CN111310877A - Asset monitoring method, equipment and storage medium - Google Patents

Asset monitoring method, equipment and storage medium Download PDF

Info

Publication number
CN111310877A
CN111310877A CN202010223129.4A CN202010223129A CN111310877A CN 111310877 A CN111310877 A CN 111310877A CN 202010223129 A CN202010223129 A CN 202010223129A CN 111310877 A CN111310877 A CN 111310877A
Authority
CN
China
Prior art keywords
passive tag
key
monitoring equipment
uid
asset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010223129.4A
Other languages
Chinese (zh)
Other versions
CN111310877B (en
Inventor
俞光宇
杨广学
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Wiregate Technology Co ltd
Original Assignee
Wuhan Wiregate Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Wiregate Technology Co ltd filed Critical Wuhan Wiregate Technology Co ltd
Priority to CN202010223129.4A priority Critical patent/CN111310877B/en
Publication of CN111310877A publication Critical patent/CN111310877A/en
Application granted granted Critical
Publication of CN111310877B publication Critical patent/CN111310877B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2451Specific applications combined with EAS
    • G08B13/2462Asset location systems combined with EAS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Automation & Control Theory (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Electromagnetism (AREA)
  • Burglar Alarm Systems (AREA)
  • Alarm Systems (AREA)

Abstract

The application provides an asset monitoring method, which comprises the following steps: the method comprises the steps that a monitoring device establishes an incidence relation with a passive tag corresponding to the monitoring device, the monitoring device reads a User Identification (UID) of the passive tag corresponding to the monitoring device and a secret key of the passive tag, and the state of an asset monitored by the monitoring device is determined according to the UID of the passive tag and the secret key of the passive tag; the application also discloses a monitoring device and a storage medium; through the embodiment of the application, the assets can be monitored in real time, and the monitoring equipment can sense and discover in time under the conditions that the assets are moved in a large range, the passive tags are damaged, the monitoring equipment is detached and the passive tags are copied, so that false alarm is avoided.

Description

Asset monitoring method, equipment and storage medium
Technical Field
The invention relates to the field of asset management of the Internet of things, in particular to an asset monitoring method, equipment and a storage medium.
Background
In the related technology, the asset monitoring mainly depends on the manual mode to carry out periodic manual inspection and manual input on the assets; however, the efficiency of asset management using a manual method is low, and the monitoring effect cannot be guaranteed. Or, in the related art, an asset monitoring system using the internet of things communication technology is used, and sensing devices such as a light sensing sensor and an acceleration sensor are used for sensing and alarming the environment where the asset is located, but a method for sensing and alarming the environment where the asset is located has a leak, so that the problem of how to monitor the state of the asset in real time and avoid false alarm is not solved.
Disclosure of Invention
The embodiment of the application provides an asset monitoring method, equipment and a storage medium, which can monitor the state of assets in real time and avoid false alarm.
The technical scheme of the embodiment of the application is realized as follows:
the monitoring equipment establishes an incidence relation of a passive tag corresponding to the monitoring equipment;
the monitoring equipment reads a User Identification (UID) of a passive tag corresponding to the monitoring equipment and a KEY (KEY) of the passive tag;
and determining the state of the asset monitored by the monitoring equipment according to the UID of the passive tag and the key of the passive tag.
In the foregoing scheme, the establishing, by the monitoring device, an association relationship with the passive tag corresponding to the monitoring device includes:
the method comprises the steps that when the monitoring equipment detects that a secret key of a passive tag corresponding to the monitoring equipment is an initial secret key, the monitoring equipment sends the initial secret key of the passive tag to a server;
the monitoring equipment receives a key modification instruction sent by the server, generates a random key according to the key modification instruction, and modifies the key of the passive tag into the random key.
In the foregoing scheme, the determining, according to the UID of the passive tag and the key of the passive tag, the state of the asset monitored by the monitoring device includes:
and under the condition that the UID of the passive tag read by the monitoring equipment and the key of the passive tag are not changed, and the path for the monitoring equipment to send the UID of the passive tag and the key of the passive tag to the server is consistent with the path for the monitoring equipment to send the initial key of the passive tag to the server, determining that the state of the asset is normal.
In the foregoing scheme, the determining, according to the UID of the passive tag and the key of the passive tag, the state of the asset monitored by the monitoring device includes:
and determining that the state of the asset is abnormal under the condition that the monitoring equipment cannot read the UID of the passive tag corresponding to the monitoring equipment and the key of the passive tag.
In the foregoing scheme, the determining, according to the UID of the passive tag and the key of the passive tag, the state of the asset monitored by the monitoring device includes:
and determining that the state of the asset is abnormal under the condition that the UID of the passive tag read by the monitoring equipment is consistent with the UID of the passive tag stored in the server, and the key of the passive tag read by the monitoring equipment is inconsistent with the key of the passive tag stored in the server.
In the foregoing scheme, the determining, according to the UID of the passive tag and the key of the passive tag, the state of the asset monitored by the monitoring device includes:
and under the condition that the UID of the passive tag read by the monitoring equipment and the key of the passive tag are not changed, and the path for the monitoring equipment to send the UID of the passive tag and the key of the passive tag to the server is inconsistent with the path for the monitoring equipment to send the initial key of the passive tag to the server, determining that the state of the asset is abnormal.
In the above scheme, the method further comprises:
under the condition that the monitored asset has a non-metal thin wall, a passive tag is installed on one side of the non-metal thin wall, and monitoring equipment is installed on the other side of the non-metal thin wall corresponding to the position of the passive tag;
in the case of an asset being monitored having a thin metal wall, a passive tag is mounted on one side of the thin metal wall, and a monitoring device is mounted in an overlying manner over the passive tag.
The present application further provides a monitoring device, the monitoring device includes:
the establishing unit is used for establishing an incidence relation between the monitoring equipment and a passive tag corresponding to the monitoring equipment;
the reading unit is used for reading a user identification UID of a passive tag corresponding to the monitoring equipment and a secret key of the passive tag;
and the determining unit is used for determining the state of the asset monitored by the monitoring equipment according to the UID of the passive tag and the key of the passive tag.
In the above scheme, the monitoring device further includes:
the detection unit is used for detecting the key information of the passive tag;
the monitoring device comprises a sending unit, a receiving unit and a processing unit, wherein the sending unit is used for sending an initial key of a passive tag to a server under the condition that a detection unit detects that the key of the passive tag corresponding to the monitoring device is the initial key;
a receiving unit, configured to receive a key modification instruction sent by the server;
and the modification unit is used for generating a random key according to the key modification instruction and modifying the key of the passive tag into the random key.
In the foregoing solution, the determining unit is further configured to:
and under the condition that the UID of the passive tag read by the monitoring equipment and the key of the passive tag are not changed, and the path for the monitoring equipment to send the UID of the passive tag and the key of the passive tag to the server is consistent with the path for the monitoring equipment to send the initial key of the passive tag to the server, determining that the state of the asset is normal.
In the foregoing solution, the determining unit is further configured to:
and determining that the state of the asset is abnormal under the condition that the monitoring equipment cannot read the UID of the passive tag corresponding to the monitoring equipment and the key of the passive tag.
In the foregoing solution, the determining unit is further configured to:
and determining that the state of the asset is abnormal under the condition that the UID of the passive tag read by the monitoring equipment is consistent with the UID of the passive tag stored in the server, and the key of the passive tag read by the monitoring equipment is inconsistent with the key of the passive tag stored in the server.
In the foregoing solution, the determining unit is further configured to:
and under the condition that the UID of the passive tag read by the monitoring equipment and the key of the passive tag are not changed, and the path for the monitoring equipment to send the UID of the passive tag and the key of the passive tag to the server is inconsistent with the path for the monitoring equipment to send the initial key of the passive tag to the server, determining that the state of the asset is abnormal.
The application also provides a storage medium, which stores an executable program, and when the executable program is executed by a processor, the asset monitoring method of the scheme is realized.
According to the asset monitoring method, the device and the storage medium provided by the embodiment of the invention, the monitoring device establishes the association relationship with the passive tag corresponding to the monitoring device, reads the UID of the passive tag corresponding to the monitoring device and the key of the passive tag, and determines the state of the asset monitored by the monitoring device according to the UID of the passive tag and the key of the passive tag; the asset monitoring system can monitor assets in real time, and monitoring equipment can sense and discover the assets in time under the conditions that the assets are moved in a large range, the passive tags are damaged, the monitoring equipment is detached, and the passive tags are copied. And the monitoring equipment has the advantage of being reusable, and can be remotely paired and bound with a passive tag. Under the condition that the label needs to be replaced or torn, the monitoring equipment can establish an incidence relation with another passive label, so that the repeatable utilization rate of the monitoring system is improved, and the manufacturing cost of the monitoring system is reduced.
Drawings
FIG. 1 is a first schematic view illustrating an alternative flow chart of an asset monitoring method according to an embodiment of the present disclosure;
FIG. 2 is a schematic view illustrating an alternative flowchart of an asset monitoring method according to an embodiment of the present application;
fig. 3 is a first schematic structural diagram illustrating an alternative installation manner of a monitoring device and a passive tag according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of an alternative mounting manner of the monitoring device and the passive tag according to the embodiment of the present application;
FIG. 5 is a top view of a monitoring device provided in an embodiment of the present application;
FIG. 6 is a rear view of a monitoring device provided in an embodiment of the present application;
FIG. 7 is a third alternative flowchart of an asset monitoring method provided by an embodiment of the present application;
FIG. 8 is a front view of a monitoring device provided by an embodiment of the present application;
fig. 9 is a cross-sectional view of a passive tag provided by an embodiment of the present application;
FIG. 10 is a cross-sectional view of an embodiment of the present application providing a representation of a passive tag;
fig. 11 is an alternative structural schematic diagram of a monitoring device provided in an embodiment of the present application.
Detailed Description
The present application will be described in further detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present invention.
In the related art, an asset management system installs a tag on a monitored asset, and generally, a paper tag (a barcode, a two-dimensional code, or the like) or a printed passive Radio Frequency Identification (RFID) tag is commonly used. The asset monitoring is mainly to carry out periodic input and inventory through artificial mode, and the mode of manual input is patrolled and examined to the manual work promptly, and the monitoring effect of system is difficult to obtain guaranteeing, mainly has following problem: the checking effect and quality are strongly related to the work responsibility degree of checking workers; the system is in a non-real-time online state, and when equipment is lost, the equipment can be found only by waiting for the next inventory cycle of a worker; the system essentially manages tags, and when the tags are separated from the monitored equipment, the asset management system is difficult to find immediately, with certain delay and hysteresis.
Or, some asset monitoring systems adopting the internet of things communication technology exist in the related technologies, so that the networking of asset tags can be realized, and the automatic checking and monitoring functions can be realized; the system realizes the functions of warning the movement of assets and the like through a light ray induction sensor, an acceleration sensor and the like. However, there are certain vulnerabilities in the above systems: some electronic tag management systems adopt a single light sensing mode or an acceleration sensor mode to perform asset displacement or tag falling alarm, for example, a light sensing sensor covers a sensor to change light intensity when a tag is installed, and light directly irradiates the sensor to generate difference when the tag falls, so that tag falling alarm is realized; under the night condition, the light induction sensor cannot detect whether the label is taken down from the equipment or not, and certain loopholes exist; in addition, if the light induction sensor is not tightly pasted or the stained surface has certain light transmittance, the light intensity can also change according to the external brightness, so that false alarm is generated; the acceleration sensor generates an alarm when the supervised asset is moved or the label is taken down, and the acceleration is from the two situations that the asset is moved or the label is taken down, so the false alarm situation cannot be avoided. Therefore, the asset monitoring system of the communication technology of the internet of things in the related art cannot distinguish whether the device for asset positioning is taken down intentionally, and the stability and reliability of the asset monitoring system of the communication technology of the internet of things are challenged in practical application.
Based on the problems existing in the existing asset monitoring method, the embodiment of the application provides an asset monitoring method, which can solve the technical problems and disadvantages that cannot be solved in the prior art.
Fig. 1 shows an alternative flowchart of an asset monitoring method provided in an embodiment of the present application, which will be described according to various steps.
Step S101, the monitoring equipment establishes an incidence relation of a passive tag corresponding to the monitoring equipment.
In some embodiments, the establishing, by the monitoring device, an association relationship with a passive tag corresponding to the monitoring device includes: the monitoring equipment sends the secret key of the passive tag to a server when detecting that the secret key of the passive tag corresponding to the monitoring equipment is a non-initial secret key. The server matches the non-initial secret key sent by the monitoring equipment to the server with the secret key stored in the server, and when the matching result is consistent, the passive tag can be normally used, and the monitoring equipment supervises the association relationship with the passive tag corresponding to the monitoring equipment; and under the condition that the matching results are inconsistent, the passive tag is an abnormal tag, and the server restores the abnormal tag to the initialized state.
In some embodiments, the establishing, by the monitoring device, an association relationship with a passive tag corresponding to the monitoring device includes: the method comprises the steps that when the monitoring equipment detects that a secret key of a passive tag corresponding to the monitoring equipment is an initial secret key, the monitoring equipment sends the initial secret key of the passive tag to a server; the monitoring equipment receives a key modification instruction sent by the server, generates a random key according to the key modification instruction, and modifies the key of the passive tag into the random key.
In some embodiments, when the monitoring device detects that the key of the passive tag corresponding to the monitoring device is the initial key, the sending, by the monitoring device, the initial key of the passive tag to the server includes: the monitoring equipment reads the UID of the passive tag and accesses the secret key of the passive tag through the authority; and sending the initial key of the passive tag to a server under the condition that the key read by the monitoring equipment from the passive tag is the initial key.
In some embodiments, the server receives an initial key of the passive tag, and sends a key modification instruction to the monitoring device when finding that the key of the passive tag is the initial key. The key modification instruction is used for instructing the monitoring equipment to modify the key of the passive tag.
In some embodiments, the monitoring device receives a key modification instruction sent by the server, generates a random key, modifies the key of the passive tag according to the key modification instruction, and modifies the initial key of the passive tag into the random key. And the monitoring equipment sends the random secret key to the server.
In some embodiments, the monitoring device sending the random key to the server further comprises: and the monitoring equipment sends the random key and at least one of the UID of the monitoring equipment and the UID of the passive tag to the server.
In this way, the monitoring device establishes an association relationship with the passive tag by modifying the key of the passive tag. The association relationship may be a unique binding relationship of the monitoring device and the passive tag. When the passive tag is damaged or lost, or the asset monitored by the monitoring equipment is changed, the monitoring equipment only needs to establish an association relationship with another passive tag again. The reusability of the monitoring equipment is improved, and the overall cost of the monitoring system is reduced.
Step S102, the monitoring device reads the UID of the passive tag corresponding to the monitoring device and the key of the passive tag.
In some embodiments, the reading, by the monitoring device, the UID of the passive tag corresponding to the monitoring device and the key of the passive tag includes: the monitoring equipment periodically reads the UID of the passive tag corresponding to the monitoring equipment and the key of the passive tag according to a first time threshold. The first time threshold is a preset monitoring time interval.
In other embodiments, the monitoring device periodically reads the UID of the passive tag and the key of the passive tag corresponding to the monitoring device according to a first time threshold, and uploads the UID of the passive tag and the key of the passive tag to a server.
In some embodiments, the first time interval may also be set according to a historical monitoring period.
Step S103, determining the state of the asset monitored by the monitoring equipment according to the UID of the passive tag and the key of the passive tag.
In some embodiments, the server receives the UID of the passive tag and the key of the passive tag uploaded by the monitoring device, and determines the status of the asset monitored by the monitoring device according to the UID of the passive tag and the key of the passive tag.
In other embodiments, the monitoring device reads the UID of the passive tag and the key of the passive tag, and determines the status of the asset monitored by the monitoring device according to the UID of the passive tag and the key of the passive tag.
In some embodiments, determining the status of the asset monitored by the monitoring device from the UID of the passive tag and the key of the passive tag comprises: and under the condition that the UID of the passive tag read by the monitoring equipment and the key of the passive tag are not changed, and the path for the monitoring equipment to send the UID of the passive tag and the key of the passive tag to the server is consistent with the path for the monitoring equipment to send the initial key of the passive tag to the server, the monitoring equipment determines that the state of the asset is normal.
In other embodiments, the monitoring device reading no change in both the UID of the passive tag and the key of the passive tag includes: the UID of the passive tag read by the monitoring equipment is the same as the UID of the passive tag stored by the server; the key of the passive tag read by the monitoring device is the same as the key of the passive tag stored by the server. The sending of the key of the passive tag to the server and the sending of the initial key of the passive tag to the server by the monitoring device are consistent, and the sending comprises: and the monitoring equipment sends the read secret key of the passive tag to the route and the gateway of the server, and the route and the gateway are consistent with the route and the gateway which are sent by the monitoring equipment to the server by the initial secret key of the passive tag.
In still other embodiments, the status of the asset as normal includes: the asset does not move widely; the passive tag on the asset is in a normal state, the passive tag on the asset is not clone replicated, the passive tag on the asset is not torn off, the passive tag on the asset is not destroyed, and the monitoring device is not removed. The lack of extensive movement of the asset includes: the assets are still within the coverage of the network in which the monitoring devices and servers are located.
In some embodiments, determining the status of the asset monitored by the monitoring device from the UID of the passive tag and the key of the passive tag comprises: and under the condition that the monitoring equipment cannot read the UID of the passive tag corresponding to the monitoring equipment and the key of the passive tag, the monitoring equipment determines that the state of the asset is abnormal.
In other embodiments, the failure of the monitoring device to read the UID of the passive tag and the key of the passive tag corresponding to the monitoring device includes: the passive tag is torn or destroyed, the monitoring device cannot read the UID of the passive tag and the key of the passive tag corresponding to the monitoring device, or the monitoring device leaves the asset, and the UID of the passive tag and the key of the passive tag cannot be read if the distance between the monitoring device and the corresponding passive tag is too far.
In still other embodiments, the status of the asset as abnormal includes: the passive tag is torn or destroyed or the monitoring device is removed.
In some embodiments, determining the status of the asset monitored by the monitoring device from the UID of the passive tag and the key of the passive tag comprises: and under the condition that the UID of the passive tag read by the monitoring equipment is consistent with the UID of the passive tag stored in the server, and the key of the passive tag read by the monitoring equipment is inconsistent with the key of the passive tag stored in the server, the monitoring equipment determines that the state of the asset is abnormal.
In other embodiments, the reading, by the monitoring device, of the UID of the passive tag to be consistent with the UID of the passive tag stored in the server, and the reading, by the monitoring device, of the key of the passive tag to be inconsistent with the key of the passive tag stored in the server includes: the passive tag is duplicated. The key area of the passive tag is protected by encryption, and when the passive tag is copied, the data in the key area cannot be copied, and only the UID of the passive tag can be copied. Therefore, in the case where the passive tag is copied, the UID of the passive tag read by the monitoring device is the same as the UID of the passive tag stored by the server, but the key of the passive tag read is different from the key of the passive tag stored by the server.
In some embodiments, determining the status of the asset monitored by the monitoring device from the UID of the passive tag and the key of the passive tag comprises: and under the condition that the UID of the passive tag read by the monitoring equipment and the key of the passive tag are not changed, and the path for the monitoring equipment to send the UID of the passive tag and the key of the passive tag to the server is inconsistent with the path for the monitoring equipment to send the initial key of the passive tag to the server, the monitoring equipment determines that the state of the asset is abnormal.
In some embodiments, the UID of the passive tag read by the monitoring device and the key of the passive tag are not changed, and a path through which the UID of the passive tag and the key of the passive tag are sent to the server by the monitoring device is inconsistent with a path through which the initial key of the passive tag is sent to the server by the monitoring device, which indicates that the monitoring device and the passive tag are still installed on the monitored asset, and the asset is moved and leaves a network when the monitoring device establishes an association relationship with a passive identifier, so that a path through which the monitoring device sends information to the server is inconsistent with a path through which the initial key of the passive tag is sent to the server by the monitoring information.
In some embodiments, the monitoring device reports the abnormal status information of the asset to the server. The abnormal state information includes: the passive tag is torn or destroyed, the monitoring device is removed from the asset, the passive tag of the asset is copied, and the asset is moved over a wide range. And/or the monitoring equipment reports the position information of the assets to the server.
Thus, an association relationship is established between the monitoring equipment and the passive tag, the UID of the passive tag corresponding to the monitoring equipment and the key of the passive tag are read by the monitoring equipment, and the state of the asset monitored by the monitoring equipment is determined according to the UID of the passive tag and the key of the passive tag; the method can monitor the assets in real time, and the monitoring equipment can sense and find the assets in time under the conditions that the assets are moved in a large range, the passive tags are damaged, the monitoring equipment is detached and the passive tags are copied, and meanwhile, the monitoring equipment is searched according to the position information reported by the monitoring equipment. And the monitoring equipment has the advantage of being reusable, and can be remotely paired and bound with a passive tag. Under the condition that the label needs to be replaced or torn, the monitoring equipment can establish an incidence relation with another passive label, so that the repeatable utilization rate of the monitoring system is improved, and the manufacturing cost of the monitoring system is reduced.
Fig. 2 is a schematic view illustrating an alternative flow chart of an asset monitoring method according to an embodiment of the present application, which will be described according to various steps.
And step S201, installing monitoring equipment and a passive tag.
Fig. 3 is a schematic structural diagram showing an alternative installation manner of the monitoring device and the passive tag according to an embodiment of the present application, which will be described according to various parts.
In some embodiments, where the asset being monitored has a non-metallic thin wall, a passive tag is mounted on one side of the non-metallic thin wall and a monitoring device is mounted on the other side of the non-metallic thin wall corresponding to the location of the passive tag. Or the passive tag is arranged on one side of the metal thin wall, and the monitoring equipment is arranged above the passive tag in a covering mode, namely the monitoring equipment is superposed above the passive tag.
Fig. 4 shows an alternative structural schematic diagram of a monitoring device and a passive tag provided in the embodiment of the present application, which will be described according to various parts.
In some embodiments, where the asset being monitored has a thin metal wall, a passive tag is mounted on one side of the thin metal wall, and the monitoring device is mounted in an overlying manner over the passive tag.
Fig. 5 shows a top view of the monitoring device provided in the embodiment of the present application, where an induction antenna is disposed directly above the inside of the monitoring device.
Fig. 6 shows a rear view of the monitoring device provided in the embodiment of the present application, where an induction antenna is disposed right behind the inside of the monitoring device.
In some embodiments, the mounting manner is not limited to the above two manners, and only the position of the passive antenna read inside the monitoring device needs to be adjusted, so that the monitoring device can read the information of the passive tag. As shown in fig. 5 and 6, the position of the reading antenna can be adjusted from the bottom of the monitoring device shown in fig. 4 to the position of the side wall of the monitoring device shown in fig. 6. I.e. the position of the reading antenna is adjusted from the sensing antenna position 1 to the sensing antenna position 2.
Step S202, the monitoring equipment initiates a network access request and establishes connection with the server.
In some embodiments, the monitoring device initiates a network access request to the server to establish a network connection with the server.
Step S203, the monitoring equipment establishes the association relation of the passive tags corresponding to the monitoring equipment.
In some embodiments, the establishing, by the monitoring device, an association relationship with a passive tag corresponding to the monitoring device includes: the monitoring equipment sends the initial secret key of the passive tag to a server when detecting that the secret key of the passive tag corresponding to the monitoring equipment is the initial secret key.
In some embodiments, when the monitoring device detects that the key of the passive tag corresponding to the monitoring device is the initial key, the sending, by the monitoring device, the initial key of the passive tag to the server includes: the monitoring equipment reads the UID of the passive tag and accesses the secret key of the passive tag through the authority; and sending the initial key of the passive tag to a server under the condition that the key read by the monitoring equipment from the passive tag is the initial key.
Step S204, the server finds that the passive tag is the initial key, issues an instruction to notify the monitoring device to modify the key and upload the modified key to the server.
In some embodiments, the server receives an initial key of the passive tag, and sends a key modification instruction to the monitoring device when finding that the key of the passive tag is the initial key. The key modification instruction is used for instructing the monitoring equipment to modify the key of the passive tag.
In step S205, the monitoring device generates a random key to modify the key of the passive tag, and uploads the modified key to the server.
In some embodiments, the monitoring device receives a key modification instruction sent by the server, generates a random key, modifies the key of the passive tag according to the key modification instruction, and modifies the initial key of the passive tag into the random key. And the monitoring equipment sends the random secret key to the server.
In some embodiments, the monitoring device sending the random key to the server further comprises: and the monitoring equipment sends the random key and at least one of the UID of the monitoring equipment and the UID of the passive tag to the server.
Step S206, the monitoring device reads the UID of the passive tag corresponding to the monitoring device and the key of the passive tag.
The processing flow of step S206 is the same as step S102, and is not described here again.
Step S207, determining the status of the asset monitored by the monitoring device according to the UID of the passive tag and the key of the passive tag.
The processing flow of step S207 is the same as step S103, and is not described here again.
Thus, an association relationship is established between the monitoring equipment and the passive tag, the UID of the passive tag corresponding to the monitoring equipment and the key of the passive tag are read by the monitoring equipment, and the state of the asset monitored by the monitoring equipment is determined according to the UID of the passive tag and the key of the passive tag; the method can monitor the assets in real time, and the monitoring equipment can sense and find the assets in time under the conditions that the assets are moved in a large range, the passive tags are damaged, the monitoring equipment is detached and the passive tags are copied, and meanwhile, the monitoring equipment is searched according to the position information reported by the monitoring equipment. And the monitoring equipment has the advantage of being reusable, and can be remotely paired and bound with a passive tag. Under the condition that the label needs to be replaced or torn, the monitoring equipment can establish an incidence relation with another passive label, so that the repeatable utilization rate of the monitoring system is improved, and the manufacturing cost of the monitoring system is reduced.
Fig. 7 is a schematic view showing an alternative flowchart of a third asset monitoring method according to an embodiment of the present application, which will be described according to various steps.
Step S301, the monitoring device establishes an association relation with a passive tag corresponding to the monitoring device.
The processing flow of step S301 is the same as step S101, and is not described here again.
Step S302, a positioning module and/or an acceleration sensor are/is arranged in the monitoring equipment.
In some embodiments, a positioning module and/or an acceleration sensor is arranged inside the monitoring device, and the positioning module is used for determining the geographic position of the monitoring device; the acceleration sensor is used for detecting the acceleration of the monitoring equipment.
Step S303, determining the state of the asset monitored by the monitoring equipment according to the information of the positioning module and/or the acceleration sensor.
In some embodiments, determining the status of the asset monitored by the monitoring device from the information of the location module comprises: the monitoring equipment is located in a preset area, and the asset state is considered to be normal; and the monitoring equipment is positioned outside a preset area, and the asset state is considered to be abnormal. The preset area is an area where preset assets are allowed to be placed, such as an archive area of a company or a fixed area range of an office.
In some embodiments, determining the status of the asset monitored by the monitoring device from the information of the acceleration sensor comprises: and under the condition that the acceleration sensor detects that the acceleration of the monitoring equipment is higher than a first preset acceleration, the asset state is considered to be abnormal. The first preset acceleration is a preset value of acceleration of the allowed asset, for example, the first preset acceleration of the asset is set to 0, that is, once the asset moves, the status of the asset is considered to be abnormal.
Step S304, when the asset is abnormal, the monitoring device reads the UID of the passive tag corresponding to the monitoring device and the key of the passive tag.
In some embodiments, in the event of an asset abnormality, the monitoring device immediately reads the UID of the passive tag and the key of the passive tag corresponding to the monitoring device, and uploads the UID of the passive tag and the key of the passive tag to a server.
In further embodiments, the monitoring device uploading the UID of the passive tag and the key of the passive tag to the server further comprises: and the monitoring equipment reports the position information of the monitoring equipment to the server.
Thus, an association relationship is established between the monitoring equipment and the passive tag, the UID of the passive tag corresponding to the monitoring equipment and the key of the passive tag are read by the monitoring equipment, and the state of the asset monitored by the monitoring equipment is determined according to the UID of the passive tag and the key of the passive tag; the assets can be monitored in real time, the monitoring equipment can sense and find the assets in time under the condition that the assets are moved in a large range, and meanwhile, the monitoring equipment is searched according to the position information reported by the monitoring equipment. And the monitoring equipment has the advantage of being reusable, and can be remotely paired and bound with a passive tag. Under the condition that the label needs to be replaced or torn, the monitoring equipment can establish an incidence relation with another passive label, so that the repeatable utilization rate of the monitoring system is improved, and the manufacturing cost of the monitoring system is reduced.
The asset monitoring system provided by the embodiment of the application comprises: monitoring devices, servers, and passive tags.
Fig. 8 illustrates a front view of a monitoring device provided by an embodiment of the present application, the front of the monitoring device including a device information storage and status indicator lights. The device information storage place is positioned in the middle of the front view of the monitoring device, and the status indicator lamp can be positioned in the upper right corner of the front view of the monitoring device.
In some embodiments, the device information depository is used for depositing the device information of the monitoring device. The device information includes: the monitoring equipment comprises at least one of a serial number of the monitoring equipment, a classification of an asset corresponding to the monitoring equipment, a model of the asset corresponding to the monitoring equipment, a value of the asset corresponding to the monitoring equipment, the time of the last entry of the asset corresponding to the monitoring equipment into the system, the time of the earliest entry of the asset corresponding to the monitoring equipment into the system, the name and the number of an employee entering the asset corresponding to the monitoring equipment, and the name and the number of a person responsible for the asset corresponding to the monitoring equipment. The status indicator light is used for representing the working status of the monitoring equipment, for example, the status indicator light represents that the monitoring equipment works abnormally in a red color, the status indicator light represents that the monitoring equipment works normally in a green color, the status indicator light represents that the monitoring equipment has insufficient electric quantity in a yellow color, and the status indicator light flickers to represent that the monitoring equipment is accessed to a network.
In some embodiments, the monitoring device has a passive tag reading function, a device UID capable of reading a passive tag, has a passive tag KEY access right, is capable of reading a KEY of a passive tag, and has a KEY modification function, and may store the passive tag KEY in a nonvolatile manner.
In some embodiments, the monitoring device has an Internet of Things communication capability, such as a NarrowBand Internet of Things (NB-IOT) or a Long Range Radio (LoRa), and is capable of reporting a device state and tag state information of the monitoring device.
In some embodiments, the monitoring device has a low power sleep that ensures long operation using battery power.
In some embodiments, the monitoring device has a short reading distance, which ensures that the monitoring device cannot read the tag information after a short distance from the tag.
In some embodiments, the monitoring device has optional functions of device status indicator lights, device power monitoring, vibration monitoring, indoor positioning, outdoor positioning, and the like.
In some embodiments, the monitoring device can communicate with the server through an internet of things communication technology, and can execute a background-initiated command, such as setting a working mode of the terminal (reading a frequency, a heartbeat cycle, reading a key of the passive tag, modifying the key of the passive tag, and the like).
In some embodiments, the monitoring device may be a bluetooth chip such as NRF52832 or NRF52840 that supports Near Field Communication (NFC) read-write functions.
Fig. 9 shows a cross-sectional view of a passive tag provided in an embodiment of the present application, and fig. 10 shows a physical diagram of the passive tag provided in the embodiment of the present application, which will be described according to various parts.
In some embodiments, the passive tag may be an NFC carrier, such as an NFC card, with a unique number.
In other embodiments, the passive tag may communicate over the 2.4G (ISM) Band open to industry, science, and medicine using NFC technology.
In some embodiments, the passive tag comprises: IC chip and wire wound inductive antenna. The IC chip is used for storing the UID and the KEY of the passive tag; the wire winding inductive antenna is used for receiving information sent by the monitoring equipment to the passive tag and sending the information sent by the passive tag to the monitoring equipment.
In some embodiments, the passive tag has a unique number UID, and a unique key that requires authorization to access; i.e. the UID of the passive tag is directly readable but the KEY of the passive tag requires the visitor to have access rights to be able to read. This design ensures the irreproducibility of the passive tag.
In other embodiments, the passive tag may be removed with damage such that the UID of the passive tag and the KEY of the passive tag cannot be read. The front side of the passive tag may be used to print information about the monitored asset. The monitoring asset related information includes: at least one of a classification of the asset, a model of the asset, a price of the asset, a time the asset was last entered into the system, a time the asset was earliest entered into the system, a name and number of an employee entering the asset, and a name and number of a person responsible for the asset.
Fig. 11 shows an alternative structural schematic diagram of a monitoring device provided in an embodiment of the present application, which will be described according to various parts.
An establishing unit 401, configured to establish an association relationship between the monitoring device and a passive tag corresponding to the monitoring device;
a reading unit 402, configured to read a user identity UID of a passive tag corresponding to the monitoring device and a key of the passive tag;
a determining unit 403, configured to determine, according to the UID of the passive tag and the key of the passive tag, a state of the asset monitored by the monitoring device.
A detecting unit 404, configured to detect key information of the passive tag;
a sending unit 405, configured to send an initial key of a passive tag to a server when the detecting unit detects that the key of the passive tag corresponding to the monitoring device is the initial key;
a receiving unit 406, configured to receive a key modification instruction sent by the server;
the modifying unit 407 is configured to generate a random key according to the key modifying instruction, and modify the key of the passive tag into the random key.
The determining unit 403 is further configured to determine that the state of the asset is normal when both the UID of the passive tag read by the monitoring device and the key of the passive tag are not changed, and a path through which the UID of the passive tag and the key of the passive tag are sent to the server by the monitoring device is consistent with a path through which the initial key of the passive tag is sent to the server by the monitoring device.
The determining unit 403 is further configured to determine that the status of the asset is abnormal when the monitoring device cannot read the UID of the passive tag corresponding to the monitoring device and the key of the passive tag.
The determining unit 403 is further configured to determine that the status of the asset is abnormal when the UID of the passive tag read by the monitoring device is consistent with the UID of the passive tag stored in the server, and the key of the passive tag read by the monitoring device is inconsistent with the key of the passive tag stored in the server.
The determining unit 403 is further configured to determine that the state of the asset is abnormal when the UID of the passive tag read by the monitoring device and the key of the passive tag are not changed, and a path through which the UID of the passive tag and the key of the passive tag are sent to the server by the monitoring device is inconsistent with a path through which the initial key of the passive tag is sent to the server by the monitoring device.
Those of ordinary skill in the art will understand that: all or part of the steps of implementing the above method embodiments may be accomplished by hardware related to program commands, where the program may be stored in a storage medium, and when the program is executed, when receiving a notification message based on a second application during the running process of a first application, the program responds to the notification message in a first area on a screen of an electronic device; the first area is smaller than a corresponding area of the input method application loaded when the second application is independently run on the screen of the electronic equipment. And the aforementioned storage medium includes: various media capable of storing program codes, such as a removable Memory device, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, and an optical disk.
Alternatively, the integrated units described above in the present application may be stored in a computer-readable storage medium if they are implemented in the form of software functional modules and sold or used as independent products. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partially implemented in the form of a software product stored in a storage medium, and include several commands for enabling a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present disclosure, and all the changes or substitutions should be covered by the scope of the present invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (15)

1. A method of asset monitoring, the method comprising:
the monitoring equipment establishes an incidence relation of a passive tag corresponding to the monitoring equipment;
the monitoring equipment reads a user identification UID of a passive tag corresponding to the monitoring equipment and a secret key of the passive tag;
and determining the state of the asset monitored by the monitoring equipment according to the UID of the passive tag and the key of the passive tag.
2. The method of claim 1, wherein the monitoring device establishing an association relationship with a passive tag corresponding to the monitoring device comprises:
the method comprises the steps that when the monitoring equipment detects that a secret key of a passive tag corresponding to the monitoring equipment is an initial secret key, the monitoring equipment sends the initial secret key of the passive tag to a server;
the monitoring equipment receives a key modification instruction sent by the server, generates a random key according to the key modification instruction, and modifies the key of the passive tag into the random key.
3. The method of claim 1, wherein determining the status of the asset monitored by the monitoring device from the UID of the passive tag and the key of the passive tag comprises:
and under the condition that the UID of the passive tag read by the monitoring equipment and the key of the passive tag are not changed, and the path for the monitoring equipment to send the UID of the passive tag and the key of the passive tag to the server is consistent with the path for the monitoring equipment to send the initial key of the passive tag to the server, determining that the state of the asset is normal.
4. The method of claim 1, wherein determining the status of the asset monitored by the monitoring device from the UID of the passive tag and the key of the passive tag comprises:
and determining that the state of the asset is abnormal under the condition that the monitoring equipment cannot read the UID of the passive tag corresponding to the monitoring equipment and the key of the passive tag.
5. The method of claim 1, wherein determining the status of the asset monitored by the monitoring device from the UID of the passive tag and the key of the passive tag comprises:
and determining that the state of the asset is abnormal under the condition that the UID of the passive tag read by the monitoring equipment is consistent with the UID of the passive tag stored in the server, and the key of the passive tag read by the monitoring equipment is inconsistent with the key of the passive tag stored in the server.
6. The method of claim 1, wherein determining the status of the asset monitored by the monitoring device from the UID of the passive tag and the key of the passive tag comprises:
and under the condition that the UID of the passive tag read by the monitoring equipment and the key of the passive tag are not changed, and the path for the monitoring equipment to send the UID of the passive tag and the key of the passive tag to the server is inconsistent with the path for the monitoring equipment to send the initial key of the passive tag to the server, determining that the state of the asset is abnormal.
7. The method of claim 1, further comprising:
under the condition that the monitored asset has a non-metal thin wall, a passive tag is installed on one side of the non-metal thin wall, and monitoring equipment is installed on the other side of the non-metal thin wall corresponding to the position of the passive tag;
in the case of an asset being monitored having a thin metal wall, a passive tag is mounted on one side of the thin metal wall, and a monitoring device is mounted in an overlying manner over the passive tag.
8. A monitoring device, characterized in that the monitoring device comprises:
the establishing unit is used for establishing an incidence relation between the monitoring equipment and a passive tag corresponding to the monitoring equipment;
the reading unit is used for reading a user identification UID of a passive tag corresponding to the monitoring equipment and a secret key of the passive tag;
and the determining unit is used for determining the state of the asset monitored by the monitoring equipment according to the UID of the passive tag and the key of the passive tag.
9. The monitoring device of claim 8, further comprising:
the detection unit is used for detecting the key information of the passive tag;
the monitoring device comprises a sending unit, a receiving unit and a processing unit, wherein the sending unit is used for sending an initial key of a passive tag to a server under the condition that a detection unit detects that the key of the passive tag corresponding to the monitoring device is the initial key;
a receiving unit, configured to receive a key modification instruction sent by the server;
and the modification unit is used for generating a random key according to the key modification instruction and modifying the key of the passive tag into the random key.
10. The monitoring device of claim 8, wherein the determination unit is further configured to:
and under the condition that the UID of the passive tag read by the monitoring equipment and the key of the passive tag are not changed, and the path for the monitoring equipment to send the UID of the passive tag and the key of the passive tag to the server is consistent with the path for the monitoring equipment to send the initial key of the passive tag to the server, determining that the state of the asset is normal.
11. The monitoring device of claim 8, wherein the determination unit is further configured to:
and determining that the state of the asset is abnormal under the condition that the monitoring equipment cannot read the UID of the passive tag corresponding to the monitoring equipment and the key of the passive tag.
12. The monitoring device of claim 8, wherein the determination unit is further configured to:
and determining that the state of the asset is abnormal under the condition that the UID of the passive tag read by the monitoring equipment is consistent with the UID of the passive tag stored in the server, and the key of the passive tag read by the monitoring equipment is inconsistent with the key of the passive tag stored in the server.
13. The monitoring device of claim 8, wherein the determination unit is further configured to:
and under the condition that the UID of the passive tag read by the monitoring equipment and the key of the passive tag are not changed, and the path for the monitoring equipment to send the UID of the passive tag and the key of the passive tag to the server is inconsistent with the path for the monitoring equipment to send the initial key of the passive tag to the server, determining that the state of the asset is abnormal.
14. A storage medium storing an executable program, wherein the executable program, when executed by a processor, implements the asset monitoring method of any of claims 1 to 7.
15. A monitoring device comprising a memory, a processor and an executable program stored on the memory and executable by the processor, wherein the steps of the asset monitoring method according to any of claims 1 to 7 are performed when the executable program is executed by the processor.
CN202010223129.4A 2020-03-26 2020-03-26 Asset monitoring method, equipment and storage medium Active CN111310877B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010223129.4A CN111310877B (en) 2020-03-26 2020-03-26 Asset monitoring method, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010223129.4A CN111310877B (en) 2020-03-26 2020-03-26 Asset monitoring method, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111310877A true CN111310877A (en) 2020-06-19
CN111310877B CN111310877B (en) 2022-11-11

Family

ID=71162518

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010223129.4A Active CN111310877B (en) 2020-03-26 2020-03-26 Asset monitoring method, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111310877B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101582194A (en) * 2009-06-24 2009-11-18 中国人民解放军总装备部军械技术研究所 Materials-in-transit monitoring alarm system
CN102622621A (en) * 2012-02-07 2012-08-01 上海中科高等研究院 Communication method for improving security of radio frequency identification system
CN103077414A (en) * 2013-01-06 2013-05-01 公安部第三研究所 Passive RFID (Radio Frequency Identification Devices) electronic tag reader-writer with high reliability and UHF (Ultra High Frequency) and read write control method
CN103778449A (en) * 2014-01-20 2014-05-07 中国科学院数据与通信保护研究教育中心 Tracking and monitoring system and method for intra-area mobile storage device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101582194A (en) * 2009-06-24 2009-11-18 中国人民解放军总装备部军械技术研究所 Materials-in-transit monitoring alarm system
CN102622621A (en) * 2012-02-07 2012-08-01 上海中科高等研究院 Communication method for improving security of radio frequency identification system
CN103077414A (en) * 2013-01-06 2013-05-01 公安部第三研究所 Passive RFID (Radio Frequency Identification Devices) electronic tag reader-writer with high reliability and UHF (Ultra High Frequency) and read write control method
CN103778449A (en) * 2014-01-20 2014-05-07 中国科学院数据与通信保护研究教育中心 Tracking and monitoring system and method for intra-area mobile storage device

Also Published As

Publication number Publication date
CN111310877B (en) 2022-11-11

Similar Documents

Publication Publication Date Title
US8121909B2 (en) Activity inference and reactive feedback
CN205015717U (en) Warehouse goods and materials monitored control system
JP4286838B2 (en) Information technology (IT) equipment positioning system
JP4785431B2 (en) Storage medium control apparatus, storage medium control method, and computer program
US20180359274A1 (en) Systems and methods for providing a notification of a cyber attack in a security system
KR102141922B1 (en) System and Method for Contolling Warehouse Security based on IoT
CN207938017U (en) Intelligent storage managing device and system
EP3848862A1 (en) Method and apparatus for managing information about measurement device
US10700917B2 (en) Life cycle network management system for performing life cycle and maintenance management of distributed network devices
CN108408362A (en) A kind of intelligent transportation monitoring system and monitoring method for conveyer belt
CN103280043A (en) RFID (Radio frequency identification)-based asset monitoring and burglary prevention system
CN109831911A (en) The maintaining method of elevator assemblies
CN112016870A (en) Intelligent warehousing system
CN212135439U (en) Radio frequency monitoring system and RFID monitoring equipment with radar detection function
CN111310877B (en) Asset monitoring method, equipment and storage medium
CN110135531A (en) Method, device and system for identifying and monitoring disassembly prevention of parts
CN103258258A (en) Asset monitoring and anti-theft method based on RFID technology
CN105430324A (en) Monitoring system and method
EP3598407B1 (en) System
KR101378781B1 (en) Method for providing check service by using mobile device and computer readable recording medium applying the same
US20080303669A1 (en) Vibration logging tag
CN114240283A (en) Warehouse management method, warehouse management device, computer equipment, storage medium and program product
CN207867293U (en) A kind of intelligent transportation monitoring system for conveyer belt
JP2010037075A (en) Article control system and program
KR20080053338A (en) Article management system and article management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant