CN112163136A - File identification method based on RFID (radio frequency identification device) identification technology - Google Patents

File identification method based on RFID (radio frequency identification device) identification technology Download PDF

Info

Publication number
CN112163136A
CN112163136A CN202011072963.4A CN202011072963A CN112163136A CN 112163136 A CN112163136 A CN 112163136A CN 202011072963 A CN202011072963 A CN 202011072963A CN 112163136 A CN112163136 A CN 112163136A
Authority
CN
China
Prior art keywords
file
files
time
rfid
characteristic value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011072963.4A
Other languages
Chinese (zh)
Inventor
金维国
杨俊飞
张征
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Avic Power Science & Technology Engineering Co ltd
Original Assignee
Avic Power Science & Technology Engineering Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Avic Power Science & Technology Engineering Co ltd filed Critical Avic Power Science & Technology Engineering Co ltd
Priority to CN202011072963.4A priority Critical patent/CN112163136A/en
Publication of CN112163136A publication Critical patent/CN112163136A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/93Document management systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/13File access structures, e.g. distributed indices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/14Details of searching files based on file metadata
    • G06F16/148File search processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations

Abstract

The invention discloses a file identification method based on an RFID (radio frequency identification) identification technology, which comprises the following steps: acquiring a file to be identified; step two: carrying out file identification by using a file identification system; step three: after the file identification is finished, the RFID identification module is used for identifying the file, the position information, the file name and the file characteristic value of the file are set in the RFID tag, and the file is identified through the RFID tag, so that the accuracy of the file identification is greatly improved; the file unloading module is used for unloading the files with the RFID tags in the temporary storage library to the database, and the file management module is used for managing the files with the RFID tags.

Description

File identification method based on RFID (radio frequency identification device) identification technology
Technical Field
The invention belongs to the technical field of file management, relates to a file identification method, and particularly relates to a file identification method based on an RFID (radio frequency identification) identification technology.
Background
"document" in the broad sense refers to a letter of official document or an article relating to policy, theory, etc. The file category is very wide, and software or programs such as antivirus and game running on a computer can be called files. A "document" in the narrow sense generally refers to a document, otherwise known as an official document. Documents are records that people make in various social activities. The narrow definition of "file" is not equivalent to "archive" and the main difference is whether it has a preserved value and whether it has the nature of the original record. If both are available, it can be called "archive", otherwise it can only be counted as a file. Although there is a large intersection between the two, they are never equal.
In the prior art, stored files cannot be found quickly, a large amount of time is needed for searching and identifying the files, and although some files with RFID tags exist at present, the RFID tags are single, and the file identification accuracy is not high; meanwhile, the file is not provided with the file transferring function and the similar file removing function in the process of identifying and storing the file; when the RFID label identification is carried out on the file, the identity of a file user cannot be verified, so that some confidential files are leaked, and therefore the file identification method based on the RFID identification technology is provided.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a file identification method based on an RFID identification technology.
The technical problem to be solved by the invention is as follows:
the stored files cannot be found quickly, a great deal of time is needed for searching and identifying the files, and although some files with RFID tags exist at present, the RFID tags are single, and the file identification accuracy is not high; meanwhile, the file is not provided with the file transferring function and the similar file removing function in the process of identifying and storing the file; when the RFID label identification is carried out on the file, the identity of a file user cannot be verified, so that some confidential files are leaked.
The purpose of the invention can be realized by the following technical scheme:
a file identification method based on RFID identification technology comprises the following steps:
the method comprises the following steps: acquiring a file to be identified;
step two: carrying out file identification by using a file identification system;
the file identification system comprises a file cabinet, a file identification subsystem and a plurality of handheld terminals, wherein the file identification subsystem and the handheld terminals are arranged in the file cabinet;
the handheld terminal comprises a terminal controller, an RFID inquiry module, a display module, an identity verification module and a communication connection module;
the label library is used for storing the RFID label of each file; the temporary storage library is used for temporarily storing files with RFID tags; the database is used for storing files with RFID labels and corresponding RFID labels; the RFID tag carries basic information and position information of the file, the position information is the placement position of the corresponding file, and the basic information comprises the file name and the file characteristic value of the corresponding file;
the terminal controller is in communication connection with the main controller through a communication connection module, and particularly is in communication connection through a 5G communication technology; the RFID inquiry module is used for inquiring the file with the RFID label and acquiring the basic information and the position information corresponding to the file with the RFID label;
the RFID module is used for identifying files, and the specific identification steps are as follows:
step S1: file users acquire all RFID tags which can be searched by the positions of the users through a handheld terminal, and basic information and position information of the RFID tags are fused to form directory information, and the directory information is used for later-stage query and retrieval of the users;
step S2: a user inputs search information through a handheld terminal, wherein the search information comprises a required file name and a required file characteristic value of a file;
step S3: comparing the required file name and the required file characteristic value with the file name and the characteristic value in the directory information one by one, acquiring the directory information consistent with the required file name and the required file characteristic value, and marking the corresponding directory information as the directory information to be selected;
step S4: comparing the characteristic value of the required file with the characteristic value of the file in the to-be-selected directory information to obtain an overlapping rate, wherein the calculating method of the overlapping rate is as follows:
k1: acquiring the total word number of the file characteristic value, marking the total word number of the file characteristic value as H1, and comparing the required file characteristic value with the file characteristic value one by one;
k2: acquiring a required file characteristic value and the repeated word number in the file characteristic value, and marking the repeated word number as H2;
k3: the formula H3-H2/H1 is used for obtaining the overlapping ratio H3
Step S5: determining the overlapping rate H3;
q1: when H3 is greater than or equal to a set threshold value X1, obtaining a file characteristic value with the highest overlapping rate, marking the directory information to be selected corresponding to the file characteristic value as target information, and simultaneously obtaining position information corresponding to the target information and marking the position information as target position information;
q2: when H3 is smaller than a set threshold value X1, determining that the current file characteristic value is wrong, simultaneously acquiring all directory information to be selected except the file characteristic value, and comparing all directory information to be selected except the file characteristic value with the required file characteristic value again;
the file unloading module is used for unloading the files with the RFID tags in the temporary storage library into a database; the file management module is used for managing files with RFID labels; the alarm module is used for carrying out alarm processing on the abnormal files and sending alarm information to the display module of the handheld terminal; the identity authentication module is used for carrying out security authentication on the identity of a file user;
step three: and the file identification is finished.
Further, the specific working process of the file unloading module is as follows:
SS 1: acquiring a plurality of files with RFID tags stored in a temporary storage library, and marking the files as i, i is 1, … …, n, i represents the number of the files with RFID tags;
SS 2: recording the storage time of each file with the RFID tag as storage starting time Ti 0;
SS 3: setting a time threshold value for temporary storage of the file, and marking the time threshold value as Ty;
SS 4: obtaining the unloading time Ti1 of each file with the RFID tag by using a formula Ti1 ═ Ti0+ Ty;
SS 5: when the corresponding file i with the RFID tag reaches the unloading time Ti1, the corresponding file i with the RFID tag is unloaded to the database.
Further, the specific authentication process of the identity authentication module is as follows:
SO 1: safety verification is carried out in a safety code input mode, wherein the safety code comprises a six-digit verification code which is randomly generated and a file characteristic value of a file with an RFID label stored by a user; the randomly generated six-digit verification code is formed by randomly mixing numbers and English letters;
SO 2: acquiring the generation time of the verification code, wherein the generation time of the verification code is marked as T2, acquiring the time of sending the verification code to a user handheld terminal, and marking the time of sending the verification code to the user handheld terminal as T3, so as to obtain the sending time length T4 of the verification code as T3-T2;
SO 3: acquiring the input time T5 of the security code, and calculating to obtain the security code input reaction time T6 of a user as T5-T3;
SO 4: presetting the aging time T7 of the verification code, adding the sending time T4 of the verification code with the verification code input reaction time T6 of a user, and comparing the sum with the aging time T7 of the verification code, wherein when T4+ T6 is more than T7, the verification code is invalid and needs to be sent again; when the T4+ T6 is less than or equal to T7, the verification code is valid, the verification code does not need to be sent again, and the next step is carried out;
SO 5: acquiring the total digit h, h being 14 of the security code, acquiring the total time length T7 of the security code input by a user, and calculating the average input time T8 being T7/14 of each digit of characters in the security code;
SO 6: acquiring input interval time Tu of a security code, wherein u is h-1 is 13, u represents the number of time segments of the input time of the security code, and acquiring maximum interval time Tmax and minimum interval time Tmin in the input interval time Tu;
SO 7: calculating to obtain a time deviation value Tpc of the input of the safety code by using a formula, wherein the specific formula is as follows:
Figure BDA0002715733840000051
in the formula, both alpha and beta are fixed values of preset proportionality coefficients;
SO 8: when the calculated time deviation value is larger than the set time deviation threshold value, the safety verification fails, a verification failure signal is generated and fed back to the main controller, the main controller sends the verification failure signal to the terminal controller through the communication connection module, and the terminal controller generates a corresponding character and displays the character through the display module.
Further, the specific management steps of the file management module are as follows:
p1: acquiring a file with an RFID tag stored in a database, and sequentially acquiring a file name, a file characteristic value and a file size of the file;
p2: when a file with an RFID label is transferred to a database, firstly, a file with the same size as that of the transferred file is obtained, and the file is marked as a primary screening file;
p3: acquiring files with the same file name as the file name of the dump file in the primary screening files, wherein the files are marked as secondary screening files;
p4: acquiring files with the same file characteristic values as the file characteristic values of the dump files in the secondary screening files, wherein the files are marked as tertiary screening files;
p5: when the three-time screening files exist, the files completely similar to the dump files exist in the database, the dump files do not need to be dumped into the database, and when the three-time screening files do not exist, the files similar to the dump files do not exist in the database, and the dump files are dumped into the database.
Further, the file characteristic value specifically obtains the following process:
acquiring a file number of a corresponding file, wherein the file number specifically comprises a company code/a department code/a file level code/a edition code/modification times of the file; the company code and the department code are both short for two English letters; the file level codes are divided into first-level files to N-level files, and the first-level files to the N-level files are sequentially represented by adopting the sequence from A to Z; the edition code is sequentially expressed by adopting the sequence of English letters A-Z; the modification times are sequentially expressed by adopting a sequence of two digits 00-09, and when the revision of the file exceeds 9 times, the revision time is increased by one digit, and so on.
Compared with the prior art, the invention has the beneficial effects that:
1. the invention can quickly search the files which are conveniently stored, avoids spending a large amount of time in the file searching and identifying work, sets the position information, the file name and the file characteristic value of the file in the RFID label, and greatly improves the accuracy of file identification by identifying the file through the RFID label;
2. in the file identification and storage process, firstly, files with RFID labels are temporarily stored in a temporary storage library, the files are automatically transferred to a database when the temporary storage time is reached, in the file transfer process, the similarity of the transferred files and the existing files in the database is compared, and when the same files exist, the files do not need to be transferred to the database, so that the storage space of the database is prevented from being occupied and wasted;
3. when the file is identified through the RFID label, the identity of the file user is safely verified in a mode of generating the safety code by combining the verification code and the file characteristic value, so that leakage of the confidential file is avoided, and the safety of file storage is improved.
Drawings
In order to facilitate understanding for those skilled in the art, the present invention will be further described with reference to the accompanying drawings.
FIG. 1 is a flow chart of the present invention;
fig. 2 is a block diagram of the system of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-2, a file identification method based on RFID identification technology includes the following steps:
the method comprises the following steps: acquiring a file to be identified;
step two: carrying out file identification by utilizing a file identification system, wherein the file identification system is a system based on an RFID identification technology;
step three: and the file identification is finished.
The file identification system comprises a file cabinet, a file identification subsystem and a plurality of handheld terminals, wherein the file identification subsystem and the handheld terminals are arranged in the file cabinet, the file identification subsystem comprises an RFID identification module, a temporary storage library, a label library, a database, a file unloading module, a file management module, an alarm module, a file analysis module and a main controller, and the main controller is a controller with the model RK 3288.
The handheld terminal comprises a terminal controller, an RFID inquiry module, a display module, an identity verification module and a communication connection module, and can be a smart phone but is not limited to the smart phone;
the label library is used for storing the RFID label of each file; the temporary storage library is used for temporarily storing files with RFID tags; the database is used for storing files with RFID labels and corresponding RFID labels; the RFID tag carries basic information and position information of the file, the position information is the placement position of the corresponding file, and the basic information comprises the file name and the file characteristic value of the corresponding file;
the specific file characteristic value acquisition process is as follows: acquiring a file number of a corresponding file, wherein the file number specifically comprises a company code/a department code/a file level code/a edition code/modification times of the file; the company code and the department code are both short for two English letters; the file level codes are divided into first-level files to N-level files, and the first-level files to the N-level files are sequentially represented by adopting the sequence from A to Z; the edition code is sequentially expressed by adopting the sequence of English letters A-Z; the modification times are sequentially expressed by adopting a sequence of two digits 00-09, if the file is modified for more than 9 times and is changed into a revision code, the file is raised by one digit, and the like;
the following examples are given: if the first version of the first-level file of the personnel department of Beijing Star Yaozi science and technology service Limited company is the second modified file, the serial number of the file is XY/RS/A/A/02, and the XY/RS/A/A/02 is the file characteristic value of the file;
the terminal controller is in communication connection with the main controller through a communication connection module, and particularly is in communication connection through a 5G communication technology; the RFID inquiry module is used for inquiring the file with the RFID label and acquiring the basic information and the position information corresponding to the file with the RFID label.
The RFID module is used for identifying files, and the specific identification steps are as follows:
step S1: file users acquire all RFID tags which can be searched by the positions of the users through a handheld terminal, and basic information and position information of the RFID tags are fused to form directory information, and the directory information is used for later-stage query and retrieval of the users;
step S2: a user inputs search information through a handheld terminal, wherein the search information comprises a required file name and a required file characteristic value of a file;
step S3: comparing the required file name and the required file characteristic value with the file name and the characteristic value in the directory information one by one, acquiring the directory information consistent with the required file name and the required file characteristic value, and marking the corresponding directory information as the directory information to be selected;
step S4: comparing the characteristic value of the required file with the characteristic value of the file in the to-be-selected directory information to obtain an overlapping rate, wherein the calculating method of the overlapping rate is as follows:
k1: acquiring the total word number of the file characteristic value, marking the total word number of the file characteristic value as H1, and comparing the required file characteristic value with the file characteristic value one by one;
k2: acquiring a required file characteristic value and the repeated word number in the file characteristic value, and marking the repeated word number as H2;
k3: the formula H3-H2/H1 is used for obtaining the overlapping ratio H3
Step S5: determining the overlapping rate H3;
q1: when H3 is greater than or equal to a set threshold value X1, obtaining a file characteristic value with the highest overlapping rate, marking the directory information to be selected corresponding to the file characteristic value as target information, and simultaneously obtaining position information corresponding to the target information and marking the position information as target position information;
q2: and when the H3 is smaller than the set threshold value X1, judging that the file characteristic value at the moment is wrong, simultaneously acquiring all the directory information to be selected except the file characteristic value, and comparing all the directory information to be selected except the file characteristic value with the required file characteristic value again.
The file unloading module is used for unloading the files with the RFID tags in the temporary storage library into the database, and the specific working process is as follows:
SS 1: acquiring a plurality of files with RFID tags stored in a temporary storage library, and marking the files as i, i is 1, … …, n, i represents the number of the files with RFID tags;
SS 2: recording the storage time of each file with the RFID tag as storage starting time Ti 0;
SS 3: setting a time threshold value for temporary storage of the file, and marking the time threshold value as Ty;
SS 4: obtaining the unloading time Ti1 of each file with the RFID tag by using a formula Ti1 ═ Ti0+ Ty;
SS 5: when the corresponding file i with the RFID tag reaches the unloading time Ti1, the corresponding file i with the RFID tag is unloaded to the database.
The file management module is used for managing files with RFID labels, and the specific management steps are as follows:
p1: acquiring a file with an RFID tag stored in a database, and sequentially acquiring a file name, a file characteristic value and a file size of the file;
p2: when a file with an RFID label is transferred to a database, firstly, a file with the same size as that of the transferred file is obtained, and the file is marked as a primary screening file;
p3: acquiring files with the same file name as the file name of the dump file in the primary screening files, wherein the files are marked as secondary screening files;
p4: acquiring files with the same file characteristic values as the file characteristic values of the dump files in the secondary screening files, wherein the files are marked as tertiary screening files;
p5: when the three-time screening files exist, the files completely similar to the dump files exist in the database, the dump files do not need to be dumped into the database, and when the three-time screening files do not exist, the files similar to the dump files do not exist in the database, and the dump files are dumped into the database.
The alarm module is used for carrying out alarm processing on the abnormal files and sending alarm information to the display module of the handheld terminal; the file analysis module is used for performing security analysis on each file with the RFID tag, and the specific security analysis process is as follows:
w1: presetting an identifiable file format uploaded to a temporary storage library by a terminal controller, wherein the identifiable file format specifically comprises doc, docx, xls, xlsx, ppt, pptx, jpg, png, dwg, txt and the like;
w2: acquiring a folder where a file with an RFID tag is located, and further acquiring the number of files in the folder;
w2: acquiring the extension name of each file in the folder;
w3: when a file format other than the recognizable file format exists in the folder, the main controller marks the file format as a suspicious file, and generates alarm information through the alarm module and feeds the alarm information back to the display module;
w4: the display module presents the alarm information to file uploading personnel in a font form, inquires whether the file uploading personnel continuously upload the file, and the font form is 'yes' and 'no';
w5: when a file uploading person clicks 'yes' in the display module, the terminal controller generates a trust signal and sends the trust signal to the main controller, and the main controller marks the suspicious file as a trust file and then can continue uploading;
w6: when a file uploading person clicks 'no' in the display module, the terminal controller generates an untrusted signal and sends the untrusted signal to the main controller, and the main controller continues to intercept the suspicious file uploading and deletes the suspicious file;
the identity authentication module is used for carrying out security authentication on the identity of a file user, and the specific authentication process is as follows:
SO 1: safety verification is carried out in a safety code input mode, wherein the safety code comprises a six-digit verification code which is randomly generated and a file characteristic value of a file with an RFID label stored by a user; the randomly generated six-digit verification code is formed by randomly mixing numbers and English letters, and specifically exemplifies a security code: the randomly generated six-digit verification code QY72P1+ file characteristic value XYRSAA02, namely the security code is QY72P1XYRSAA 02;
SO 2: acquiring the generation time of the verification code, wherein the generation time of the verification code is marked as T2, acquiring the time of sending the verification code to a user handheld terminal, and marking the time of sending the verification code to the user handheld terminal as T3, so as to obtain the sending time length T4 of the verification code as T3-T2;
SO 3: acquiring the input time T5 of the security code, and calculating to obtain the security code input reaction time T6 of a user as T5-T3;
SO 4: presetting the aging time T7 of the verification code, adding the sending time T4 of the verification code with the verification code input reaction time T6 of a user, and comparing the sum with the aging time T7 of the verification code, wherein when T4+ T6 is more than T7, the verification code is invalid and needs to be sent again; when the T4+ T6 is less than or equal to T7, the verification code is valid, the verification code does not need to be sent again, and the next step is carried out;
SO 5: acquiring the total digit h, h being 14 of the security code, acquiring the total time length T8 of the security code input by a user, and calculating the average input time T9 being T8/14 of each digit of characters in the security code;
SO 6: acquiring input interval time Tu of a security code, wherein u is h-1 is 13, u represents the number of time segments of the input time of the security code, and acquiring maximum interval time Tmax and minimum interval time Tmin in the input interval time Tu;
SO 7: calculating to obtain a time deviation value Tpc of the input of the safety code by using a formula, wherein the specific formula is as follows:
Figure BDA0002715733840000121
in the formula, both alpha and beta are fixed values of preset proportionality coefficients;
SO 8: when the calculated time deviation value is larger than the set time deviation threshold value, the safety verification fails, a verification failure signal is generated and fed back to the main controller, the main controller sends the verification failure signal to the terminal controller through the communication connection module, and the terminal controller generates a corresponding character and displays the character through the display module.
A file identification method based on RFID identification technology, during operation, an RFID identification module is used for identifying files, firstly, a file user obtains all RFID tags which can be searched by the user through a handheld terminal, basic information and position information of the RFID tags are fused to form directory information, then the user inputs search information through the handheld terminal, the search information comprises a required file name and a required file characteristic value of the file, the required file name and the required file characteristic value are compared with file names and characteristic values in the directory information one by one, the directory information which is consistent with the required file name and the required file characteristic value is obtained, meanwhile, the corresponding directory information is marked as directory information to be selected, and the required file characteristic value is compared with the file characteristic value in the directory information to be selected to obtain an overlapping rate;
firstly, the total word number of the file characteristic value is obtained, the total word number of the file characteristic value is marked as H1, the characteristic value of the demand file is compared with the characteristic value of the file one by one, then obtaining the requirement file characteristic value and the repeated word number in the file characteristic value, marking the repeated word number as H2, obtaining the overlapping rate H3 by the formula H3 ═ H2/H1, judging the overlapping rate H3, when H3 is more than or equal to a set threshold value X1, obtaining the file characteristic value with the highest overlapping rate and marking the directory information to be selected corresponding to the file characteristic value as target information, and simultaneously acquiring position information corresponding to the target information and marking the position information as the target position information, when H3 is smaller than a set threshold value X1, judging that the file characteristic value at the moment is wrong, simultaneously acquiring all the directory information to be selected except the file characteristic value, comparing all the directory information to be selected except the file characteristic value with the characteristic value of the required file again;
the file transferring module is used for transferring files with RFID tags in the temporary storage library to a database, acquiring a plurality of files with RFID tags stored in the temporary storage library, marking the files as i, recording the storage time of each file with RFID tags as storage starting time Ti0, setting a time threshold Ty for temporary storage of the files, obtaining the transferring time Ti1 of each file with RFID tags by using a formula Ti1 which is Ti0+ Ty, and transferring the corresponding file i with RFID tags to the database when the corresponding file i with RFID tags reaches the transferring time Ti 1;
the file management module is used for carrying out file management on files with RFID labels, acquiring files with RFID labels stored in a database, and sequentially acquiring file names, file characteristic values and file sizes of the files, when the files with RFID labels are transferred to the database, firstly acquiring files with the same size as the transferred files, marking the files as primary screening files, then acquiring files with the same name as the transferred files in the primary screening files, marking the files as secondary screening files, and finally acquiring files with the same characteristic values as the transferred files in the secondary screening files, marking the files as tertiary screening files, when the tertiary screening files exist, the files completely similar to the transferred files exist in the database, the transferred files do not need to be transferred to the database, when the tertiary screening files do not exist, the method comprises the following steps that files similar to a dump file do not exist in a database, and the dump file is dumped into the database;
the file analysis module is used for carrying out security analysis on each file with an RFID label, identifiable file formats uploaded to a temporary storage library by a terminal controller are preset, a folder where the file with the RFID label is located is taken, the number of the files in the folder is further obtained, an extension name of each file in the folder is obtained, when the folder has file formats other than the identifiable file formats, the file formats are marked as suspicious files by the main controller, alarm information is generated by the alarm module and fed back to the display module, the display module presents the alarm information to a file uploading worker in a font form, whether the file uploading worker continues uploading is inquired, the font forms are yes and no, when the file uploading worker clicks the yes in the display module, the terminal controller generates a trust signal and sends the trust signal to the main controller, and the main controller marks the suspicious files as trust files and then continues uploading, when a file uploading person clicks 'no' in the display module, the terminal controller generates an untrusted signal and sends the untrusted signal to the main controller, and the main controller continues to intercept the suspicious file uploading and deletes the suspicious file;
the identity verification module is used for performing security verification on the identity of a file user, and the security verification is performed in a security code input mode, wherein the security code comprises a randomly generated six-digit verification code and a file characteristic value of a file with an RFID (radio frequency identification) tag stored by the user, and the randomly generated six-digit verification code consists of a number sumThe method comprises the steps of randomly mixing English letters, obtaining generation time T2 of a verification code and time T3 of sending the verification code to a user handheld terminal, obtaining sending time T4 of the verification code, obtaining input time T5 of the security code, calculating and obtaining security code input reaction time T6 of the user, presetting aging time T7 of the verification code, adding the sending time T4 of the verification code and the verification code input reaction time T6 of the user, comparing the added time with the aging time T7 of the verification code, when T4+ T6 is larger than T7, the verification code is invalid, the verification code needs to be sent again, when T4+ T6 is smaller than or equal to T7, the verification code is valid, the verification code does not need to be sent again, further obtaining total digit h of the security code and total time T8 of the user inputting the security code, calculating and obtaining average input time T9 of each character in the security code, namely T8/14, and obtaining input interval time Tu of the security code, Inputting the maximum interval time Tmax and the minimum interval time Tmin of the interval time Tu by using a formula
Figure BDA0002715733840000141
And calculating to obtain a time deviation value Tpc of the input of the safety code, when the calculated time deviation value is greater than a set time deviation threshold value, the safety verification fails, generating a verification failure signal and feeding the verification failure signal back to the main controller, sending the verification failure signal to the terminal controller by the main controller through the communication connection module, and generating a corresponding character pattern by the terminal controller and displaying the character pattern through the display module.
The above formulas are all quantitative calculation, the formula is a formula obtained by acquiring a large amount of data and performing software simulation to obtain the latest real situation, and the preset parameters in the formula are set by the technical personnel in the field according to the actual situation.
The preferred embodiments of the invention disclosed above are intended to be illustrative only. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise forms disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best utilize the invention. The invention is limited only by the claims and their full scope and equivalents.

Claims (5)

1. A file identification method based on an RFID identification technology is characterized by comprising the following steps:
the method comprises the following steps: acquiring a file to be identified;
step two: carrying out file identification by using a file identification system;
the file identification system comprises a file cabinet, a file identification subsystem and a plurality of handheld terminals, wherein the file identification subsystem and the handheld terminals are arranged in the file cabinet;
the handheld terminal comprises a terminal controller, an RFID inquiry module, a display module, an identity verification module and a communication connection module;
the label library is used for storing the RFID label of each file; the temporary storage library is used for temporarily storing files with RFID tags; the database is used for storing files with RFID labels and corresponding RFID labels; the RFID tag carries basic information and position information of the file, the position information is the placement position of the corresponding file, and the basic information comprises the file name and the file characteristic value of the corresponding file;
the terminal controller is in communication connection with the main controller through a communication connection module, and particularly is in communication connection through a 5G communication technology; the RFID inquiry module is used for inquiring the file with the RFID label and acquiring the basic information and the position information corresponding to the file with the RFID label;
the RFID module is used for identifying files, and the specific identification steps are as follows:
step S1: file users acquire all RFID tags which can be searched by the positions of the users through a handheld terminal, and basic information and position information of the RFID tags are fused to form directory information, and the directory information is used for later-stage query and retrieval of the users;
step S2: a user inputs search information through a handheld terminal, wherein the search information comprises a required file name and a required file characteristic value of a file;
step S3: comparing the required file name and the required file characteristic value with the file name and the characteristic value in the directory information one by one, acquiring the directory information consistent with the required file name and the required file characteristic value, and marking the corresponding directory information as the directory information to be selected;
step S4: comparing the characteristic value of the required file with the characteristic value of the file in the to-be-selected directory information to obtain an overlapping rate, wherein the calculating method of the overlapping rate is as follows:
k1: acquiring the total word number of the file characteristic value, marking the total word number of the file characteristic value as H1, and comparing the required file characteristic value with the file characteristic value one by one;
k2: acquiring a required file characteristic value and the repeated word number in the file characteristic value, and marking the repeated word number as H2;
k3: the formula H3-H2/H1 is used for obtaining the overlapping ratio H3
Step S5: determining the overlapping rate H3;
q1: when H3 is greater than or equal to a set threshold value X1, obtaining a file characteristic value with the highest overlapping rate, marking the directory information to be selected corresponding to the file characteristic value as target information, and simultaneously obtaining position information corresponding to the target information and marking the position information as target position information;
q2: when H3 is smaller than a set threshold value X1, determining that the current file characteristic value is wrong, simultaneously acquiring all directory information to be selected except the file characteristic value, and comparing all directory information to be selected except the file characteristic value with the required file characteristic value again;
the file unloading module is used for unloading the files with the RFID tags in the temporary storage library into a database; the file management module is used for managing files with RFID labels; the alarm module is used for carrying out alarm processing on the abnormal files and sending alarm information to the display module of the handheld terminal; the identity authentication module is used for carrying out security authentication on the identity of a file user;
step three: and the file identification is finished.
2. The file identification method based on the RFID technology as claimed in claim 1, wherein the specific working process of the file unloading module is as follows:
SS 1: acquiring a plurality of files with RFID tags stored in a temporary storage library, and marking the files as i, i is 1, … …, n, i represents the number of the files with RFID tags;
SS 2: recording the storage time of each file with the RFID tag as storage starting time Ti 0;
SS 3: setting a time threshold value for temporary storage of the file, and marking the time threshold value as Ty;
SS 4: obtaining the unloading time Ti1 of each file with the RFID tag by using a formula Ti1 ═ Ti0+ Ty;
SS 5: when the corresponding file i with the RFID tag reaches the unloading time Ti1, the corresponding file i with the RFID tag is unloaded to the database.
3. The file identification method based on the RFID technology as claimed in claim 1, wherein the specific authentication process of the authentication module is as follows:
SO 1: safety verification is carried out in a safety code input mode, wherein the safety code comprises a six-digit verification code which is randomly generated and a file characteristic value of a file with an RFID label stored by a user; the randomly generated six-digit verification code is formed by randomly mixing numbers and English letters;
SO 2: acquiring the generation time of the verification code, wherein the generation time of the verification code is marked as T2, acquiring the time of sending the verification code to a user handheld terminal, and marking the time of sending the verification code to the user handheld terminal as T3, so as to obtain the sending time length T4 of the verification code as T3-T2;
SO 3: acquiring the input time T5 of the security code, and calculating to obtain the security code input reaction time T6 of a user as T5-T3;
SO 4: presetting the aging time T7 of the verification code, adding the sending time T4 of the verification code with the verification code input reaction time T6 of a user, and comparing the sum with the aging time T7 of the verification code, wherein when T4+ T6 is more than T7, the verification code is invalid and needs to be sent again; when the T4+ T6 is less than or equal to T7, the verification code is valid, the verification code does not need to be sent again, and the next step is carried out;
SO 5: acquiring the total digit h, h being 14 of the security code, acquiring the total time length T8 of the security code input by a user, and calculating the average input time T9 being T8/14 of each digit of characters in the security code;
SO 6: acquiring input interval time Tu of a security code, wherein u is h-1 is 13, u represents the number of time segments of the input time of the security code, and acquiring maximum interval time Tmax and minimum interval time Tmin in the input interval time Tu;
SO 7: calculating to obtain a time deviation value Tpc of the input of the safety code by using a formula, wherein the specific formula is as follows:
Figure FDA0002715733830000041
in the formula, both alpha and beta are fixed values of preset proportionality coefficients;
SO 8: when the calculated time deviation value is larger than the set time deviation threshold value, the safety verification fails, a verification failure signal is generated and fed back to the main controller, the main controller sends the verification failure signal to the terminal controller through the communication connection module, and the terminal controller generates a corresponding character and displays the character through the display module.
4. The file identification method based on the RFID technology as claimed in claim 1, wherein the specific management steps of the file management module are as follows:
p1: acquiring a file with an RFID tag stored in a database, and sequentially acquiring a file name, a file characteristic value and a file size of the file;
p2: when the file with the RFID tag is transferred to a database, firstly, the file with the same size as that of the transferred file is obtained, and the file with the same size is marked as a primary screening file;
p3: acquiring files with the same file name as the file of the dump file in the primary screening files, and marking the files with the same file name as the secondary screening files;
p4: acquiring files with the same file characteristic values as the file characteristic values of the dump files in the secondary screening files, and marking the files with the same file characteristic values as the tertiary screening files;
p5: when the three-time screening files exist, the files completely similar to the dump files exist in the database, the dump files do not need to be dumped into the database, and when the three-time screening files do not exist, the files similar to the dump files do not exist in the database, and the dump files are dumped into the database.
5. The file identification method based on the RFID technology as claimed in claim 1, wherein the file characteristic value is obtained by the following specific steps:
acquiring a file number of a corresponding file, wherein the file number specifically comprises a company code/a department code/a file level code/a edition code/modification times of the file; the company code and the department code are both short for two English letters; the file level codes are divided into first-level files to N-level files, and the first-level files to the N-level files are sequentially represented by adopting the sequence from A to Z; the edition code is sequentially expressed by adopting the sequence of English letters A-Z; the modification times are sequentially expressed by adopting a sequence of two digits 00-09, and when the revision of the file exceeds 9 times, the revision time is increased by one digit, and so on.
CN202011072963.4A 2020-10-09 2020-10-09 File identification method based on RFID (radio frequency identification device) identification technology Pending CN112163136A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011072963.4A CN112163136A (en) 2020-10-09 2020-10-09 File identification method based on RFID (radio frequency identification device) identification technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011072963.4A CN112163136A (en) 2020-10-09 2020-10-09 File identification method based on RFID (radio frequency identification device) identification technology

Publications (1)

Publication Number Publication Date
CN112163136A true CN112163136A (en) 2021-01-01

Family

ID=73866428

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011072963.4A Pending CN112163136A (en) 2020-10-09 2020-10-09 File identification method based on RFID (radio frequency identification device) identification technology

Country Status (1)

Country Link
CN (1) CN112163136A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114138755A (en) * 2022-02-07 2022-03-04 中国建筑第五工程局有限公司 Material archive retrieval method aiming at supplier cooperation based on artificial intelligence

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090001811A (en) * 2007-05-23 2009-01-09 재단법인 한국건자재시험연구원 System and method for managing foundation pile with radio frequency identification
CN103164677A (en) * 2011-12-13 2013-06-19 艾微数据公司 File management by the adoption of telefile alignment and retrieval
CN103345649A (en) * 2013-07-31 2013-10-09 昆山信德佳电气科技有限公司 Management method for documents and archives
CN206224543U (en) * 2016-11-30 2017-06-06 重庆邮电大学 A kind of archive management device based on tag recognition pairing and authentication
CN110032476A (en) * 2019-04-17 2019-07-19 柳州铁道职业技术学院 A kind of file storage intelligent backup system based on big data
CN110766113A (en) * 2019-10-24 2020-02-07 江苏世丰知识产权管理咨询有限公司 Office paper file management system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090001811A (en) * 2007-05-23 2009-01-09 재단법인 한국건자재시험연구원 System and method for managing foundation pile with radio frequency identification
CN103164677A (en) * 2011-12-13 2013-06-19 艾微数据公司 File management by the adoption of telefile alignment and retrieval
CN103345649A (en) * 2013-07-31 2013-10-09 昆山信德佳电气科技有限公司 Management method for documents and archives
CN206224543U (en) * 2016-11-30 2017-06-06 重庆邮电大学 A kind of archive management device based on tag recognition pairing and authentication
CN110032476A (en) * 2019-04-17 2019-07-19 柳州铁道职业技术学院 A kind of file storage intelligent backup system based on big data
CN110766113A (en) * 2019-10-24 2020-02-07 江苏世丰知识产权管理咨询有限公司 Office paper file management system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114138755A (en) * 2022-02-07 2022-03-04 中国建筑第五工程局有限公司 Material archive retrieval method aiming at supplier cooperation based on artificial intelligence
CN114138755B (en) * 2022-02-07 2022-04-08 中国建筑第五工程局有限公司 Material archive retrieval method aiming at supplier cooperation based on artificial intelligence

Similar Documents

Publication Publication Date Title
CN111353014B (en) Position keyword extraction and position demand updating method and device
US20200302081A1 (en) Method and system for managing personal digital identifiers of a user in a plurality of data elements
CN114979120B (en) Data uploading method, device, equipment and storage medium
CN111723077A (en) Data dictionary maintenance method and device and computer equipment
CN112163136A (en) File identification method based on RFID (radio frequency identification device) identification technology
CN111259056A (en) Block chain data query method, system and related equipment
CN113704406A (en) Chinese paraphrase matching system and method for popular abbreviations
CN113505273A (en) Data sorting method, device, equipment and medium based on repeated data screening
CN111353874B (en) Intelligent service system of bank outlets
US10248638B2 (en) Creating forms for hierarchical organizations
CN111090649A (en) Data information paging query method and device, computer equipment and storage medium
CN112612817B (en) Data processing method, device, terminal equipment and computer readable storage medium
CN115952146A (en) File management system applied to key information supervision of direct-current control protection device
CN113282763B (en) Text key information extraction device, equipment and storage medium
CN114968914A (en) Electronic archive management method and device, computer equipment and storage medium
CN114495138A (en) Intelligent document identification and feature extraction method, device platform and storage medium
CN117290401B (en) Data transaction method and system
JP2006072783A (en) Data entry system and data entry method
CN113360505B (en) Time sequence data-based data processing method and device, electronic equipment and readable storage medium
CN113901782A (en) Intelligent complaint work order falling method, device, equipment and medium
CN113139106B (en) Event auditing method and device for security check
CN113343103A (en) Report form pushing method and device, electronic equipment and storage medium
CN115640931A (en) Fixed source data management method and system
KR20220026969A (en) A corporate trademark management system
CN113377946A (en) Document pushing method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination