CN111865955A - Secure transportation monitoring method, device and system for confidential documents - Google Patents

Secure transportation monitoring method, device and system for confidential documents Download PDF

Info

Publication number
CN111865955A
CN111865955A CN202010665660.7A CN202010665660A CN111865955A CN 111865955 A CN111865955 A CN 111865955A CN 202010665660 A CN202010665660 A CN 202010665660A CN 111865955 A CN111865955 A CN 111865955A
Authority
CN
China
Prior art keywords
information
target
box
document box
confidential
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010665660.7A
Other languages
Chinese (zh)
Inventor
薛军
刘德海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Seeworld Technology Co ltd
Original Assignee
Guangzhou Seeworld Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Seeworld Technology Co ltd filed Critical Guangzhou Seeworld Technology Co ltd
Priority to CN202010665660.7A priority Critical patent/CN111865955A/en
Publication of CN111865955A publication Critical patent/CN111865955A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

The invention relates to the technical field of file safe transportation, in particular to a method, a device and a system for monitoring safe transportation of confidential documents, which comprises the following steps: acquiring initial identity information of a confidential person through an identity verification device arranged on a target confidential document box; if the current authentication information input by the authentication device is acquired in the transportation process of the target security file box; judging whether the current identity authentication information is matched with the initial identity information; and if the current identity authentication information is matched with the target security document box, the current identity authentication information is sent to a user side related to the target security document box. The invention has the effects of continuously and effectively monitoring the transportation of the confidential documents and improving the security of the transportation of the confidential documents.

Description

Secure transportation monitoring method, device and system for confidential documents
Technical Field
The invention relates to the technical field of file safe transportation, in particular to a method, a device and a system for monitoring safe transportation of confidential documents.
Background
At present, before general examinations or examinations of various grades in countries, provinces and cities, test papers need to be transported to various examination places in a confidential mode, a great amount of manpower and material resources are input to carry out strict confidential work in a few types except high examinations, the cost of the manpower and material resources which can be input in most grades of examinations is limited, and the confidentiality of the confidential work is adversely affected.
Most of existing confidential documents are boxed by a confidential cabinet or a confidential box, then escorted by a specially-assigned person, and a GPS (global positioning system) positioner is arranged on the escort vehicle to position the escort vehicle in real time.
Disclosure of Invention
The invention aims to continuously and effectively monitor the transportation of confidential documents and improve the security of the transportation of the confidential documents.
The above object of the present invention is achieved by the following technical solutions:
a method for secure transportation monitoring of confidential documents, comprising the steps of:
acquiring initial identity information of a confidential person through an identity verification device arranged on a target confidential document box;
if the current authentication information input by the authentication device is acquired in the transportation process of the target security file box; judging whether the current identity authentication information is matched with the initial identity information;
and if the current identity authentication information is matched with the target security document box, the current identity authentication information is sent to a user side related to the target security document box.
By adopting the technical scheme, the initial identity information of the security personnel is obtained through the identity verification device arranged on the target security file box, so that only the security personnel is allowed to verify the identity verification device and open the target security file box under the condition of non-violent unpacking; if someone performs identity authentication on the identity authentication device in the transportation process, acquiring current identity authentication information through the identity authentication device; judging whether the current authentication information of the authentication device is matched with the initial authentication information or not, if so, indicating that the security personnel perform authentication, sending the current authentication information to a user end associated with a target security document box, and determining the identity information of the security personnel performing authentication and informing the related user end; this application is through being equipped with authentication recognition function at the secret document case of target, so reduces the possibility that non-secret personnel opened secret case, if secret case had been opened to secret personnel in addition, relevant secret personnel identity information also can be told the user to can play the secret work of supervision secret personnel psychologically, thereby improve the security of secret file transportation.
The present invention in a preferred example may be further configured to: after determining whether the current authentication information of the authentication device matches the initial authentication information, the monitoring method further includes:
and if not, triggering an alarm prompt on the identity authentication device.
By adopting the technical scheme, if the current authentication information of the authentication device is not matched with the initial authentication information, the person who performs authentication on the authentication device can be determined not to be a confidential person, and then the alarm prompt on the authentication device is triggered, so that the authentication operation of the confidential person can be warned, and meanwhile, the confidential person can know the abnormal operation at the moment.
The present invention in a preferred example may be further configured to: the monitoring method further comprises the following steps:
acquiring the sealing state information of the target security file box in real time;
judging whether the target security file box is subjected to unpacking light or not;
and if so, sending the state exception information to the user end associated with the target security document box.
By adopting the technical scheme, the sealing state of the target security file box can be obtained in real time by acquiring the sealing state information of the target security file box in real time; and if the target security file box is opened by security personnel or violently unpacked, sending state abnormal information to a user end associated with the target security file box, so that the abnormal unpacking condition of the target security file box is monitored in real time, and the related management personnel can conveniently carry out further security processing.
The present invention in a preferred example may be further configured to: after the target security file box is judged whether to be unpacked and exposed to light, the monitoring method further comprises the following steps:
and if the target confidential document box is unpacked and exposed to light, triggering a camera device arranged in the target confidential document box to acquire unpacked portrait information and surrounding environment information, and sending the unpacked portrait information and the surrounding environment information to a user side associated with the target confidential document box.
By adopting the technical scheme, if the situation that the target confidential document box is unpacked and exposed to light is judged, the camera device arranged in the target confidential document box is triggered to acquire unpacking portrait information and surrounding environment information, so that the unpacking portrait information and the surrounding environment information can be recorded, and the unpacking portrait information and the surrounding environment information are sent to a user side associated with the target confidential document box, so that related management personnel can be informed to perform further security processing according to the information shot by videos.
The present invention in a preferred example may be further configured to: the monitoring method further comprises the following steps:
acquiring the transportation address information of the target confidential file box, and determining a preset transportation path of the target confidential file box according to the transportation address information;
Acquiring the current position information of the target security file box in real time;
judging whether the position of the target confidential file box is abnormal or not according to the current position information of the target confidential file box and the preset transportation path;
and if so, sending the position abnormal information to the user end associated with the target security document box.
By adopting the technical scheme, the transportation address information of the target confidential document box is obtained, the preset transportation path of the target confidential document box is determined according to the transportation address information, and the transportation route of the target confidential document box can be determined, so that the target confidential document box can be transported according to the preset transportation path; the current position information of the target confidential document box is obtained in real time, so that the current position condition of the target confidential document box in the transportation process can be mastered in real time; and judging whether the position of the target security document box is abnormal or not according to the current position information of the target security document box and the preset transportation path, monitoring whether the transportation of the target security document box deviates from the preset transportation path or not in real time, and if so, sending position abnormal information to a user end associated with the target security document box, thereby informing related management personnel to carry out further security processing according to the information shot by the video.
The present invention in a preferred example may be further configured to: the method for judging whether the position of the target security file box is abnormal or not according to the current position information of the target security file box and the preset transportation path specifically comprises the following steps:
calculating a real-time transportation path of the target confidential document box according to the current position information of the target confidential document box;
judging whether the real-time transportation path of the target confidential document box is consistent with the fitting of a preset transportation path or not;
if not, determining that the position of the target confidential document box is abnormal.
By adopting the technical scheme, the real-time transportation path of the target security file box is calculated according to the current position information of the target security file box, so that the real-time transportation path of the target security file box is obtained in real time; whether the real-time transportation path of the target confidential document box is matched with the preset transportation path or not is judged, so that whether the real-time transportation path deviates from the preset transportation path or not can be judged in real time, and if the real-time transportation path is not matched with the preset transportation path, the position of the target confidential document box is determined to be abnormal, so that the abnormal condition of the position of the target confidential document box can be monitored in real time.
The second aim of the invention is realized by the following technical scheme:
A secure transportation monitoring device for confidential documents, the device comprising:
the system comprises an initial information acquisition module, a target security message file box and a data processing module, wherein the initial information acquisition module is used for acquiring initial identity information of security personnel, acquiring transportation address information of the target security message file box and planning a preset transportation path of the target security message file box according to the transportation address information;
the real-time information acquisition module is used for acquiring the current authentication information recorded by the authentication device in real time and acquiring the current position information and the sealing state information of the target security file box in real time;
the identity authentication module is used for judging whether the current identity authentication information is matched with the initial identity information of the confidential personnel or not according to the current identity authentication information and the initial identity information of the confidential personnel, if so, the current identity authentication information is sent to a user side associated with a target confidential document box, and if not, an alarm prompt on the identity authentication device is triggered;
the position abnormity judgment module is used for judging whether the position of the target security document box is abnormal or not according to the current position information of the target security document box and the preset transportation path, and if so, sending position abnormity information to a user side associated with the target security document box;
The sealing abnormity judging module is used for judging whether the target security file box is unpacked to be exposed to light or not according to the sealing state information of the target security file box, and if so, sending state abnormity information to a user side associated with the target security file box;
and the video shooting module is used for triggering a camera device arranged in the target confidential document box to acquire unpacking portrait information and surrounding environment information according to the unpacking visible light of the target confidential document box, and sending the unpacking portrait information and the surrounding environment information to a user side associated with the target confidential document box.
The third object of the invention is realized by the following technical scheme:
a secure transportation monitoring system for confidential documents, the system comprising:
the execution terminal is in communication connection with the computer device;
the execution terminal comprises an identity verification device arranged on the target security file box, a position locator, a photosensitive sensor and a video shooting device, wherein the position locator, the photosensitive sensor and the video shooting device are arranged in the target security file box;
the identity authentication device is used for inputting initial identity information of security personnel and inputting current identity authentication information, and sending the initial identity information and the current identity authentication information to the computer equipment;
The position locator is used for acquiring the current position information of the target security file box in real time and sending the current position information to the computer equipment;
the photosensitive sensor is used for acquiring the sealing state information of the target security file box in real time and sending the information to the computer equipment;
the video shooting device is used for triggering a shooting device arranged in the target confidential document box to acquire unpacking portrait information and surrounding environment information according to the unpacking visible light of the target confidential document box, and sending the unpacking portrait information and the surrounding environment information to a user side associated with the target confidential document box;
the computer equipment is used for acquiring initial identity information and current identity verification information of security personnel related to the target security document box, judging whether the current identity verification information is matched with the initial identity information, if so, sending the current identity verification information to a user side associated with the target security document box, and if not, generating an alarm reminding instruction and sending the alarm reminding instruction to an identity verification device.
The computer equipment is also used for acquiring the sealing state information of the target security document box and judging whether the target security document box is unpacked and exposed, if so, sending state abnormal information to a user side associated with the target security document box.
The present invention in a preferred example may be further configured to: the computer device is further configured to obtain transportation address information of the target confidential document box, determine a preset transportation path of the target confidential document box according to the transportation address information, judge whether the position of the target confidential document box is abnormal according to the current position information of the target confidential document box and the preset transportation path, and send position abnormality information to a user side associated with the target confidential document box if the position of the target confidential document box is abnormal.
The present invention in a preferred example may be further configured to: the identity authentication device is also used for receiving an alarm reminding instruction of the computer equipment and executing alarm reminding.
In summary, the invention includes at least one of the following beneficial technical effects:
1. this application is through being equipped with authentication recognition function at the secret document case of target, so reduces the possibility that non-secret personnel opened secret case, if secret case had been opened to secret personnel in addition, relevant secret personnel identity information also can be told the user to can play the secret work of supervision secret personnel psychologically, thereby improve the security of secret file transportation.
2. According to the method, the initial identity information of the security personnel is obtained through the identity verification device arranged on the target security file box, so that only the security personnel is allowed to verify the identity verification device and open the target security file box under the condition of non-violent unpacking; if someone performs identity authentication on the identity authentication device in the transportation process, the identity authentication device sends the current identity authentication information to the computer equipment; and judging whether the current authentication information of the authentication device is matched with the initial authentication information, if so, indicating that the security personnel performs authentication, sending the current authentication information to a user end associated with the target security document box, and determining the identity information of the security personnel performing authentication and informing the related user end.
3. If the current authentication information of the authentication device is judged to be not matched with the initial authentication information, the person who performs authentication on the authentication device can be determined not to be a confidential person, and then alarm reminding on the authentication device is triggered, so that the authentication operation of the confidential person can be warned, and meanwhile, the confidential person can know abnormal operation at the moment.
Drawings
FIG. 1 is a flow chart of a first implementation of a method for secure transportation monitoring of a confidential document according to an embodiment of the present application;
FIG. 2 is a flow chart of a second implementation of a method for secure transportation monitoring of a confidential document according to an embodiment of the present application;
FIG. 3 is a flow chart of a third implementation of a method for monitoring secure transportation of a confidential document according to an embodiment of the present application;
FIG. 4 is a schematic block diagram of an agricultural product logistics monitoring apparatus according to an embodiment of the present application;
FIG. 5 is a schematic block diagram of an agricultural product logistics monitoring system of an embodiment of the present application;
FIG. 6 is a schematic diagram of a computer device in an embodiment of the present application.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
Examples
Generally, when confidential data are transported, such as confidential test paper or confidential documents, a confidential document box is adopted to carry out boxing and sealing on the confidential data and then logistics transportation is carried out, the transportation of the confidential data is different from that of common packages, the risk of data leakage exists, and therefore the safe transportation level of the confidential data is higher.
As shown in FIG. 1, the invention discloses a method for monitoring secure transportation of a confidential document, which specifically comprises the following steps:
s101: the initial identity information of the confidential personnel is obtained through the identity verification device arranged on the target confidential document box.
In this embodiment, the target secure document box refers to a secure box in which a target secure document is packaged; the identity authentication device is a device which is arranged on the target security file box and has a biological identification function; the security personnel are a plurality of personnel with the authority of opening the target security file box, and can participate in escort of the target security file box; the initial identity information refers to information reflecting the identity of the security personnel.
Specifically, before the target security document box is transported, the security personnel inputs initial identity information into an identity verification device on the target security document box, wherein the initial identity information comprises one or more combinations of fingerprint information, portrait information or iris information of the security personnel.
Further, the identity authentication device sends the initial identity information to the computer equipment through wireless communication, and the computer equipment receives the initial identity information.
S102: and in the transportation process of the target security file box, if the current authentication information input by the authentication device is obtained.
In this embodiment, the current authentication information refers to identity information obtained when a person performs authentication.
Specifically, in the transportation process of the target security document box, if someone inputs authentication information into the authentication device, the current authentication information is acquired by the authentication device, and in this embodiment, the current authentication information includes fingerprint information, portrait information, or iris information.
S103: and judging whether the current identity authentication information is matched with the initial identity information.
Specifically, it is determined whether the current authentication information of the authentication device matches the initial identity information, and in this embodiment, it is determined whether the fingerprint information, portrait information, or iris information entered by the authentication device matches the initial identity information.
S104: and if the identity authentication information is matched with the target security document box, the current identity authentication information is sent to a user side related to the target security document box.
Specifically, if it is determined in step S103 that the current authentication information matches the initial authentication information, which indicates that the security personnel performed authentication during transportation of the target security document box, the current authentication information is sent to the user side associated with the target security document box.
In step S103 of this embodiment, after determining whether the current authentication information of the authentication device matches the initial authentication information, the method for monitoring secure transportation of a confidential document further includes:
s114: and if not, triggering an alarm prompt on the identity authentication device.
Specifically, if it is determined that the current authentication information of the authentication device is not matched with the initial authentication information, which indicates that the non-confidential person performs authentication, an alarm prompt on the authentication device is triggered, where the alarm prompt in this embodiment includes a voice warning prompt or a ring.
As shown in fig. 2, the method for monitoring secure transportation of a confidential document of the present embodiment further includes the following steps:
s201: and acquiring the sealing state information of the target security file box in real time.
In the present embodiment, the sealing state information refers to information reflecting the sealing condition of the target confidential document box.
Specifically, the sealing state information of the target security document box is obtained through a photosensitive sensor arranged in the target security document box, and the sealing state information is the photosensitive value of the photosensitive sensor.
S202: and judging whether the target security file box is subjected to unpacking light or not.
Specifically, whether the light sensitivity value is larger than 0 is judged according to the acquired sealing state information, namely the light sensitivity value of the photosensitive sensor, and if the light sensitivity value is larger than 0, the unpacking light of the target security document box is determined.
S203: and if so, sending the state exception information to the user end associated with the target security document box.
In this embodiment, the state exception information refers to a state exception condition of the target security file box.
Specifically, if the determination result in step S202 is that the target secure document box is unpacked and is exposed to light, the state anomaly information is triggered and sent to the user end associated with the target secure document box, where the state anomaly information includes a specific reason and time of the state anomaly.
In this embodiment, after the step S202 is to determine whether the target confidential document box is unpacked and exposed to light, the method for monitoring secure transportation of the confidential document in this embodiment further includes:
s213: and if the target confidential document box is unpacked and exposed to light, triggering a camera device arranged in the target confidential document box to acquire unpacking portrait information and surrounding environment information, and sending the unpacking portrait information and the surrounding environment information to a user side associated with the target confidential document box.
In this embodiment, the unpacking portrait information refers to a portrait photo or video of a person who opens the target confidential document box; the surrounding environment information refers to a picture or a video of the surrounding environment when the target confidential document box is opened.
Specifically, if the determination result in step S202 is that the target confidential document box is unpacked and exposed to light, the image capturing device disposed in the target confidential document box is triggered to acquire unpacked portrait information and surrounding environment information.
Further, the obtained unpacking portrait information and the surrounding environment information are sent to a user side related to the target confidential document box.
As shown in fig. 3, the method for monitoring secure transportation of a confidential document of the present embodiment further includes the following steps:
s301: and acquiring the transportation address information of the target confidential file box, and determining the preset transportation path of the target confidential file box according to the transportation address information.
In this embodiment, the transport address information refers to the departure address information and the destination address information of the target security file box; the preset transportation path refers to a transportation route from a departure place to a destination preset for the target security document box.
Specifically, before the target confidential document box is transported, the transport address information of the target confidential document box is obtained in a manual input mode, and the preset transport path of the target confidential document box is calculated according to the starting address information and the destination address information of the target confidential document box.
S302: and acquiring the current position information of the target confidential document box in real time.
In this embodiment, the current location information refers to the current geographic location information of the target security document box.
Specifically, in the transportation process of the target security document box, the current position information of the target security document box is acquired in real time through a position sensor arranged in the target security document box.
S303: and judging whether the position of the target confidential file box is abnormal or not according to the current position information of the target confidential file box and a preset transportation path.
Specifically, a real-time transportation path of the target security document box is calculated according to the current position information of the target security document box;
And further fitting the real-time transportation path of the target confidential file box with a preset transportation path, and if the fitting result is inconsistent, indicating that the real-time transportation path of the target confidential file box deviates from the preset transportation path, determining that the position of the target confidential file box is abnormal.
S304: and if so, sending the position abnormal information to the user end associated with the target security document box.
In this embodiment, the position abnormality information is information reflecting the cause and specific position of the position abnormality of the target confidential document box.
Specifically, if it is determined in step S303 that the target secure document box is abnormal in position, the position abnormality information is triggered, and the position abnormality information is sent to the user side associated with the target secure document box.
As shown in fig. 4, in the present embodiment, there is further provided a secure transportation monitoring apparatus for a confidential document, including: the system comprises an initial information acquisition module 10, a real-time information acquisition module 20, an identity verification module 30, a position abnormity judgment module 40, a sealing abnormity judgment module 50 and a video shooting module 60.
The initial information acquisition module 10 is configured to acquire transportation address information of the target security document box, and plan a preset transportation path and transportation time of the target security document box according to the transportation address information;
The real-time information acquisition module 20 is used for acquiring the current position information and the sealing state information of the target security file box in real time;
the identity authentication module 30 is used for judging whether the current identity authentication information is matched with the initial identity information of the confidential personnel according to the current identity authentication information input by the identity authentication device and the input initial identity information of the confidential personnel, if so, sending the current identity authentication information to a user side associated with the target confidential document box, and if not, triggering an alarm prompt on the identity authentication device;
the position abnormity judging module 40 is used for judging whether the position of the target security document box is abnormal according to the current position information of the target security document box and a preset transportation path, and if so, sending position abnormity information to a user side associated with the target security document box;
a sealing abnormity judging module 50, configured to judge whether the target security document box is unpacked to be exposed according to the sealing state information of the target security document box, and if yes, send state abnormity information to a user side associated with the target security document box;
and the video shooting module 60 is configured to trigger a camera device arranged in the target confidential document box to acquire unpacking portrait information and surrounding environment information if the target confidential document box is unpacked and exposed to light, and send the unpacking portrait information and the surrounding environment information to a user side associated with the target confidential document box.
As shown in fig. 5, in the present embodiment, there is further provided a secure transportation monitoring system for a confidential document, including:
an execution terminal 501 and a computer device 502, wherein the execution terminal 501 and the computer device are connected in a communication mode 502;
the execution terminal 501 includes an authentication device 5011 disposed on the target security document box, and a position locator 5012, a photosensitive sensor 5013, and a photographing device 5014 disposed in the target security document box;
the identity verification device 5011 is used for inputting initial identity information and current identity verification information of security personnel related to the target security file box and sending the initial identity information and the current identity verification information to the computer equipment; the identity authentication device 5011 is further configured to receive an alarm reminding instruction of the computer device, and execute alarm reminding.
The position locator 5012 is used for acquiring the current position information of the target security file box in real time and sending the current position information to the computer equipment;
the photosensitive sensor 5013 is used for acquiring the sealing state information of the target security file box in real time and sending the information to the computer equipment;
the shooting device 5014 is used for triggering a shooting device arranged in the target confidential document box to acquire unpacking portrait information and surrounding environment information according to the unpacking light of the target confidential document box, and sending the unpacking portrait information and the surrounding environment information to a user side associated with the target confidential document box;
The computer equipment 502 is used for acquiring initial identity information and current identity verification information of security personnel related to the target security document box, acquiring current position information of the target security document box, judging whether the current identity verification information is matched with the initial identity information or not, if so, sending the current identity verification information to a user side related to the target security document box, and if not, generating an alarm reminding instruction and sending the alarm reminding instruction to an identity verification device;
the computer device 502 is further configured to obtain the sealing state information of the target security document box, and determine whether the target security document box is unpacked with visible light, and if so, send state abnormality information to the user side associated with the target security document box.
The computer device 502 is further configured to obtain transportation address information of the target confidential document box, determine a preset transportation path of the target confidential document box according to the transportation address information, determine whether the position of the target confidential document box is abnormal according to the current position information of the target confidential document box and the preset transportation path, and if so, send position abnormality information to a user side associated with the target confidential document box.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
The computer device 502 in this embodiment may be a server, and its internal structure diagram may be as shown in fig. 6. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer equipment is used for storing initial identity information, current identity authentication information, transportation address information, current position information acquired in real time, sealing state information and the like which are input by the identity authentication device. The network interface of the computer device is used for communicating with an external terminal through a network connection.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (10)

1. A method of monitoring secure transport of a confidential document, the method comprising the steps of:
acquiring initial identity information of a confidential person through an identity verification device arranged on a target confidential document box;
If the current authentication information input by the authentication device is acquired in the transportation process of the target security file box; judging whether the current identity authentication information is matched with the initial identity information;
and if the current identity authentication information is matched with the target security document box, the current identity authentication information is sent to a user side related to the target security document box.
2. The method for monitoring the secure transportation of a confidential document according to claim 1, wherein after determining whether the current authentication information of the authentication device matches the initial authentication information, the monitoring method further comprises:
and if not, triggering an alarm prompt on the identity authentication device.
3. A method of monitoring the secure transportation of a confidential document according to claim 1, further comprising the steps of:
acquiring the sealing state information of the target security file box in real time;
judging whether the target security file box is subjected to unpacking light or not;
and if so, sending the state exception information to the user end associated with the target security document box.
4. A method for monitoring the secure transportation of a confidential document according to claim 3, wherein after determining whether the target confidential document box is unpacked by the light, the method further comprises:
And if the target confidential document box is unpacked and exposed to light, triggering a camera device arranged in the target confidential document box to acquire unpacked portrait information and surrounding environment information, and sending the unpacked portrait information and the surrounding environment information to a user side associated with the target confidential document box.
5. The secure transportation monitoring method of a confidential document according to claim 1, further comprising:
acquiring the transportation address information of the target confidential file box, and determining a preset transportation path of the target confidential file box according to the transportation address information;
acquiring the current position information of the target security file box in real time;
judging whether the position of the target confidential file box is abnormal or not according to the current position information of the target confidential file box and the preset transportation path;
and if so, sending the position abnormal information to the user end associated with the target security document box.
6. The secure transportation monitoring method for the confidential document according to claim 5, wherein the step of judging whether the position of the target confidential document box is abnormal or not according to the current position information of the target confidential document box and the preset transportation path comprises the following specific steps:
Calculating a real-time transportation path of the target confidential document box according to the current position information of the target confidential document box;
judging whether the real-time transportation path of the target confidential document box is consistent with the fitting of a preset transportation path or not;
if not, determining that the position of the target confidential document box is abnormal.
7. A secure transportation monitoring device for confidential documents, the device comprising:
the initial information acquisition module is used for acquiring the transportation address information of the target security file box and planning the preset transportation path of the target security file box according to the transportation address information;
the real-time information acquisition module is used for acquiring the current authentication information recorded by the authentication device in real time and acquiring the current position information and the sealing state information of the target security file box in real time;
the identity authentication module is used for judging whether the current identity authentication information is matched with the initial identity information of the confidential personnel or not according to the current identity authentication information and the initial identity information of the confidential personnel, if so, the current identity authentication information is sent to a user side associated with a target confidential document box, and if not, an alarm prompt on the identity authentication device is triggered;
The position abnormity judgment module is used for judging whether the position of the target security document box is abnormal or not according to the current position information of the target security document box and the preset transportation path, and if so, sending position abnormity information to a user side associated with the target security document box;
the sealing abnormity judging module is used for judging whether the target security file box is unpacked to be exposed to light or not according to the sealing state information of the target security file box, and if so, sending state abnormity information to a user side associated with the target security file box;
and the shooting module is used for triggering a camera device arranged in the target confidential document box to acquire unpacking portrait information and surrounding environment information according to the unpacking light of the target confidential document box, and sending the unpacking portrait information and the surrounding environment information to a user side associated with the target confidential document box.
8. A secure transportation monitoring system for confidential documents, the system comprising:
the execution terminal is in communication connection with the computer device;
the execution terminal comprises an identity verification device arranged on the target security file box, a position locator, a photosensitive sensor and a shooting device, wherein the position locator, the photosensitive sensor and the shooting device are arranged in the target security file box;
The identity verification device is used for inputting initial identity information and current identity verification information of security personnel related to the target security file box and sending the initial identity information and the current identity verification information to the computer equipment;
the position locator is used for acquiring the current position information of the target security file box in real time and sending the current position information to the computer equipment;
the photosensitive sensor is used for acquiring the sealing state information of the target security file box in real time and sending the information to the computer equipment;
the shooting device is used for triggering the shooting device arranged in the target confidential document box to acquire unpacking portrait information and surrounding environment information according to the unpacking light of the target confidential document box, and sending the unpacking portrait information and the surrounding environment information to a user side associated with the target confidential document box;
the computer equipment is used for acquiring initial identity information and current identity verification information of security personnel related to the target security document box, judging whether the current identity verification information is matched with the initial identity information or not, if so, sending the current identity verification information to a user side associated with the target security document box, and if not, generating an alarm reminding instruction and sending the alarm reminding instruction to an identity verification device;
The computer equipment is also used for acquiring the sealing state information of the target security document box and judging whether the target security document box is unpacked and exposed, if so, sending state abnormal information to a user side associated with the target security document box.
9. A secure transportation monitoring system of confidential documents according to claim 8,
the computer device is further configured to obtain transportation address information of the target confidential document box, determine a preset transportation path of the target confidential document box according to the transportation address information, judge whether the position of the target confidential document box is abnormal according to the current position information of the target confidential document box and the preset transportation path, and send position abnormality information to a user side associated with the target confidential document box if the position of the target confidential document box is abnormal.
10. The system for secure transportation monitoring of confidential documents according to claim 8, wherein the authentication device is further configured to receive an alarm reminding instruction from a computer device and execute an alarm reminding.
CN202010665660.7A 2020-07-11 2020-07-11 Secure transportation monitoring method, device and system for confidential documents Pending CN111865955A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010665660.7A CN111865955A (en) 2020-07-11 2020-07-11 Secure transportation monitoring method, device and system for confidential documents

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010665660.7A CN111865955A (en) 2020-07-11 2020-07-11 Secure transportation monitoring method, device and system for confidential documents

Publications (1)

Publication Number Publication Date
CN111865955A true CN111865955A (en) 2020-10-30

Family

ID=72983010

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010665660.7A Pending CN111865955A (en) 2020-07-11 2020-07-11 Secure transportation monitoring method, device and system for confidential documents

Country Status (1)

Country Link
CN (1) CN111865955A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106408057A (en) * 2016-11-10 2017-02-15 深圳市海云天科技股份有限公司 Monitoring method of file in secret box, device and system
CN108009780A (en) * 2017-12-29 2018-05-08 北京远大宏略科技股份有限公司 A kind of intelligent and safe delivery system
US20180137742A1 (en) * 2016-01-26 2018-05-17 Beijing Didi Infinity Technology And Development Co., Ltd. Systems and methods for monitoring on-route transportations
CN109884944A (en) * 2019-03-07 2019-06-14 中国计量大学 A kind of paper transport monitoring device based on NB-IoT technology
CN109960917A (en) * 2019-03-12 2019-07-02 深圳市趣创科技有限公司 A kind of time slot scrambling and device of document
CN110555497A (en) * 2019-10-09 2019-12-10 朱清 Intelligent management and control system and method for confidential documents with identity recognition and knowledge range matching functions

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180137742A1 (en) * 2016-01-26 2018-05-17 Beijing Didi Infinity Technology And Development Co., Ltd. Systems and methods for monitoring on-route transportations
CN106408057A (en) * 2016-11-10 2017-02-15 深圳市海云天科技股份有限公司 Monitoring method of file in secret box, device and system
CN108009780A (en) * 2017-12-29 2018-05-08 北京远大宏略科技股份有限公司 A kind of intelligent and safe delivery system
CN109884944A (en) * 2019-03-07 2019-06-14 中国计量大学 A kind of paper transport monitoring device based on NB-IoT technology
CN109960917A (en) * 2019-03-12 2019-07-02 深圳市趣创科技有限公司 A kind of time slot scrambling and device of document
CN110555497A (en) * 2019-10-09 2019-12-10 朱清 Intelligent management and control system and method for confidential documents with identity recognition and knowledge range matching functions

Similar Documents

Publication Publication Date Title
US9613257B2 (en) Global identification (ID) and age verification system and method
CN108306864B (en) Network data detection method and device, computer equipment and storage medium
CN108243212B (en) Method and device for vehicle diagnosis
CN110555779A (en) data processing method, data processing device, computer equipment and storage medium
CN110569389A (en) Environment monitoring method and device, computer equipment and storage medium
CN111935446B (en) Ship monitoring method, device, monitoring system and equipment based on block chain
CN112447033B (en) Security data processing method, system, computer equipment and storage medium
CN113066254B (en) Nuclear power equipment working environment abnormity early warning method, device, equipment and storage medium
CN111063048A (en) Method and device for processing equipment inspection information and electronic equipment
CN107909680A (en) Regulatory area entrance personnel safety inspection method and system
CN108872780B (en) Live working detection and system for live exploration and terminal equipment
CN114398449B (en) Data processing method, device, video monitoring system and storage medium
CN107171834A (en) Short Message Service Gateway service platform monitoring early-warning system and method based on gateway early warning pond
CN105678193A (en) Tamper-proof processing method and device
CN108600162B (en) User authentication method and device, computing equipment and computer storage medium
CN111372042B (en) Fault detection method and device, computer equipment and storage medium
CN111611991A (en) Fault processing method and device, electronic equipment and computer readable storage medium
CN113923207A (en) Computer network monitoring method and terminal
CN114510589A (en) Enterprise financial data entry method and device and electronic equipment
CN111865955A (en) Secure transportation monitoring method, device and system for confidential documents
CN110458710B (en) Request processing method, apparatus, computer device and storage medium
CN110737913B (en) Safety desensitization method and device based on time and date data and computer equipment
CN113206823A (en) Industrial information safety monitoring method and device, computer equipment and storage medium
CN111782372A (en) Java process starting method and device, computer equipment and storage medium
JP7467846B2 (en) Information processing device, method, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201030