CN109920117A - Key safeguard box, key storage system and method - Google Patents
Key safeguard box, key storage system and method Download PDFInfo
- Publication number
- CN109920117A CN109920117A CN201910219680.9A CN201910219680A CN109920117A CN 109920117 A CN109920117 A CN 109920117A CN 201910219680 A CN201910219680 A CN 201910219680A CN 109920117 A CN109920117 A CN 109920117A
- Authority
- CN
- China
- Prior art keywords
- key
- module
- authorization
- box
- card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Lock And Its Accessories (AREA)
Abstract
The present invention provides a kind of key safeguard box, key storage system and method, key safeguard box includes: cabinet, and cabinet includes box door lock;Phone module, phone module are used to establish connection with authorized telephone, and issue phonetic order to authorized telephone after the incoming call of identification authorized telephone, and receive and operated using the manager of authorized telephone according to the remote key-press that phonetic order is carried out;On-site verification module, on-site verification module are used to obtain the verification information of Field Force;Main control module, main control module is connected with phone module, on-site verification module and box door lock respectively, main control module, which is used to be operated according to remote key-press, carries out authorization identifying, and authorization message is obtained after authorization identifying success and issues authorization identifying and is successfully prompted, and authorization message is compared with verification information after getting verification information for authentication module at the scene, and controls box door lock according to comparison result and unlock.The present invention can be improved the safety of key safeguard box and the normalization of key management.
Description
Technical field
The present invention relates to equipment safety management technical fields, and in particular to a kind of key safeguard box, a kind of key storage system
System and a kind of key storage method.
Background technique
The equipment of current keeping key can only substantially guarantee that having recorded someone takes or return the record of key away,
Either fixed authorization, if the authorization message of licensee is lost, for example authorization card is lost, and tends to be assumed another's name to push up by people
It replaces.In addition, in certain scenes need just to allow to take away key the operation of progress next step in specific time, for example electric power five is anti-
Intelligent unlocking equipment.From the point of view of the actual conditions of substation operation, the case where Misuse solution lock key, happens occasionally.Private collection
Lock key is solved, is unlocked by force, the program and formality of solution lock key is failed to carry out, results in misoperation fault and constantly occur, bring perhaps
More security risks.
Summary of the invention
The present invention is to solve the poor technical problem of current key storage device security, provides a kind of key storage
Case, key storage system and method.
The technical solution adopted by the invention is as follows:
A kind of key safeguard box, comprising: cabinet, the cabinet include box door lock;Phone module, the phone module are used for
Connection is established with authorized telephone, and issues phonetic order to the authorized telephone after the incoming call for identifying the authorized telephone, with
And it receives and is operated using the manager of the authorized telephone according to the remote key-press that the phonetic order is carried out;On-site verification mould
Block, the on-site verification module are used to obtain the verification information of Field Force;Main control module, the main control module respectively with it is described
Phone module, the on-site verification module are connected with the box door lock, and the main control module is used to be grasped according to the remote key-press
Make carry out authorization identifying, and obtains authorization message after authorization identifying success and successfully prompted with authorization identifying is issued, and in institute
It states after on-site verification module gets the verification information and the authorization message is compared with the verification information, and according to
Comparison result controls the box door lock and unlocks.
The main control module is also used to be communicatively coupled with computer, system is calibrated and read by the communication connection
System time, setting, which are unlocked, to be delayed, downloading user list, extracts record of unlocking, reads and modify configuration information and report hardware
Failure.
The on-site verification module is card reader module, and the card reader module is used at the IC card of the Field Force
The information of the IC card is read when predeterminated position, and using the information of the IC card as the verification information.
The authorization message includes the work number and authorization duration of the Field Force, and the information of the IC card includes the IC
The ID of card, wherein issued in the authorization duration after authorization identifying successfully prompts in the main control module, if the card reader mould
Block reads the ID of the IC card, then the main control module judge the ID of the IC card and the Field Force work number whether phase
Matching controls the box door lock and unlocks if matched.
The phone module includes ring detection unit, circuit for answering, DTMF detection unit, voice playing unit, relay
Device output unit and microprocessor.
The card reader module includes single-chip microcontroller and card reading chip.
The main control module includes microprocessing unit, data storage cell, Ethernet interface unit, real time clock unit, U
Disk interface unit, box door lock interface unit and state indication unit.
A kind of key storage system, including above-mentioned key safeguard box and authorized telephone.
The key storage system further includes computer.
A kind of key storage method, comprising: key safeguard box and authorized telephone establish telephone connection, and award described in the identification
Phonetic order is issued to the authorized telephone after the incoming call of power phone;The manager using the authorized telephone is received according to described
The remote key-press operation that phonetic order is carried out;According to the remote key-press operate carry out authorization identifying, and authorization identifying at
Authorization message is obtained after function and issues authorization identifying successfully prompts;Obtain the verification information of Field Force;By the authorization message
It is compared with the verification information, and the box door lock is controlled according to comparison result and is unlocked.
Beneficial effects of the present invention:
The present invention can carry out telephone authorizations certification before unlocking, and carry out on-site verification, and thereby, it is possible to effectively prevent key
Key in safe deposit box substantially increases the safety of key safeguard box and the normalization of key management by mispick.
Detailed description of the invention
Fig. 1 is the block diagram of the key safeguard box of the embodiment of the present invention;
Fig. 2 is the block diagram of the phone module of one embodiment of the invention;
Fig. 3 is the caller identification electrical block diagram of one embodiment of the invention;
Fig. 4 is the block diagram of the card reader module of one embodiment of the invention;
Fig. 5 is the electrical block diagram of the MF RC500 of one embodiment of the invention;
Fig. 6 is the card reader module interface circuit structure schematic diagram of one embodiment of the invention;
Fig. 7 is the electrical block diagram of the card reader module socket of one embodiment of the invention;
Fig. 8 is the electrical block diagram of the IAP11F62X of one embodiment of the invention;
Fig. 9 is the electrical block diagram of the Ethernet interface unit of one embodiment of the invention;
Figure 10 is the electrical block diagram of the DS1307 chip of one embodiment of the invention;
Figure 11 is the application block diagram of the CH376 of one embodiment of the invention;
Figure 12 is the computer of one embodiment of the invention and the networking structure schematic diagram of key safeguard box;
Figure 13 is the computer of one embodiment of the invention and the communication process schematic diagram of key safeguard box;
Figure 14 is the block diagram of the key storage system of the embodiment of the present invention;
Figure 15 is the block diagram of the key storage system of one embodiment of the invention;
Figure 16 is the flow chart of the key storage method of the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
As shown in Figure 1, the key safeguard box of the embodiment of the present invention, including cabinet 10, phone module 20, on-site verification module
30 and main control module 40.Wherein, cabinet 10 includes box door lock 11;Phone module 20 is used to establish connection with authorized telephone, and
Phonetic order is issued to authorized telephone after the incoming call of identification authorized telephone, and receives the manager using authorized telephone according to language
Sound instructs carried out remote key-press operation;On-site verification module 30 is used to obtain the verification information of Field Force;Main control module
40 are connected with phone module 20, on-site verification module 30 and box door lock 11 respectively, and main control module 40 according to remote key-press for grasping
Make carry out authorization identifying, and obtains authorization message after authorization identifying success and successfully prompted with authorization identifying is issued, and existing
Authorization message is compared with verification information after getting verification information for field authentication module 30, and according to comparison result control cabinet
Door lock 11 is unlocked.
In one embodiment of the invention, on-site verification module 30 is card reader module, and card reader module is used for existing
The IC card of field personnel reads the information of IC card when being in predeterminated position, and using the information of IC card as verification information.
Specifically, authorization message includes the work number and authorization duration of Field Force, and the information of IC card includes the ID of IC card,
In, it is issued in the authorization duration after authorization identifying successfully prompts in main control module 40, if card reader module reads IC card
ID, then main control module 40 judges whether the ID of IC card and the work number of Field Force match, if matched, controls box door lock
11 unlock.
In one embodiment of the invention, as shown in Fig. 2, phone module 20 includes ring detection unit 21, off-hook electricity
Road 22, DTMF detection unit 23, voice playing unit 24, relay output unit 25 and microprocessor 26.20 base of phone module
Identification incoming number can be realized in above structure, be filtered processing, the function that unauthorized number is handled without off-hook, for
The incoming call of authorized telephone can auto-pickup, play voice, according to voice flow handle remote key-press operation.
Identification for incoming number, the embodiment of the present invention is using caller identification circuit HT9032 shown in Fig. 3 as FSK
Decoding circuit.HT9032 meets Bell 202 and V.23 standardizes.As shown in figure 3, incoming number identifies hardware mainly by HT9032
With the Mega8 type singlechip group of Atmel at.The capture that the FSK baseband signal that HT9032 is demodulated is sent into single-chip microcontroller is interrupted, signal
Code rate is 1200b/s, so Mega8 setting 1.2kHz clock frequency carries out sampling judgement to signal.Since the sampling period may
It is not ideal 1200Hz, sampling location can be made to deviate symbol center gradually, cause mistake in judgment, so failing edge capture every time
It interrupts after generating, inside numeration clock resets again, corrects its sampling phase, is then delayed 0.4ms (2.4kHz), in code fetch member
Point, and start thus to obtain 0,1 bit stream by 1.2kHz polydispersity index, it is synthesized into byte information, each byte by 10bit
Start bit is 1, stop bits 0, and intermediate 8 are information.Needed for finally being extracted according to the forms data message format of caller identification
Message word obtains incoming call date and incoming number.There are two types of the formats of caller identification information data: forms data message format
(SDMF) and Multiple Data Message Format (MDMF), former structure is simple, and also more commonly used, specific format is as follows:
Channel occupancy signal | Marking signal | Type of message word | Message-length word | Message | Verification and |
Wherein, channel occupancy signal is alternately formed by one group 300 continuous " 0 " and " l " (binary digit), first ratio
Specially for " 0 ", the last one is " 1 ".Under talking state, channel occupancy signal is not sent, and receiving end is only being properly received this
Just thought after signal followed by being useful signal.Marking signal is by 180 (under hook states) or 80 (talking states
Under) flag bit (logic " 1 ") composition, i.e., lasting high level.Type of message word is " 04H ", table in forms data format
It is shown as calling number transmission information.Message-length word accounts for a byte, is the number of message word.Forms data message format message word
Content is as follows: the date, the time (moon, day, when, point), totally 8 bytes;Calling number) if allowing to show);If not allowing to show
Show calling number, character " P " will be transmitted;When terminaling exchange is unable to get host number, character " 0 " will be transmitted.Check word
Algorithm be by message data (i.e. the type of message word of forms data format, message-length word and message data word) by 256 mould
Summation takes benefit to obtain check word.
If HT9032 decoded output bit signal are as follows:
00010000001,0110010001,0000011001,0000111001,
0100011001,0001011001,0100011001,0110011001,
0001011001,0111011001,0100011001,0110011001,
0110011001,0000111001,0011011001,0100011001,
0100111001,0000111001,0110011001,0000011001,
0100011001,0010010001,
0x04,0x13,0x30,0x38,0x31,0x34,0x31,0x33,0x34,
0x37,0x31,0x33,0x33,0x38,0x36,0x31,0x39,0x38,
0x33,0x30,0x31,0x12
The time of caller identification is obtained after analyzing according to forms data message format are as follows: 47 divide at 08 month 14 days 13, incoming call number
Code are as follows: 13386198301, check bit: 0x12.All data (including check bit) and by 256 mould summation be 00, it was demonstrated that receive
Data it is completely correct.
For voice flow processing, the core that the embodiment of the present invention uses PM66 sequence of speech chip to handle as voice flow
Electrocardio road.PM66 sequence of speech chip is a intelligent sound product, and with that can store, sound number of seconds is longer, and playback sound quality is more preferably
Advantage.PM66 incorporates recording and playing circuit, flash, ADPCM coding and decoding device, power amplifier, the routes such as voltage-stablizer,
DIP28 and DIP16 pin is encapsulated, peripheral circuit is simple, need to only connect with the mains, loudspeaker, key, PM66 is exactly an independent sound
Sound play system.
PM66 functional character are as follows: storage time is long (40~4000 seconds);It can independent control up to 256 acoustic segments;Wide model
Enclose operating voltage (DC3~5V);The sample frequency (4k~20kHz) of wide scope;Can key triggering, MCU control can also be connect;It is minimum
System only needs power supply, loudspeaker, key;Acoustic segment is freely combined;Two kinds of audio output modes of PWM and DAC.PM66 is electrical
Feature are as follows: operating voltage: DC3~5V;Operating current :≤60mA while connecing 8 ohm of loudspeaker (the PWM way of output);Quiescent current:
≤2uA.PM66SSXX (DIP16) pin defines shown in following table:
Pin name | Pin number | Description |
K1, K2, K5 | 3,2,1 | Trigger input pin (low effective) |
O1, O2 | 14,13 | Output pin |
SPP,SPN | 5,4 | Connect loudspeaker both ends |
VDD | 6,7 | Power positive end |
GND | 8,9 | Power ground |
RESB | 12 | System reset end (low effective) |
FCSB,FCLK,FDO,FDI | 10,16,11,15 | Programming Control end |
PM66 has keystroke pattern and two kinds of audio output modes, in the keystroke pattern of PM66 sequence of speech chip, K1
As 8 triggering ends, each triggering end can store most 100 groups (Group)~K8, can store 200 in each group (Group)
A independent acoustic segment.K1~K8 can trigger corresponding sound (low effective), when burning/recording chip, Ke Yishe respectively
It is set to a variety of triggering modes such as failing edge triggering or low level triggering.There is built-in pull-up resistor in the port K1~K8, and has stabilization
Dynamic design, can connect key, it is also possible to which single-chip processor i/o mouth line directly operates it.When being connected with PWM mode, SPP foot and SPN
Foot connects trumpet end, directly drives 8 ohm of 0.5W loudspeaker;It, can be using triode 8050 as amplifier when being connected in a manner of DAC
Part can select power discharging device according to actual power demand, and SPP foot is audio signal output end, and SPN foot is hanging.
PM66, can be with independent control up to 256 sections of voices under microprocessor control mode.PM66 provides two kinds of microcontrollers
Device processing mode: serial address mode and parallel address pattern.Wherein, serial address mode can be 256 sections of independent control, serial
In address pattern, K1 is address date input terminal, and K2 is synchronised clock end, and O1, O2 are busy signal end, and address date is on clock
Edge is risen to be latched into PM66 chip.The address of voice segments is 0x00H~0xFFH, and external microcontroller is sent into the address code of voice segments
It can play, K2 clock frequency is in 25Hz~5kHz.Parallel address pattern can be 128 sections of independent control, in parallel address
In mode, K1 is synchronised clock end, and K2~K8 is 7 parallel-by-bit address input ends, and maximum can be divided into 27=128 sections, the position O1, O2 two
The opposite polarity busy signal output of kind, can be selected by user using wherein one output, as busy signal, O1 is when playing voice
For height, playback, which finishes, to be dragged down;O2 is opposite to that.
In one embodiment of the invention, card reader module includes single-chip microcontroller and card reading chip.Wherein, as shown in figure 4,
Single-chip microcontroller model can be AT89S52, and card reading chip model can be MF RC500, and card reader module further includes peripheral circuit, corresponding
IC card be Mifare1 train of radio frequency card.MF RC500 can be controlled and be communicated by AT89S52, MF RC500 driving is outer
Circuit is enclosed to be written and read Mifare1 card.Specifically, AT89S52 receives the instruction of main control module by serial port, completes
To the operation of card and the management of entire reader.MF RCS00 is responsible for the coding of signal, decoding, modulation, the demodulation of signal;Periphery
Circuit establishes reader with contacting between radio-frequency card, and the design of this part directly influences the size and system of radio-frequency power
Anti-interference ability;Mifare1 card is systematic difference terminal.
Wherein, AT89S52 is 8 single-chip microcontrollers of low cost and high performance CMOS, and what piece included 8Kbytes ISP can be repeatedly
Erasable 1000 times Flash read-only program memories are manufactured using the high-density, non-volatile memory technology of atmel corp, simultaneous
Appearance standard MCS-51 instruction system and 80C51 pin configuration.General 8 central processing units of Embedded, with being had in time slice
The Watchdog of anti-deadlock, to ensure system stable operation.
MF RC500 is a member in the highly integrated card reading IC series applied to 13.56MHz contactless communication.The card reading
IC series utilizes advanced modulation and demodulation concept, fully-integrated all types of passive contactless logical at 13.56 mhz
Letter mode and agreement.The layer that MF RC500 supports ISO14443A all, internal transmitter part do not need to increase active circuit
The antenna of near operation distance can be directly driven (up to 10cm);Receiver part provides a firm and effective demodulation
Decoding circuit, the transponder signal compatible for ISO14443;Numerical portion processing: ISO14443A frame and error detection are (odd
Ou &CRC).In addition, it also supports quick CRYPTO!Encryption Algorithm easily connects parallel for verifying Mifare1 series of products
Mouth may be coupled directly to any 8-bit microprocessor, provide great flexibility to the design of reader.MF RC500 can facilitate
Ground based on ISO/IEC 14443A standard and requires the non-of low cost, small size, high-performance and single supply to connect for various
The application of touch communication.The inside EEPROM of MF RC500 point is 4 parts, be respectively used to save product for information about, deposit
It puts initialization of register startup file and stores the key etc. of cryptographic calculation.8 × 64 FIFO are for caching microcontroller
With the defeated people's output stream of chip asked, data flow length can be handled up to 64Byte.
An antenna and a match circuit can be designed there are two different concepts: one is direct matched antenna,
Card reader and the minimum range of antenna can establish a small-sized full terminal;Another kind is the matched antenna of 50 Ω, can be with
As a simple solution for using the connection application of long range coaxial cable between card reader and antenna, connection card reader matching
The coaxial cable longest distance of circuit and antenna is up to 10m.In an embodiment of the present invention using direct matched antenna.
The theoretical work distance of direct matched antenna is up to 100m, and operating distance is mainly by the size of antenna and antenna-matching circuit
Correction value determine, the component needed have EMC filter, receive circuit and the matching of antenna itself etc..
The working frequency of Mifare system is 13.56MHz, this frequency is occurred with a quartz (controlled) oscillator, but it is same
When also generate higher hamonic wave.In order to meet and higher hamonic wave will be pressed down well for 3 times, 5 times in international EMC regulation 13.56MHz
System, other than Multi-layer design, it is also necessary to add low-pass filter.Low-pass filter by element filter inductance and filter capacitor at.One
As choose filter inductance be 1 μ H, filter capacitor be 68 μ F.
The internal receipt part of MF RC500 has used a new reception concept, it is loaded using the subcarrier of card response
Defeated people potential of the internal VMID potential generated as RX pin can be used in 2 sidebands caused by modulating.It is dry in order to reduce
It disturbs, connects a capacitor to ground in VMID pin.The receiving portion of card reader needs to connect one between RX and VMID pin
Divider.
In one particular embodiment of the present invention, MF RC500, card reader module interface circuit and card reader module are inserted
The operating circuit of seat is respectively as shown in Fig. 5,6,7.
In one embodiment of the invention, as shown in figure 8, main control module 40 includes microprocessing unit 41, data storage
Unit 42, Ethernet interface unit 43, real time clock unit 44, USB flash disk interface unit 45, box door lock interface unit 46 and state refer to
Show unit 47.
Wherein, STC11/10xx series monolithic IAP11F62X can be selected in microprocessing unit 41.STC11/10xx series is single
Piece machine is the single-chip microcontroller of single clock/machine cycle (1T) of macrocrystalline science and technology production, is that high speed/low-power consumption/superpower is jamproof newly
8051 single-chip microcontroller of a generation, instruction code completely compatible traditional 8051, but fast 8-12 times of speed.It is internally integrated highly reliable reset electricity
Road, for high-speed communication, intelligent control, strong jamming occasion.On piece integrates 1280 byte RAM;User program space 62K byte;2
A 16 bit timing device (with traditional 8051 compatible timer/counters, 16 bit timing device T0 and T1);One independent general complete
Duplexing asynchronous serial port (UART) can use [RxD/P3.0, TxD/P3.1] can be switched to when hosted when 2 serial ports
[RxD/P1.6, TxD/P1.7], by toggling serial ports between P3 mouthfuls and P1 mouthfuls, using 1 serial ports as 2 main serial ports
Time-sharing multiplex can be realized with a low cost 2 serial ports.Integrated chip interface resource is abundant, convenient for exploitation.Data storage can utilize monolithic
Bigpian internal program space.The program space is divided into 2 parts: user program and data storage area.User program is for storing master control
Module SCM program, data storage area is for storage configuration information, list information, record information etc..
Embedded ethernet module NEBOARD can be used in Ethernet interface unit 43.NEBOARD is CONEXTOP company face
Multi-functional, highly reliable, the high performance embedded data conversion products released to industrial circle, provide ether for industrial equipment
The mutual rotating function of data of net (Ethernet) and (Dial-up) network that dials.NEBOARD interiors of products is integrated with ICP/IP protocol
Stack provides complete network insertion and data-transformation facility.Other than Ethernet, and a variety of dial-up accesses can be provided
Means, wherein have PPP, PPPoE, GPRS, WIFI, 3G/3.5G user can select according to actual needs one of those or it is more
A access scheme.NEBOARD provides function and application abundant for user, uses for convenience, provides this convenience of WEB
Efficiently configuration mode, user can complete the configuration of equipment using common browser.NEBOARD is provided not just for user
The mode and scheme of a variety of networkings, while it supports to be up to 256 road serial ports, also meets the application environment height collection of Multi-serial port
At highly reliable application demand.The function and characteristic of NEBOARD series of products are as follows: be easily connected to INTERNET network;It supports
ETHERNET provides the adaptive network interface of 10M/100M;Support PPP access, PPPoE access;Support WEB configuration mode.
The DS1307 chip of MAXIM company can be used in real time clock unit 44.DS1307 is a low-power consumption, has 56 words
Save the full binary-coded decimal clock/calendar real-time timepiece chip of non-volatile RAM.Address and data are passed by the two-way universal serial bus of two lines
It is defeated.Chip can provide the second, point, hour, number of days, date, month, the information such as time.The number of days energy adjust automatically of each month, and
Have the function of leap year compensation, the way of numbering the years upper limit 2100.AM/PM flag bit determines clock work in 24 hours or 12 hours modes.Core
Piece has the power source sensing circuit built in one, has detection of power loss and battery handoff functionality.DS1307 is worked in from equipment state.
It follows after " entry condition ", as soon as main equipment is provided from equipment addressing byte and the register address to be accessed, register
It can continuously be accessed until " stop condition " arrives.When VCC is lower than 1.25 × VBAT, chip will stop current deposit
Take simultaneously homing device address counter.At this moment, it will be rejected to any signal that chip issues, and to avoid access errors.When
When VCC is lower than VBAT, chip will be switched to battery backup mode.When VCC is restored to greater than VBAT+0.2V, chip will
It is powered by VCC.When VCC is greater than 1.25 × VBAT, access can be normally carried out.
USB flash disk interface unit 45 uses CH376 chip, and CH376 is file management control chip, reads and writes for SCM system
File in USB flash disk or SD card.CH376 supports USB device mode and usb host mode, and built-in USB communications protocol
Basic firmware, the firmware of the special communication protocol of built-in processing Mass-Storage mass memory unit, built-in SD card
Communication interface firmware, the built-in managed firmware of FAT16 and FAT32 and FAT12 file system support common USB to store
Equipment (including USB flash disk/USB hard disk/USB flash drive/USB card reader) and SD card (including normal capacity SD card and high capacity HC-SD
The mmc card and TF card of card and protocol-compliant).CH376 supports three kinds of communication interfaces: 8 parallel ports, SPI interface or asynchronous string
Mouthful, the controllers such as single-chip microcontroller/DSP/MCU/MPU can control CH376 chip by above-mentioned any communication interface, access U
File or and computer communication in disk or SD card.
In one particular embodiment of the present invention, the work of IAP11F62X, Ethernet interface unit, DS1307 chip
The application block diagram of circuit and CH376 are respectively as shown in Fig. 8,9,10,11.
Based on above-mentioned key safeguard box, in one particular embodiment of the present invention, application example may include long-range
Licensing process, authentication process itself take out key and close key safeguard box.
Wherein, remote authorization process can include:
● the telephone number for dialing key safeguard box is waited a moment, automatic off-hook, and " hello, welcomes to use xx brand electric power for prompt
Unlocking key box product please input licencing key, press the # key end."
● input password, and press the # key end.If Password Input is incorrect, " input error " is prompted, waits a moment continuation
Prompt " licencing key please be input, press the # key ends ", if it is continuous input three times it is incorrect, can automatic hand-up.
● it after Password Input is correct, can prompt " to authorize unlock please by 1, modification licencing key please by 2, modifies unlocked time
Please by 3, terminate please by 0 ".Below with sentence in " authorization ... " replacement in explanation.
▲ hear above-mentioned " authorization ... " prompt tone after, press 1, prompt " authorize and unlock successfully ".After authorizing successfully, award
Power indicator light (blue) is lighted, and IC card verifying identity can be used.
▲ hear above-mentioned " authorization ... " prompt tone after, press 2, prompt " new licencing key please be input, by No. # knot
Beam ".Arbitrarily long number within input ten, then terminated with # key.Prompt " please inputs new licencing key, by # again
Number terminate.", password just now is inputted again.If the password inputted twice is different, " input error " is prompted, is returned automatically
Return to upper level.Input password is identical twice, then prompts " password is successfully modified ", automatically return to upper level.
▲ hear above-mentioned " authorization ... " prompt tone after, press 3, prompt " 2 unlocked times please be input ".Such as to solve
Locking the time is 2 minutes, then inputs " 0 ", " 2 ", prompts " input is correct ", automatically returns to upper level.
▲ hear above-mentioned " control ... " prompt tone after, terminate on-hook by 0.
It was not inputted in any operating process more than 30 seconds, system can automatic hand-up.This is primarily to prevent from leading to
Section design in letter.
Authentication process itself can include: by IC card close to card reading induction zone.After such as successfully identifying, buzzer can be issued in machine
One sound of " beep ".After verifying identity passes through, status indicator lamp (yellow) is lighted, while automatically opening key safeguard box.5 seconds
It is automatic locking after (default time is 5 seconds).
In 5 seconds after key safeguard box automatically opens, key can be taken away, then by Field Force manually by key storage
Case closes.Field Force can try firmly to be pulled outwardly again after closing key safeguard box manually, and whether confirmation key safeguard box is complete
It closes entirely.
In one embodiment of the invention, each key in key safeguard box can post RFID label tag, key
What safe deposit box can determine key by monitoring RFID label tag takes and returns movement away.
Key safeguard box according to an embodiment of the present invention carries out telephone authorizations certification by phone module before unlocking, and
On-site verification is carried out by on-site verification module, thereby, it is possible to the keys effectivelying prevent in key safeguard box by mispick, mention significantly
The high safety of key safeguard box and the normalization of key management.
Further, in one embodiment of the invention, main control module 40 can be also communicatively coupled with computer, with
System time is calibrated and read by the communication connection, setting is unlocked and is delayed, downloading user list, extracts record of unlocking, reading
With modification configuration information and report hardware fault.
In one particular embodiment of the present invention, each computer can be carried out with the main control module of multiple key safeguard boxes
Communication connection.As shown in figure 12, computer operation carries out wireless communication company with multiple key safeguard boxes in TCP Client mode
It connects, each key safeguard box can work in TCP Server mode.As shown in figure 13, computer and each key safeguard box
Communication process can include:
1, client link is established.TCP Client link is initiated from computer to key safeguard box, if linked successfully,
Then entry communication process, if link failure, key safeguard box are in off-line state, can not be communicated.
2, it communicates.Communication command is sent to key safeguard box from computer and is awaited a response;Key safeguard box receives order
Operation is executed afterwards, responds computer.In communication process, waiting-timeout 500mS, number of retries 2 times, such as key safeguard box
Without response, 2 communications are reattempted, if illustrating that key safeguard box is in off-line state or hardware fault still without response.
3, client link is disconnected.The instruction for stopping TCP Client and linking is sent from computer to key safeguard box, and
It is responded by key safeguard box to confirm and disconnect.
In one embodiment of the invention, the data frame format transmitted between computer and key safeguard box is as follows:
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
1Byte | 1Byte | 1Byte | 2Byte(N) | N Byte | 1Byte | 1Byte |
STX: start-of-frame is fixed as 0xBF;
Addr: key safeguard box address is fixed as 0x01;
Cmd: command code
The 0x01 calibration system time
0x02 setting, which is opened the door, to be delayed
0x03 downloads user list
0x13 extracts user list
0x14 extracts record information
0x11 reads system time
0x15 reads configuration information
0x05 restores factory configuration (only broadcast address is effective)
0x06 modifies configuration information
0xFA order mistake
0xFB hardware fault
Len: data length, 2 bytes, most-significant byte is preceding;
Data: data information;
ChkSum: single byte verification and verification range Addr, Cmd, Len, Data;
ETX: frame end symbol is fixed as 0xE7.
The format of every byte are as follows:
0 | D0 | D1 | D2 | D3 | D4 | D5 | D6 | D7 | 1 |
Each byte is 10 data: 1 start bit is fixed as 0;8 data bit, lowest order are first sent;No parity check position;
1 stop position, is fixed as 1.
In one particular embodiment of the present invention, the communication process of each function is as follows:
1, the calibration system time
Computer → key safeguard box:
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0x01 | 0x00 0x08 | 8Byte | ChkSum | 0xE7 |
Computer sending alignment system time order, waits the response of key safeguard box.If not receiving at the appointed time
The response of key safeguard box, then retransmit.Retransmit full 2 times then Communications failures.
Data be 8 byte 8421BCD code times, byte order: when system, year, month, day, week, when, minute, second.
Such as: 00 11 08 26 05 21 34 55 indicate 24 when systems, and 34 divide 55 seconds when 11 on Augusts, 26, Friday 21;
For another example: 01 11 08 26 05 09 34 55 12 when systems of expression, 26, Friday PM of 11 on Augusts 9:34:55 (under
Noon);
For another example: 11 11 08 26 05 09 34 55 12 when systems of expression, 26, Friday AM of 11 on Augusts 9:34:55 (on
Noon).
Key safeguard box → computer:
After key safeguard box receives the order of calibration system time, write RTC operation, after return to above-mentioned data frame
To computer.
If key safeguard box receive mistake order (command code mistake, error in data), return command mistake,
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0xFA | 0x00 0x00 | ChkSum | 0xE7 |
If writing RTC failure, hardware error (RTC operating mistake) is returned,
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0xFB | 0x00 0x01 | 0x02 | ChkSum | 0xE7 |
The area Data is fault code: 0x01-E2prom operating mistake 0x02-RTC (real-time clock) operating mistake.
2, setting, which is unlocked, is delayed
Computer → key safeguard box:
Computer hair setting unlocking delay command, waits the response of key safeguard box.If not receiving at the appointed time
The response of key safeguard box, then retransmit.Retransmit full 2 times then Communications failures.
Data be 1 byte unlocking action delay time, 5~60, unit: second.Such as it is set as 10 seconds, then data are 0x0A.
Key safeguard box → computer:
After key safeguard box receives setting unlocking delay command, write E2prom operation, after return to above-mentioned number
According to frame to computer.
If key safeguard box receive mistake order (command code mistake, error in data), return command mistake,
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0xFA | 0x00 0x00 | ChkSum | 0xE7 |
If writing E2prom failure, hardware error (E2prom operating mistake) is returned,
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0xFB | 0x00 0x01 | 0x01 | ChkSum | 0xE7 |
The area Data is fault code:0x01-E2prom operating mistake0x02-RTC (real-time clock) operating mistake.
3, user list is downloaded
Computer → key safeguard box:
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0x03 | N | N Byte | ChkSum | 0xE7 |
Computer, which is given, carries user list order, waits the response of key safeguard box.If not receiving at the appointed time
The response of key safeguard box, then retransmit.Retransmit full 2 times then Communications failures.
Data is N byte user list, and every 14 byte is 1 user list information, therefore the multiple that N is 14, minimum 14
(0x00 0x0E), 504 (0x01 0xF8) of maximum.I.e. key safeguard box can at most download 36 user lists.
Such as N be 14 when, data information is as follows:
Key safeguard box → computer:
After key safeguard box receives downloading user list order, write E2prom operation, after return to above-mentioned number
According to frame to computer.
If key safeguard box receive mistake order (command code mistake, error in data), return command mistake,
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0xFA | 0x00 0x00 | ChkSum | 0xE7 |
If writing E2prom failure, hardware error (E2prom operating mistake) is returned,
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0xFB | 0x00 0x01 | 0x01 | ChkSum | 0xE7 |
The area Data is fault code: 0x01-E2prom operating mistake 0x02-RTC (real-time clock) operating mistake.
4, user list is extracted
Computer → key safeguard box:
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0x13 | 0x00 0x00 | ChkSum | 0xE7 |
Computer hair extracts user list order, waits the response of key safeguard box.If not receiving at the appointed time
The response of key safeguard box, then retransmit.Retransmit full 2 times then Communications failures.
Key safeguard box → computer:
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0x13 | N | N Byte | ChkSum | 0xE7 |
After key safeguard box receives extraction user list order, list information is returned.
Data is N byte list information, and every 14 byte is 1 user list information, therefore the multiple that N is 14, minimum 14
(0x00 0x0E), 504 (0x01 0xF8) of maximum [0x00 0x00 indicates no user list].I.e. key safeguard box can at most be deposited
Store up 36 user lists.
Such as N be 14 when, data information is as follows:
If key safeguard box receive mistake order (command code mistake, error in data), return command mistake,
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0xFA | 0x00 0x00 | ChkSum | 0xE7 |
5, record information is extracted
Computer → key safeguard box:
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0x14 | 0x00 0x00 | ChkSum | 0xE7 |
Computer hair extracts record message command, waits the response of key safeguard box.If not receiving at the appointed time
The response of key safeguard box, then retransmit.Retransmit full 2 times then Communications failures.
Key safeguard box → computer:
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0x14 | N | N Byte | ChkSum | 0xE7 |
After key safeguard box receives extraction record message command, return recording information.
Data is that N byte records information, and every 20 byte is 1 record information, therefore the multiple that N is 20, minimum 20
(0x000x14), 2000 (0x07 0xD0) of maximum [0x00 0x00 indicates no record information].I.e. key safeguard box can at most be deposited
Store up 2000 record information.
Such as N be 20 when, data information is as follows:
If key safeguard box receive mistake order (command code mistake, error in data), return command mistake,
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0xFA | 0x00 0x00 | ChkSum | 0xE7 |
6, system time is read
Computer → key safeguard box:
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0x11 | 0x00 0x00 | ChkSum | 0xE7 |
Computer hair reads system time order, waits the response of key safeguard box.If not receiving at the appointed time
The response of key safeguard box, then retransmit.Retransmit full 2 times then Communications failures.
Key safeguard box → computer:
Key safeguard box receive read system time order after, carry out read RTC operation, after return system time number
According to frame to computer.
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0x11 | 0x00 0x08 | 8Byte | ChkSum | 0xE7 |
Data be 8 byte 8421BCD code times, byte order: when system, year, month, day, week, when, minute, second.
Such as: 00 11 08 26 05 21 34 55 indicate 24 when systems, and 34 divide 55 seconds when 11 on Augusts, 26, Friday 21;
For another example: 01 11 08 26 05 09 34 55 12 when systems of expression, 26, Friday PM of 11 on Augusts 9:34:55 (under
Noon);
For another example: 11 11 08 26 05 09 34 55 12 when systems of expression, 26, Friday AM of 11 on Augusts 9:34:55 (on
Noon).
If key safeguard box receive mistake order (command code mistake, error in data), return command mistake,
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0xFA | 0x00 0x00 | ChkSum | 0xE7 |
If reading RTC failure, hardware error (RTC operating mistake) is returned,
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0xFB | 0x00 0x01 | 0x02 | ChkSum | 0xE7 |
The area Data is fault code: 0x01-E2Prom operating mistake 0x02-RTC (real-time clock) operating mistake.
7, configuration information is read
Computer → key safeguard box:
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0x15 | 0x00 0x00 | ChkSum | 0xE7 |
Computer hair reads configuration information order, waits the response of key safeguard box.If not receiving at the appointed time
The response of key safeguard box, then retransmit.Retransmit full 2 times then Communications failures.
Key safeguard box → computer:
After key safeguard box receives reading configuration information order, reading E is carried out2Prom operation, after return match confidence
Data frame is ceased to computer.
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0x15 | 0x00 0x08 | 8Byte | ChkSum | 0xE7 |
Data is 8 byte configuration information data, specifically be see the table below:
If key safeguard box receive mistake order (command code mistake, error in data), return command mistake,
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0xFA | 0x00 0x00 | ChkSum | 0xE7 |
If reading E2Prom failure, then return to hardware error (E2Prom operating mistake),
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0xFB | 0x00 0x01 | 0x01 | ChkSum | 0xE7 |
The area Data is fault code: 0x01-E2Prom operating mistake 0x02-RTC (real-time clock) operating mistake.
8, restore factory configuration
Computer → key safeguard box: (broadcast address order)
Computer hair restores factory configuration order, without waiting for the response of key safeguard box.Key safeguard box receives extensive
After factory's configuration order of appearing again, write E2prom operation, after not return to any data frame to computer.
9, configuration information is modified
Computer → key safeguard box:
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0x06 | 0x00 0x08 | 8Byte | ChkSum | 0xE7 |
Computer hair modification configuration information order, waits the response of key safeguard box.If not receiving at the appointed time
The response of key safeguard box, then retransmit.Retransmit full 2 times then Communications failures.
Data is 8 byte E2Prom information data, specifically see the table below:
Key safeguard box → computer:
After key safeguard box receives modification configuration information order, carry out writing E2Prom operation, after return to above-mentioned number
According to frame to computer.
If key safeguard box receive mistake order (command code mistake, error in data), return command mistake,
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0xFA | 0x00 0x00 | ChkSum | 0xE7 |
If writing E2Prom failure, then return to hardware error (E2Prom operating mistake),
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0xFB | 0x00 0x01 | 0x01 | ChkSum | 0xE7 |
The area Data is fault code: 0x01-E2Prom operating mistake 0x02-RTC (real-time clock) operating mistake.
10, hardware fault reports
Key safeguard box can carry out self-test to hardware system after the power-up.If hardware breaks down, in communication each time
After order arrives, can all it return " hardware error ".
STX | Addr | Cmd | Len | Data | ChkSum | ETX |
0xBF | Addr | 0xFB | 0x00 0x01 | 0x01 | ChkSum | 0xE7 |
The area Data is fault code: 0x01-E2prom operating mistake 0x02-RTC (real-time clock) operating mistake.
The key safeguard box of the embodiment of the present invention, by being communicated with computer, realizing above-mentioned calibration and reading system
System time, setting, which are unlocked, to be delayed, downloading user list, extracts record of unlocking, reads and modify configuration information and report hardware
The functions such as failure further improve the normalization of key management.
The key safeguard box of corresponding above-mentioned implementation, the present invention also propose a kind of key storage system.
As shown in figure 14, the key storage system of the embodiment of the present invention includes the key safeguard box 100 of above-described embodiment, also
Including authorized telephone 200.
Authorized telephone 200 and key safeguard box 100 establish telephone connection, and key safeguard box 100 is in identification authorized telephone
Phonetic order can be issued after incoming call to authorized telephone, manager can carry out remote key-press operation by authorized telephone 100.Key is protected
Bobbin carriage 100 can operate according to remote key-press and carry out authorization identifying, and acquisition authorization message and sending are awarded after authorization identifying success
Power, which authenticates, successfully to be prompted, and by authorization message and verification information after the verification information for getting 100 scene of key safeguard box
It is compared, and is unlocked according to the box door lock that comparison result controls key safeguard box 100.
Further, as shown in figure 15, the key storage system of the embodiment of the present invention may also include computer 300.It calculates
Machine 300 can be communicatively coupled with key safeguard box 100, and to calibrate and read system time by the communication connection, setting is opened
Lock delay, extracts record of unlocking, reads and modify configuration information and report hardware fault downloading user list.
The more specific embodiment of key storage system of the embodiment of the present invention can refer to the correlation of above-mentioned key safeguard box
Embodiment, details are not described herein.
Key storage system according to an embodiment of the present invention carries out telephone authorizations certification before key safeguard box is unlocked, and
On-site verification is carried out, thereby, it is possible to the keys effectivelying prevent in key safeguard box by mispick, substantially increase key safeguard box
The normalization of safety and key management.
Corresponding above-mentioned implementation, the present invention also propose a kind of key storage method.
As shown in figure 16, the key storage method of the embodiment of the present invention, comprising the following steps:
S1, key safeguard box and authorized telephone establish telephone connection, and to authorization electricity after the incoming call of identification authorized telephone
Words issue phonetic order.
Firstly, the Field Force at key safeguard box can issue request of unpacking, management to the administrative staff at authorized telephone
Personnel can put through key safeguard box by authorized telephone after being connected to request.
S2 is received and is operated using the manager of authorized telephone according to the remote key-press that phonetic order is carried out.
S3 is operated according to remote key-press and is carried out authorization identifying, and obtains authorization message and sending after authorization identifying success
Authorization identifying successfully prompts.
Key safeguard box has phonetic function, can issue operation indicating voice to manager, manager can mention according to operation
Show that voice inputs licencing key on authorized telephone key, and after password authentification passes through input Field Force work number and award
It temporary grows, while key safeguard box issues authorization identifying to Field Force and successfully prompts.
S4 obtains the verification information of Field Force.
Field Force can swipe the card unlocking after receiving authorization identifying and successfully prompting.
Authorization message is compared S5 with verification information, and controls box door lock according to comparison result and unlock.
After Field Force swipes the card, whether the corresponding work number of card ID that key safeguard box can match staff is to authorize before
Work number and recorded if it is, control box door lock is unlocked to open chamber door.If it is not, then refusal opens chamber door.
Authorization duration, which refers to, within a specified time completes unlocking action of swiping the card, if it exceeds the authorization duration is not swiped the card, then it is subsequent to swipe the card
In vain.
The key storage method of the embodiment of the present invention is based on above-mentioned key safeguard box and key storage system is implemented, more specifically
Embodiment can refer to above-described embodiment.
Key storage method according to an embodiment of the present invention carries out telephone authorizations certification before unlocking, and the scene of progress is tested
Card, thereby, it is possible to the keys effectivelying prevent in key safeguard box by mispick, substantially increase safety and the key of key safeguard box
The normalization of spoon management.
In the description of the present invention, the meaning of " plurality " is two or more, unless otherwise specifically defined.
In the present invention unless specifically defined or limited otherwise, term " installation ", " connected ", " connection ", " fixation " etc.
Term shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or integral;It can be mechanical connect
It connects, is also possible to be electrically connected;It can be directly connected, can also can be in two elements indirectly connected through an intermediary
The interaction relationship of the connection in portion or two elements.It for the ordinary skill in the art, can be according to specific feelings
Condition understands the concrete meaning of above-mentioned term in the present invention.
In the present invention unless specifically defined or limited otherwise, fisrt feature in the second feature " on " or " down " can be with
It is that the first and second features directly contact or the first and second features pass through intermediary mediate contact.Moreover, fisrt feature exists
Second feature " on ", " top " and " above " but fisrt feature be directly above or diagonally above the second feature, or be merely representative of
First feature horizontal height is higher than second feature.Fisrt feature can be under the second feature " below ", " below " and " below "
One feature is directly under or diagonally below the second feature, or is merely representative of first feature horizontal height less than second feature.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not
It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office
It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field
Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples
It closes and combines.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with
A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding
And modification, the scope of the present invention is defined by the appended.
Claims (10)
1. a kind of key safeguard box characterized by comprising
Cabinet, the cabinet include box door lock;
Phone module, the phone module are used to establish connection with authorized telephone, and after the incoming call for identifying the authorized telephone
Phonetic order is issued to the authorized telephone, and receives the manager using the authorized telephone according to the phonetic order institute
The remote key-press of progress operates;
On-site verification module, the on-site verification module are used to obtain the verification information of Field Force;
Main control module, the main control module are connected with the phone module, the on-site verification module and the box door lock respectively,
The main control module, which is used to be operated according to the remote key-press, carries out authorization identifying, and authorization letter is obtained after authorization identifying success
Breath and sending authorization identifying successfully prompt, and by the authorization after the on-site verification module gets the verification information
Information is compared with the verification information, and controls the box door lock according to comparison result and unlock.
2. key safeguard box according to claim 1, which is characterized in that the main control module is also used to carry out with computer
System time is calibrated and read to communication connection to pass through the communication connection, setting is unlocked and is delayed, downloading user list, extracts
It unlocks and records, reads and modify configuration information and report hardware fault.
3. key safeguard box according to claim 1 or 2, which is characterized in that the on-site verification module is card reader mould
Block, the card reader module are used to read the information of the IC card when the IC card of the Field Force is in predeterminated position, and
Using the information of the IC card as the verification information.
4. key safeguard box according to claim 3, which is characterized in that the authorization message includes the Field Force
Work number and authorization duration, the information of the IC card includes the ID of the IC card, wherein issues authorization identifying in the main control module
In authorization duration after success prompt, if the card reader module reads the ID of the IC card, the main control module is sentenced
Whether the ID for the IC card of breaking matches with the work number of the Field Force, if matched, controls the box door lock and unlocks.
5. key safeguard box according to claim 1, which is characterized in that the phone module include ring detection unit,
Circuit for answering, DTMF detection unit, voice playing unit, relay output unit and microprocessor.
6. key safeguard box according to claim 3, which is characterized in that the card reader module includes single-chip microcontroller and card reading
Chip.
7. key safeguard box according to claim 3, which is characterized in that the main control module includes microprocessing unit, number
According to storage unit, Ethernet interface unit, real time clock unit, USB flash disk interface unit, box door lock interface unit and state instruction list
Member.
8. a kind of key storage system, which is characterized in that including key safeguard box described according to claim 1 any one of -7
And authorized telephone.
9. key storage system according to claim 8, which is characterized in that further include computer.
10. a kind of key storage method characterized by comprising
Key safeguard box and authorized telephone establish telephone connection, and to the authorization electricity after the incoming call for identifying the authorized telephone
Words issue phonetic order;
It receives and is operated using the manager of the authorized telephone according to the remote key-press that the phonetic order is carried out;
It is operated according to the remote key-press and carries out authorization identifying, and obtained authorization message after authorization identifying success and issue authorization
It authenticates and successfully prompts;
Obtain the verification information of Field Force;
The authorization message is compared with the verification information, and the box door lock is controlled according to comparison result and is unlocked.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910219680.9A CN109920117A (en) | 2019-03-22 | 2019-03-22 | Key safeguard box, key storage system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910219680.9A CN109920117A (en) | 2019-03-22 | 2019-03-22 | Key safeguard box, key storage system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109920117A true CN109920117A (en) | 2019-06-21 |
Family
ID=66966215
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910219680.9A Pending CN109920117A (en) | 2019-03-22 | 2019-03-22 | Key safeguard box, key storage system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109920117A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111080859A (en) * | 2019-12-30 | 2020-04-28 | 西安众恒科技有限公司 | Reverse charging intelligent door lock unlocking system and method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201043405Y (en) * | 2006-12-11 | 2008-04-02 | 张七利 | Firearm cabinet for police |
CN203422780U (en) * | 2013-09-04 | 2014-02-05 | 焦国湘 | IC (Integrated Circuit) card and GSM (Global System for Mobile Communications) remote control door lock |
CN203433572U (en) * | 2013-09-06 | 2014-02-12 | 李成 | Access wireless control equipment for manhole covers in city pipe network and outdoor equipment |
CN203732971U (en) * | 2014-03-03 | 2014-07-23 | 广州思泰信息技术有限公司 | System for monitoring outdoor machine rooms and outdoor equipment cabinets of electric power system |
CN105321237A (en) * | 2014-08-05 | 2016-02-10 | 艾默生网络能源有限公司 | Management method and system for door control of cabinet |
KR20180134547A (en) * | 2017-06-09 | 2018-12-19 | 한국산업기술대학교산학협력단 | Method of controlling smart storage box and apparatuses performing the same |
-
2019
- 2019-03-22 CN CN201910219680.9A patent/CN109920117A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201043405Y (en) * | 2006-12-11 | 2008-04-02 | 张七利 | Firearm cabinet for police |
CN203422780U (en) * | 2013-09-04 | 2014-02-05 | 焦国湘 | IC (Integrated Circuit) card and GSM (Global System for Mobile Communications) remote control door lock |
CN203433572U (en) * | 2013-09-06 | 2014-02-12 | 李成 | Access wireless control equipment for manhole covers in city pipe network and outdoor equipment |
CN203732971U (en) * | 2014-03-03 | 2014-07-23 | 广州思泰信息技术有限公司 | System for monitoring outdoor machine rooms and outdoor equipment cabinets of electric power system |
CN105321237A (en) * | 2014-08-05 | 2016-02-10 | 艾默生网络能源有限公司 | Management method and system for door control of cabinet |
KR20180134547A (en) * | 2017-06-09 | 2018-12-19 | 한국산업기술대학교산학협력단 | Method of controlling smart storage box and apparatuses performing the same |
Non-Patent Citations (1)
Title |
---|
韩露: "基于RFID技术的变电站智能钥匙设计", 《中国优秀硕士学位论文全文数据库 工程科技Ⅱ辑》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111080859A (en) * | 2019-12-30 | 2020-04-28 | 西安众恒科技有限公司 | Reverse charging intelligent door lock unlocking system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN201311672Y (en) | Storage cabinet system | |
CN103117853B (en) | A kind of safe storage device account input and authentication method | |
CN103116720A (en) | Universal serial bus (USB) Key device and account management method and authentication application method thereof | |
CN109934366A (en) | House renting management method, system and server based on wireless network | |
CN105735826B (en) | Intelligent key management box system | |
CN105225317A (en) | A kind of network access control system of multichannel centralized management | |
CN109754513A (en) | A kind of long-range access control system of multi-client based on recognition of face | |
CN103729925A (en) | Intelligent automatic door management system | |
CN106887064A (en) | A kind of access controller and gate control system based on dynamic password | |
CN107492173A (en) | A kind of cloud password access control system and method | |
CN109191637A (en) | A kind of transformer substation key intelligent management case | |
CN106780922A (en) | A kind of intelligent access control system | |
CN201974866U (en) | Card-camera access control device | |
CN202584252U (en) | Access control system based on second-generation resident identification cards | |
CN109920117A (en) | Key safeguard box, key storage system and method | |
CN206515937U (en) | A kind of intelligent access control system | |
CN103226856B (en) | Multi-identification based security system | |
CN202380832U (en) | Intelligent door control system | |
CN207004232U (en) | A kind of optical coded lock | |
CN102033516A (en) | Wireless intelligent management monitoring system | |
CN210895580U (en) | Mobile terminal dynamic modification intelligent door lock password | |
CN109754507B (en) | Door lock control method, device and system | |
CN107558818A (en) | One kind can network intelligent door lock and its method of work | |
CN203422780U (en) | IC (Integrated Circuit) card and GSM (Global System for Mobile Communications) remote control door lock | |
CN106548557A (en) | Low-power consumption Internet of Things gate inhibition based on NFC and its lift a ban method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190621 |