CN109920117A - Key safeguard box, key storage system and method - Google Patents

Key safeguard box, key storage system and method Download PDF

Info

Publication number
CN109920117A
CN109920117A CN201910219680.9A CN201910219680A CN109920117A CN 109920117 A CN109920117 A CN 109920117A CN 201910219680 A CN201910219680 A CN 201910219680A CN 109920117 A CN109920117 A CN 109920117A
Authority
CN
China
Prior art keywords
key
module
authorization
box
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910219680.9A
Other languages
Chinese (zh)
Inventor
汪文斌
龚志强
吴楠
冯晓航
陆钰
马庆功
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaide College of Changzhou University
Original Assignee
Huaide College of Changzhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaide College of Changzhou University filed Critical Huaide College of Changzhou University
Priority to CN201910219680.9A priority Critical patent/CN109920117A/en
Publication of CN109920117A publication Critical patent/CN109920117A/en
Pending legal-status Critical Current

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The present invention provides a kind of key safeguard box, key storage system and method, key safeguard box includes: cabinet, and cabinet includes box door lock;Phone module, phone module are used to establish connection with authorized telephone, and issue phonetic order to authorized telephone after the incoming call of identification authorized telephone, and receive and operated using the manager of authorized telephone according to the remote key-press that phonetic order is carried out;On-site verification module, on-site verification module are used to obtain the verification information of Field Force;Main control module, main control module is connected with phone module, on-site verification module and box door lock respectively, main control module, which is used to be operated according to remote key-press, carries out authorization identifying, and authorization message is obtained after authorization identifying success and issues authorization identifying and is successfully prompted, and authorization message is compared with verification information after getting verification information for authentication module at the scene, and controls box door lock according to comparison result and unlock.The present invention can be improved the safety of key safeguard box and the normalization of key management.

Description

Key safeguard box, key storage system and method
Technical field
The present invention relates to equipment safety management technical fields, and in particular to a kind of key safeguard box, a kind of key storage system System and a kind of key storage method.
Background technique
The equipment of current keeping key can only substantially guarantee that having recorded someone takes or return the record of key away, Either fixed authorization, if the authorization message of licensee is lost, for example authorization card is lost, and tends to be assumed another's name to push up by people It replaces.In addition, in certain scenes need just to allow to take away key the operation of progress next step in specific time, for example electric power five is anti- Intelligent unlocking equipment.From the point of view of the actual conditions of substation operation, the case where Misuse solution lock key, happens occasionally.Private collection Lock key is solved, is unlocked by force, the program and formality of solution lock key is failed to carry out, results in misoperation fault and constantly occur, bring perhaps More security risks.
Summary of the invention
The present invention is to solve the poor technical problem of current key storage device security, provides a kind of key storage Case, key storage system and method.
The technical solution adopted by the invention is as follows:
A kind of key safeguard box, comprising: cabinet, the cabinet include box door lock;Phone module, the phone module are used for Connection is established with authorized telephone, and issues phonetic order to the authorized telephone after the incoming call for identifying the authorized telephone, with And it receives and is operated using the manager of the authorized telephone according to the remote key-press that the phonetic order is carried out;On-site verification mould Block, the on-site verification module are used to obtain the verification information of Field Force;Main control module, the main control module respectively with it is described Phone module, the on-site verification module are connected with the box door lock, and the main control module is used to be grasped according to the remote key-press Make carry out authorization identifying, and obtains authorization message after authorization identifying success and successfully prompted with authorization identifying is issued, and in institute It states after on-site verification module gets the verification information and the authorization message is compared with the verification information, and according to Comparison result controls the box door lock and unlocks.
The main control module is also used to be communicatively coupled with computer, system is calibrated and read by the communication connection System time, setting, which are unlocked, to be delayed, downloading user list, extracts record of unlocking, reads and modify configuration information and report hardware Failure.
The on-site verification module is card reader module, and the card reader module is used at the IC card of the Field Force The information of the IC card is read when predeterminated position, and using the information of the IC card as the verification information.
The authorization message includes the work number and authorization duration of the Field Force, and the information of the IC card includes the IC The ID of card, wherein issued in the authorization duration after authorization identifying successfully prompts in the main control module, if the card reader mould Block reads the ID of the IC card, then the main control module judge the ID of the IC card and the Field Force work number whether phase Matching controls the box door lock and unlocks if matched.
The phone module includes ring detection unit, circuit for answering, DTMF detection unit, voice playing unit, relay Device output unit and microprocessor.
The card reader module includes single-chip microcontroller and card reading chip.
The main control module includes microprocessing unit, data storage cell, Ethernet interface unit, real time clock unit, U Disk interface unit, box door lock interface unit and state indication unit.
A kind of key storage system, including above-mentioned key safeguard box and authorized telephone.
The key storage system further includes computer.
A kind of key storage method, comprising: key safeguard box and authorized telephone establish telephone connection, and award described in the identification Phonetic order is issued to the authorized telephone after the incoming call of power phone;The manager using the authorized telephone is received according to described The remote key-press operation that phonetic order is carried out;According to the remote key-press operate carry out authorization identifying, and authorization identifying at Authorization message is obtained after function and issues authorization identifying successfully prompts;Obtain the verification information of Field Force;By the authorization message It is compared with the verification information, and the box door lock is controlled according to comparison result and is unlocked.
Beneficial effects of the present invention:
The present invention can carry out telephone authorizations certification before unlocking, and carry out on-site verification, and thereby, it is possible to effectively prevent key Key in safe deposit box substantially increases the safety of key safeguard box and the normalization of key management by mispick.
Detailed description of the invention
Fig. 1 is the block diagram of the key safeguard box of the embodiment of the present invention;
Fig. 2 is the block diagram of the phone module of one embodiment of the invention;
Fig. 3 is the caller identification electrical block diagram of one embodiment of the invention;
Fig. 4 is the block diagram of the card reader module of one embodiment of the invention;
Fig. 5 is the electrical block diagram of the MF RC500 of one embodiment of the invention;
Fig. 6 is the card reader module interface circuit structure schematic diagram of one embodiment of the invention;
Fig. 7 is the electrical block diagram of the card reader module socket of one embodiment of the invention;
Fig. 8 is the electrical block diagram of the IAP11F62X of one embodiment of the invention;
Fig. 9 is the electrical block diagram of the Ethernet interface unit of one embodiment of the invention;
Figure 10 is the electrical block diagram of the DS1307 chip of one embodiment of the invention;
Figure 11 is the application block diagram of the CH376 of one embodiment of the invention;
Figure 12 is the computer of one embodiment of the invention and the networking structure schematic diagram of key safeguard box;
Figure 13 is the computer of one embodiment of the invention and the communication process schematic diagram of key safeguard box;
Figure 14 is the block diagram of the key storage system of the embodiment of the present invention;
Figure 15 is the block diagram of the key storage system of one embodiment of the invention;
Figure 16 is the flow chart of the key storage method of the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
As shown in Figure 1, the key safeguard box of the embodiment of the present invention, including cabinet 10, phone module 20, on-site verification module 30 and main control module 40.Wherein, cabinet 10 includes box door lock 11;Phone module 20 is used to establish connection with authorized telephone, and Phonetic order is issued to authorized telephone after the incoming call of identification authorized telephone, and receives the manager using authorized telephone according to language Sound instructs carried out remote key-press operation;On-site verification module 30 is used to obtain the verification information of Field Force;Main control module 40 are connected with phone module 20, on-site verification module 30 and box door lock 11 respectively, and main control module 40 according to remote key-press for grasping Make carry out authorization identifying, and obtains authorization message after authorization identifying success and successfully prompted with authorization identifying is issued, and existing Authorization message is compared with verification information after getting verification information for field authentication module 30, and according to comparison result control cabinet Door lock 11 is unlocked.
In one embodiment of the invention, on-site verification module 30 is card reader module, and card reader module is used for existing The IC card of field personnel reads the information of IC card when being in predeterminated position, and using the information of IC card as verification information.
Specifically, authorization message includes the work number and authorization duration of Field Force, and the information of IC card includes the ID of IC card, In, it is issued in the authorization duration after authorization identifying successfully prompts in main control module 40, if card reader module reads IC card ID, then main control module 40 judges whether the ID of IC card and the work number of Field Force match, if matched, controls box door lock 11 unlock.
In one embodiment of the invention, as shown in Fig. 2, phone module 20 includes ring detection unit 21, off-hook electricity Road 22, DTMF detection unit 23, voice playing unit 24, relay output unit 25 and microprocessor 26.20 base of phone module Identification incoming number can be realized in above structure, be filtered processing, the function that unauthorized number is handled without off-hook, for The incoming call of authorized telephone can auto-pickup, play voice, according to voice flow handle remote key-press operation.
Identification for incoming number, the embodiment of the present invention is using caller identification circuit HT9032 shown in Fig. 3 as FSK Decoding circuit.HT9032 meets Bell 202 and V.23 standardizes.As shown in figure 3, incoming number identifies hardware mainly by HT9032 With the Mega8 type singlechip group of Atmel at.The capture that the FSK baseband signal that HT9032 is demodulated is sent into single-chip microcontroller is interrupted, signal Code rate is 1200b/s, so Mega8 setting 1.2kHz clock frequency carries out sampling judgement to signal.Since the sampling period may It is not ideal 1200Hz, sampling location can be made to deviate symbol center gradually, cause mistake in judgment, so failing edge capture every time It interrupts after generating, inside numeration clock resets again, corrects its sampling phase, is then delayed 0.4ms (2.4kHz), in code fetch member Point, and start thus to obtain 0,1 bit stream by 1.2kHz polydispersity index, it is synthesized into byte information, each byte by 10bit Start bit is 1, stop bits 0, and intermediate 8 are information.Needed for finally being extracted according to the forms data message format of caller identification Message word obtains incoming call date and incoming number.There are two types of the formats of caller identification information data: forms data message format (SDMF) and Multiple Data Message Format (MDMF), former structure is simple, and also more commonly used, specific format is as follows:
Channel occupancy signal Marking signal Type of message word Message-length word Message Verification and
Wherein, channel occupancy signal is alternately formed by one group 300 continuous " 0 " and " l " (binary digit), first ratio Specially for " 0 ", the last one is " 1 ".Under talking state, channel occupancy signal is not sent, and receiving end is only being properly received this Just thought after signal followed by being useful signal.Marking signal is by 180 (under hook states) or 80 (talking states Under) flag bit (logic " 1 ") composition, i.e., lasting high level.Type of message word is " 04H ", table in forms data format It is shown as calling number transmission information.Message-length word accounts for a byte, is the number of message word.Forms data message format message word Content is as follows: the date, the time (moon, day, when, point), totally 8 bytes;Calling number) if allowing to show);If not allowing to show Show calling number, character " P " will be transmitted;When terminaling exchange is unable to get host number, character " 0 " will be transmitted.Check word Algorithm be by message data (i.e. the type of message word of forms data format, message-length word and message data word) by 256 mould Summation takes benefit to obtain check word.
If HT9032 decoded output bit signal are as follows:
00010000001,0110010001,0000011001,0000111001,
0100011001,0001011001,0100011001,0110011001,
0001011001,0111011001,0100011001,0110011001,
0110011001,0000111001,0011011001,0100011001,
0100111001,0000111001,0110011001,0000011001,
0100011001,0010010001,
0x04,0x13,0x30,0x38,0x31,0x34,0x31,0x33,0x34,
0x37,0x31,0x33,0x33,0x38,0x36,0x31,0x39,0x38,
0x33,0x30,0x31,0x12
The time of caller identification is obtained after analyzing according to forms data message format are as follows: 47 divide at 08 month 14 days 13, incoming call number Code are as follows: 13386198301, check bit: 0x12.All data (including check bit) and by 256 mould summation be 00, it was demonstrated that receive Data it is completely correct.
For voice flow processing, the core that the embodiment of the present invention uses PM66 sequence of speech chip to handle as voice flow Electrocardio road.PM66 sequence of speech chip is a intelligent sound product, and with that can store, sound number of seconds is longer, and playback sound quality is more preferably Advantage.PM66 incorporates recording and playing circuit, flash, ADPCM coding and decoding device, power amplifier, the routes such as voltage-stablizer, DIP28 and DIP16 pin is encapsulated, peripheral circuit is simple, need to only connect with the mains, loudspeaker, key, PM66 is exactly an independent sound Sound play system.
PM66 functional character are as follows: storage time is long (40~4000 seconds);It can independent control up to 256 acoustic segments;Wide model Enclose operating voltage (DC3~5V);The sample frequency (4k~20kHz) of wide scope;Can key triggering, MCU control can also be connect;It is minimum System only needs power supply, loudspeaker, key;Acoustic segment is freely combined;Two kinds of audio output modes of PWM and DAC.PM66 is electrical Feature are as follows: operating voltage: DC3~5V;Operating current :≤60mA while connecing 8 ohm of loudspeaker (the PWM way of output);Quiescent current: ≤2uA.PM66SSXX (DIP16) pin defines shown in following table:
Pin name Pin number Description
K1, K2, K5 3,2,1 Trigger input pin (low effective)
O1, O2 14,13 Output pin
SPP,SPN 5,4 Connect loudspeaker both ends
VDD 6,7 Power positive end
GND 8,9 Power ground
RESB 12 System reset end (low effective)
FCSB,FCLK,FDO,FDI 10,16,11,15 Programming Control end
PM66 has keystroke pattern and two kinds of audio output modes, in the keystroke pattern of PM66 sequence of speech chip, K1 As 8 triggering ends, each triggering end can store most 100 groups (Group)~K8, can store 200 in each group (Group) A independent acoustic segment.K1~K8 can trigger corresponding sound (low effective), when burning/recording chip, Ke Yishe respectively It is set to a variety of triggering modes such as failing edge triggering or low level triggering.There is built-in pull-up resistor in the port K1~K8, and has stabilization Dynamic design, can connect key, it is also possible to which single-chip processor i/o mouth line directly operates it.When being connected with PWM mode, SPP foot and SPN Foot connects trumpet end, directly drives 8 ohm of 0.5W loudspeaker;It, can be using triode 8050 as amplifier when being connected in a manner of DAC Part can select power discharging device according to actual power demand, and SPP foot is audio signal output end, and SPN foot is hanging.
PM66, can be with independent control up to 256 sections of voices under microprocessor control mode.PM66 provides two kinds of microcontrollers Device processing mode: serial address mode and parallel address pattern.Wherein, serial address mode can be 256 sections of independent control, serial In address pattern, K1 is address date input terminal, and K2 is synchronised clock end, and O1, O2 are busy signal end, and address date is on clock Edge is risen to be latched into PM66 chip.The address of voice segments is 0x00H~0xFFH, and external microcontroller is sent into the address code of voice segments It can play, K2 clock frequency is in 25Hz~5kHz.Parallel address pattern can be 128 sections of independent control, in parallel address In mode, K1 is synchronised clock end, and K2~K8 is 7 parallel-by-bit address input ends, and maximum can be divided into 27=128 sections, the position O1, O2 two The opposite polarity busy signal output of kind, can be selected by user using wherein one output, as busy signal, O1 is when playing voice For height, playback, which finishes, to be dragged down;O2 is opposite to that.
In one embodiment of the invention, card reader module includes single-chip microcontroller and card reading chip.Wherein, as shown in figure 4, Single-chip microcontroller model can be AT89S52, and card reading chip model can be MF RC500, and card reader module further includes peripheral circuit, corresponding IC card be Mifare1 train of radio frequency card.MF RC500 can be controlled and be communicated by AT89S52, MF RC500 driving is outer Circuit is enclosed to be written and read Mifare1 card.Specifically, AT89S52 receives the instruction of main control module by serial port, completes To the operation of card and the management of entire reader.MF RCS00 is responsible for the coding of signal, decoding, modulation, the demodulation of signal;Periphery Circuit establishes reader with contacting between radio-frequency card, and the design of this part directly influences the size and system of radio-frequency power Anti-interference ability;Mifare1 card is systematic difference terminal.
Wherein, AT89S52 is 8 single-chip microcontrollers of low cost and high performance CMOS, and what piece included 8Kbytes ISP can be repeatedly Erasable 1000 times Flash read-only program memories are manufactured using the high-density, non-volatile memory technology of atmel corp, simultaneous Appearance standard MCS-51 instruction system and 80C51 pin configuration.General 8 central processing units of Embedded, with being had in time slice The Watchdog of anti-deadlock, to ensure system stable operation.
MF RC500 is a member in the highly integrated card reading IC series applied to 13.56MHz contactless communication.The card reading IC series utilizes advanced modulation and demodulation concept, fully-integrated all types of passive contactless logical at 13.56 mhz Letter mode and agreement.The layer that MF RC500 supports ISO14443A all, internal transmitter part do not need to increase active circuit The antenna of near operation distance can be directly driven (up to 10cm);Receiver part provides a firm and effective demodulation Decoding circuit, the transponder signal compatible for ISO14443;Numerical portion processing: ISO14443A frame and error detection are (odd Ou &CRC).In addition, it also supports quick CRYPTO!Encryption Algorithm easily connects parallel for verifying Mifare1 series of products Mouth may be coupled directly to any 8-bit microprocessor, provide great flexibility to the design of reader.MF RC500 can facilitate Ground based on ISO/IEC 14443A standard and requires the non-of low cost, small size, high-performance and single supply to connect for various The application of touch communication.The inside EEPROM of MF RC500 point is 4 parts, be respectively used to save product for information about, deposit It puts initialization of register startup file and stores the key etc. of cryptographic calculation.8 × 64 FIFO are for caching microcontroller With the defeated people's output stream of chip asked, data flow length can be handled up to 64Byte.
An antenna and a match circuit can be designed there are two different concepts: one is direct matched antenna, Card reader and the minimum range of antenna can establish a small-sized full terminal;Another kind is the matched antenna of 50 Ω, can be with As a simple solution for using the connection application of long range coaxial cable between card reader and antenna, connection card reader matching The coaxial cable longest distance of circuit and antenna is up to 10m.In an embodiment of the present invention using direct matched antenna. The theoretical work distance of direct matched antenna is up to 100m, and operating distance is mainly by the size of antenna and antenna-matching circuit Correction value determine, the component needed have EMC filter, receive circuit and the matching of antenna itself etc..
The working frequency of Mifare system is 13.56MHz, this frequency is occurred with a quartz (controlled) oscillator, but it is same When also generate higher hamonic wave.In order to meet and higher hamonic wave will be pressed down well for 3 times, 5 times in international EMC regulation 13.56MHz System, other than Multi-layer design, it is also necessary to add low-pass filter.Low-pass filter by element filter inductance and filter capacitor at.One As choose filter inductance be 1 μ H, filter capacitor be 68 μ F.
The internal receipt part of MF RC500 has used a new reception concept, it is loaded using the subcarrier of card response Defeated people potential of the internal VMID potential generated as RX pin can be used in 2 sidebands caused by modulating.It is dry in order to reduce It disturbs, connects a capacitor to ground in VMID pin.The receiving portion of card reader needs to connect one between RX and VMID pin Divider.
In one particular embodiment of the present invention, MF RC500, card reader module interface circuit and card reader module are inserted The operating circuit of seat is respectively as shown in Fig. 5,6,7.
In one embodiment of the invention, as shown in figure 8, main control module 40 includes microprocessing unit 41, data storage Unit 42, Ethernet interface unit 43, real time clock unit 44, USB flash disk interface unit 45, box door lock interface unit 46 and state refer to Show unit 47.
Wherein, STC11/10xx series monolithic IAP11F62X can be selected in microprocessing unit 41.STC11/10xx series is single Piece machine is the single-chip microcontroller of single clock/machine cycle (1T) of macrocrystalline science and technology production, is that high speed/low-power consumption/superpower is jamproof newly 8051 single-chip microcontroller of a generation, instruction code completely compatible traditional 8051, but fast 8-12 times of speed.It is internally integrated highly reliable reset electricity Road, for high-speed communication, intelligent control, strong jamming occasion.On piece integrates 1280 byte RAM;User program space 62K byte;2 A 16 bit timing device (with traditional 8051 compatible timer/counters, 16 bit timing device T0 and T1);One independent general complete Duplexing asynchronous serial port (UART) can use [RxD/P3.0, TxD/P3.1] can be switched to when hosted when 2 serial ports [RxD/P1.6, TxD/P1.7], by toggling serial ports between P3 mouthfuls and P1 mouthfuls, using 1 serial ports as 2 main serial ports Time-sharing multiplex can be realized with a low cost 2 serial ports.Integrated chip interface resource is abundant, convenient for exploitation.Data storage can utilize monolithic Bigpian internal program space.The program space is divided into 2 parts: user program and data storage area.User program is for storing master control Module SCM program, data storage area is for storage configuration information, list information, record information etc..
Embedded ethernet module NEBOARD can be used in Ethernet interface unit 43.NEBOARD is CONEXTOP company face Multi-functional, highly reliable, the high performance embedded data conversion products released to industrial circle, provide ether for industrial equipment The mutual rotating function of data of net (Ethernet) and (Dial-up) network that dials.NEBOARD interiors of products is integrated with ICP/IP protocol Stack provides complete network insertion and data-transformation facility.Other than Ethernet, and a variety of dial-up accesses can be provided Means, wherein have PPP, PPPoE, GPRS, WIFI, 3G/3.5G user can select according to actual needs one of those or it is more A access scheme.NEBOARD provides function and application abundant for user, uses for convenience, provides this convenience of WEB Efficiently configuration mode, user can complete the configuration of equipment using common browser.NEBOARD is provided not just for user The mode and scheme of a variety of networkings, while it supports to be up to 256 road serial ports, also meets the application environment height collection of Multi-serial port At highly reliable application demand.The function and characteristic of NEBOARD series of products are as follows: be easily connected to INTERNET network;It supports ETHERNET provides the adaptive network interface of 10M/100M;Support PPP access, PPPoE access;Support WEB configuration mode.
The DS1307 chip of MAXIM company can be used in real time clock unit 44.DS1307 is a low-power consumption, has 56 words Save the full binary-coded decimal clock/calendar real-time timepiece chip of non-volatile RAM.Address and data are passed by the two-way universal serial bus of two lines It is defeated.Chip can provide the second, point, hour, number of days, date, month, the information such as time.The number of days energy adjust automatically of each month, and Have the function of leap year compensation, the way of numbering the years upper limit 2100.AM/PM flag bit determines clock work in 24 hours or 12 hours modes.Core Piece has the power source sensing circuit built in one, has detection of power loss and battery handoff functionality.DS1307 is worked in from equipment state. It follows after " entry condition ", as soon as main equipment is provided from equipment addressing byte and the register address to be accessed, register It can continuously be accessed until " stop condition " arrives.When VCC is lower than 1.25 × VBAT, chip will stop current deposit Take simultaneously homing device address counter.At this moment, it will be rejected to any signal that chip issues, and to avoid access errors.When When VCC is lower than VBAT, chip will be switched to battery backup mode.When VCC is restored to greater than VBAT+0.2V, chip will It is powered by VCC.When VCC is greater than 1.25 × VBAT, access can be normally carried out.
USB flash disk interface unit 45 uses CH376 chip, and CH376 is file management control chip, reads and writes for SCM system File in USB flash disk or SD card.CH376 supports USB device mode and usb host mode, and built-in USB communications protocol Basic firmware, the firmware of the special communication protocol of built-in processing Mass-Storage mass memory unit, built-in SD card Communication interface firmware, the built-in managed firmware of FAT16 and FAT32 and FAT12 file system support common USB to store Equipment (including USB flash disk/USB hard disk/USB flash drive/USB card reader) and SD card (including normal capacity SD card and high capacity HC-SD The mmc card and TF card of card and protocol-compliant).CH376 supports three kinds of communication interfaces: 8 parallel ports, SPI interface or asynchronous string Mouthful, the controllers such as single-chip microcontroller/DSP/MCU/MPU can control CH376 chip by above-mentioned any communication interface, access U File or and computer communication in disk or SD card.
In one particular embodiment of the present invention, the work of IAP11F62X, Ethernet interface unit, DS1307 chip The application block diagram of circuit and CH376 are respectively as shown in Fig. 8,9,10,11.
Based on above-mentioned key safeguard box, in one particular embodiment of the present invention, application example may include long-range Licensing process, authentication process itself take out key and close key safeguard box.
Wherein, remote authorization process can include:
● the telephone number for dialing key safeguard box is waited a moment, automatic off-hook, and " hello, welcomes to use xx brand electric power for prompt Unlocking key box product please input licencing key, press the # key end."
● input password, and press the # key end.If Password Input is incorrect, " input error " is prompted, waits a moment continuation Prompt " licencing key please be input, press the # key ends ", if it is continuous input three times it is incorrect, can automatic hand-up.
● it after Password Input is correct, can prompt " to authorize unlock please by 1, modification licencing key please by 2, modifies unlocked time Please by 3, terminate please by 0 ".Below with sentence in " authorization ... " replacement in explanation.
▲ hear above-mentioned " authorization ... " prompt tone after, press 1, prompt " authorize and unlock successfully ".After authorizing successfully, award Power indicator light (blue) is lighted, and IC card verifying identity can be used.
▲ hear above-mentioned " authorization ... " prompt tone after, press 2, prompt " new licencing key please be input, by No. # knot Beam ".Arbitrarily long number within input ten, then terminated with # key.Prompt " please inputs new licencing key, by # again Number terminate.", password just now is inputted again.If the password inputted twice is different, " input error " is prompted, is returned automatically Return to upper level.Input password is identical twice, then prompts " password is successfully modified ", automatically return to upper level.
▲ hear above-mentioned " authorization ... " prompt tone after, press 3, prompt " 2 unlocked times please be input ".Such as to solve Locking the time is 2 minutes, then inputs " 0 ", " 2 ", prompts " input is correct ", automatically returns to upper level.
▲ hear above-mentioned " control ... " prompt tone after, terminate on-hook by 0.
It was not inputted in any operating process more than 30 seconds, system can automatic hand-up.This is primarily to prevent from leading to Section design in letter.
Authentication process itself can include: by IC card close to card reading induction zone.After such as successfully identifying, buzzer can be issued in machine One sound of " beep ".After verifying identity passes through, status indicator lamp (yellow) is lighted, while automatically opening key safeguard box.5 seconds It is automatic locking after (default time is 5 seconds).
In 5 seconds after key safeguard box automatically opens, key can be taken away, then by Field Force manually by key storage Case closes.Field Force can try firmly to be pulled outwardly again after closing key safeguard box manually, and whether confirmation key safeguard box is complete It closes entirely.
In one embodiment of the invention, each key in key safeguard box can post RFID label tag, key What safe deposit box can determine key by monitoring RFID label tag takes and returns movement away.
Key safeguard box according to an embodiment of the present invention carries out telephone authorizations certification by phone module before unlocking, and On-site verification is carried out by on-site verification module, thereby, it is possible to the keys effectivelying prevent in key safeguard box by mispick, mention significantly The high safety of key safeguard box and the normalization of key management.
Further, in one embodiment of the invention, main control module 40 can be also communicatively coupled with computer, with System time is calibrated and read by the communication connection, setting is unlocked and is delayed, downloading user list, extracts record of unlocking, reading With modification configuration information and report hardware fault.
In one particular embodiment of the present invention, each computer can be carried out with the main control module of multiple key safeguard boxes Communication connection.As shown in figure 12, computer operation carries out wireless communication company with multiple key safeguard boxes in TCP Client mode It connects, each key safeguard box can work in TCP Server mode.As shown in figure 13, computer and each key safeguard box Communication process can include:
1, client link is established.TCP Client link is initiated from computer to key safeguard box, if linked successfully, Then entry communication process, if link failure, key safeguard box are in off-line state, can not be communicated.
2, it communicates.Communication command is sent to key safeguard box from computer and is awaited a response;Key safeguard box receives order Operation is executed afterwards, responds computer.In communication process, waiting-timeout 500mS, number of retries 2 times, such as key safeguard box Without response, 2 communications are reattempted, if illustrating that key safeguard box is in off-line state or hardware fault still without response.
3, client link is disconnected.The instruction for stopping TCP Client and linking is sent from computer to key safeguard box, and It is responded by key safeguard box to confirm and disconnect.
In one embodiment of the invention, the data frame format transmitted between computer and key safeguard box is as follows:
STX Addr Cmd Len Data ChkSum ETX
1Byte 1Byte 1Byte 2Byte(N) N Byte 1Byte 1Byte
STX: start-of-frame is fixed as 0xBF;
Addr: key safeguard box address is fixed as 0x01;
Cmd: command code
The 0x01 calibration system time
0x02 setting, which is opened the door, to be delayed
0x03 downloads user list
0x13 extracts user list
0x14 extracts record information
0x11 reads system time
0x15 reads configuration information
0x05 restores factory configuration (only broadcast address is effective)
0x06 modifies configuration information
0xFA order mistake
0xFB hardware fault
Len: data length, 2 bytes, most-significant byte is preceding;
Data: data information;
ChkSum: single byte verification and verification range Addr, Cmd, Len, Data;
ETX: frame end symbol is fixed as 0xE7.
The format of every byte are as follows:
0 D0 D1 D2 D3 D4 D5 D6 D7 1
Each byte is 10 data: 1 start bit is fixed as 0;8 data bit, lowest order are first sent;No parity check position; 1 stop position, is fixed as 1.
In one particular embodiment of the present invention, the communication process of each function is as follows:
1, the calibration system time
Computer → key safeguard box:
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0x01 0x00 0x08 8Byte ChkSum 0xE7
Computer sending alignment system time order, waits the response of key safeguard box.If not receiving at the appointed time The response of key safeguard box, then retransmit.Retransmit full 2 times then Communications failures.
Data be 8 byte 8421BCD code times, byte order: when system, year, month, day, week, when, minute, second.
Such as: 00 11 08 26 05 21 34 55 indicate 24 when systems, and 34 divide 55 seconds when 11 on Augusts, 26, Friday 21;
For another example: 01 11 08 26 05 09 34 55 12 when systems of expression, 26, Friday PM of 11 on Augusts 9:34:55 (under Noon);
For another example: 11 11 08 26 05 09 34 55 12 when systems of expression, 26, Friday AM of 11 on Augusts 9:34:55 (on Noon).
Key safeguard box → computer:
After key safeguard box receives the order of calibration system time, write RTC operation, after return to above-mentioned data frame To computer.
If key safeguard box receive mistake order (command code mistake, error in data), return command mistake,
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0xFA 0x00 0x00 ChkSum 0xE7
If writing RTC failure, hardware error (RTC operating mistake) is returned,
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0xFB 0x00 0x01 0x02 ChkSum 0xE7
The area Data is fault code: 0x01-E2prom operating mistake 0x02-RTC (real-time clock) operating mistake.
2, setting, which is unlocked, is delayed
Computer → key safeguard box:
Computer hair setting unlocking delay command, waits the response of key safeguard box.If not receiving at the appointed time The response of key safeguard box, then retransmit.Retransmit full 2 times then Communications failures.
Data be 1 byte unlocking action delay time, 5~60, unit: second.Such as it is set as 10 seconds, then data are 0x0A.
Key safeguard box → computer:
After key safeguard box receives setting unlocking delay command, write E2prom operation, after return to above-mentioned number According to frame to computer.
If key safeguard box receive mistake order (command code mistake, error in data), return command mistake,
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0xFA 0x00 0x00 ChkSum 0xE7
If writing E2prom failure, hardware error (E2prom operating mistake) is returned,
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0xFB 0x00 0x01 0x01 ChkSum 0xE7
The area Data is fault code:0x01-E2prom operating mistake0x02-RTC (real-time clock) operating mistake.
3, user list is downloaded
Computer → key safeguard box:
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0x03 N N Byte ChkSum 0xE7
Computer, which is given, carries user list order, waits the response of key safeguard box.If not receiving at the appointed time The response of key safeguard box, then retransmit.Retransmit full 2 times then Communications failures.
Data is N byte user list, and every 14 byte is 1 user list information, therefore the multiple that N is 14, minimum 14 (0x00 0x0E), 504 (0x01 0xF8) of maximum.I.e. key safeguard box can at most download 36 user lists.
Such as N be 14 when, data information is as follows:
Key safeguard box → computer:
After key safeguard box receives downloading user list order, write E2prom operation, after return to above-mentioned number According to frame to computer.
If key safeguard box receive mistake order (command code mistake, error in data), return command mistake,
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0xFA 0x00 0x00 ChkSum 0xE7
If writing E2prom failure, hardware error (E2prom operating mistake) is returned,
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0xFB 0x00 0x01 0x01 ChkSum 0xE7
The area Data is fault code: 0x01-E2prom operating mistake 0x02-RTC (real-time clock) operating mistake.
4, user list is extracted
Computer → key safeguard box:
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0x13 0x00 0x00 ChkSum 0xE7
Computer hair extracts user list order, waits the response of key safeguard box.If not receiving at the appointed time The response of key safeguard box, then retransmit.Retransmit full 2 times then Communications failures.
Key safeguard box → computer:
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0x13 N N Byte ChkSum 0xE7
After key safeguard box receives extraction user list order, list information is returned.
Data is N byte list information, and every 14 byte is 1 user list information, therefore the multiple that N is 14, minimum 14 (0x00 0x0E), 504 (0x01 0xF8) of maximum [0x00 0x00 indicates no user list].I.e. key safeguard box can at most be deposited Store up 36 user lists.
Such as N be 14 when, data information is as follows:
If key safeguard box receive mistake order (command code mistake, error in data), return command mistake,
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0xFA 0x00 0x00 ChkSum 0xE7
5, record information is extracted
Computer → key safeguard box:
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0x14 0x00 0x00 ChkSum 0xE7
Computer hair extracts record message command, waits the response of key safeguard box.If not receiving at the appointed time The response of key safeguard box, then retransmit.Retransmit full 2 times then Communications failures.
Key safeguard box → computer:
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0x14 N N Byte ChkSum 0xE7
After key safeguard box receives extraction record message command, return recording information.
Data is that N byte records information, and every 20 byte is 1 record information, therefore the multiple that N is 20, minimum 20 (0x000x14), 2000 (0x07 0xD0) of maximum [0x00 0x00 indicates no record information].I.e. key safeguard box can at most be deposited Store up 2000 record information.
Such as N be 20 when, data information is as follows:
If key safeguard box receive mistake order (command code mistake, error in data), return command mistake,
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0xFA 0x00 0x00 ChkSum 0xE7
6, system time is read
Computer → key safeguard box:
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0x11 0x00 0x00 ChkSum 0xE7
Computer hair reads system time order, waits the response of key safeguard box.If not receiving at the appointed time The response of key safeguard box, then retransmit.Retransmit full 2 times then Communications failures.
Key safeguard box → computer:
Key safeguard box receive read system time order after, carry out read RTC operation, after return system time number According to frame to computer.
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0x11 0x00 0x08 8Byte ChkSum 0xE7
Data be 8 byte 8421BCD code times, byte order: when system, year, month, day, week, when, minute, second.
Such as: 00 11 08 26 05 21 34 55 indicate 24 when systems, and 34 divide 55 seconds when 11 on Augusts, 26, Friday 21;
For another example: 01 11 08 26 05 09 34 55 12 when systems of expression, 26, Friday PM of 11 on Augusts 9:34:55 (under Noon);
For another example: 11 11 08 26 05 09 34 55 12 when systems of expression, 26, Friday AM of 11 on Augusts 9:34:55 (on Noon).
If key safeguard box receive mistake order (command code mistake, error in data), return command mistake,
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0xFA 0x00 0x00 ChkSum 0xE7
If reading RTC failure, hardware error (RTC operating mistake) is returned,
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0xFB 0x00 0x01 0x02 ChkSum 0xE7
The area Data is fault code: 0x01-E2Prom operating mistake 0x02-RTC (real-time clock) operating mistake.
7, configuration information is read
Computer → key safeguard box:
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0x15 0x00 0x00 ChkSum 0xE7
Computer hair reads configuration information order, waits the response of key safeguard box.If not receiving at the appointed time The response of key safeguard box, then retransmit.Retransmit full 2 times then Communications failures.
Key safeguard box → computer:
After key safeguard box receives reading configuration information order, reading E is carried out2Prom operation, after return match confidence Data frame is ceased to computer.
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0x15 0x00 0x08 8Byte ChkSum 0xE7
Data is 8 byte configuration information data, specifically be see the table below:
If key safeguard box receive mistake order (command code mistake, error in data), return command mistake,
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0xFA 0x00 0x00 ChkSum 0xE7
If reading E2Prom failure, then return to hardware error (E2Prom operating mistake),
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0xFB 0x00 0x01 0x01 ChkSum 0xE7
The area Data is fault code: 0x01-E2Prom operating mistake 0x02-RTC (real-time clock) operating mistake.
8, restore factory configuration
Computer → key safeguard box: (broadcast address order)
Computer hair restores factory configuration order, without waiting for the response of key safeguard box.Key safeguard box receives extensive After factory's configuration order of appearing again, write E2prom operation, after not return to any data frame to computer.
9, configuration information is modified
Computer → key safeguard box:
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0x06 0x00 0x08 8Byte ChkSum 0xE7
Computer hair modification configuration information order, waits the response of key safeguard box.If not receiving at the appointed time The response of key safeguard box, then retransmit.Retransmit full 2 times then Communications failures.
Data is 8 byte E2Prom information data, specifically see the table below:
Key safeguard box → computer:
After key safeguard box receives modification configuration information order, carry out writing E2Prom operation, after return to above-mentioned number According to frame to computer.
If key safeguard box receive mistake order (command code mistake, error in data), return command mistake,
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0xFA 0x00 0x00 ChkSum 0xE7
If writing E2Prom failure, then return to hardware error (E2Prom operating mistake),
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0xFB 0x00 0x01 0x01 ChkSum 0xE7
The area Data is fault code: 0x01-E2Prom operating mistake 0x02-RTC (real-time clock) operating mistake.
10, hardware fault reports
Key safeguard box can carry out self-test to hardware system after the power-up.If hardware breaks down, in communication each time After order arrives, can all it return " hardware error ".
STX Addr Cmd Len Data ChkSum ETX
0xBF Addr 0xFB 0x00 0x01 0x01 ChkSum 0xE7
The area Data is fault code: 0x01-E2prom operating mistake 0x02-RTC (real-time clock) operating mistake.
The key safeguard box of the embodiment of the present invention, by being communicated with computer, realizing above-mentioned calibration and reading system System time, setting, which are unlocked, to be delayed, downloading user list, extracts record of unlocking, reads and modify configuration information and report hardware The functions such as failure further improve the normalization of key management.
The key safeguard box of corresponding above-mentioned implementation, the present invention also propose a kind of key storage system.
As shown in figure 14, the key storage system of the embodiment of the present invention includes the key safeguard box 100 of above-described embodiment, also Including authorized telephone 200.
Authorized telephone 200 and key safeguard box 100 establish telephone connection, and key safeguard box 100 is in identification authorized telephone Phonetic order can be issued after incoming call to authorized telephone, manager can carry out remote key-press operation by authorized telephone 100.Key is protected Bobbin carriage 100 can operate according to remote key-press and carry out authorization identifying, and acquisition authorization message and sending are awarded after authorization identifying success Power, which authenticates, successfully to be prompted, and by authorization message and verification information after the verification information for getting 100 scene of key safeguard box It is compared, and is unlocked according to the box door lock that comparison result controls key safeguard box 100.
Further, as shown in figure 15, the key storage system of the embodiment of the present invention may also include computer 300.It calculates Machine 300 can be communicatively coupled with key safeguard box 100, and to calibrate and read system time by the communication connection, setting is opened Lock delay, extracts record of unlocking, reads and modify configuration information and report hardware fault downloading user list.
The more specific embodiment of key storage system of the embodiment of the present invention can refer to the correlation of above-mentioned key safeguard box Embodiment, details are not described herein.
Key storage system according to an embodiment of the present invention carries out telephone authorizations certification before key safeguard box is unlocked, and On-site verification is carried out, thereby, it is possible to the keys effectivelying prevent in key safeguard box by mispick, substantially increase key safeguard box The normalization of safety and key management.
Corresponding above-mentioned implementation, the present invention also propose a kind of key storage method.
As shown in figure 16, the key storage method of the embodiment of the present invention, comprising the following steps:
S1, key safeguard box and authorized telephone establish telephone connection, and to authorization electricity after the incoming call of identification authorized telephone Words issue phonetic order.
Firstly, the Field Force at key safeguard box can issue request of unpacking, management to the administrative staff at authorized telephone Personnel can put through key safeguard box by authorized telephone after being connected to request.
S2 is received and is operated using the manager of authorized telephone according to the remote key-press that phonetic order is carried out.
S3 is operated according to remote key-press and is carried out authorization identifying, and obtains authorization message and sending after authorization identifying success Authorization identifying successfully prompts.
Key safeguard box has phonetic function, can issue operation indicating voice to manager, manager can mention according to operation Show that voice inputs licencing key on authorized telephone key, and after password authentification passes through input Field Force work number and award It temporary grows, while key safeguard box issues authorization identifying to Field Force and successfully prompts.
S4 obtains the verification information of Field Force.
Field Force can swipe the card unlocking after receiving authorization identifying and successfully prompting.
Authorization message is compared S5 with verification information, and controls box door lock according to comparison result and unlock.
After Field Force swipes the card, whether the corresponding work number of card ID that key safeguard box can match staff is to authorize before Work number and recorded if it is, control box door lock is unlocked to open chamber door.If it is not, then refusal opens chamber door. Authorization duration, which refers to, within a specified time completes unlocking action of swiping the card, if it exceeds the authorization duration is not swiped the card, then it is subsequent to swipe the card In vain.
The key storage method of the embodiment of the present invention is based on above-mentioned key safeguard box and key storage system is implemented, more specifically Embodiment can refer to above-described embodiment.
Key storage method according to an embodiment of the present invention carries out telephone authorizations certification before unlocking, and the scene of progress is tested Card, thereby, it is possible to the keys effectivelying prevent in key safeguard box by mispick, substantially increase safety and the key of key safeguard box The normalization of spoon management.
In the description of the present invention, the meaning of " plurality " is two or more, unless otherwise specifically defined.
In the present invention unless specifically defined or limited otherwise, term " installation ", " connected ", " connection ", " fixation " etc. Term shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or integral;It can be mechanical connect It connects, is also possible to be electrically connected;It can be directly connected, can also can be in two elements indirectly connected through an intermediary The interaction relationship of the connection in portion or two elements.It for the ordinary skill in the art, can be according to specific feelings Condition understands the concrete meaning of above-mentioned term in the present invention.
In the present invention unless specifically defined or limited otherwise, fisrt feature in the second feature " on " or " down " can be with It is that the first and second features directly contact or the first and second features pass through intermediary mediate contact.Moreover, fisrt feature exists Second feature " on ", " top " and " above " but fisrt feature be directly above or diagonally above the second feature, or be merely representative of First feature horizontal height is higher than second feature.Fisrt feature can be under the second feature " below ", " below " and " below " One feature is directly under or diagonally below the second feature, or is merely representative of first feature horizontal height less than second feature.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding And modification, the scope of the present invention is defined by the appended.

Claims (10)

1. a kind of key safeguard box characterized by comprising
Cabinet, the cabinet include box door lock;
Phone module, the phone module are used to establish connection with authorized telephone, and after the incoming call for identifying the authorized telephone Phonetic order is issued to the authorized telephone, and receives the manager using the authorized telephone according to the phonetic order institute The remote key-press of progress operates;
On-site verification module, the on-site verification module are used to obtain the verification information of Field Force;
Main control module, the main control module are connected with the phone module, the on-site verification module and the box door lock respectively, The main control module, which is used to be operated according to the remote key-press, carries out authorization identifying, and authorization letter is obtained after authorization identifying success Breath and sending authorization identifying successfully prompt, and by the authorization after the on-site verification module gets the verification information Information is compared with the verification information, and controls the box door lock according to comparison result and unlock.
2. key safeguard box according to claim 1, which is characterized in that the main control module is also used to carry out with computer System time is calibrated and read to communication connection to pass through the communication connection, setting is unlocked and is delayed, downloading user list, extracts It unlocks and records, reads and modify configuration information and report hardware fault.
3. key safeguard box according to claim 1 or 2, which is characterized in that the on-site verification module is card reader mould Block, the card reader module are used to read the information of the IC card when the IC card of the Field Force is in predeterminated position, and Using the information of the IC card as the verification information.
4. key safeguard box according to claim 3, which is characterized in that the authorization message includes the Field Force Work number and authorization duration, the information of the IC card includes the ID of the IC card, wherein issues authorization identifying in the main control module In authorization duration after success prompt, if the card reader module reads the ID of the IC card, the main control module is sentenced Whether the ID for the IC card of breaking matches with the work number of the Field Force, if matched, controls the box door lock and unlocks.
5. key safeguard box according to claim 1, which is characterized in that the phone module include ring detection unit, Circuit for answering, DTMF detection unit, voice playing unit, relay output unit and microprocessor.
6. key safeguard box according to claim 3, which is characterized in that the card reader module includes single-chip microcontroller and card reading Chip.
7. key safeguard box according to claim 3, which is characterized in that the main control module includes microprocessing unit, number According to storage unit, Ethernet interface unit, real time clock unit, USB flash disk interface unit, box door lock interface unit and state instruction list Member.
8. a kind of key storage system, which is characterized in that including key safeguard box described according to claim 1 any one of -7 And authorized telephone.
9. key storage system according to claim 8, which is characterized in that further include computer.
10. a kind of key storage method characterized by comprising
Key safeguard box and authorized telephone establish telephone connection, and to the authorization electricity after the incoming call for identifying the authorized telephone Words issue phonetic order;
It receives and is operated using the manager of the authorized telephone according to the remote key-press that the phonetic order is carried out;
It is operated according to the remote key-press and carries out authorization identifying, and obtained authorization message after authorization identifying success and issue authorization It authenticates and successfully prompts;
Obtain the verification information of Field Force;
The authorization message is compared with the verification information, and the box door lock is controlled according to comparison result and is unlocked.
CN201910219680.9A 2019-03-22 2019-03-22 Key safeguard box, key storage system and method Pending CN109920117A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910219680.9A CN109920117A (en) 2019-03-22 2019-03-22 Key safeguard box, key storage system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910219680.9A CN109920117A (en) 2019-03-22 2019-03-22 Key safeguard box, key storage system and method

Publications (1)

Publication Number Publication Date
CN109920117A true CN109920117A (en) 2019-06-21

Family

ID=66966215

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910219680.9A Pending CN109920117A (en) 2019-03-22 2019-03-22 Key safeguard box, key storage system and method

Country Status (1)

Country Link
CN (1) CN109920117A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111080859A (en) * 2019-12-30 2020-04-28 西安众恒科技有限公司 Reverse charging intelligent door lock unlocking system and method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201043405Y (en) * 2006-12-11 2008-04-02 张七利 Firearm cabinet for police
CN203422780U (en) * 2013-09-04 2014-02-05 焦国湘 IC (Integrated Circuit) card and GSM (Global System for Mobile Communications) remote control door lock
CN203433572U (en) * 2013-09-06 2014-02-12 李成 Access wireless control equipment for manhole covers in city pipe network and outdoor equipment
CN203732971U (en) * 2014-03-03 2014-07-23 广州思泰信息技术有限公司 System for monitoring outdoor machine rooms and outdoor equipment cabinets of electric power system
CN105321237A (en) * 2014-08-05 2016-02-10 艾默生网络能源有限公司 Management method and system for door control of cabinet
KR20180134547A (en) * 2017-06-09 2018-12-19 한국산업기술대학교산학협력단 Method of controlling smart storage box and apparatuses performing the same

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201043405Y (en) * 2006-12-11 2008-04-02 张七利 Firearm cabinet for police
CN203422780U (en) * 2013-09-04 2014-02-05 焦国湘 IC (Integrated Circuit) card and GSM (Global System for Mobile Communications) remote control door lock
CN203433572U (en) * 2013-09-06 2014-02-12 李成 Access wireless control equipment for manhole covers in city pipe network and outdoor equipment
CN203732971U (en) * 2014-03-03 2014-07-23 广州思泰信息技术有限公司 System for monitoring outdoor machine rooms and outdoor equipment cabinets of electric power system
CN105321237A (en) * 2014-08-05 2016-02-10 艾默生网络能源有限公司 Management method and system for door control of cabinet
KR20180134547A (en) * 2017-06-09 2018-12-19 한국산업기술대학교산학협력단 Method of controlling smart storage box and apparatuses performing the same

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
韩露: "基于RFID技术的变电站智能钥匙设计", 《中国优秀硕士学位论文全文数据库 工程科技Ⅱ辑》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111080859A (en) * 2019-12-30 2020-04-28 西安众恒科技有限公司 Reverse charging intelligent door lock unlocking system and method

Similar Documents

Publication Publication Date Title
CN201311672Y (en) Storage cabinet system
CN103117853B (en) A kind of safe storage device account input and authentication method
CN103116720A (en) Universal serial bus (USB) Key device and account management method and authentication application method thereof
CN109934366A (en) House renting management method, system and server based on wireless network
CN105735826B (en) Intelligent key management box system
CN105225317A (en) A kind of network access control system of multichannel centralized management
CN109754513A (en) A kind of long-range access control system of multi-client based on recognition of face
CN103729925A (en) Intelligent automatic door management system
CN106887064A (en) A kind of access controller and gate control system based on dynamic password
CN107492173A (en) A kind of cloud password access control system and method
CN109191637A (en) A kind of transformer substation key intelligent management case
CN106780922A (en) A kind of intelligent access control system
CN201974866U (en) Card-camera access control device
CN202584252U (en) Access control system based on second-generation resident identification cards
CN109920117A (en) Key safeguard box, key storage system and method
CN206515937U (en) A kind of intelligent access control system
CN103226856B (en) Multi-identification based security system
CN202380832U (en) Intelligent door control system
CN207004232U (en) A kind of optical coded lock
CN102033516A (en) Wireless intelligent management monitoring system
CN210895580U (en) Mobile terminal dynamic modification intelligent door lock password
CN109754507B (en) Door lock control method, device and system
CN107558818A (en) One kind can network intelligent door lock and its method of work
CN203422780U (en) IC (Integrated Circuit) card and GSM (Global System for Mobile Communications) remote control door lock
CN106548557A (en) Low-power consumption Internet of Things gate inhibition based on NFC and its lift a ban method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190621