CN112699987B - Method and system for monitoring work task by using lock - Google Patents

Method and system for monitoring work task by using lock Download PDF

Info

Publication number
CN112699987B
CN112699987B CN202011502673.9A CN202011502673A CN112699987B CN 112699987 B CN112699987 B CN 112699987B CN 202011502673 A CN202011502673 A CN 202011502673A CN 112699987 B CN112699987 B CN 112699987B
Authority
CN
China
Prior art keywords
key
locking device
locking
lock
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011502673.9A
Other languages
Chinese (zh)
Other versions
CN112699987A (en
Inventor
郑勇进
王杭彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202011502673.9A priority Critical patent/CN112699987B/en
Publication of CN112699987A publication Critical patent/CN112699987A/en
Application granted granted Critical
Publication of CN112699987B publication Critical patent/CN112699987B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/0772Physical layout of the record carrier
    • G06K19/07732Physical layout of the record carrier the record carrier having a housing or construction similar to well-known portable memory devices, such as SD cards, USB or memory sticks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • G06K19/07318Means for preventing undesired reading or writing from or onto record carriers by hindering electromagnetic reading or writing
    • G06K19/07327Passive means, e.g. Faraday cages
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/0772Physical layout of the record carrier
    • G06K19/07728Physical layout of the record carrier the record carrier comprising means for protection against impact or bending, e.g. protective shells or stress-absorbing layers around the integrated circuit
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0013Methods or arrangements for sensing record carriers, e.g. for reading patterns by galvanic contacts, e.g. card connectors for ISO-7816 compliant smart cards or memory cards, e.g. SD card readers
    • G06K7/0021Methods or arrangements for sensing record carriers, e.g. for reading patterns by galvanic contacts, e.g. card connectors for ISO-7816 compliant smart cards or memory cards, e.g. SD card readers for reading/sensing record carriers having surface contacts
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Abstract

The invention provides a method and a system for monitoring a work task by using a lock, which comprises the following steps: receiving and analyzing the communication request, and determining target locking equipment and processing task items according to an analysis result; and establishing NFC communication connection between the terminal equipment and the target locking equipment to acquire the unique identification code so as to perform task verification, unlocking the locking equipment by adopting a key on the terminal equipment after the key verification is passed, and feeding back an unlocking result to the server. According to the invention, the NFC communication connection is established between the terminal device integrated with the key and the target locking device, so that the target locking device is determined according to the unique identification code in the NFC electronic tag fixed in the lock of the target locking device, and the matching degree of the key and the lock of the locking device is verified, so that the whole life cycle tracing intelligent management of all locking facilities of an enterprise is realized, and the safety management of the key is realized.

Description

Method and system for monitoring work task by using lock
Technical Field
The invention relates to the technical field of communication, in particular to a method and a system for monitoring a work task by using a lock.
Background
The existing lockset has single function, can not carry out intelligent personnel and facility management, and has the following problems: (1) many enterprises need a lot of facilities for locking, and if all mechanical locks are replaced by intelligent locks capable of being intelligently managed, the economic burden of the enterprises can be greatly increased; (2) the intelligent lock has the advantages that the service environment and the service life of the intelligent lock are far shorter than those of a mechanical lock, and the intelligent lock cannot be normally used particularly in an extreme temperature environment; (3) the mechanical lock cannot supervise inherent information of a switch lock of a constructor and cannot ensure a safe padlock of a constructed lockset; (4) the common mechanical lock has no unique identity authentication and cannot be associated and bound with a locking facility; (5) the common mechanical lock has no intelligent management platform and cannot record the relevant image-text information of the locking facility; (6) the key is easy to copy and lose.
On the one hand, along with the development of information technology, the NFC radio frequency identification technology has obtained more and more extensive application, how to combine the NFC radio frequency identification technology to current mechanical lock to realize the intelligent management of mechanical lock, have great economic meaning to the enterprise, on the other hand how to prevent that the key is easily duplicated and bring unnecessary economic loss for the enterprise also is the problem that awaits a urgent need to be solved.
Disclosure of Invention
In view of the above, the invention provides a method and a system for monitoring a work task by using a lock, and aims to solve the safety problem caused by easy duplication of a key in the existing intelligent management process of the lock.
In one aspect, the invention provides a method for monitoring a work task by using a lock, which comprises the following steps:
step 101: the method comprises the steps that a terminal device integrated with a key receives a communication request sent by a main control device, and analyzes the communication request to determine the task type and target position information of a locking device;
step 102: determining at least one target locking device from a plurality of locking devices according to the target position information of the locking device, and determining at least one processing task item according to the device information record and the task type of the determined target locking device; wherein the device information record includes: inherent information of the locking equipment and a unique identification code of the locking equipment;
step 103: acquiring one of the processing task items as a current processing task item by using the terminal equipment integrated with the key, and determining target locking equipment according to the current processing task item information;
step 104: the terminal device integrated with the key is used for carrying out NFC communication with the target locking device to obtain a first unique identification code in an NFC electronic tag fixed in a lock of the target locking device, and the first unique identification code is compared with a second unique identification code stored in the processing task item to determine whether the target locking device is a locking device to be processed;
step 105: acquiring a third unique identification code of the terminal device integrated with the key, and comparing the third unique identification code with a first unique identification code stored in a lock of the target locking device to determine whether the key is bound with the lock on the to-be-processed locking device;
step 106: after the key verification is passed, the key on the terminal equipment is automatically unlocked;
step 107: pushing out the key from the terminal equipment and inserting the key into a lock bound by the locking equipment to be processed;
step 108: and unlocking the to-be-processed locking equipment, and feeding back unlocking result information to the server side by the terminal equipment integrated with the key.
Further, in the above work task monitoring method using a lock, the step 104 and the step 105 are performed simultaneously.
Further, in the above work task monitoring method using a lock, the step 104 is performed after the step 105.
Further, in the above work task monitoring method using a lock, the step 104 is performed after the steps 105 and 106.
Further, in the above work task monitoring method using a lock, the step 104 is performed after the steps 105, 106, and 107.
Further, in the above method for monitoring a work task using a lock, the method further includes:
after the processing task item is implemented, the lock on the locking device is closed by using the key on the terminal device, so that the key on the terminal device can be reset, then the locking state picture of the locking device to be processed is obtained, the locking state picture of the locking device to be processed is compared with the initial locking state picture of the locking device to be processed, and a comparison result is obtained.
Further, in the above method for monitoring a work task using a lock, when the target locking device is not a locking device to be processed or when the key is not verified, a target locking device unmatching message or a key verification failure message is returned to the terminal device integrated with the key.
Further, in the above method for monitoring a work task using a lock, the unlocking result information includes: the account information logged on the terminal device integrated with the key, the communication time of the terminal device integrated with the key and the target locking device and a filling log of processing task items.
On the other hand, the invention also provides a work task monitoring system using the lock, which comprises: the communication request analysis unit is used for receiving a communication request sent by the main control equipment and analyzing the communication request so as to determine the task type and the target position information of the locking equipment;
the processing task item determining unit is used for determining at least one target locking device from a plurality of locking devices according to the target position information of the locking device, and determining at least one processing task item according to the device information record and the task type of the determined target locking device; wherein the device information record includes: inherent information of the locking device and the unique identification code of the locking device;
the target locking device determining unit is used for acquiring one of the processing task items as a current processing task item by using the terminal device integrated with the key and determining the target locking device according to the current processing task item information;
the to-be-processed locking device confirming unit is used for carrying out NFC communication between the terminal device integrated with the key and the target locking device, acquiring a first unique identification code in an NFC electronic tag fixed in the target locking device, and comparing the first unique identification code with a second unique identification code stored in the processing task item to determine whether the target locking device is the to-be-processed locking device or not;
the key verification unit is used for acquiring a third unique identification code of the terminal equipment integrated with the key, and comparing the third unique identification code with a first unique identification code stored in a lock of the target locking equipment to determine whether the key is bound with the lock on the target locking equipment;
and the unlocking unit is used for automatically unlocking the key on the terminal equipment when the target locking equipment is determined to be the to-be-processed locking equipment and the key passes the verification, unlocking the to-be-processed locking equipment by using the key on the terminal equipment and feeding back unlocking result information to the server side.
The invention provides a method and a system for monitoring a work task by using a lock, wherein NFC communication connection is established between terminal equipment integrated with a key and target locking equipment, whether the target locking equipment is to-be-processed locking equipment is determined according to a unique identification code in an NFC electronic tag fixed in the lock of the target locking equipment, the acquired unique identification code of the terminal equipment integrated with the key is compared with the unique identification code in the NFC electronic tag fixed in the lock through a server end to verify whether the key is the key bound with the locking equipment, when the target locking equipment is to-be-processed locking equipment and the key verification is passed, the key on the terminal equipment is automatically unlocked, a worker pushes out the key on the terminal equipment and inserts the key into the lock bound with the to-be-processed locking equipment to unlock the to-be-processed locking equipment, and the unlocking result information is fed back to the server side, so that the problems that the existing lockset cannot be associated and bound with the locking equipment and the key is easy to copy and lose are solved, and the full life cycle tracing intelligent management of all locking facilities of an enterprise is realized on the premise of not increasing the economic cost.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flow chart of a method for job task monitoring using a lockset according to an embodiment of the invention;
FIG. 2 is a flowchart of an embodiment of a method for monitoring a task using a lock according to the present invention;
FIG. 3 is a flowchart illustrating another embodiment of a method for monitoring a task using a lock according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating another embodiment of a method for monitoring a task using a lock according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a work task monitoring system using a lock according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art. It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict. The present invention will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 is a flowchart of a method for monitoring a job task using a lock according to an embodiment of the present invention. As shown in fig. 1, in the method for monitoring a work task using a lock according to an embodiment of the present invention, an NFC communication connection is established between a terminal device integrated with a key and a target locking device, so as to determine whether the target locking device is a locking device to be processed according to a unique identification code in an NFC electronic tag fixed in a lock of the target locking device, the server compares an acquired unique identification code of the terminal device integrated with the key with a unique identification code in an NFC electronic tag fixed in the lock to verify whether the key is a key bound to the locking device, when the target locking device is the locking device to be processed and the key is verified, the key on the terminal device is automatically unlocked, and a worker pushes out the key on the terminal device and inserts the key into the lock bound to be processed into the locking device to be processed to unlock the locking device to be processed, and the unlocking result information is fed back to the server side, so that the problems that the existing lockset cannot be associated and bound with the locking equipment and the key is easy to copy and lose are solved, and the full life cycle tracing intelligent management of all locking facilities of an enterprise on the premise of not increasing the economic cost is realized.
In the method 100 for monitoring a work task using a lock according to an embodiment of the present invention, starting from step 101, a terminal device integrated with a key in step 101 receives a communication request sent by a master control device, and analyzes the communication request to determine a task type and target position information where a lock-applying device is located.
Specifically, after the server receives the communication request sent by the main control device, the server may parse the received communication request to determine the task type and the target position information where the locking device is located. Among them, the task types may include: maintenance, first-aid repair, inspection and the like. The locking device is various hardware devices (such as cabinet facilities) with the lock. The key in the key-integrated terminal device may be a mechanical key or an electronic key.
Preferably, the method further comprises:
before a communication task request sent by a main control device is received, generating a unique identification code of each locking device according to a preset unique identification code generation rule based on stored device inherent information of each locking device in a plurality of locking devices, associating the unique identification code of each locking device with the device inherent information of the locking device, and determining a device information record of each locking device; and
the terminal equipment sequentially establishes NFC communication connection with each locking equipment, and stores the unique identification code of each locking equipment into the corresponding locking equipment, so that each locking equipment is associated with the equipment information record of the locking equipment based on the unique identification code.
Wherein: the device information records device inherent information and a unique identification code of the locking device. The inherent information of the equipment comprises the type, name, model, delivery date, position information, related person information, inspection and maintenance standard flow, authority information and the like of the locking equipment. In this embodiment, the master control device may be a background monitoring device.
Preferably, the method utilizes the terminal device to generate a radio frequency field and establishes a communication connection with the NFC electronic tag fixed on the locking device, so as to establish the communication connection between the terminal device and the locking device.
Further preferably, the NFC electronic tag is a passive anti-metal tear-resistant tag, and the NFC electronic tag includes: an NFC chip and an antenna; the NFC chip is internally added with an anti-metal coating, and the antenna is subjected to cutting processing by a cutting die.
In the implementation mode of the invention, each locking device is fixed with an NFC electronic tag which is an NFC passive anti-metal anti-tearing encryption tag packaged by adopting a special process, and the NFC electronic tag is characterized in that security encryption data and energy are transmitted in a wireless mode. An anti-metal coating is added in an NFC chip inside the chip; the inside antenna adopts the cutting die to open the piece and handles, can prevent the tearing of pasting and pull the damage. And generating a radio frequency field by the terminal equipment with the NFC function, and establishing communication connection with the NFC electronic tag fixed on each locking equipment so as to realize the establishment of the communication connection between the terminal equipment with the key and each locking equipment. The terminal equipment integrated with the key is only required to be close to the NFC electronic tag fixed on the locking equipment and to be in collision with the NFC electronic tag, and then communication connection between the terminal equipment and the locking equipment can be established.
Compared with the traditional NFC label with 2 PADs, the NFC electronic label greatly optimizes the physical anti-tearing function of the traditional anti-tearing label that the chip and the antenna are remained only by tearing the label, cannot read any data as long as the NFC electronic label in the lockset is manually violently damaged, ensures that the passive NFC electronic label is in one-to-one matching correspondence with the lockset, and avoids data distortion caused by manual tearing and replacement. The locking facility meets various environments in use, waterproof, high-low temperature, anti-corrosion, anti-interference and other performance packaging implantation is performed on the intelligent NFC chip, the service life of the passive NFC electronic tag is prolonged to the greatest extent, and the cost is reduced. The bottom layer platform of the NFC passive electronic tag is safely encrypted by adopting a block chain technology, the operations of authorized touch reading, remote anti-counterfeiting verification and the like of all NFC mobile phones and terminal equipment in the market are supported, and the information tracing of the common lockset, such as the whole life, the whole period locking and unlocking record, the routing inspection, the operation tracing and the maintenance, and the like, is completed.
In step 102, determining at least one target locking device from a plurality of locking devices according to the target position information of the locking device, and determining at least one processing task item according to the device information record and the task type of the determined target locking device; wherein the device information record includes: inherent information of the locking device and a unique identification code of the locking device.
In the embodiment of the invention, at least one target locking device is screened out from a plurality of locking devices stored in a server under the condition of the type of the locking device and the target position information of the locking device. And extracting the device information record of the screened target locking device, and determining a processing task item according to the task type. The detailed information of any one processing task item corresponds to all the device information of the target locking device, which is stored in the server.
In step 103, a terminal device integrated with a key is used to acquire one of the processing task items as a current processing task item, and a target locking device is determined according to the current processing task item information.
And the terminal equipment integrated with the key is communicated with the server, and the position information of the target locking equipment is determined according to the processing task item distributed by the server.
In step 104, the terminal device integrated with the key is used for performing NFC communication with the target locking device to obtain a first unique identification code in an NFC electronic tag fixed in a lock of the target locking device, and the first unique identification code is compared with a second unique identification code stored in the processing task item to determine whether the target locking device is a to-be-processed locking device.
In particular, the lock on the locking device may be a padlock. In the embodiment of the invention, for any terminal device integrated with a key, the terminal device can only establish the NFC communication connection with the target locking device corresponding to the received processing task item, but cannot establish the NFC communication connection with other target locking devices. If the terminal device integrated with the key can successfully establish communication with the target locking device, displaying the unique identification code of the locking device on the terminal device after the communication is successful, otherwise, returning a mismatching message of the target locking device to the terminal device integrated with the key when the target locking device is not the locking device to be processed; namely: if the locking device corresponding to the NFC electronic tag touched by the terminal device integrated with the key is not the target locking device, the terminal device integrated with the key and the locking device cannot establish communication connection, and the terminal device integrated with the key can prompt a message that the target locking device is not matched with the to-be-processed locking device.
When any processing task item is processed, the terminal device integrated with the key is communicated with the NFC electronic tag on the locking device corresponding to the processing task item, the first unique identification code stored in the NFC electronic tag fixed in the lock of the locking device is read and is matched with the second unique identification code in the processing task item, if the matching is successful, the communication connection is determined to be successfully established, the unique identification code of the target locking device is obtained and fed back to the server, and the server obtains the device information record of the target locking device from the database according to the obtained unique identification code.
In this embodiment, the NFC chip implanted in the lock completely supports the 15693 protocol of the NFC Forum Type5 protocol, and compared with the chip of the conventional ISO14443 Type a protocol, the read-write distance is further, and the secure algorithm for SM7 bidirectional encryption of national authentication is built in the chip, thereby automatically generating a dynamic authentication code. After the intelligent management software of the lockset can finish batch input of locking facility information, the terminal touches the lockset implanted with the NFC chip to finish key authentication and information interaction. Every tool to lock all possesses unique UID identification code, and the tool to lock is bound with the equipment of executing the lock one by one, can realize that all the equipment of executing the lock quantity, position, relevant information of leaving the factory, person of responsibility information, the personnel's of authorizing the unblanking patrol and examine arrival rate, patrol and examine frequency, switching on and shutting down the lock time, do not execute the lock information and report an emergency and ask for help the administrator of enterprise to the supervision of constructor and the facility of executing the lock intellectuality of maintaining the picture and text information.
When the lock is implemented specifically, the lock with the NFC chip is touched by the terminal equipment, the equipment information input interface can jump out of the terminal equipment, the position, the factory information, the related responsible person information of the cabinet facility and the inspection and maintenance standard flow of different locking facilities can be completely recorded through the GPS function of the terminal equipment, and the information mastering of the locking facilities and the inspection and maintenance standard operation of the inspection personnel are greatly improved.
During daily work such as inspection, overhaul and rush-repair, the background supervisory equipment can issue related work tasks to inspection personnel, after the inspection personnel arrives at the location of the locking equipment needing operation and maintenance, firstly, the work palm machine with the key is used for touching the lock with the NFC chip, so that a processing task item can be jumped out (if the processing task item which is not jumped out indicates that the touched locking equipment with the lock is not the operation and maintenance equipment required by the work palm machine, other locking equipment is required to be searched around, the processing task item is jumped out only on the work palm machine, and the equipment to be operated and maintained is found), after the processing task item is confirmed to be abnormal, the lock on the locking equipment is unlocked by using an integrated key on the work palm machine, and image-text records are recorded in the work palm machine APP according to the inspection standard requirements and are uploaded all the time.
In step 105, a third unique identification code of the terminal device integrated with the key is obtained, and the third unique identification code is compared with the first unique identification code stored in the lock of the target locking device, so as to determine whether the key is bound with the lock on the to-be-processed locking device.
Specifically, in the embodiment of the present invention, for a key on any terminal device, it can only establish an NFC communication connection with a lock on a target locking device corresponding to a received processing task item, but cannot establish an NFC communication connection with a mechanical lock on another target locking device. If the key on the terminal equipment can successfully establish communication with the lock on the target locking equipment, the unique identification code of the lock on the locking equipment can be displayed on the terminal equipment after the communication is successful, otherwise,
and when the key is not verified, returning a key verification failing message to the terminal equipment integrated with the key. Namely: if the lock corresponding to the NFC electronic tag touched by the terminal device is not a mechanical lock on the target locking device, the terminal device cannot establish communication connection with the lock on the locking device, and the terminal device can prompt a message that the key verification fails.
In step 106, after the key verification is passed, the key on the terminal device is automatically unlocked.
In an implementation manner of the embodiment of the present invention, after the key verification passes, the key on the terminal device automatically pops up.
In step 107, the key is pushed out of the terminal device and inserted into the lock bound by the locking device to be processed.
Specifically, after the key verification is passed and the key is unlocked, the unlocked key is withdrawn from the terminal device, aligned with the lock cylinder of the lock bound with the locking device to be processed, and inserted into the lock cylinder.
In step 108, the unlocking processing is performed on the to-be-processed locking device, and the unlocking result information is fed back to the server side by the terminal device integrated with the key.
Specifically, when the target locking device is the to-be-processed locking device and the key passes verification and is unlocked, the locking device can be unlocked by using the key inserted into the lockset, and information is fed back to the server in real time. Wherein:
preferably, the unlocking result information includes: the logged account information on the terminal device integrated with the key, the communication time of the terminal device integrated with the key and the target locking device and a filling log of processing task items.
Specifically, the account information logged on the terminal device integrated with the key is login information of an authorized job number, the communication time between the terminal device integrated with the key and the target locking device is unlocking time, and the log for processing the task item may include image-text records of the locking and unlocking frequency of the locking and unlocking device to be processed, the emergency maintenance, the routing inspection and other items of the locking and unlocking device to be processed (for example, the problem targeted for the maintenance, the state after the maintenance and the like).
Preferably, the method further comprises: after the processing task item is implemented, the lock on the locking device is closed by using the key on the terminal device, so that the key on the terminal device can be reset, then the locking state picture of the locking device to be processed is obtained, the locking state picture of the locking device to be processed is compared with the initial locking state picture of the locking device to be processed, and a comparison result is obtained.
Particularly, after the task item to be processed is implemented and finished, a constructor can reset the key on the working palm machine after pressing down the lock beam of the lock to finish locking, and the problem that the key is easy to lose and copy can be prevented. The camera on the terminal equipment can be used for shooting a real object photo of the locking state of the locking equipment, comparing the real object photo with an initial locking state picture of the locking equipment stored in the server, and determining whether the safe locking is realized or not, so as to prevent the lock which is not originally bound by the lock and is not used for locking the locking equipment or used for locking after the processing task item is implemented.
When the system is implemented specifically, after a processing task item is implemented, a constructor can make a key on a working palm machine automatically pop up the lock and reset after pressing down a lock beam of the lock to complete locking, then the lock enters an off-station management interface in the working palm machine APP, the locking time is recorded according to the requirement of a work order, and a picture of locking the lock is shot and then uploaded to a server for storage. The uploading time of the processing task item is the locking time of the lock.
Further preferably, when the comparison result indicates that the lock-off state picture is inconsistent with the initial lock-applying state picture of the lock-applying device to be processed, an alarm message is sent to the main control device.
Specifically, when the real object picture of the locking state of the locking device is consistent with the initial locking state picture of the locking device, the task can be considered to be completed; and if the locking state picture of the locking equipment is inconsistent with the initial locking state picture of the locking equipment to be processed, sending alarm information to background monitoring equipment to realize the safe padlock of the locking equipment.
When the system is implemented specifically, after construction is finished, an inspector touches a lock by using a working palm and enters an off-station management platform, a locking picture of a locking device needs to be photographed in a specified interface, (the picture can be photographed only on site and cannot be called from an album), after a task item to be processed is uploaded, the system can record the locking time after construction is finished, and can compare the picture of the locking on site with the picture left when the lock of the locking device is bound for the first time, if the lock of the unlocking device which is not padlock or hung is not originally bound, the supervision device can automatically give an alarm to an administrator.
In the embodiment, the terminal device integrated with the key is connected to the system server through a wireless network, the wireless network is a wireless local area network or a 3G/4G mobile network, and the camera is arranged on the terminal device integrated with the key and can shoot a real object photo of a locking facility.
Specifically, an equipment information processing client on the terminal equipment is started, an online working mode is realized through a GPRS network of the terminal equipment, and the terminal equipment is connected to a system server through a wireless network; and then, performing authorized work number login, operating according to the distributed processing task items after login, communicating with the fixed NFC label on the locking equipment, and quickly realizing the operations of authentication, overhaul, first-aid repair, routing inspection and the like of the equipment.
In a specific implementation manner of this embodiment, the step 104 and the step 105 are performed simultaneously. The method comprises the steps of acquiring a first unique identification code in an NFC electronic tag fixed in a lock of target locking equipment by using the terminal equipment integrated with a key, comparing the first unique identification code with a second unique identification code stored in a processing task item, acquiring a third unique identification code of the terminal equipment integrated with the key, and comparing the third unique identification code with the first unique identification code stored in the lock of the target locking equipment.
Specifically, the terminal device and a lock on the target locking device are subjected to NFC communication to obtain a unique identification code of the lock, the unique identification code and the unique identification code stored in a processing task item are subjected to task item verification, the server obtains the unique identification code of the terminal device and compares the unique identification code with the unique identification code in the lock to verify the matching between a key and the lock, and after the task item and the key are verified, the key can be unlocked from the terminal device.
Referring to fig. 2, in another embodiment of the present invention, the step 104 is performed after the step 105. Namely: the method comprises the steps of firstly obtaining a third unique identification code of the terminal device integrated with the key, comparing the third unique identification code with a first unique identification code stored in a lock of the target locking device, then obtaining the first unique identification code in an NFC electronic tag fixed in the lock of the target locking device by using the terminal device integrated with the key, and comparing the first unique identification code with a second unique identification code stored in a processing task item.
Specifically, firstly, a server acquires a unique identification code of a terminal device, and compares the unique identification code with a unique identification code in a lock to verify the matching between a key and the lock, and after the key is verified; and then, the terminal equipment and the lock on the target locking equipment carry out NFC communication to obtain the unique identification code of the lock, the unique identification code and the unique identification code stored in the processing task item are used for verifying the task item, and after the key and the task item are verified, the key can be automatically unlocked, for example, the key is popped up from the terminal equipment.
Referring to fig. 3, in another embodiment of the present invention, the step 104 is performed after the steps 105 and 106. Acquiring a third unique identification code of the terminal device integrated with the key, and comparing the third unique identification code with a first unique identification code stored in a lock of the target locking device to determine whether the key is bound with the lock on the to-be-processed locking device; after the key verification is passed and the key on the terminal device is automatically unlocked, the terminal device integrated with the key is utilized to perform NFC communication with the target locking device, a first unique identification code in an NFC electronic tag fixed in a lock of the target locking device is obtained, and the first unique identification code is compared with a second unique identification code stored in the processing task item to determine whether the target locking device is a locking device to be processed.
Specifically, firstly, a server acquires a unique identification code of a terminal device, and compares the unique identification code with a unique identification code in a lock so as to verify the matching between a key and the lock; secondly, after the key verification is passed, the key on the terminal equipment is automatically unlocked; and finally, the terminal equipment and the lock on the target locking equipment are subjected to NFC communication to obtain the unique identification code of the lock, the unique identification code and the unique identification code stored in the processing task item are subjected to task item verification to determine whether the target locking equipment is the locking equipment to be processed, and when the key passes the verification and unlocking and after the task item passes the verification, the key can be inserted into the lock bound with the processed locking equipment.
Referring to fig. 4, in yet another embodiment of the present invention, the step 104 is performed after the steps 105, 106, and 107. Namely: acquiring a third unique identification code of the terminal device integrated with the key, and comparing the third unique identification code with a first unique identification code stored in a lock of the target locking device; after the key verification is passed, the key on the terminal equipment is automatically unlocked; and after the key is inserted into the lock bound with the locking equipment to be processed, acquiring a first unique identification code in an NFC electronic tag fixed in the lock, and comparing the first unique identification code with a second unique identification code stored in the processing task item to determine whether the target locking equipment is the locking equipment to be processed.
Specifically, firstly, a server acquires a unique identification code of a terminal device, and compares the unique identification code with a unique identification code in a lock so as to verify the matching between a key and the lock; secondly, after the target locking equipment is to-be-processed locking equipment and the key verification is passed, automatically unlocking the key on the terminal equipment; then, inserting the key into a lockset bound by the locking equipment to be processed; and finally, the terminal equipment and the lock on the target locking equipment are subjected to NFC communication to obtain the unique identification code of the lock, the unique identification code and the unique identification code stored in the processing task item are subjected to task item verification to determine whether the target locking equipment is the locking equipment to be processed, and after the key and the task item are verified, the locking equipment can be unlocked by using the key inserted into the lock.
In the embodiment of the invention, the lockset embedded with the NFC intelligent chip is bound with the locking equipment (such as cabinet equipment) one by one, and the keys on the terminal equipment are bound with the locking equipment one by one, so that the full life cycle source-tracing intelligent management of the operation and maintenance information such as the number, the positions, the delivery related information, the information of responsible persons, the inspection arrival rate, the inspection frequency, the lock opening and closing time, the repair reporting, the first-aid repair and the scrapping of authorized unlocking personnel and the like of all the locking equipment of an enterprise can be realized on the premise of not increasing the hardware investment, the problem of non-intelligent management of a common mechanical padlock on a locking facility is fundamentally solved, the problem of property loss of the enterprise caused by the malicious copying of the keys by other people can be effectively prevented, and the controllable expenditure of the intelligent management of the enterprise is effectively guaranteed.
Fig. 5 is a schematic structural diagram of a work task monitoring system using a lock according to an embodiment of the present invention, and as shown in fig. 5, a work task monitoring system 200 using a lock according to an embodiment of the present invention includes: a communication request parsing unit 201, a processing task item determining unit 202, a target locking device determining unit 203, a pending locking device confirming unit 204, a key verifying unit 205, and an unlocking unit 206.
Preferably, the communication request parsing unit 201 is configured to receive a communication request sent by a master control device, and parse the communication request to determine the task type and the target location information where the locking device is located.
Preferably, the processing task item determining unit 202 is configured to determine at least one target locking device from the multiple locking devices according to the target position information where the locking device is located, and determine at least one processing task item according to the device information record and the task type of the determined target locking device; wherein the device information record includes: inherent information of the locking device and a unique identification code of the locking device.
Preferably, the target locking device determining unit 203 is configured to acquire one of the processing task items as a current processing task item by using a terminal device integrated with a key, and determine a target locking device according to information of the current processing task item.
Preferably, the to-be-processed locking device confirming unit 204 is configured to perform NFC communication with the target locking device by using the terminal device integrated with the key, acquire a first unique identifier in an NFC electronic tag fixed in the target locking device, and compare the first unique identifier with a second unique identifier stored in the processing task item, so as to determine whether the target locking device is the to-be-processed locking device.
Preferably, the system utilizes the terminal device to generate a radio frequency field and establishes communication connection with the NFC electronic tag fixed on the locking device, so as to establish communication connection between the terminal device and the locking device;
wherein, NFC electronic tags is passive anti-metal anti-tear label, NFC electronic tags includes: an NFC chip and an antenna; the NFC chip is internally added with an anti-metal coating, and the antenna is subjected to cutting processing by a cutting die.
Preferably, the key verification unit 205 is configured to acquire a third unique identification code of the terminal device integrated with the key, and compare the third unique identification code with a first unique identification code stored in the lock of the target locking device to determine whether the key is a key bound to the lock on the to-be-processed locking device.
Preferably, the unlocking unit 206 is configured to, when it is determined that the target locking device is a to-be-processed locking device and the key verification passes, automatically unlock the key on the terminal device, perform unlocking processing on the to-be-processed locking device by using the key, and feed back unlocking result information to the server.
Further preferably, the unlocking unit 206, which uses a key on a terminal device to unlock the to-be-processed locking device and feeds back unlocking result information to a server, includes:
and uploading the logged account information on the terminal device integrated with the key, the communication time of the terminal device integrated with the key and the target locking device and a filling log of a processing task item to a server.
Preferably, the system further comprises: and the locking unit is used for closing the lock on the locking equipment by using the key on the terminal equipment after the processing task item is implemented, resetting the key on the terminal equipment, acquiring a locking state picture of the locking equipment to be processed, comparing the locking state picture of the locking equipment to be processed with an initial locking state picture of the locking equipment to be processed, and acquiring a comparison result.
Preferably, the system further comprises: and the alarm unit is used for sending alarm information to the main control equipment when the comparison result indicates that the locking state picture is inconsistent with the initial locking state picture of the locking equipment to be processed.
The working task monitoring system 200 using a lock in the embodiment of the present invention corresponds to the working task monitoring method 100 using a lock in another embodiment of the present invention, and details thereof are not repeated herein.
The invention has been described with reference to a few embodiments. However, other embodiments of the invention than the one disclosed above are equally possible within the scope of the invention, as would be apparent to a person skilled in the art from the appended patent claims.
Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to "a/an/the [ device, component, etc ]" are to be interpreted openly as referring to at least one instance of said device, component, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting the same, and although the present invention is described in detail with reference to the above embodiments, those of ordinary skill in the art should understand that: modifications and equivalents may be made to the embodiments of the invention without departing from the spirit and scope of the invention, which is to be covered by the claims.

Claims (6)

1. A method for monitoring a work task by using a lock is characterized by comprising the following steps:
step 101: the method comprises the steps that a terminal device integrated with a key receives a communication request sent by a main control device, and analyzes the communication request to determine the task type and target position information of a locking device;
step 102: determining at least one target locking device from a plurality of locking devices according to the target position information of the locking device, and determining at least one processing task item according to the device information record and the task type of the determined target locking device; wherein the device information record includes: inherent information of the locking device and the unique identification code of the locking device;
step 103: acquiring one of the processing task items as a current processing task item by using the terminal equipment integrated with the key, and determining target locking equipment according to the current processing task item information;
step 104: performing NFC communication between the terminal device integrated with the key and the target locking device to acquire a first unique identification code in an NFC electronic tag fixed in a lock of the target locking device, and comparing the first unique identification code with a second unique identification code stored in the processing task item to determine whether the target locking device is a locking device to be processed;
step 105: acquiring a third unique identification code of the terminal device integrated with the key, and comparing the third unique identification code with a first unique identification code stored in a lock of the target locking device to determine whether the key is bound with the lock on the to-be-processed locking device;
step 106: after the key verification is passed, the key on the terminal equipment is automatically unlocked;
step 107: pushing out the key from the terminal equipment and inserting the key into a lock bound by the locking equipment to be processed;
step 108: and unlocking the to-be-processed locking equipment, and feeding back unlocking result information to the server side by the terminal equipment integrated with the key.
2. The method for monitoring a work task using a lock according to claim 1, wherein the steps 104 and 105 are performed simultaneously.
3. The method for monitoring a job task using a lockset as recited in claim 1, further comprising:
after the processing task item is implemented, the lock on the locking device is closed by using the key on the terminal device, so that the key on the terminal device can be reset, then the locking state picture of the locking device to be processed is obtained, the locking state picture of the locking device to be processed is compared with the initial locking state picture of the locking device to be processed, and a comparison result is obtained.
4. The method for monitoring work tasks with locks according to claim 1, characterized in that when the target locking device is not a pending locking device or when the key is not verified, a target locking device mismatch message or a key verification failed message is returned to the key integrated terminal device.
5. The method for monitoring the work task by using the lock according to any one of claims 1 to 4, wherein the unlocking result information includes: the logged account information on the terminal device integrated with the key, the communication time of the terminal device integrated with the key and the target locking device and a filling log of processing task items.
6. A job task monitoring system utilizing a lockset, comprising:
the communication request analysis unit is used for receiving a communication request sent by the main control equipment and analyzing the communication request so as to determine the task type and the target position information of the locking equipment;
the processing task item determining unit is used for determining at least one target locking device from the plurality of locking devices according to the target position information of the locking device, and determining at least one processing task item according to the device information record and the task type of the determined target locking device; wherein the device information record includes: inherent information of the locking device and the unique identification code of the locking device;
the target locking device determining unit is used for acquiring one of the processing task items as a current processing task item by using the terminal device integrated with the key and determining the target locking device according to the current processing task item information;
the to-be-processed locking device confirming unit is used for carrying out NFC communication between the terminal device integrated with the key and the target locking device, acquiring a first unique identification code in an NFC electronic tag fixed in the target locking device, and comparing the first unique identification code with a second unique identification code stored in the processing task item to determine whether the target locking device is the to-be-processed locking device or not;
the key verification unit is used for acquiring a third unique identification code of the terminal device integrated with a key, and comparing the third unique identification code with a first unique identification code stored in a lock of the target locking device to determine whether the key is bound with the lock on the to-be-processed locking device;
and the unlocking unit is used for automatically unlocking the key on the terminal equipment when the target locking equipment is determined to be the to-be-processed locking equipment and the key passes the verification, unlocking the to-be-processed locking equipment by using the key on the terminal equipment and feeding unlocking result information back to the server side.
CN202011502673.9A 2020-12-17 2020-12-17 Method and system for monitoring work task by using lock Active CN112699987B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011502673.9A CN112699987B (en) 2020-12-17 2020-12-17 Method and system for monitoring work task by using lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011502673.9A CN112699987B (en) 2020-12-17 2020-12-17 Method and system for monitoring work task by using lock

Publications (2)

Publication Number Publication Date
CN112699987A CN112699987A (en) 2021-04-23
CN112699987B true CN112699987B (en) 2022-07-05

Family

ID=75509060

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011502673.9A Active CN112699987B (en) 2020-12-17 2020-12-17 Method and system for monitoring work task by using lock

Country Status (1)

Country Link
CN (1) CN112699987B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113593082B (en) * 2021-05-14 2023-05-23 国家电网有限公司技术学院分公司 Five-prevention lockset management method and system based on blockchain
CN113611014B (en) * 2021-07-08 2023-07-21 国家电网有限公司技术学院分公司 Five-prevention lockset management method based on block chain
CN113593090B (en) * 2021-07-30 2023-07-18 国家电网有限公司技术学院分公司 Block chain-based five-prevention Bluetooth lock system of transformer substation

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102182362A (en) * 2011-05-06 2011-09-14 刘新明 Universal intelligent unlocking system
CN103345790A (en) * 2013-06-26 2013-10-09 深圳市同创新佳科技有限公司 Electronic door lock management method and system based on NFC (near field communication) intelligent electronic equipment
US9109379B1 (en) * 2014-08-12 2015-08-18 Dog & Bone Holdings Pty Ltd Keyless padlock, system and method of use
CN205186088U (en) * 2015-10-23 2016-04-27 乐卡汽车智能科技(北京)有限公司 Device and vehicle monitored is carried out car key
CN208284003U (en) * 2018-07-06 2018-12-25 北京亿诚理想科技发展有限公司 The Intelligent key for opening intelligent lock based on fingerprint recognition and NFC communication authorization
CN208314883U (en) * 2018-06-04 2019-01-01 贵州电网有限责任公司 intelligent lock management system
CN209182920U (en) * 2018-12-12 2019-07-30 浙江福源智能科技有限公司 Cabinet with numeric type password

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102182362A (en) * 2011-05-06 2011-09-14 刘新明 Universal intelligent unlocking system
CN103345790A (en) * 2013-06-26 2013-10-09 深圳市同创新佳科技有限公司 Electronic door lock management method and system based on NFC (near field communication) intelligent electronic equipment
US9109379B1 (en) * 2014-08-12 2015-08-18 Dog & Bone Holdings Pty Ltd Keyless padlock, system and method of use
CN205186088U (en) * 2015-10-23 2016-04-27 乐卡汽车智能科技(北京)有限公司 Device and vehicle monitored is carried out car key
CN208314883U (en) * 2018-06-04 2019-01-01 贵州电网有限责任公司 intelligent lock management system
CN208284003U (en) * 2018-07-06 2018-12-25 北京亿诚理想科技发展有限公司 The Intelligent key for opening intelligent lock based on fingerprint recognition and NFC communication authorization
CN209182920U (en) * 2018-12-12 2019-07-30 浙江福源智能科技有限公司 Cabinet with numeric type password

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于物联网技术的钥匙智能管理系统的设计与实现;田华等;《科技资讯》;20170603(第16期);全文 *

Also Published As

Publication number Publication date
CN112699987A (en) 2021-04-23

Similar Documents

Publication Publication Date Title
CN112699987B (en) Method and system for monitoring work task by using lock
CN108961475B (en) Access control deployment method and access control deployment server
CN201562306U (en) Intelligent door lock control system
CN103793960B (en) Method for mobile key service
CN109155096A (en) Delivering for package and the automatic storage cabinet system and method got
CN204143429U (en) A kind of tele-control system of electronic lock
CN103473844A (en) Intelligent control method and intelligent control system for public rental housing
WO2015117507A1 (en) Authentication method, collection device, authentication device and system, and cabinet and unlocking method therefor
CN110011848B (en) Mobile operation and maintenance auditing system
CN106611452A (en) Maintenance isolation latching system and method
CN103530559A (en) Integrity protection system of Android system
CN107369234A (en) A kind of method for unlocking and system
CN109460675A (en) A kind of enterprise information security management method
CN113704718A (en) Computer data protection system based on identity authentication
CN111445610B (en) System for managing work ticket isolation key
EP2304655A2 (en) Activity based management system
CN109711677A (en) A kind of anti-human-equation error free isolated operation system of power plant and method
CN112687032B (en) Method and system for monitoring work task by using mechanical lock
CN108595974B (en) Quick verification system for electronic product code
CN111243131A (en) Method and device for unlocking lock, storage medium and processor
CN113205620B (en) Unlocking method and related equipment
CN1862556B (en) Method and apparatus for controlling computer 10g-in by contactless smart card
CN212627319U (en) System for wind-powered electricity generation field safety control
CN114154965A (en) Collaborative law enforcement and case handling management method and system based on block chain
CN105701906B (en) A kind of self-service device method for managing security based on finger-print puzzle lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant