Levels can duplicate the high file of security classification, the lower user of Permission Levels can only then duplicate secrecy
The lower file of rank.
In step 203, the verification result of subscriber identity information is sent, so that duplicator is according to the verification result
Based on the RFID label tag and two dimensional code mark reading duplicating original part information on original hard-copy file.
In the present embodiment, duplicator can be by reading RFID (the Radio Frequency on hard-copy file
Identification, radio frequency identification) label and two dimensional code mark, obtain duplicate original part information, the duplicating original part information
Server can be sent to by duplicator.
In step 204, the duplicating original part information is received, and is judged according to the duplicating original part information described original
Whether hard-copy file is classified document, to obtain the original duplicating when determining the original hard-copy file as classified document
The security classification of file.
In step 205, the security classification and the Permission Levels are matched, and in the security classification and the power
The matching instruction generated when limit rank matching.
In this embodiment it is assumed that the rank of security classification 1- security classification 10 is gradually increased, Permission Levels 1- permission grade
Other 10 rank is gradually increased, then.Permission Levels are matched with security classification it is to be understood that Permission Levels are not less than secrecy
Rank can successively determine that user has operating right, is able to carry out the copy operation for the original hard-copy file.
In step 206, the matching instruction is sent to the duplicator, so that the duplicator starts, and according to
Current copy operation relevant information, the duplicating original part information and subscriber identity information obtain more new information.
In step 207, the more new information is received, and with the update information update database.
In the present embodiment, server updates the database of itself according to the more new information received, convenient for it is subsequent from
Server download data directly inquires data by server, historical record is duplicated to determine, convenient for retrospect.
Fig. 3 is another flow chart based on RFID copy method, the interaction being related between duplicator and server, such as
Shown in Fig. 3:
In step 301, the finger print information of user is obtained.
In the present embodiment, use can be taken by the Fingerprint Identification Unit or fingerprint capturer being arranged inside duplicator
The finger print information at family.Certainly, it is only illustrated by taking finger print information as an example herein, it can also be using other use in other information
Family information carries out authentication.
In step 302, the finger print information is matched.
In the present embodiment, server can receive the finger print information of duplicator transmission, and the finger print information that will be received
It is matched with the pre-matching information of storage inside, obtains matching result, which can be sent to duplicator, make
It obtains duplicator and different operation is executed according to matching result.
For example, duplicator can execute step 304 according to matching result when finger print information and pre-matching information matches;
When finger print information and pre-matching information mismatch, duplicator, which may remind the user that, re-types finger print information.
In step 304, the RFID label tag and two dimensional code mark on original hard-copy file are scanned, obtains and duplicates original part letter
Breath.
In the present embodiment, which can be the passive RF label for being pasted onto and duplicating on original part.The duplicating is former
Part information may include the related contents such as classified information, the security classification for duplicating original part.
In step 305, judge original hard-copy file for confidential document according to duplicating original part information.
In the present embodiment, server can receive the duplicating original part information of duplicator transmission, and believe according to original part is duplicated
Breath judges whether original hard-copy file is confidential document.
For example, step 306 is executed when original hard-copy file is confidential document, when original hard-copy file is not concerning security matters text
When part, judging result can be sent to duplicator, duplicator executes common copy operation.
Within step 306, judge that Permission Levels are matched with the security classification for duplicating original part.
In the present embodiment, Permission Levels are matched with security classification, then illustrate that user has for the original hard-copy file
Execute the permission of copy operation.
When Permission Levels and security classification mismatch, unmatched result can be sent to duplicator, duplicator is reminded
User does not have permission.
In step 307, starting is duplicated in control, starts to duplicate.
In the present embodiment, after duplicator starting, user can input in input interface and duplicate the relevant informations such as number.
In step 308, it is generated according to current copy operation relevant information, subscriber identity information and duplicating original part information
More new information.
In the present embodiment, current copy operation relevant information may include duplicating number, duplicating moment, duplicator ID
Etc. information.Duplicator may further be based on the update information update label substance, thus by the tag identifier after content update
On copy.
In a step 309, more new information is received.
In the step 310, according to the update confidence more new database received.
In the present embodiment, server can be according to information update database be updated, so that subsequent can pass through server
Historical record is duplicated in inquiry, and situation is duplicated in retrospect, is conducive to search hard-copy file leakage reason.
The duplicating managing and control system architecture diagram based on RFID that the present invention also provides a kind of.As shown in Fig. 4-Fig. 8,
Duplicator secrecy managing and control system 100 disclosed by the invention based on RFID may include positioned at duplicating the of generator terminal
One copy system 101 and the second copy system 102 positioned at server end, first copy system 101 and the second copy system
Interaction between 102.
Specifically, the first copy system 101 may include information gathering subsystem 1 and connect with information gathering subsystem 1
The duplicating control subsystem 2 connect, the second copy system 102 may include control centre's server 3, the duplicating control subsystem 2
It is communicated to connect respectively with control centre server 3 and information gathering subsystem 1.
Wherein, information gathering subsystem 1 is for acquiring subscriber identity information and duplicating original part information, collected user
Identity information, which can be sent to, duplicates control subsystem 2, to be sent out subscriber identity information by duplicating control subsystem 2
It send to control centre's server 3, the subscriber identity information received is directed to by control centre's server 3, to user identity
It is verified.
When control centre's server 3 verify user identity by when obtain the corresponding Permission Levels of subscriber identity information, and
By verification result return instruction to control subsystem 2 is duplicated, duplicates control subsystem 2 and receive verification result, indicate information collection
Subsystem 1, which obtains, duplicates original part information, and is sent to and duplicates control subsystem 2, which will duplicate original part
Information is sent to control centre's server 3, and control centre's server 3 receives the duplicating original part information, and according to the duplicating
Original part information judges whether the original hard-copy file is classified document, to determine the original hard-copy file for secrecy text
When part, the security classification of the original hard-copy file is obtained, and matches the security classification and the Permission Levels, and in institute
State the matching instruction generated when security classification matches with the Permission Levels.The reception matching instruction of control subsystem 2 is duplicated to open
It is dynamic, and more new information is obtained according to current copy operation relevant information, the duplicating original part information and subscriber identity information.
One side duplicator can be marked according to the content of the update information update electronic tag, and by updated RFID
Label and two dimensional code mark are identified on copy;On the other hand control centre's server can be sent by more new information
3, control centre's server 3 receives more new information and according to the update information update database, realizes to duplicating historical record
Retrospect.
The identity of user can be verified before the copy function of starting duplicator based on this, guarantee to make
The user identity legitimacy of duplicator avoids the user that puts on record in non-managing and control system from using duplicator;In addition, being controlled by duplicating
Subsystem 2 is according to currently performed copy operation, subscriber identity information and duplicates original part information generation more new information, the update
Information can make control centre's server 3 synchronize update, the subsequent duplicating situation that can trace and inquire duplicator,
Convenient for obtaining the source information duplicated, since more new information can be identified on copy, in other users by the copy
When being duplicated as duplicating original part, it can still be identified by duplicator.
Information gathering subsystem 1 may include user information collector 11, user information collector 11 and duplicating control
System 2 connects, and for acquiring subscriber identity information, and is sent to the duplicating control subsystem 2.For example, which believes
Breath collector 11 may include fingerprint capturer, iris capturing device, recognition of face device or speech recognition device etc., correspondingly, with
Family identity information may include finger print information, iris information, face information or password content.
Information gathering subsystem 1 can also include that (Radio Frequency Identification, is wirelessly penetrated RFID
Frequency be by) reader 12, the RFID reader 12 can with duplicate control subsystem 2 communicate to connect, when duplicate original part be positioned
Afterwards, which can identify the electronic tag duplicated on original part, and the electronic tag content read is sent to duplicating
Control subsystem 2.The electronic tag content includes duplicating original part information.The electronic tag duplicated on original part can be active electricity
Subtab or passive electronic label, are not defined herein.
Similar, which can be also used for reading subscriber identity information.For example, user can hold
ID ID card has RFID reader 12 to read ID ID card, and to obtain subscriber identity information, which can be used
In verifying user identity.For example, RFID reader 12 can choose the radio frequency identification module of 13.56M.
Information gathering subsystem 1 can also include dimensional code scanner 13, which can control with duplicating
Subsystem 2 communicates to connect, and after duplicating original part is positioned, which can identify two duplicated on original part
Code mark is tieed up, the electronic tag content read, which is sent to, duplicates control subsystem 2.
Copy system 100 based on RFID of the invention can also carry out cost control, the number that each user can duplicate
60,000 are limited, more than also needing using then being expanded by management;Limitation uses the time, can set working time section, prevent
Non-working time uses duplicator;Time-out exits, and machine is unmanned after opening to be used, more than 3 minutes after system automatically exit from pass
It closes.It prevents from other people from falsely using to duplicate.
Control subsystem 2 is duplicated to realize using general purpose computer, single-chip microcontroller or ARM plate.For example, can use
STC15F2K60S2 chip microcontroller.As shown in fig. 6, the duplicating control subsystem 2 may include:
Main control module 21, the main control module 21 and information gathering subsystem 1 communicate to connect, to be used to indicate the information
The starting of acquisition subsystem 1 operates the acquisition of subscriber identity information and duplicating original part information.For example, can be on duplicator
Switch button is pressed or is when recognizing user, and instruction information acquisition system obtains subscriber identity information.The master control
Module 21 is to duplicate the core of control subsystem 2, can control duplicator and is started, can be completed and the life in computer
Order exchanges, data transmission and the duplicating signal detection of entire duplicator, duplicator state instruction, two dimensional code are generated and shown
Show, the disengaging of paper detection etc. functions.
Network Interface Module 22, the Network Interface Module 22 duplicate control subsystem 2 and control centre's server with foundation
Communication connection between 3.Network Interface Module 22 is the unique passage that control subsystem is communicated with computer foundation, main
The functions such as data packing, the data parsing of TCP network protocol are completed, the CPU in master board transmits computer
Data identified.
Power module 23, the power module 23 are used to include that the duplicator of duplicating control system is powered.The electricity
Source module 23 can use the AC-DC switch power module 23 of compact, and alternating current is converted into DC3.3V for subsystem just
Often operation.The module has the characteristics that small in size, light-weight, high conversion efficiency, calorific value are small, cost performance is high, stability is good.
First receiving module 24, first receiving module are former for receiving the subscriber identity information and the duplicating
Part information;
Second receiving module 25, second receiving module is for receiving verifying of the server about user identity
As a result, the matching instruction that the server is generated when the security classification matches with the Permission Levels;
Sending module 26, the sending module is for sending the subscriber identity information, the duplicating original part information and institute
State more new information;
Detection module 27, detection module 27 is for detecting whether the duplicator is in copy mode, so that the master
Control module 21 judges whether to acquire subscriber identity information and duplicates original part information according to the state.Specifically, the detection module
Whether 27 can detecte paper, which enters, carries out duplicating this movement in duplicator, determines whether duplicator is in copy mode.Inspection
Survey module 27 whether paper can be entered carry out duplicating in duplicator this movement can be converted a certain transformation number letter
Number amount, so that the CPU in main control module 21 is able to carry out identification.In duplicating control subsystem 2, the digital signal amount is direct
It is taken from the inside of duplicator, and light-coupled isolation is added in the part that it is connected with CPU, it is ensured that paper signal is between the two
Normal transmission and opposite independence, so that it does not interfere with each other, be independent of each other.
RFID module 28, the RFID module 26 can be based on current copy operations, the subscriber identity information and described
It duplicates original part information and generates updated RFID label tag, and the updated RFID label tag can be identified to copy.
Wherein, RFID information acquisition module closely identifies since the present invention is directed to, has selected frequency opposite
The radio frequency identification module of lower 13.56M.Its specific targets are as follows:
Product type: MIFARE522_MODULE;
Operating current: 13~26mA/ direct current 3.3V;
Idle current: 10~13mA/ direct current 3.3;
Quiescent current: < 80uA;
Peak point current: < 30mA;
Working frequency: 13.56MHz;
Card reading distance: 0~65mm;
Interface: UART TTL;
Baud rate 9600;
Message transmission rate: maximum 10Mbit/s;
Card reading speed: reading ID 7 times per second, reads block number according to 3 times per second;
Size: 50mm × 50mm;
Ambient operating temperature: -20~80 degree Celsius;
Storage temperature: -40~85 degree Celsius;
Humidity: relative humidity 5%~95%;
Agreement: meeting ISO14443A standard, supports Mifare1S50, S70 (ID number of four bytes).
Two dimensional code module 29, the two dimensional code module 29 can be believed based on current copy operation relevant information, user identity
Breath and duplicating original part information generate two dimensional code mark, and the two-dimensional barcode information of generation are shown, and the two dimensional code identifies
It can be copied on paper.Two dimensional code module 28 can be formed using DSP architecture, carry the solution of various one-dimension codes and two dimensional code
Code algorithm and corresponding error correction algorithm, can fast and accurately identify and parse the information for including in two-dimension code pattern.Two
Dimension code is shown can be completed using the TFT of the 128*128 resolution ratio of 160,000 colors of high speed, which can be clearly by two dimensional code
It shows and is identified by duplicator, thus duplicate onto paper, meanwhile, in order to consider to reduce whole system power consumption, the back of the TFT
Light controls its open and close by main control module 21.
Specifically, the modulus rule of two dimensional code are as follows: use QR code, (error-correction level 7%) feature size is 21*21 picture
Vegetarian refreshments, (from left to right, the left side is a high position to modulus rule, and black pixel point 1, white pixel point is 0, and the end of every row is by whole
Number section has more three and mends 0), is converted into 16 system formats with byte (Byte) as minimum unit.
Such as: as two dimensional code (information 1234567890abcdef) picture in Fig. 7 the first row modulus after should obtain
3 bytes, 0xfe, 0x03,0xf8.
Its specific targets is as follows:
Scanning sensor: 752 × 480CMOS sensor;
Move tolerance: 4 inch per seconds;
Rotation sensitivity: 360 ° of omnidirectionals read;
Visual angle: ± 40 °;
Environment photo-adaptive: under complete darkness to Full daylight (100,000 lux);
Illuminate feux rouges: 626nm ± 30nm;
Sight line: feux rouges: 526nm ± 30nm laser: 650nm ± 10nm;
Illuminate (sight line) classification: 5080LED sight line (LED Aimer);
Code system supports (all general peacekeeping two dimensional codes):
Two dimensional code: PDF417, MicroPDF417, MaxiCode, Data Matrix, QR Code, Aztec, Aztec
Mesa, Code 49, UCC Composite
One-dimension code: Code 39, Code 128, Codabar, UPC, EAN intersect 25 yards, Reduced Space
Symbology, Code 93, Codablock
Postal code: Postnet (US), Planet Code, BPO 4State, Canadian Post, Japanese
Post, KIX (Netherlands) Post
OCR format: OCR-A and OCR-B.
Duplicator state indicator module 210, the duplicator state indicator module 210 may include two different colours
Highlighted low-power consumption LED composition, is mounted in the control panel of duplicator, can be used to show that duplicator present mode (maintains secrecy or general
It is logical), TFT backlight state etc. in duplicator.
It duplicates signal identification module 211 and duplicates signal control module 212, obtained by duplicating signal identification module 211
The duplicating of user is requested, and duplicating request signal is sent to the CPU of main control module 21 by duplicating signal control module 212 to, together
When be responsible for by CPU send start duplicate signal send duplicator to.It is duplicating signal identification module 211 and is duplicating signal control
In molding block 212, in order to reach the reliable detection of signal, reliable transmission, be independent of each other, equally also use optocoupler carry out every
From.
Wherein, the communication between the 3 of duplicator control subsystem 2 and control centre's server includes control centre's server 3
It holds to duplicator control subsystem 2 and transmits data and duplicator control subsystem 2 answering to control centre's server end 3
It answers.Communication interface uses two kinds of forms of RJ45 network interface and UART serial ports.
Specifically it is shown in Table 1:
Table 1
Frame head: 0xff, 0x55 immobilize;
Data length: to the sum of postamble, all data bytes since command byte;
Order: 0x00 normally receives data;
0x01 cancels current number of copies immediately and stops duplicating;
0x02 transmission has currently duplicated the page number to PC;
0xaa duplicator is set to security schema;
0xa0 duplicator is set to general mode;
Number of pages: current document needs the page number duplicated;
Number of pages radix-minus-one complement: mainly playing verification, such as currently needing the number of pages duplicated is 0x02, then radix-minus-one complement is 0xff-
0x02=0xfd;
Postamble: 0xff, 0xaa immobilize.
(2) duplicator control module can be replied first in any case to control centre's server end response (2Byte)
Success or not is received, is then replied by order.Specifically it is shown in Table 2.
Table 2
Specifically as shown in fig. 7, the Fig. 7 illustrates control centre's server admin flow chart.To administrator when software starts
Identity is verified, and is arranged username and password two, can be logged in management system by verifying, be shown main interface.The main boundary
Face can show user management, file management and duplicate the correlated identities such as management, but when user triggers any mark can
Transfer the corresponding content in background data base.
Control centre's server 3 may include:
First receiving module 31, for receiving subscriber identity information;
Authentication module 32 for verifying user identity according to the subscriber identity information, and passes through in subscriber authentication
When obtain the corresponding Permission Levels of the subscriber identity information;
First sending module 33, for sending the verification result of subscriber identity information, so that duplicator is tested according to
Result is demonstrate,proved based on the RFID label tag and two dimensional code mark reading duplicating original part information on original hard-copy file;
Second receiving module 34 judges institute for receiving the duplicating original part information, and according to the duplicating original part information
State whether original hard-copy file is classified document, to obtain the original when determining the original hard-copy file as classified document
The security classification of beginning hard-copy file;
Matching module 35, for matching the security classification and the Permission Levels, and the security classification with it is described
The matching instruction that Permission Levels generate when matching;
Second sending module 36, for sending the matching instruction to the duplicator, so that the duplicator opens
It is dynamic, and more new information is obtained according to current copy operation relevant information, the duplicating original part information and subscriber identity information;
Third receiving module 37, for receiving the more new information, and according to the update information update database.
Login module 38 can verify administrator's identity by the way that username and password is arranged.When user name with it is close
When code matching, control centre's server 3 can be logged in, with query-related information.
User management module 39 realizes the management to personal information is duplicated, and the user management module 32 is for storing user
Number, name, position, user class, telephone number and affiliated function, wherein the user class corresponds to hard-copy file
Level of confidentiality power.It can also include function bar, which includes increasing newly, inquiry, modification, saving, delete, six Xiang Gongneng of closing, pipe
Reason person can choose new new-added item addition user, and query term is selected to search user and realize modification after lookup and delete function.
Document management module 310, document management module 310 are used for store-updated information, the two-dimensional barcode information packet
Include hard-copy file number, hard-copy file title, level of confidentiality, access times, telephone number, department.
Hard-copy log management module 311, the hard-copy log management module 311 may include using for storing hard-copy log
Family number, file name, duplicates number, duplicates the time reference number of a document, realizes relevant inquiring function, including be based on querying individual
Which kind of file record when hard-copy log, i.e. inquiry user duplicate, and inquiry file copy record, i.e., same file is assorted
The information whom time used by.
Claims (7)
1. a kind of duplicator secrecy managing and control system based on RFID characterized by comprising information gathering subsystem duplicates control
Subsystem and control centre's server, the duplicating control subsystem respectively with control centre's server and the information
Acquisition subsystem connection;Wherein,
The information gathering subsystem for acquiring subscriber identity information and duplicating original part information, sent out by the subscriber identity information
It send to the duplicating control subsystem, to be sent to control centre's server by the duplicating control subsystem;
Control centre's server is verified for receiving the subscriber identity information, and to being believed according to the subscriber identity information
User identity, and the corresponding Permission Levels of the subscriber identity information are obtained when subscriber authentication passes through;
The duplicating control subsystem is also used to when subscriber authentication passes through, and the duplicating original part information is sent to described
Control centre's server, so that whether the server judges the original hard-copy file according to the duplicating original part information
For classified document, and when determining the original hard-copy file is classified document, the confidential of the original hard-copy file is obtained
Not;
When the security classification and the matching result of the Permission Levels to match are sent to by control centre's server
When the duplicating control subsystem, the duplicating control subsystem controls the duplicator starting, and is based on current copy operation
Relevant information, the subscriber identity information and duplicating original part information generate more new information, and the more new information is sent to institute
State control centre's server.
2. duplicator secrecy managing and control system according to claim 1, which is characterized in that the information gathering subsystem packet
It includes:
User information collector, the user information collector is connect with the duplicating control subsystem, for acquiring user's body
Part information, and it is sent to the duplicating control subsystem.
3. duplicator secrecy managing and control system according to claim 1, which is characterized in that the information gathering subsystem packet
It includes:
RFID reader, the RFID reader is connect with the duplicating control subsystem, for reading original hard-copy file
RFID label tag, and the label substance read is sent to the duplicating control subsystem, the label substance includes duplicating
Original part information and/or subscriber identity information;
And/or dimensional code scanner, the dimensional code scanner is connect with the duplicating control subsystem, original for scanning
Two-dimensional barcode information on hard-copy file, and the two-dimensional barcode information is sent to the duplicating control subsystem.
4. duplicator secrecy managing and control system according to claim 1, which is characterized in that the duplicating control subsystem packet
It includes:
Main control module, it is described for controlling the duplicator starting.
Network Interface Module, the Network Interface Module communication link established between the duplicating control subsystem and server
It connects.
Power module, the power module are used to include that the duplicator for duplicating control system is powered.
First receiving module, first receiving module is for receiving the subscriber identity information and the duplicating original part information;
Second receiving module, second receiving module are used to receive verification result of the server about user identity, institute
State the matching instruction that server is generated when the security classification matches with the Permission Levels;
Sending module, the sending module is for sending the subscriber identity information, the duplicating original part information and the update
Information;
RFID module, the RFID module are used for according to current copy operation relevant information, the subscriber identity information and described
It duplicates original part information and generates more new information.
5. duplicator secrecy managing and control system according to claim 1, which is characterized in that the duplicating control subsystem is also wrapped
It includes:
Two dimensional code module, the two dimensional code module be used for according to current copy operation relevant information, the subscriber identity information and
The duplicating original part information generates more new information, and obtains updated two dimensional code mark.
6. duplicator secrecy managing and control system according to claim 1, which is characterized in that control centre's server subsystem packet
It includes:
First receiving module, for receiving subscriber identity information;
Authentication module, for verifying user identity, and the acquisition when subscriber authentication passes through according to the subscriber identity information
The corresponding Permission Levels of the subscriber identity information;
First sending module, for sending the verification result of subscriber identity information, so that duplicator is according to the verification result
It is read based on the RFID label tag on original hard-copy file and duplicates original part information;
Second receiving module for receiving the duplicating original part information, and judges according to the duplicating original part information described original
Whether hard-copy file is classified document, to obtain the original duplicating when determining the original hard-copy file as classified document
The security classification of file;
Matching module, for matching the security classification and the Permission Levels, and in the security classification and the permission grade
Not Pi Pei when the matching instruction that generates;
Second sending module, for sending the matching instruction to the duplicator, so that the duplicator starts, and according to
Current copy operation relevant information, the duplicating original part information and subscriber identity information obtain more new information;
Third receiving module, for receiving the more new information, and according to the update information update database.
7. duplicator secrecy managing and control system according to claim 1, which is characterized in that the current copy operation correlation letter
Breath include it is following at least one of:
The moment is duplicated, number is duplicated, duplicator ID, duplicates duration.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910028552.6A CN109753254A (en) | 2019-01-11 | 2019-01-11 | Duplicator secrecy management and control system based on RFID |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910028552.6A CN109753254A (en) | 2019-01-11 | 2019-01-11 | Duplicator secrecy management and control system based on RFID |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109753254A true CN109753254A (en) | 2019-05-14 |
Family
ID=66405455
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910028552.6A Pending CN109753254A (en) | 2019-01-11 | 2019-01-11 | Duplicator secrecy management and control system based on RFID |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109753254A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101819689A (en) * | 2009-02-17 | 2010-09-01 | 江苏云联科技有限公司 | File management system based on RFID (Radio Frequency Identification Device) |
CN201681271U (en) * | 2010-03-24 | 2010-12-22 | 北京立思辰新技术有限公司 | Duplicator safety control terminal |
CN104809388A (en) * | 2015-04-30 | 2015-07-29 | 北京立思辰计算机技术有限公司 | Method and device for tracing information source of copied document as well as information security type copier |
CN104834853A (en) * | 2015-04-30 | 2015-08-12 | 北京立思辰计算机技术有限公司 | Identity recognition method, identity recognition device and information security type copy machine |
CN107977584A (en) * | 2017-12-14 | 2018-05-01 | 中铁信安(北京)信息安全技术有限公司 | The safe copy system of desktop type |
CN108153496A (en) * | 2016-12-06 | 2018-06-12 | 西宁金智电子有限公司 | A kind of identity card dedicated secret duplicator for identifying client identity |
-
2019
- 2019-01-11 CN CN201910028552.6A patent/CN109753254A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101819689A (en) * | 2009-02-17 | 2010-09-01 | 江苏云联科技有限公司 | File management system based on RFID (Radio Frequency Identification Device) |
CN201681271U (en) * | 2010-03-24 | 2010-12-22 | 北京立思辰新技术有限公司 | Duplicator safety control terminal |
CN104809388A (en) * | 2015-04-30 | 2015-07-29 | 北京立思辰计算机技术有限公司 | Method and device for tracing information source of copied document as well as information security type copier |
CN104834853A (en) * | 2015-04-30 | 2015-08-12 | 北京立思辰计算机技术有限公司 | Identity recognition method, identity recognition device and information security type copy machine |
CN108153496A (en) * | 2016-12-06 | 2018-06-12 | 西宁金智电子有限公司 | A kind of identity card dedicated secret duplicator for identifying client identity |
CN107977584A (en) * | 2017-12-14 | 2018-05-01 | 中铁信安(北京)信息安全技术有限公司 | The safe copy system of desktop type |
Non-Patent Citations (1)
Title |
---|
柴天天: "基于二维条码QR码的安全复印系统设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102156853B (en) | Certificate reading system and certificate reading method | |
CN109726783A (en) | A kind of invoice acquisition management system and method based on OCR image recognition technology | |
Harris et al. | Biometric authentication: assuring access to information | |
CN109656112A (en) | Traceable copying method and system | |
US20020131636A1 (en) | Palm office assistants | |
US7840571B2 (en) | System and method for information management using handwritten identifiers | |
CN109525745A (en) | Copying method and system based on two-dimensional code | |
US20050091490A1 (en) | Information storage server and information storage program | |
CN107680294A (en) | House property information querying method, system, terminal device and storage medium | |
GB2412154A (en) | Digital pen with a reader/writer for a document having a memory tag and a personal identification device having an e-signature | |
CN107170093A (en) | Authentication gate control system | |
WO2012057459A1 (en) | Random-type multilayer identification, and system using same | |
CA2142227A1 (en) | Combination radiofrequency identification card - fingerprint identification system | |
CN110363891A (en) | A kind of intelligent visitor system suitable for more scenes | |
CN208141417U (en) | A kind of identity recognition terminal | |
CN106096552A (en) | The finger print matching method of intelligent fingerprint punched-card machine, fingerprint punch card system | |
CN206274408U (en) | A kind of intelligent caller machine | |
CN109753254A (en) | Duplicator secrecy management and control system based on RFID | |
CN109740368A (en) | Copying method and system based on RFID | |
CN207458050U (en) | A kind of multi-function desktop intelligent terminal | |
CN107563842A (en) | A kind of ticket-booking system and booking method based on fingerprint recognition | |
CN206212038U (en) | The Login Register system of distributed palm print identity authentication | |
CN201828977U (en) | Multifunctional non-local personnel registering system | |
CN110400433A (en) | A kind of intelligent bookshelf brush book, which checks out, self-service borrows method and system | |
CN202110562U (en) | Certificate identifying-reading device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190514 |