CN110610564A - Key management device, key management method, key management system, and readable storage medium - Google Patents

Key management device, key management method, key management system, and readable storage medium Download PDF

Info

Publication number
CN110610564A
CN110610564A CN201910742831.9A CN201910742831A CN110610564A CN 110610564 A CN110610564 A CN 110610564A CN 201910742831 A CN201910742831 A CN 201910742831A CN 110610564 A CN110610564 A CN 110610564A
Authority
CN
China
Prior art keywords
key
information
verification information
locking mechanism
key management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910742831.9A
Other languages
Chinese (zh)
Inventor
李保福
杨绍华
陈华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Unitech Power Technology Co Ltd
Original Assignee
Zhuhai Youte IoT Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Youte IoT Technology Co Ltd filed Critical Zhuhai Youte IoT Technology Co Ltd
Priority to CN201910742831.9A priority Critical patent/CN110610564A/en
Publication of CN110610564A publication Critical patent/CN110610564A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application provides a key management device, a key management method, a key management system and a readable storage medium, and relates to the technical field of logistics storage and keeping. The key management device comprises a locking mechanism, a control module, a first acquisition module and a second acquisition module. The locking mechanism is used for locking a key inserted into the locking mechanism; the first acquisition module is used for acquiring key identity information preset in the key from the key when the locking mechanism locks the key; the second acquisition module is used for acquiring first verification information input by a user; the control module is used for controlling the locking mechanism to unlock the key when second verification information corresponding to the key identity information is matched with the first verification information, so that the safety of key access can be improved, and potential safety hazards existing in the process of mailing or registering the key can be reduced.

Description

Key management device, key management method, key management system, and readable storage medium
Technical Field
The invention relates to the technical field of logistics storage and keeping, in particular to a key management device, a key management method, a key management system and a readable storage medium.
Background
In the field of logistics storage and storage, articles are generally stored in a storage cabinet, and a door of the storage cabinet needs to be opened and closed in the process of storing and taking the articles. For the articles with high requirements on the safety of storage, in the logistics transportation process, the articles need to be directly handed over by multiple persons, so that the safety of logistics storage of the articles is poor. For example, a key usually belongs to an article with high safety requirements on storage, when the key needs to be mailed or deposited, a plurality of persons need to take the key directly, and there is a risk that the person configures the same key as the mailed key during taking the key, so that potential safety hazards exist during mailing or depositing the key.
Disclosure of Invention
The application provides a key management device, a key management method, a key management system and a readable storage medium, which can reduce potential safety hazards existing in the process of mailing or registering keys.
In order to achieve the above purpose, the technical solutions provided in the embodiments of the present application are as follows:
in a first aspect, an embodiment of the present application provides a key management device, including: the device comprises a locking mechanism, a control module, a first acquisition module and a second acquisition module; the locking mechanism is used for locking a key inserted into the locking mechanism; the first acquisition module is used for acquiring key identity information preset in the key from the key when the locking mechanism locks the key; the second acquisition module is used for acquiring first verification information input by a user; the control module is used for controlling the locking mechanism to unlock the key when second verification information corresponding to the key identity information is matched with the first verification information.
In the above embodiment, the key is locked by the locking mechanism, and when the key is taken out, the first verification information input by the user is matched with the second verification information corresponding to the key identification information, so that the security of key access can be improved, and the potential safety hazard existing in the key mailing or depositing process can be reduced.
With reference to the first aspect, in some optional embodiments, the key management device further comprises a communication module; the communication module is used for sending the key identity information to a server and obtaining the second verification information according to the key identity information by the server.
In the above-described embodiment, the server acquires the second verification information based on the key identification information, which contributes to reducing the amount of computation of the key management device, so that the key management device does not need to have a high-performance computation processing capability, and is advantageous to reducing the manufacturing cost of the key management device.
With reference to the first aspect, in some optional embodiments, the communication module is further configured to receive the second verification information sent by the server after sending the key identification information to the server; the control module is used for matching the first verification information with the second verification information and controlling the locking mechanism to unlock the key when the first verification information is matched with the second verification information.
In the above embodiment, the key management device may match the first authentication information and the second authentication information via the control module, and may not need the server to match the first authentication information and the second authentication information, which may help to reduce processing pressure of the server. In addition, the key management device can still normally operate after the server is offline, thereby being beneficial to improving the reliability of the operation of the key management device.
With reference to the first aspect, in some optional implementations, the key management device further includes a communication module, where the communication module is configured to send the first verification information to a server, where the server matches the first verification information with the second verification information, and send an unlocking instruction for unlocking the key to the key management device when the first verification information matches the second verification information; the control module is used for controlling the locking mechanism to unlock the key according to the unlocking instruction.
In the above embodiment, the first authentication information and the second authentication information are matched by the server, which contributes to reducing the processing pressure of the key management device.
With reference to the first aspect, in some optional embodiments, the control module is further configured to control the communication module to send a prompt message to a user terminal corresponding to the key identity information when the key is locked by the locking mechanism or when the locking mechanism unlocks the key.
In the above embodiment, by sending the prompt message to the user terminal, the user can conveniently grasp the locking state of the key in time through the prompt message.
With reference to the first aspect, in some optional embodiments, the key management device further comprises a communication module; the communication module is used for acquiring the second verification information according to the key identity information; the control module is used for matching the first verification information with the second verification information and controlling the locking mechanism to unlock the key when the first verification information is matched with the second verification information.
In the above embodiment, the key management apparatus may directly acquire the second verification information and match the first verification information and the second verification information, and may not need a server to participate. In addition, the key management device can still normally operate after the server is offline, thereby being beneficial to improving the reliability of the operation of the key management device.
With reference to the first aspect, in some optional embodiments, the first acquisition module includes at least one signal probe, the locking mechanism includes a card slot for inserting the key, the signal probe is disposed in the card slot, the key includes a chip for storing key identity information and at least one signal contact connected to the chip, and the at least one signal probe is configured to contact the at least one signal contact to form a communication loop for the first acquisition module to acquire the key identity information pre-stored in the chip.
In the above embodiment, for a key which needs to be electrically connected with the signal contact of the key to read the key identity information, the signal probe in the first acquisition module is in contact with the signal contact to form a communication loop, so that the key identity information in the key can be acquired.
With reference to the first aspect, in some alternative embodiments, the key includes insections, and the locking mechanism includes an electromagnetic assembly for retaining the insections to lock the key.
In the above embodiment, the electromagnetic assembly cooperates with the insections to lock and unlock the key. The electromagnetic assembly can lock the key by clamping the insection, and the key is unlocked by releasing the clamping of the insection.
With reference to the first aspect, in some optional embodiments, the first verification information includes at least one of biometric information, identity information, and a verification code of the user.
In the above embodiment, at least one of the biometric information, the identification information, and the verification code of the user may be used as the verification information for verifying whether the user has the right to access the key, which contributes to improving the security of accessing the key.
In a second aspect, an embodiment of the present application further provides a key management method, where the method includes:
when a locking mechanism locks a key inserted into the locking mechanism, acquiring key identity information preset in the key from the key;
acquiring first verification information input by a user;
and when second verification information corresponding to the key identity information is matched with the first verification information, controlling the locking mechanism to unlock the key.
With reference to the second aspect, in some optional embodiments, before obtaining the first verification information input by the user, the method further includes:
and sending the key identity information to a server, wherein the server is used for acquiring the second verification information according to the key identity information.
With reference to the second aspect, in some optional embodiments, when second verification information corresponding to the key identification information matches the first verification information, controlling the locking mechanism to unlock the key includes:
sending the first verification information to a server, wherein the server is used for matching the first verification information with the second verification information, and sending an unlocking instruction for unlocking the key to the key management device when the first verification information is matched with the second verification information;
and when the unlocking instruction sent by the server is received, controlling the locking mechanism to unlock the key according to the unlocking instruction.
In combination with the second aspect, in some alternative embodiments, the method further comprises:
after the key identity information is sent to the server, receiving the second verification information sent by the server;
the controlling the locking mechanism to unlock the key when the second verification information corresponding to the key identification information matches the first verification information includes:
matching the first authentication information with the second authentication information;
and controlling the locking mechanism to unlock the key when the first authentication information matches the second authentication information.
In combination with the second aspect, in some alternative embodiments, the method further comprises:
and sending prompt information to a user terminal corresponding to the key identity information when the key is locked by the locking mechanism or when the locking mechanism releases the locking of the key.
With reference to the second aspect, in some optional embodiments, after obtaining the key identification information preset in the key from the key, the method further includes:
acquiring the second verification information according to the key identity information;
the controlling the locking mechanism to unlock the key when the second verification information corresponding to the key identification information matches the first verification information includes:
matching the first verification information with the second verification information;
and controlling the locking mechanism to unlock the key when the first authentication information matches the second authentication information.
In a third aspect, an embodiment of the present application further provides a key management system, where the key management system includes a server and the key management device.
In a fourth aspect, the present application further provides a computer-readable storage medium, in which a computer program is stored, and when the computer program runs on a computer, the computer is caused to execute the above method.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments will be briefly described below. It is appreciated that the following drawings depict only certain embodiments of the application and are therefore not to be considered limiting of its scope, for those skilled in the art will be able to derive additional related drawings therefrom without the benefit of the inventive faculty.
Fig. 1 is a schematic structural diagram of a key management system according to an embodiment of the present application.
Fig. 2 is a functional block diagram of a key management device according to an embodiment of the present application.
Fig. 3 is a schematic structural diagram of a key management device and a key according to an embodiment of the present application.
Fig. 4 is a flowchart illustrating a key management method according to an embodiment of the present application.
Icon: 10-a key management system; 20-a key management device; 21-a locking mechanism; 22-a control module; 23-a first acquisition module; 24-a second acquisition module; 25-a communication module; 26-a storage module; 27-a card slot; 28-a signaling probe; 30-a server; 40-a user terminal; 50-a key; 51-a signal contact; 52-insection.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. It should be noted that the terms "first," "second," and the like are used merely to distinguish one description from another, and are not intended to indicate or imply relative importance.
Referring to fig. 1, an embodiment of the present application provides a key management system 10, which can be used for managing access to a key to improve security and reliability of the key access. The key management system 10 may include a key management device 20 and a server 30. The key management device 20 establishes a communication connection with the server 30 through a network to perform data interaction. The key management device 20 and the server 30 may also establish a communication connection with the user terminal 40 through a network to perform data interaction. The key may be a key of a mechanical lock or a key of an electronic lock, where the type of the key is not particularly limited, and the key identification information may refer to an identification number (ID) of the key and may be set according to an actual situation. For example, the IDs of the keys capable of unlocking the same lock are the same, and the IDs of the keys of different locks are different; alternatively, the ID of each key is different.
Understandably, the user terminal 40 may be a component device in the key management system 10, or may be a device independent of the key management system 10.
The server 30 may be, but is not limited to, a cloud server, a distributed server, a cluster server, and the like.
The user terminal 40 may be, but is not limited to, a smart phone, a Personal Computer (PC), a tablet PC, a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), and the like. The network may be, but is not limited to, a wired network or a wireless network.
Referring to fig. 2 and 3 in combination, the key management apparatus 20 according to the embodiment of the present application may be used to execute or implement the following steps of the key management method. The key management device 20 may include a locking mechanism 21, a control module 22, a first acquisition module 23, and a second acquisition module 24.
The lock mechanism 21 is used to lock a key 50 inserted into the lock mechanism 21. The first acquisition module 23 is configured to acquire key identity information preset in the key 50 from the key 50 when the locking mechanism 21 locks the key 50; the second acquisition module 24 is configured to acquire first verification information input by a user; the control module 22 is configured to control the locking mechanism 21 to unlock the key 50 when the second verification information corresponding to the key identification information matches the first verification information.
In the above embodiment, the lock mechanism 21 locks the key 50 that needs to be locked, and when the key 50 needs to be removed, the lock mechanism 21 unlocks the key 50 based on the fact that the first authentication information input by the user matches the second authentication information corresponding to the key identification information, and when the first authentication information matches the second authentication information, it indicates that the user has the right to remove the key 50. If the first authentication information does not match the second authentication information, the locking mechanism 21 continues to lock the key 50, so that the key 50 cannot be easily removed by the user.
Based on this, the key 50 is locked by the locking mechanism 21, and the whole key 50 does not need to be placed in the storage compartment of the storage cabinet, which facilitates the miniaturization design of the key management device 20 (if the key 50 is placed in the storage cabinet, the storage cabinet usually comprises a plurality of storage compartments, the existing storage method usually places the key 50 of one user in a single storage compartment, and the volume occupied by the key 50 itself is small, so that the space of the storage compartment cannot be fully utilized, and if the number of users of the stored key is large, a plurality of storage compartments are required, so that the design volume of the storage cabinet needs to be large enough). Further, by verifying the first verification information of the user, the security of the operation of taking out the key 50 can be improved, and it is possible to prevent the user who does not have the authority from taking out the key 50.
Since the distributor who transports the key management device 20 does not normally have the authority to take out the key 50, the distributor cannot take out the key 50 from the key management device 20. Understandably, the key 50 is inserted into the key management device 20 immediately after the key 50 is prepared at the preparation site, and the distributor does not have the right to take out the key, and only the authorized user can take out the key, so as to improve the safety of the key 50 in storage or mail transportation.
If an unauthorized user can take out the key 50, there is a risk that the key 50 is used to arrange the same key 50 as the key 50. In contrast, in the embodiment of the present application, after the key 50 is locked, the user having authority (i.e., the user having the first authentication information matching the second authentication information) can take out the key 50 from the lock mechanism 21, and the problem that the key 50 is held by another user and the risk of keeping the key 50 is increased can be solved.
Referring to fig. 3 again, as an alternative embodiment, the first collection module 23 includes at least one signal probe 28, the locking mechanism 21 includes a card slot 27 for inserting the key 50, the signal probe 28 is disposed in the card slot 27, the key 50 includes a chip for storing key identification information and at least one signal contact 51 connected to the chip, and the at least one signal probe 28 is used for contacting with the at least one signal contact 51 to form a communication loop for the first collection module 23 to collect the key identification information pre-stored in the chip.
In the present embodiment, the number of the signal probes 28 and the signal contacts 51 may be one or more. For example, the number of the signal probes 28 and the number of the signal contacts 51 are both one, and the body of the key 50 can be used as a signal contact alone and can be connected with the control module 22. That is, a signal probe 28 is in contact with a signal contact 51, and the body of the key 50 can be connected to the control module 22, thereby forming a communication loop.
For another example, the number of the signal probes 28 and the number of the signal contacts 51 are both two, and the two signal probes 28 may be connected to the control module 22, so that the control module 22 reads the key identification information stored in the chip of the key 50. When reading data in the key 50, the two signal probes 28 are in contact with (or electrically connected to) the two signal contacts 51, respectively, thereby forming a communication loop.
In this embodiment, the first acquisition module 23 may include a reader connected to at least one signal probe 28, and the reader may form a communication loop with a chip in the key 50 through the signal probe 28, so as to read the key identification information stored in the chip.
The key 50 may be inserted into the lock mechanism 21 through the card slot 27 and then the key 50 is locked by the lock mechanism 21. When the key 50 is locked, the at least one signal probe 28 contacts the at least one signal contact 51 in the key 50, forming the communication loop described above.
The chip in the key 50 may be a chip with stored data, and may be, but is not limited to, a memory card, an electronic tag chip, and the like. The chip may be factory set for the key 50.
As an alternative embodiment, the key 50 includes serrations 52 and the locking mechanism 21 includes a solenoid assembly for capturing the serrations 52 to lock the key 50. The electromagnetic assembly may include a probe for engaging the insection 52, the probe being inserted into a groove of the insection 52 when the key 50 is to be locked (or into a groove of the insection 52 when the key 50 is inserted into the slot 27), the key 50 being held after the probe is inserted into the groove of the insection 52, and the key 50 being not easily removable. Understandably, the probe can be moved by electromagnetic force after the coil in the electromagnetic assembly is energized, so that the probe can be inserted into the groove of the insection 52 to achieve locking, or the probe in the groove of the insection 52 can be removed to release the locking.
The insection 52 may be provided when the key 50 is shipped from the factory, or may be insection 52 provided after the key 50 is shipped from the factory without affecting the normal unlocking of the key 50. For example, the insections (which may also be referred to as the teeth of the key 50) are made at the time of dispensing the dispensing dots. Understandably, when the key 50 is used for unlocking, the mechanical unlocking corresponding to the tooth form of the tooth is realized, the electronic unlocking read by the probe is realized, and the corresponding door lock can be unlocked only after the double-authentication unlocking is realized. The number of the insections 52 and the shape of the insections 52 can be set according to actual conditions, and the number of the probes can be one or more, and can be set according to actual conditions.
Of course, in other embodiments, the locking mechanism 21 may lock the key 50 by other structures or other means, for example, the locking mechanism 21 may clamp the key 50 by a clamping member to lock the key 50.
In this embodiment, the second collecting module 24 may be at least one of a biometric collecting unit, a card reader, and an input unit. The biometric acquisition unit can be used for acquiring biometric information of the user. The biometric information includes, but is not limited to, fingerprint information, portrait, and the like. For example, the biometric acquisition unit may be a camera for acquiring a portrait of the user. The biological characteristic acquisition unit can be a fingerprint acquirer for acquiring fingerprint information of the user.
The card reader may be a reader for reading identity information of a user. For example, if the identity information is the identity card number of the user, the card reader may read the identity card of the user to obtain the identity card number of the user, which is used as the identity information of the user. Of course, the identity information may also be other information representing the unique identity of the user, for example, the card carrying the user identity information may be an electronic tag card (the unique identity information of the user may be stored in the electronic tag card), and the card reader may read the identity information of the user from the electronic tag card.
The input unit may be, but is not limited to, a numeric keypad, a touch display screen, and the like, and may be used for a user to input verification information such as a verification code for retrieving the key 50, identity information, and the like.
Understandably, the second verification information includes at least one of biometric information, identity information of the first user, which is previously entered, or the second verification information is a first verification code, wherein the first verification code may be a number or a character associated with the key identity information of the key 50, which is generated when the key 50 is locked. The first verification information corresponds to the second verification information and includes at least one of biometric information and identity information of the second user, or the second verification information is a second verification code, and the second verification code is a number or a character received by the user terminal 40 and used for accessing the key 50.
The first user and the second user may be the same user or different users. In general, when the first user and the second user are not the same user at the time of authentication using biometric information, the second user cannot access the key 50 of the first user from the key management device 20.
In the case of authentication using the identification information or the authentication code, if the second user has the identification information or the authentication code for obtaining the key of the first user, the key 50 can be obtained from the key management device 20 by using the identification information or the authentication code even if the second user is not the same user as the first user. Based on this, it is convenient for the first user to grant others access to the key 50, so that others can access the first user's key 50 with the first user's authorization.
As an alternative embodiment, the key management device 20 may further include a communication module 25. The communication module 25 is configured to send the key identity information to the server 30, and the server 30 obtains the second verification information according to the key identity information.
If the second verification information is a verification code, the server 30 may send the second verification information to the user terminal 40 corresponding to the key identification information, so that the user can access the key 50 through the verification code of the user terminal 40.
If the second verification information is not a verification code, for example, the second verification information is an identity information of a user, such as an identity number, a face image, or a fingerprint, the server 30 may send the second verification information to the key management device 20, so that the key management device 20 verifies the first verification information and the second verification information. Alternatively, the server 20 itself authenticates the first authentication information and the second authentication information.
For example, the communication module 25 may transmit the collected key identification information of the key 50 to the server 30. The server 30 may generate second authentication information associated with the key identification information from the key identification information. Alternatively, the server 30 may store the second verification information corresponding to the key identification information in advance, and when the server 30 receives the key identification information of the key 50, the second verification information corresponding to the key identification information may be searched for from the server 30 based on the key identification information.
After acquiring the second verification information, the server 30 may send the second verification information (e.g., a verification code) to the user terminal 40 corresponding to the key identification information. Understandably, the user terminal 40 corresponding to the key identity information is generally the user terminal 40 of the user needing to obtain the key 50, and the user terminal 40 may perform identity binding according to actual conditions, so that the user needing to obtain the key 50 can obtain the second verification information or other information from the user terminal 40, and the user can conveniently obtain the key 50.
In the above embodiment, the server 30 acquires the second verification information based on the key identification information, which helps to reduce the amount of computation of the key management device 20, so that the key management device 20 does not need to have a high-speed computation processing capability, thereby being beneficial to reducing the manufacturing cost of the key management device 20, and in addition, the key management device 20 can still normally operate after the server 30 is offline, thereby being beneficial to improving the reliability of the operation of the key management device 20. .
As an optional implementation manner, the communication module 25 is further configured to receive the second verification information sent by the server 30 after the key identity information is sent to the server 30; the control module 22 is configured to match the first authentication information with the second authentication information, and control the locking mechanism 21 to unlock the key 50 when the first authentication information matches the second authentication information.
In this embodiment, after acquiring the second verification information, the server 30 may send the second verification information to the key management device 20, the key management device 20 may match the second verification information received from the server 30 with the first verification information input by the user acquired by the second acquisition module 24 through the control module 22, and if the first verification information is the same as the second verification information, it may be considered that the first verification information matches the second verification information, and at this time, it indicates that the user has the authority to acquire the key 50, and the control module 22 may control the locking mechanism 21 to unlock the key 50. After the lock of the key 50 is released, the user can easily remove the key 50.
It should be noted that one or more locking mechanisms 21 may be included in the key management device 20, and each locking mechanism 21 may be used to lock a key 50. When there are a plurality of lock mechanisms 21, each lock mechanism 21 may be provided with a unique number in the same key management device 20. When the key 50 is locked in the lock mechanism 21, the control module 22 may associate or bind the number of the lock mechanism 21 with the read key identification information of the key 50, and when the user needs to take out the target key 50 from a plurality of lock mechanisms 21, the control module 22 may match the second verification information based on the first verification information input by the user, and the second verification information is previously associated with the key identification information of the key 50. Therefore, the key identification information of the target key 50 to be obtained can be acquired by the first authentication information. At this time, the control module 22 may control the lock mechanism 21 corresponding to the number associated with the key identification information based on the key identification information of the target key 50 to unlock the key 50. The key 50 in the locking mechanism 21 is the target key 50 that the user needs to take.
In the above embodiment, the server 30 is not required to perform matching processing on the first authentication information and the second authentication information, which contributes to reducing the processing pressure of the server 30.
As an alternative embodiment, the communication module 25 is configured to send the first verification information to the server 30, where the server 30 matches the first verification information with the second verification information, and send an unlocking instruction for unlocking the key 50 to the key management device 20 when the first verification information matches the second verification information; the control module 22 is used for controlling the locking mechanism 21 to unlock the key 50 according to an unlocking instruction.
In this embodiment, after acquiring the second verification information corresponding to the key identification information, the server 30 may match the second verification information with the first verification information input by the user, and if the second verification information matches the first verification information, send an unlocking instruction to the key management device 20, where the unlocking instruction may include an identification of the key management device 20 in which the key 50 that needs to be unlocked is located and a number of the locking mechanism 21 in which the key 50 is located.
After receiving the unlocking instruction, the key management device 20 may analyze the unlocking instruction to obtain the identification of the key management device 20 and the number of the locking mechanism 21 in the unlocking instruction. If the id is the same as the id of the key management device 20 that received the command, the control module 22 controls the locking mechanism 21 corresponding to the number in the unlocking command to unlock. If the id is different from the id of the key management device 20 receiving the command, the locking mechanism 21 continues to lock the key 50.
Based on this, the key management system 10 can accurately unlock the target key 50 and avoid unlocking another key. Wherein other keys are understood to not be keys 50 that the current user needs to take.
As an alternative embodiment, the communication module 25 is configured to obtain the second verification information according to the key identity information; the control module 22 is configured to match the first authentication information with the second authentication information, and control the locking mechanism 21 to unlock the key 50 when the first authentication information matches the second authentication information.
In the present embodiment, the processing operations of acquiring the second authentication information corresponding to the key identification information and the first authentication information and the second authentication information may be both performed by the key management device 20, and the server 30 may not be required to participate in the processing operations.
Understandably, the key management device 20 may store second authentication information corresponding to the key identification information in advance, and the manner in which the key management device 20 acquires the second authentication information is the same as or similar to the manner in which the server 30 acquires the second authentication information. The way in which the key management device 20 matches the first verification information and the second verification information is the same as or similar to the way in which the server 30 matches the first verification information and the second verification information, and is not described here again.
As an alternative embodiment, the control module 22 is further configured to control the communication module 25 to send the prompt message to the user terminal 40 corresponding to the key identification information when the key 50 is locked by the locking mechanism 21 or when the locking mechanism 21 unlocks the key 50.
In the present embodiment, the control module 22 in the key management device 20 may control the communication module 25 to transmit a prompt indicating that the key 50 is locked to the user terminal 40 when the key 50 is locked, so that the user can confirm that the key 50 is locked according to the prompt. In addition, after determining that the key 50 is unlocked, the control module 22 may control the communication module 25 to send a prompt indicating that the key 50 is unlocked to the user terminal 40, based on which, if the key 50 is removed by another person, the user can know that the key 50 is removed through the prompt, so that the user can conveniently know the locking state of the key 50 in time according to the prompt.
As an alternative embodiment, the key management device 20 may further include a vibration detection module, and the vibration detection module is configured to detect the intensity of the vibration and the duration of the vibration of the key management device 20. Of course, the duration of the vibration may also be determined by the control module 22 based on the duration of the received vibration intensity.
The control module 22 can determine whether there is a situation that the key management device 20 is violently broken based on the intensity and duration of the vibration. The case of the violent-destruction key management apparatus 20 may include: a case where the key management device 20 is continuously broken, and a case where the key management device 20 is momentarily broken. However, when the key management device 20 is continuously broken, the intensity of the vibration that causes the key management device 20 is generally lower than the intensity of the vibration that causes the momentary breakage, and the vibration lasts for a longer time.
In the present embodiment, if the control module 22 detects that the vibration intensity is greater than or equal to the first specified threshold and the duration greater than or equal to the first specified threshold exceeds the specified duration, it is determined that there is a situation in which the key management device 20 is continuously violently broken. At this time, the control module 22 may generate an alarm signal and transmit the alarm signal to the user terminal 40, so that the user terminal 40 sends an alarm prompt according to the alarm signal. The user terminal 40 may be, but is not limited to, a terminal of an administrator of the key management apparatus 20 or a terminal of a user to whom the key 50 belongs. The first specified threshold may be set according to actual conditions, and the specified time duration may be set according to actual conditions, for example, the specified time duration may be 5 seconds, 10 seconds, and the like.
In addition, if the control module 22 detects that the vibration intensity is greater than or equal to a second specified threshold, which is greater than the first specified threshold, which may be set according to actual conditions, it is determined that there is a situation where the key management device 20 is suddenly broken. At this time, the control module 22 may generate an alarm signal and transmit the alarm signal to the user terminal 40, so that the user terminal 40 sends an alarm prompt according to the alarm signal.
As an alternative embodiment, the key management device 20 may further include a power supply module, and the power supply module may be a battery module. Alternatively, the key management device 20 may be powered by the mains electricity.
The functional role of the key management device 20 will be illustrated in connection with the usage scenario as follows:
for example, a user finds a merchant who configures the key 50 on the internet to configure the key 50 of the electronic lock, the merchant can store the configured key 50 in the key management device 20, and the user can directly go to the key management device 20 at the location of the merchant to obtain the configured key 50; alternatively, the merchant transports the entire key management device 20 to the user site through the distribution company, and then the user takes the key 50 from the transported key management device 20. Accordingly, fewer persons touch the key 50, which contributes to the security of the logistics storage of the key 50.
When the key 50 is to be accessed, the key management device 20 needs to authenticate the user, that is, one or more combination authentication methods, such as collecting biometric information, such as a portrait and a fingerprint, identity information, and an authentication code, of the user are used to authenticate whether the user has the right to access the key 50. When the first authentication information inputted by the user matches the second authentication information corresponding to the key 50, it is determined that the user has the right to remove the key 50, and at this time, the key management device 20 releases the lock on the corresponding key 50, so that the user can remove the target key 50.
The situation that the first verification information matches the second verification information includes, but is not limited to: the currently collected portrait of the user and the portrait corresponding to the pre-stored key identity information are the same user portrait; the fingerprint of the user which is currently collected and the fingerprint corresponding to the prestored key identity information are the fingerprints of the same user; the currently input verification code is the same as the verification code corresponding to the key identity information; the currently read identity information of the user is the same as the identity information of the user corresponding to the key identity information.
Of course, the application scenario may be other scenarios, for example, in the field of house rental and sale, it is usually necessary to open the door through the agency, and at this time, the key management device 20 may be installed in the cell. After the house owner gives the property broker the authentication information (first authentication information) for retrieving the corresponding key 50, the property broker can retrieve the corresponding key 50 from the key management device 20.
In this embodiment, the control module 22 may be an integrated circuit chip having signal processing capability. The control module 22 may be a general purpose processor. For example, the control module 22 may be a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a Network Processor (NP), or the like; the method, the steps and the logic block diagram disclosed in the embodiments of the present Application may also be implemented or executed by a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component.
The communication module 25 is used for communication connection with the server 30 and the user terminal 40 via the network key management device 20, and for transmitting and receiving data via a network.
The memory module 26 may be, but is not limited to, a random access memory, a read only memory, a programmable read only memory, an erasable programmable read only memory, an electrically erasable programmable read only memory, and the like. In this embodiment, the storage module 26 may be used to store the identity information of the key 50, the second authentication information corresponding to the key 50, and the like. Of course, the storage module 26 may also be used to store a program that is executed by the control module 22 upon receiving an execution instruction.
The key management device 20 may include at least one software function module which may be stored in the form of software or firmware in the memory module 26 or solidified in an Operating System (OS) of the device. The control module 22 is used for executing executable modules stored in the storage module 26, such as software functional modules and computer programs included in the key management device 20.
Referring to fig. 4, the present embodiment further provides a key management method, which can be applied to the key management device 20 or the key management system 10, and the key management device 20 can execute the steps of the method, or the server 30 can execute the steps of the method, or the key management device 20 and the server 30 cooperate with each other to execute the steps of the method.
In this embodiment, the key management method may include the steps of:
step S210, when the locking mechanism 21 locks the key 50 inserted into the locking mechanism 21, acquiring key identification information preset in the key 50 from the key 50;
step S220, acquiring first verification information input by a user;
in step S230, when the second verification information corresponding to the key identification information matches the first verification information, the lock mechanism 21 is controlled to unlock the key 50.
Optionally, before step S220, the method may further include: and sending the key identity information to the server 30, so that the server 30 acquires the second verification information according to the key identity information.
Alternatively, step S230 may include: sending the first verification information to a server 30, so that the server 30 matches the first verification information with the second verification information, and sending an unlocking instruction for unlocking the key 50 to the key management device 20 when the first verification information matches the second verification information; and when the unlocking instruction sent by the server 30 is received, controlling the locking mechanism 21 to unlock the key 50 according to the unlocking instruction.
Optionally, the method may further comprise: after the key identity information is sent to the server 30, receiving the second verification information sent by the server 30;
the controlling the locking mechanism 21 to unlock the key 50 when the second verification information corresponding to the key identification information matches the first verification information includes: matching the first authentication information with the second authentication information; and when the first authentication information matches the second authentication information, controlling the lock mechanism 21 to unlock the key 50.
Optionally, the method may further comprise: when the key 50 is locked by the lock mechanism 21 or when the lock mechanism 21 releases the lock of the key 50, a presentation message is transmitted to the user terminal 40 corresponding to the key identification information.
Optionally, after step S210, the method may further include: and acquiring the second verification information according to the key identity information. Step S230 may include: matching the first verification information with the second verification information; control the lock mechanism 21 to unlock the key 50 when the first authentication information matches the second authentication information
It should be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the key management method described above may refer to the execution process of each device in the key management apparatus 20, and will not be described in detail herein.
The embodiment of the application also provides a computer readable storage medium. The readable storage medium has stored therein a computer program that, when run on a computer, causes the computer to execute the key management method as described in the above embodiments.
From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by hardware, or by software plus a necessary general hardware platform, and based on such understanding, the technical solution of the present application can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.), and includes several instructions to enable a computer device (which can be a personal computer, a server, or a network device, etc.) to execute the method described in the embodiments of the present application.
In summary, the present application provides a key management apparatus, a key management method, a key management system, and a readable storage medium. The key management device comprises a locking mechanism, a control module, a first acquisition module and a second acquisition module. The locking mechanism is used for locking a key inserted into the locking mechanism; the first acquisition module is used for acquiring key identity information preset in the key from the key when the locking mechanism locks the key; the second acquisition module is used for acquiring first verification information input by a user; the control module is used for controlling the locking mechanism to unlock the key when second verification information corresponding to the key identity information is matched with the first verification information. In the scheme, the key is locked by using the locking mechanism, and when the key is taken, the first verification information input by the user is matched with the second verification information corresponding to the key identity information, so that the safety of key access can be improved, and the potential safety hazard existing in the process of mailing or depositing the key is reduced.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus, system, and method may be implemented in other ways. The apparatus, system, and method embodiments described above are illustrative only, as the flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (17)

1. A key management device, characterized in that the key management device comprises: the device comprises a locking mechanism, a control module, a first acquisition module and a second acquisition module;
the locking mechanism is used for locking a key inserted into the locking mechanism;
the first acquisition module is used for acquiring key identity information preset in the key from the key when the locking mechanism locks the key;
the second acquisition module is used for acquiring first verification information input by a user;
the control module is used for controlling the locking mechanism to unlock the key when second verification information corresponding to the key identity information is matched with the first verification information.
2. The key management device according to claim 1, further comprising a communication module;
the communication module is used for sending the key identity information to a server and obtaining the second verification information according to the key identity information by the server.
3. The key management device of claim 2, wherein the communication module is further configured to receive the second verification information sent by the server after sending the key identification information to the server;
the control module is used for matching the first verification information with the second verification information and controlling the locking mechanism to unlock the key when the first verification information is matched with the second verification information.
4. The key management device according to claim 1, further comprising a communication module configured to transmit the first authentication information to a server, to match the first authentication information with the second authentication information by the server, and to transmit an unlocking instruction for unlocking the key to the key management device when the first authentication information matches the second authentication information;
the control module is used for controlling the locking mechanism to unlock the key according to the unlocking instruction.
5. The key management device according to claim 3 or 4, wherein the control module is further configured to control the communication module to send a prompt message to the user terminal corresponding to the key identification information when the key is locked by the locking mechanism or when the locking mechanism releases the locking of the key.
6. The key management device according to claim 1, further comprising a communication module;
the communication module is used for acquiring the second verification information according to the key identity information;
the control module is used for matching the first verification information with the second verification information and controlling the locking mechanism to unlock the key when the first verification information is matched with the second verification information.
7. The key management device according to claim 1, wherein the first collection module comprises at least one signal probe, the locking mechanism comprises a card slot for inserting the key, the signal probe is disposed in the card slot, the key comprises a chip for storing key identification information and at least one signal contact connected with the chip, and the at least one signal probe is used for contacting with the at least one signal contact to form a communication loop for the first collection module to collect the key identification information prestored in the chip.
8. The key management apparatus of claim 1, wherein the locking mechanism includes an electromagnetic assembly for captively locking the key.
9. The key management apparatus of claim 1, wherein the first authentication information includes at least one of biometric information, identity information, and an authentication code of the user.
10. A key management method, characterized in that the method comprises:
when a locking mechanism locks a key inserted into the locking mechanism, acquiring key identity information preset in the key from the key;
acquiring first verification information input by a user;
and when second verification information corresponding to the key identity information is matched with the first verification information, controlling the locking mechanism to unlock the key.
11. The key management method according to claim 10, wherein before acquiring the first authentication information input by the user, the method further comprises:
and sending the key identity information to a server, wherein the server is used for acquiring the second verification information according to the key identity information.
12. The key management method according to claim 10, wherein controlling the lock mechanism to release the lock on the key when second authentication information corresponding to the key identification information matches the first authentication information includes:
sending the first verification information to a server, wherein the server is used for matching the first verification information with the second verification information, and sending an unlocking instruction for unlocking the key to the key management device when the first verification information is matched with the second verification information;
and when the unlocking instruction sent by the server is received, controlling the locking mechanism to unlock the key according to the unlocking instruction.
13. The key management method according to claim 11, further comprising:
after the key identity information is sent to the server, receiving the second verification information sent by the server;
the controlling the locking mechanism to unlock the key when the second verification information corresponding to the key identification information matches the first verification information includes:
matching the first authentication information with the second authentication information;
and controlling the locking mechanism to unlock the key when the first authentication information matches the second authentication information.
14. The key management method according to claim 12 or 13, wherein the method further comprises:
and sending prompt information to a user terminal corresponding to the key identity information when the key is locked by the locking mechanism or when the locking mechanism releases the locking of the key.
15. The key management method according to claim 10, wherein after acquiring key identification information preset in the key from the key, the method further comprises:
acquiring the second verification information according to the key identity information;
the controlling the locking mechanism to unlock the key when the second verification information corresponding to the key identification information matches the first verification information includes:
matching the first verification information with the second verification information;
and controlling the locking mechanism to unlock the key when the first authentication information matches the second authentication information.
16. A key management system, characterized in that the key management system comprises a server and a key management device according to any one of claims 1 to 9.
17. A computer-readable storage medium, in which a computer program is stored which, when run on a computer, causes the computer to carry out the method according to any one of claims 10-15.
CN201910742831.9A 2019-08-13 2019-08-13 Key management device, key management method, key management system, and readable storage medium Pending CN110610564A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910742831.9A CN110610564A (en) 2019-08-13 2019-08-13 Key management device, key management method, key management system, and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910742831.9A CN110610564A (en) 2019-08-13 2019-08-13 Key management device, key management method, key management system, and readable storage medium

Publications (1)

Publication Number Publication Date
CN110610564A true CN110610564A (en) 2019-12-24

Family

ID=68889810

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910742831.9A Pending CN110610564A (en) 2019-08-13 2019-08-13 Key management device, key management method, key management system, and readable storage medium

Country Status (1)

Country Link
CN (1) CN110610564A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112734995A (en) * 2020-12-29 2021-04-30 深圳威富优房客科技有限公司 Bluetooth public key, and Bluetooth public key control method and system
CN113643461A (en) * 2021-08-06 2021-11-12 青岛博芬智能科技股份有限公司 Identity recognition method and device for wine cabinet, wine cabinet and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859415A (en) * 2010-06-29 2010-10-13 高鹏 Human-computer interaction intelligent key management system and management method thereof
CN206649591U (en) * 2017-04-28 2017-11-17 光荣电子工业(苏州)有限公司 A kind of key management machine that can be set using authority
CN206649590U (en) * 2017-04-28 2017-11-17 光荣电子工业(苏州)有限公司 A kind of key management machine with key memory function
CN107424339A (en) * 2017-04-19 2017-12-01 宁波瑞奥物联技术股份有限公司 A kind of intelligent key management system and method
CN109448199A (en) * 2018-12-21 2019-03-08 武汉黎赛科技有限责任公司 A kind of key management cabinet and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859415A (en) * 2010-06-29 2010-10-13 高鹏 Human-computer interaction intelligent key management system and management method thereof
CN107424339A (en) * 2017-04-19 2017-12-01 宁波瑞奥物联技术股份有限公司 A kind of intelligent key management system and method
CN206649591U (en) * 2017-04-28 2017-11-17 光荣电子工业(苏州)有限公司 A kind of key management machine that can be set using authority
CN206649590U (en) * 2017-04-28 2017-11-17 光荣电子工业(苏州)有限公司 A kind of key management machine with key memory function
CN109448199A (en) * 2018-12-21 2019-03-08 武汉黎赛科技有限责任公司 A kind of key management cabinet and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112734995A (en) * 2020-12-29 2021-04-30 深圳威富优房客科技有限公司 Bluetooth public key, and Bluetooth public key control method and system
CN113643461A (en) * 2021-08-06 2021-11-12 青岛博芬智能科技股份有限公司 Identity recognition method and device for wine cabinet, wine cabinet and storage medium

Similar Documents

Publication Publication Date Title
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
US20180262891A1 (en) Electronic access control systems and methods using near-field communications, mobile devices and cloud computing
EP3312750A1 (en) Information processing device, information processing system, and information processing method
US20050077995A1 (en) Universal key security method and system
CN103473844A (en) Intelligent control method and intelligent control system for public rental housing
CA2556299A1 (en) Using promiscuous and non-promiscuous data to verify card and reader identity
CN104375836A (en) Method and device for showing lock screen window
CN109067881B (en) Remote authorization method, device, equipment and storage medium thereof
CN110930561B (en) Control method and device of intelligent lock
CN109389709A (en) Unlocking control system and unlocking control method
US20100235905A1 (en) Realization of access control conditions as boolean expressions in credential authentications
CN111414605B (en) Unlocking method and device of embedded security unit, electronic equipment and storage medium
CN109754505B (en) Unlocking method and device based on IC card
CN105894640A (en) Guest room door lock management method and device
CN110610564A (en) Key management device, key management method, key management system, and readable storage medium
US8931080B2 (en) Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource
CN101645124B (en) Method for unlocking PIN code and intelligent key equipment
CN114079666A (en) Equipment control system, method and device
US20030014642A1 (en) Security arrangement
CN110599636A (en) Customs lock, customs lock key, and customs lock opening and closing method and system
JP2006172074A (en) Program, history management server, and history management method
CN105071993B (en) Encryption state detection method and system
JP2007308873A (en) System for managing entry into room
CN111192386A (en) Intelligent lock system and unlocking method of intelligent lock
CN101465011B (en) Lock control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20230119

Address after: 519085 No. 68, Jinhong 7th Road, High-tech Zone, Zhuhai City, Guangdong Province

Applicant after: ZHUHAI UNITECH POWER TECHNOLOGY Co.,Ltd.

Address before: 519000 1 E301-17, 1 Harbin Industrial Road, Tangjia Bay, Zhuhai high tech Zone, Guangdong

Applicant before: ZHUHAI UTAIOT TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20191224

RJ01 Rejection of invention patent application after publication