CN116484346B - Intelligent money box management system based on multidimensional information - Google Patents

Intelligent money box management system based on multidimensional information Download PDF

Info

Publication number
CN116484346B
CN116484346B CN202310724947.6A CN202310724947A CN116484346B CN 116484346 B CN116484346 B CN 116484346B CN 202310724947 A CN202310724947 A CN 202310724947A CN 116484346 B CN116484346 B CN 116484346B
Authority
CN
China
Prior art keywords
target
unlocking
password
management user
user terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310724947.6A
Other languages
Chinese (zh)
Other versions
CN116484346A (en
Inventor
夏予柱
张文杰
胡入幻
周凤梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Jintou Science And Technology Co ltd
Original Assignee
Sichuan Jintou Science And Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Jintou Science And Technology Co ltd filed Critical Sichuan Jintou Science And Technology Co ltd
Priority to CN202310724947.6A priority Critical patent/CN116484346B/en
Publication of CN116484346A publication Critical patent/CN116484346A/en
Application granted granted Critical
Publication of CN116484346B publication Critical patent/CN116484346B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Multimedia (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention relates to an intelligent money box management system based on multidimensional information, which comprises: the data processing platform is used for receiving a first unlocking request and a second unlocking request for at least one first target intelligent money box and generating a secondary encrypted unlocking password; the right verification device is used for verifying the right of the first management user and the second management user; after the authority verification is passed, the first management user terminal equipment and the first management user terminal equipment perform secondary decryption on the unlocking password after secondary encryption to generate a first generated password and a second generated password; the target independent data processor performs secondary decryption on the unlocking password after secondary encryption to generate a third generated password, and when unlocking is judged based on the first generated password, the second generated password and the third generated password, all the target independent data processors send unlocking signals to at least one first target intelligent money box, so that the money box management reliability is improved.

Description

Intelligent money box management system based on multidimensional information
Technical Field
The specification relates to the field of data processing, and in particular relates to an intelligent money box management system based on multidimensional information.
Background
The existing bank business outlets are generally provided with money boxes for storing basic articles required by daily business work of the outlet, such as cash, heavy empty certificates, noble metals, mortgages, valuable bills and the like. The prior financial institution business sites are all provided with money boxes for storing important articles of daily business work of the sites, and the security management of the money boxes is also paid more attention to. At present, a mechanical lock offline management mode is mostly adopted for money box management by a financial institution business website. A set of two keys are commonly required to be separated into two separate pipes for common responsibility. In actual use, the key is easy to lose and copy, the procedure is complex during handover, and the risk of storage is increased.
Therefore, it is desirable to provide an intelligent money box management method and system based on multidimensional information, which are used for improving reliability of money box management.
Disclosure of Invention
One of the embodiments of the present disclosure provides an intelligent money box management system based on multidimensional information, which is applied to a service library, wherein the service library is used for storing intelligent money boxes, a plurality of independent data processors are arranged in the service library, each independent data processor corresponds to at least one intelligent money box, and each independent data processor communicates with the corresponding intelligent money box through a first short-range wireless communication device, and the system includes: the data processing platform is used for receiving a first unlocking request of at least one first target intelligent money box sent by first management user terminal equipment and a second unlocking request of at least one first target intelligent money box sent by second management user terminal equipment, generating an unlocking password of the at least one first target intelligent money box based on the first unlocking request and the second unlocking request, and performing secondary encryption on the unlocking password to generate an unlocking password after secondary encryption; the authority verification device is arranged in the service library, and is used for performing authority verification on the first management user and the second management user when a first distance between the first management user terminal device and the service library and a second distance between the second management user terminal device and the service library are smaller than a preset distance threshold value, and sending an authority verification result to the data processing platform; the data processing platform is further used for sending the unlocking password after the secondary encryption to the first management user terminal equipment, the second management user terminal equipment and at least one target independent data processor corresponding to the at least one first target intelligent money box when the permission verification result is permission verification passing; the first management user terminal device is further used for performing secondary decryption on the secondarily encrypted unlocking password to generate a first generated password, the first generated password is sent to the target independent data processor, the second management user terminal device is further used for performing secondary decryption on the secondarily encrypted unlocking password to generate a second generated password, and the second generated password is sent to the target independent data processor; the target independent data processor is further used for performing secondary decryption on the unlocking password after secondary encryption to generate a third generated password, generating an unlocking judgment result based on the first generated password, the second generated password and the third generated password, sharing the unlocking judgment result to other target independent data processors when the unlocking judgment result is unlocking, and sending unlocking signals to the at least one first target intelligent money box by all target independent data processors corresponding to the at least one first target intelligent money box, wherein the unlocking signals are used for controlling the first target intelligent money box to unlock.
In some embodiments, the first unlocking request includes at least a device identification of the first administrative user terminal device, a target unlocking period, and a cash box identification of the at least one first target smart cash box; the second unlocking request comprises a device identifier of the second management user terminal device, a target unlocking time period and a money box identifier of the at least one first target intelligent money box; the data processing platform generates an unlocking password of the at least one first target intelligent money box based on the first unlocking request and the second unlocking request, and the unlocking password comprises the following steps: the data processing platform judges whether the first management user terminal device is matched with the second management user terminal device or not based on the device identifier of the first management user terminal device included in the first unlocking request and the device identifier of the second management user terminal device included in the second unlocking request; when judging that the first management user terminal equipment is matched with the second management user terminal equipment, judging whether target money box information is matched or not based on the money box identification of the at least one first target intelligent money box included in the first unlocking request and the money box identification of the at least one first target intelligent money box included in the second unlocking request; when judging that the target money box information is matched, judging whether the at least one first target intelligent money box is in an unlocking state or not through all target independent data processors corresponding to the at least one first target intelligent money box; if the at least one first target intelligent money box is judged to be in the unlocking state, an unlocking password of the at least one first target intelligent money box is generated based on the equipment identifier of the first management user terminal equipment, the equipment identifier of the second management user terminal equipment, the target unlocking time period and the money box identifier of the at least one first target intelligent money box.
In some embodiments, the performing the secondary encryption on the unlocking password to generate the unlocking password after the secondary encryption includes: performing primary encryption on the unlocking password based on a private key corresponding to the first management user terminal equipment, performing secondary encryption on the unlocking password after primary encryption based on the position information of the service library and a first random number, generating a first encryption password, and generating a first encryption identifier based on the position information of the service library and the first random number according to an encryption function; performing primary encryption on the unlocking password based on a private key corresponding to the second management user terminal equipment, performing secondary encryption on the unlocking password after the primary encryption based on the position information of the service library and a second random number, generating a second encryption password, and generating a second encryption identifier based on the position information of the service library and the second random number according to the encryption function; the data processing platform sends the unlocking password after the secondary encryption to the first management user terminal device, the second management user terminal device and at least one target independent data processor corresponding to the at least one first target intelligent money box, and the data processing platform comprises: transmitting the first encryption password and the first encryption identifier to the first management user terminal equipment; and sending the second encryption password and the second encryption identifier to the second management user terminal equipment.
In some embodiments, the performing the secondary encryption on the unlocking password to generate the unlocking password after the secondary encryption includes: determining a preset computational force load of all the target independent data processors corresponding to the at least one first target intelligent cash box in the target unlocking time period based on the historical computational force loads of all the target independent data processors corresponding to the at least one first target intelligent cash box; determining target independent data processors used for decryption in the target independent data processors based on preset calculation force loads of the target independent data processors in the target unlocking time period; performing primary encryption on the unlocking password based on a private key corresponding to the target independent data processor for decryption, performing secondary encryption on the unlocking password after primary encryption based on the position information of the service library and a third random number, generating a third encryption password, and generating a third encryption identifier based on the position information of the service library and the third random number according to the encryption function; the data processing platform sends the unlocking password after the secondary encryption to the first management user terminal device, the second management user terminal device and at least one target independent data processor corresponding to the at least one first target intelligent money box, and the data processing platform comprises: and sending the third encryption password and the third encryption identifier to the second management user terminal equipment and sending the third encryption password and the third encryption identifier to the target independent data processor for decryption.
In some embodiments, the first management user terminal device is further configured to secondarily decrypt the secondarily encrypted unlock password, and generate a first generated password, including: solving the encryption function based on the first encryption identifier and the real-time position of the first management user terminal equipment to obtain the first random number; decrypting the first encrypted password for the first time based on the first random number and the real-time position of the first management user terminal device, decrypting the first encrypted password after the first decryption for the second time based on a private key corresponding to the first management user terminal device, and obtaining the first generated password; the second management user terminal device is further configured to decrypt the unlocking password after the second encryption, and generate a second generated password, where the second generated password includes: solving the encryption function based on the second encryption identifier and the real-time position of the second management user terminal equipment to obtain the second random number; decrypting the second encrypted password for the first time based on the second random number and the real-time position of the second management user terminal device, decrypting the first decrypted second encrypted password for the second time based on a private key corresponding to the second management user terminal device, and obtaining the second generated password; the target independent data processor performs secondary decryption on the unlocking password after secondary encryption, and the target independent data processor comprises the following steps: the target independent data processor for decryption solves the encryption function based on the third encryption identifier and the real-time position of the target independent data processor for decryption to obtain the third random number; and decrypting the third encryption password for the first time based on the third random number and the real-time position of the target independent data processor for decryption, decrypting the decrypted third encryption password for the second time based on the private key corresponding to the target independent data processor for decryption, and obtaining the third generated password.
In some embodiments, the target independent data processor for decrypting is further configured to send a short-range wireless communication request to the first management user terminal device and the second management user terminal device when the permission verification result is that the permission verification passes, and establish a short-range wireless communication connection with the first management user terminal device and the second management user terminal device; the first management user terminal device is further configured to send the first generated password to the target independent data processor for decryption; the second management user terminal device is further configured to send the second generated password to the target independent data processor for decryption; the target independent data processor for decryption is further configured to generate an unlocking determination result based on the first generated password, the second generated password and the third generated password, and share the unlocking determination result to other target independent data processors when the unlocking determination result is unlocking, where all target independent data processors corresponding to the at least one first target intelligent money box send an unlocking signal to the at least one first target intelligent money box based on the unlocking determination result.
In some embodiments, the rights verification apparatus includes a controller, a first depth image acquisition device for acquiring a depth image of the first administrative user, and a second depth image acquisition device for acquiring a depth image of the second administrative user; the authority verification device performs authority verification on a first management user and a second management user, and comprises: the controller generates a first illumination sequence, controls the first depth image acquisition device to sequentially emit illumination with multiple colors according to the illumination sequence and acquires a plurality of depth images of a first management user; the controller generates a second illumination sequence, and controls the second depth image acquisition device to sequentially emit illumination with multiple colors according to the illumination sequence and acquire a plurality of depth images of a second management user; the controller determines a first color sequence to be verified based on the depth images of the plurality of first management users, and judges whether the first color sequence to be verified corresponds to the first illumination sequence; the controller determines a second color sequence to be verified based on the depth images of the plurality of second management users, and judges whether the second color sequence to be verified corresponds to the second illumination sequence; when the first color sequence to be verified corresponds to the first illumination sequence and the second color sequence to be verified corresponds to the second illumination sequence, extracting first background features based on the depth images of the plurality of first management users, extracting second background features based on the depth images of the plurality of second management users, and judging whether the first background features are matched with the second background features; when the first background feature is matched with the second background feature, extracting a first face feature based on the depth images of the plurality of first management users, extracting a second face feature based on the depth images of the plurality of second management users, and performing authority verification based on the first face feature and the second face feature.
In some embodiments, a plurality of storage cabinets are further disposed in the service library, the storage cabinets are used for placing the intelligent money box, a monitoring device is disposed in the service library, one monitoring device corresponds to at least one storage cabinet, the monitoring device is used for acquiring relevant information of the corresponding storage cabinet, one independent data processor corresponds to at least one monitoring device, and the independent data processor is used for receiving relevant information of the corresponding storage cabinet acquired by the monitoring device and determining the state of the storage cabinet based on the relevant information of the corresponding storage cabinet.
In some embodiments, the data processing platform is further configured to receive a first locking request sent by the first management user terminal device for at least one second target smart cash box and a second locking request sent by the second management user terminal device for the at least one second target smart cash box; when a first distance between the first management user terminal equipment and the service library and a second distance between the second management user terminal equipment and the service library are smaller than a preset distance threshold value, the authority verification equipment performs authority verification on the first management user and the second management user, and sends an authority verification result to the data processing platform; when the right verification result is right verification passing, the data processing platform determines at least one target storage cabinet for storing the at least one second target intelligent money box from the plurality of storage cabinets based on the state of the storage cabinets determined by the independent data processor; after the monitoring equipment monitors that the intelligent money boxes are placed in the target storage cabinets, the independent data processor is in communication connection with the second target intelligent money boxes, and sends a locking signal to the second target intelligent money boxes, wherein the locking signal is used for controlling the second target intelligent money boxes to lock.
In some embodiments, the data processing platform determines at least one target storage bin for storing the at least one second target smart cash box from the plurality of storage bins based on the state of the storage bins determined by the independent data processor, comprising: determining a candidate storage cabinet in an empty state; and determining the at least one target storage cabinet based on the position information of the candidate storage cabinets, the communication distance between the second target intelligent money box and the plurality of independent data processors and the current computational power load of the plurality of independent data processors.
Compared with the prior art, the intelligent money box management method and system based on the multidimensional information provided by the specification have the following beneficial effects:
1. the automatic processing of unlocking requests of the money box can be realized through the data processing platform, the permission verification equipment, the first management user terminal equipment, the second management user terminal equipment, a plurality of independent data processors arranged in the service library and a plurality of intelligent money boxes, manual key keeping and manual unlocking are not needed, and the reliability of money box management is improved;
2. the unlocking password of at least one first target intelligent money box is dynamically generated based on the first unlocking request and the second unlocking request, malicious unlocking of the money box can be effectively avoided, the unlocking password is secondarily encrypted through information related to the first unlocking request and the second unlocking request, and the unlocking password after the secondary encryption is generated, so that the unlocking password is an active security defense strategy, and quite large security protection can be provided for transmission of the unlocking password with quite low cost;
3. The right verification device verifies based on the colors of the images, so that the obtained depth images of the first management users and the obtained depth images of the second management users are truly collected images, cheating is prevented, the first background features and the second background features are verified, the first management users and the second management users can be ensured to be in presence at the same time, finally, the faces are verified, and other people are prevented from stealing the first management user terminal device and the second management user terminal device to maliciously unlock the locks;
4. based on the historical calculation force loads of all the target independent data processors corresponding to the at least one first target intelligent money box, the preset calculation force load of all the target independent data processors corresponding to the at least one first target intelligent money box in the target unlocking time period is determined, the target independent data processors with smaller calculation force loads in the target time period can finish unlocking, and unlocking efficiency and accuracy are improved.
Drawings
The present specification will be further elucidated by way of example embodiments, which will be described in detail by means of the accompanying drawings. The embodiments are not limiting, in which like numerals represent like structures, wherein:
FIG. 1 is a block diagram of an intelligent cash box management system based on multi-dimensional information, as shown in some embodiments of the present description;
FIG. 2 is a schematic flow diagram of generating an unlock code according to some embodiments of the present description;
FIG. 3 is a schematic flow diagram of generating a third encryption password according to some embodiments of the present description;
FIG. 4 is a flow diagram illustrating authority verification for a first management user and a second management user according to some embodiments of the present disclosure;
FIG. 5 is a flow diagram of a multi-dimensional information intelligent cash box management system implementing locking of at least one intelligent cash box in a service library according to some embodiments of the present disclosure;
FIG. 6 is a block diagram of a stand-alone data processor, according to some embodiments of the present description.
Detailed Description
In order to more clearly illustrate the technical solutions of the embodiments of the present specification, the drawings that are required to be used in the description of the embodiments will be briefly described below. It is apparent that the drawings in the following description are only some examples or embodiments of the present specification, and it is possible for those of ordinary skill in the art to apply the present specification to other similar situations according to the drawings without inventive effort. Unless otherwise apparent from the context of the language or otherwise specified, like reference numerals in the figures refer to like structures or operations.
It will be appreciated that "system," "apparatus," "unit" and/or "module" as used herein is one method for distinguishing between different components, elements, parts, portions or assemblies at different levels. However, if other words can achieve the same purpose, the words can be replaced by other expressions.
As used in this specification and the claims, the terms "a," "an," "the," and/or "the" are not specific to a singular, but may include a plurality, unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that the steps and elements are explicitly identified, and they do not constitute an exclusive list, as other steps or elements may be included in a method or apparatus.
A flowchart is used in this specification to describe the operations performed by the system according to embodiments of the present specification. It should be appreciated that the preceding or following operations are not necessarily performed in order precisely. Rather, the steps may be processed in reverse order or simultaneously. Also, other operations may be added to or removed from these processes.
Fig. 1 is a schematic block diagram of an intelligent cash box management system based on multidimensional information according to some embodiments of the present disclosure, as shown in fig. 1, the intelligent cash box management system based on multidimensional information is applied to a service library, the service library is used for storing intelligent cash boxes, a plurality of independent data processors are arranged in the service library, each independent data processor corresponds to at least one intelligent cash box, and each independent data processor communicates with the corresponding intelligent cash box stored in at least one storage cabinet through a first short-range wireless communication device. Wherein the first short-range wireless communication device may comprise bluetooth, wi-Fi, irDA, NFC, zigBee, etc. For further description of the individual data processors, see fig. 5 and its associated description, which is not repeated here.
In some embodiments, a plurality of storage cabinets are further arranged in the service library, the storage cabinets are used for placing intelligent money boxes, monitoring equipment is arranged in the service library, one monitoring equipment corresponds to at least one storage cabinet and is used for acquiring relevant information of the corresponding storage cabinet, one independent data processor corresponds to at least one monitoring equipment, and the independent data processor is used for receiving the relevant information of the corresponding storage cabinet acquired by the monitoring equipment and determining the state of the storage cabinet based on the relevant information of the corresponding storage cabinet. The independent data processor and the corresponding monitoring device can transmit data through a line.
Specifically, the monitoring device may include at least a temperature sensor, a smoke sensor, an infrared ranging sensor, etc., where the infrared ranging sensor is configured to determine whether an intelligent money box is placed in the storage cabinet, and the infrared ranging sensor may be disposed at a top of the storage cabinet and configured to measure a distance between the infrared ranging sensor and an inner bottom of the storage cabinet. It can be understood that when the intelligent money box is not placed in the storage cabinet, the distance between the infrared distance measuring sensor and the inner bottom of the storage cabinet is larger than the distance between the infrared distance measuring sensor and the inner bottom of the storage cabinet when the intelligent money box is placed in the storage cabinet.
As shown in fig. 1, the intelligent cash box management system based on the multidimensional information may include a data processing platform, a rights verification device, a first management user terminal device and a second management user terminal device.
The following describes unlocking of at least one intelligent money box in the business library completed by the intelligent money box management system based on multi-dimensional information.
The data processing platform can be used for receiving a first unlocking request of the at least one first target intelligent cash box sent by the first management user terminal equipment and a second unlocking request of the at least one first target intelligent cash box sent by the second management user terminal equipment, and generating an unlocking password of the at least one first target intelligent cash box based on the first unlocking request and the second unlocking request. The first unlocking request at least comprises a device identifier of the first management user terminal device, a target unlocking time period and a money box identifier of at least one first target intelligent money box, and the second unlocking request comprises a device identifier of the second management user terminal device, a target unlocking time period and a money box identifier of at least one first target intelligent money box.
Fig. 2 is a schematic flow chart of generating an unlock code according to some embodiments of the present disclosure, as shown in fig. 2, in some embodiments, the data processing platform generates an unlock code of at least one first target smart cash box based on a first unlock request and a second unlock request, including:
the data processing platform judges whether the first management user terminal device and the second management user terminal device are matched based on the device identifier of the first management user terminal device included in the first unlocking request and the device identifier of the second management user terminal device included in the second unlocking request, for example, the data processing platform can prestore a device correspondence table, wherein the device correspondence table is used for recording information (such as the device identifier of the management user terminal device) of each two management user terminal devices with corresponding relations, and it can be understood that if the two management user terminal devices cooperate to manage the same or a plurality of intelligent money boxes, a corresponding relation exists between the two management user terminal devices, the data processing platform can determine whether the corresponding relation exists between the first management user terminal device and the second management user terminal device based on the device correspondence table, and if so, the data processing platform judges that the first management user terminal device and the second management user terminal device are matched;
When the first management user terminal device and the second management user terminal device are judged to be matched, judging whether the target money box information is matched or not based on the money box identification of at least one first target intelligent money box included in the first unlocking request and the money box identification of at least one first target intelligent money box included in the second unlocking request, for example, a permission table can be prestored in a data processing platform, wherein the permission table is used for recording information (such as information equipment identifications of two management user terminal devices) of two management user terminal devices corresponding to each intelligent money box, the data processing platform can judge whether the two management user terminal devices are the two management user terminal devices corresponding to all first target intelligent money boxes or not according to the equipment identification of the first management user terminal device and the second management user terminal device, and if yes, judging that the target money box information is matched;
when judging that the information of the target money boxes is matched, judging whether at least one first target intelligent money box is in an unlocking state through all target independent data processors corresponding to at least one first target intelligent money box, for example, monitoring equipment corresponding to a storage cabinet where each first target intelligent money box is located acquires related information of the storage cabinet and transmits the related information of the storage cabinet to the corresponding independent data processor, judging whether the storage cabinet is in a fault (for example, fire, intelligent money boxes are not placed and the like) or not according to the related information of the storage cabinet by the independent data processors, if yes, judging that the first target intelligent money box is not in the unlocking state, if not, the independent data processor can also determine whether communication between the first target intelligent money box and the first target intelligent money box is normal, if not, judging that the first target intelligent money box is not in the unlocking state, if normal, judging that the first target intelligent money box is in the unlocking state;
If the at least one first target intelligent cash box is judged to be in the unlocking state, an unlocking password of the at least one first target intelligent cash box is generated based on the equipment identifier of the first management user terminal equipment, the equipment identifier of the second management user terminal equipment, the target unlocking time period and the cash box identifier of the at least one first target intelligent cash box. For example, the data processing platform may first convert the device identifier of the first management user terminal device, the device identifier of the second management user terminal device, the target unlocking period, and the box identifier of the at least one first target intelligent box into a Unicode code string, and then generate a hash value with fixed 128 bits according to the Unicode code string by using an MD4 single hash algorithm. By way of example only, the device identifier of the first management user terminal device is "141", the device identifier of the second management user terminal device is "142", the target unlocking time period is "090010", the money boxes of all the first target intelligent money boxes are identified as "03", "05" and "07", the sequence "141142090010030507" and "141142090010030507" are converted into Unicode codes "310032003300340035003600" and "310032003300340035003600" firstly, and standard MD4 one-way hash is performed, so that the unlocking password of at least one first target intelligent money box is "32ED87BDB5FDC5E9CBA88547376818D4".
The data processing platform can be further used for carrying out secondary encryption on the unlocking password to generate the unlocking password after secondary encryption.
In some embodiments, the data processing platform performs secondary encryption on the unlocking password to generate the unlocking password after secondary encryption, including:
the method comprises the steps that an unlocking password is encrypted for the first time based on a private key corresponding to first management user terminal equipment, the unlocking password after the first encryption is encrypted for the second time based on position information of a service library and a first random number, a first encryption password is generated, a first encryption identifier is generated according to an encryption function based on the position information of the service library and the first random number, specifically, a data processing platform can adopt any feasible encryption algorithm (such as a symmetric encryption algorithm, an asymmetric encryption algorithm, a hash algorithm and the like) to encrypt the unlocking password for the first time based on the private key corresponding to the first management user terminal equipment, and encrypt the unlocking password after the first encryption for the second time based on the position information of the service library and the first random number, so that a first encryption password is generated;
for example only, the data processing platform may generate the first encrypted identification based on the location information of the service library and the first random number based on the following encryption function:
Wherein, the liquid crystal display device comprises a liquid crystal display device,for the first encrypted identification,/->Is a first random number, ">For normalized business library location information, < >>Is a preset parameter.
The unlocking password is encrypted for the first time based on the private key corresponding to the second management user terminal equipment, the unlocking password after the first encryption is encrypted for the second time based on the position information of the service library and the second random number, a second encryption password is generated, and a second encryption identifier is generated according to an encryption function based on the position information of the service library and the second random number, wherein the flow of generating the second encryption password is similar to the flow of generating the first encryption password, and the description is omitted here.
In some embodiments, the data processing platform sends the unlocking password after the secondary encryption to the first management user terminal device, the second management user terminal device, and at least one target independent data processor corresponding to at least one first target smart money box, including:
transmitting the first encryption password and the first encryption identifier to first management user terminal equipment;
and sending the second encryption password and the second encryption identifier to the second management user terminal equipment.
Fig. 3 is a schematic flow chart of generating a third encryption password according to some embodiments of the present disclosure, as shown in fig. 3, in some embodiments, the data processing platform performs secondary encryption on the unlock password, and generates the unlock password after the secondary encryption, including:
Determining a preset computational power load of all target independent data processors corresponding to at least one first target intelligent money box in a target unlocking time period based on historical computational power loads of all target independent data processors corresponding to at least one first target intelligent money box, wherein the historical computational power load can comprise computational power loads of all target independent data processors in a plurality of historical time points, a data processing platform can determine the preset computational power load of all target independent data processors corresponding to at least one first target intelligent money box in the target unlocking time period based on the historical computational power loads of all target independent data processors corresponding to at least one first target intelligent money box through a load prediction model, and the load prediction model can be a machine learning model such as an Artificial Neural Network (ANN) model, a cyclic neural network (RNN) model, a long-short-time memory network (LSTM) model, a bidirectional cyclic neural network (BRNN) model and the like;
determining the target independent data processor for decryption among all the target independent data processors based on the preset calculation force load of all the target independent data processors in the target unlocking period, for example, the target independent data processor with the minimum preset calculation force load in the target unlocking period can be used as the target independent data processor for decryption;
The unlocking password is encrypted for the first time based on a private key corresponding to the target independent data processor for decryption, the unlocking password after the first encryption is encrypted for the second time based on the position information of the service library and the third random number, a third encryption password is generated, and a third encryption identifier is generated according to an encryption function based on the position information of the service library and the third random number, wherein the flow of generating the third encryption password is similar to the flow of generating the first encryption password, and the description is omitted here.
In some embodiments, the data processing platform sends the unlocking password after the secondary encryption to the first management user terminal device, the second management user terminal device, and at least one target independent data processor corresponding to at least one first target smart money box, including: and sending the third encryption password and the third encryption identifier to the second management user terminal equipment and sending the second management user terminal equipment to the target independent data processor for decryption.
And the permission verification device is arranged in the service library, and is used for performing permission verification on the first management user and the second management user when the first distance between the first management user terminal device and the service library and the second distance between the second management user terminal device and the service library are smaller than a preset distance threshold value, and sending permission verification results to the data processing platform.
In some embodiments, the permission verification apparatus includes a controller, a first depth image acquisition device for acquiring a depth image of a first administrative user, and a second depth image acquisition device for acquiring a depth image of a second administrative user;
fig. 4 is a schematic flow chart of authority verification for a first management user and a second management user according to some embodiments of the present disclosure, as shown in fig. 4, in some embodiments, the authority verification device performs authority verification for the first management user and the second management user, including:
the controller generates a first illumination sequence, and controls the first depth image acquisition device to sequentially emit illumination with multiple colors according to the illumination sequence and acquire a plurality of depth images of a first management user;
the controller generates a second illumination sequence, and controls the second depth image acquisition device to sequentially emit illumination with multiple colors according to the illumination sequence and acquire a plurality of depth images of a second management user;
the controller determines a first color sequence to be verified based on the depth images of the plurality of first management users, and judges whether the first color sequence to be verified corresponds to the first illumination sequence or not;
The controller determines a second color sequence to be verified based on the depth images of the plurality of second management users, and judges whether the second color sequence to be verified corresponds to a second illumination sequence or not;
when the first color sequence to be verified corresponds to the first illumination sequence and the second color sequence to be verified corresponds to the second illumination sequence, based on the depth images of the plurality of first management users, extracting first background features, based on the depth images of the plurality of second management users, extracting second background features, and judging whether the first background features are matched with the second background features, for example, the data processing platform may firstly perform background separation on at least one image in the depth images of the plurality of first management users, extract the first background features, perform background separation on at least one image in the depth images of the plurality of second management users, extract the second background features, calculate the similarity between the first background features and the second background features, judge whether the first background features are matched with the second background features based on the similarity between the first background features and the second background features, specifically, the data processing platform may compare the background images separated from the depth images of the first management users with the pixel values of the background images separated from the depth images of the second management users, calculate the mean square error, and the mean square error represents that the similarity between the first background features and the second background features is larger than the second background features, and the similarity is larger than the first background features if the similarity is larger than the second background features;
When the first background feature is matched with the second background feature, the first face feature is extracted based on a plurality of depth images of the first management user, the second face feature is extracted based on a plurality of depth images of the second management user, and authority verification is performed based on the first face feature and the second face feature, for example, the authority verification is performed on the first face feature and the second face feature through a pre-stored face image with depth information of the first management user and a pre-stored face image with depth information of the second management user, specifically, the first face similarity between the first face feature and the pre-stored face image with depth information of the first management user can be calculated, the second face similarity between the second face feature and the pre-stored face image with depth information of the second management user can be calculated, and when the first face similarity and the second face similarity are both larger than a preset face similarity threshold, the authority verification can be judged.
Specifically, the first depth image capturing device and the second depth image capturing device each include a plurality of light sources for respectively emitting illumination of a plurality of colors. For example, the first and second depth image capturing devices may sequentially control the on-off states of the plurality of light sources in order to emit illumination of a plurality of colors. The plurality of colors may be the same or different. An illumination sequence is a collection of illumination of a plurality of colors arranged in a sequence. The illumination sequence may include information of each of the illumination of a plurality of colors, for example, a color parameter, an illumination time, and the like. The illumination sequence may be used to determine a plurality of colors that the terminal emits when illuminating a face. The illumination of multiple colors in the illumination sequence may be represented in different ways. For example, the representation may be based on color class. By way of example, the illumination sequence may be red, yellow, green, violet, cyan, blue, etc. The illumination time may be a time point representing a time when illumination of a certain color of the plurality of colors by the terminal starts. For example, the illumination time of red light is 14: 00. the illumination time of the green light is 14:02, etc. The illumination time may be a time period representing a time during which the first depth image capturing device or the second depth image capturing device emits illumination of a certain color of the plurality of colors. For example, the irradiation time of red light is 14:00-14: 01. the irradiation time of green light was 14:02-14:03, etc.
In some embodiments, the controller may acquire images of which photographing times correspond to illumination times of respective colors in the illumination sequence from among the plurality of depth images of the first management user. For example, the irradiation time of red light is 14:00-14:01, the irradiation time of green light is 14:02-14:03, then the slave imaging time is 14:02-14: the depth image of the first management user between 03 is a second face image corresponding to green. The controller may determine whether the color of the first illumination sequence corresponds to the color of the depth image of the first management user, for example, if the color of the second face image corresponding to the green illumination time in the first illumination sequence is red, the color of the illumination sequence does not correspond to the color of the depth image of the first management user. When the color of the illumination sequence does not correspond to the color of the depth image of the first management user, the controller judges that the first color sequence to be verified does not correspond to the first illumination sequence, and the process of judging whether the first background feature is matched with the second background feature is similar to the process, and details are omitted here.
And the data processing platform is also used for transmitting the unlocking password after the secondary encryption to the first management user terminal equipment, the second management user terminal equipment and at least one target independent data processor corresponding to at least one first target intelligent money box when the permission verification result is that the permission verification is passed. The target independent data processor for decryption is further configured to send a short-range wireless communication request to the first management user terminal device and the second management user terminal device when the permission verification result is permission verification passing, and establish short-range wireless communication connection with the first management user terminal device and the second management user terminal device.
In some embodiments, the first management user terminal device is further configured to perform secondary decryption on the secondarily encrypted unlock code, generate a first generated code, send the first generated code to the target independent data processor, and the second management user terminal device is further configured to perform secondary decryption on the secondarily encrypted unlock code, generate a second generated code, and send the second generated code to the target independent data processor.
In some embodiments, the second management user terminal device performs second decryption on the unlocking password after the second encryption, and generates a second generated password, including:
solving the encryption function based on the first encryption identification and the real-time position of the first management user terminal equipment to obtain a first random number;
and decrypting the first encrypted password for the first time based on the first random number and the real-time position of the first management user terminal equipment, decrypting the first encrypted password after the first decryption for the second time based on the private key corresponding to the first management user terminal equipment, and obtaining the first generated password.
The first administrative user terminal device is further configured to send the first generated password to the target independent data processor for decryption, i.e., the target independent data processor for decryption.
Specifically, the data processing platform may determine a decryption range according to the position of the service library and a preset decryption radius, and send the decryption range to the first management user terminal device and the second management user terminal device, when the real-time position of the first management user terminal device is located in the decryption range, the first management user terminal device may be triggered to use the position of the service library as the real-time position of the first management user terminal device, and solve the encryption function based on the first encryption identifier and the real-time position of the first management user terminal device, to obtain the first random number; decrypting the first encrypted password for the first time based on the first random number and the real-time position of the first management user terminal device; when the real-time position of the second management user terminal device is within the decryption range, the second management user terminal device can be triggered to use the position of the service library as the real-time position of the second management user terminal device, and the encryption function is solved based on the second encryption identifier and the real-time position of the second management user terminal device to obtain a second random number; and decrypting the second encryption password for the first time based on the second random number and the real-time position of the second management user terminal device.
In some embodiments, the second management user terminal device is further configured to decrypt the unlocking password after the secondary encryption, and generate a second generated password, including:
solving the encryption function based on the second encryption identification and the real-time position of the second management user terminal equipment to obtain a second random number;
and decrypting the second encrypted password for the first time based on the second random number and the real-time position of the second management user terminal equipment, decrypting the decrypted second encrypted password for the second time based on a private key corresponding to the second management user terminal equipment, and obtaining a second generated password.
The second administrative user terminal device is further configured to send the second generated password to the target independent data processor for decryption, i.e., the target independent data processor for decryption.
The target independent data processor is also used for performing secondary decryption on the unlocking password after secondary encryption to generate a third generated password.
In some embodiments, the target independent data processor secondarily decrypts the secondarily encrypted unlock code, comprising:
the target independent data processor for decryption solves the encryption function based on the third encryption identification and the real-time position of the target independent data processor for decryption to obtain a third random number;
And decrypting the third encrypted password for the first time based on the third random number and the real-time position of the target independent data processor for decryption, decrypting the decrypted third encrypted password for the second time based on the private key corresponding to the target independent data processor for decryption, and obtaining a third generated password.
The target independent data processor (e.g., the target independent data processor for decryption) may generate an unlocking determination result based on the first generated password, the second generated password, and the third generated password, and share the unlocking determination result to other target independent data processors when the unlocking determination result is unlocking, where all target independent data processors corresponding to at least one first target intelligent cash box send an unlocking signal to at least one first target intelligent cash box, where the unlocking signal is used to control unlocking of the first target intelligent cash box. Specifically, the target independent data processor for decryption may calculate a similarity between the first generated password and the third generated password (may also be referred to as a first password similarity), calculate a similarity between the second generated password and the third generated password (may also be referred to as a second password similarity), calculate a total password similarity based on the first password similarity and the second password similarity, for example, weight and sum the first password similarity and the second password similarity to determine the total password similarity, and when the total password similarity is greater than a preset password similarity threshold, the unlocking determination result is unlocking, and when the total password similarity is less than or equal to the preset password similarity threshold, the unlocking determination result is non-unlocking.
The following describes locking of at least one intelligent money box in a business library completed by the intelligent money box management system based on multi-dimensional information.
Fig. 5 is a schematic flow chart of a process of locking at least one intelligent cash box in a service library by the intelligent cash box management system with multi-dimensional information according to some embodiments of the present disclosure, and as shown in fig. 5, the data processing platform is further configured to receive a first locking request sent by the first management user terminal device for at least one second target intelligent cash box and a second locking request sent by the second management user terminal device for at least one second target intelligent cash box.
As shown in fig. 5, when the first distance between the first management user terminal device and the service library and the second distance between the second management user terminal device and the service library are both smaller than the preset distance threshold, the authority verification device performs authority verification on the first management user and the second management user, and sends the authority verification result to the data processing platform. For more description of the authority verification of the first management user and the second management user, reference may be made to the above, and the description thereof will not be repeated here.
As shown in fig. 5, when the right verification result is right verification passing, the data processing platform determines at least one target storage cabinet for storing at least one second target smart money box from the plurality of storage cabinets based on the states of the storage cabinets determined by the independent data processor.
In some embodiments, the data processing platform determines at least one target storage bin for storing at least one second target smart money box from the plurality of storage bins based on the state of the storage bins determined by the independent data processor, comprising:
determining a candidate storage cabinet in an empty state;
and determining at least one target storage cabinet based on the position information of the candidate storage cabinets, the communication distance between the second target intelligent money box and the plurality of independent data processors and the current computational power load of the plurality of independent data processors.
Specifically, for at least one second target intelligent cash box, the data processing platform may sort the at least one second target intelligent cash box based on the historical switch lock frequency of each second target intelligent cash box, and according to the sorting result, preferentially determine the target storage cabinets corresponding to the second target intelligent cash boxes with the front sorting. The higher the historical switch lock frequency is, the more the second target intelligent money box is ordered. When determining the target storage cabinets of the second target intelligent money box, the data processing platform may determine, according to the position information (e.g., height) of the candidate storage cabinets in the empty state, the height information of the first management user and the height information of the second management user, the candidate storage cabinets in the empty state (which may also be referred to as screened candidate storage cabinets) which are more convenient for the first management user and the second management user to operate, for each screened candidate storage cabinet, the data processing platform may determine a communication range with the screened candidate storage cabinet as a center and a preset communication radius, determine an independent data processor located in the communication range, determine whether a current computing power load of at least one independent data processor in the communication range is smaller than a preset computing power load threshold, if yes, use the independent data processor as a candidate independent data processor, and calculate a communication distance between the screened candidate storage cabinet and the candidate independent data processor, that is, for each screened candidate storage cabinet and one candidate independent data processor, the data processing platform may take the candidate storage cabinet and the candidate storage cabinet as a sorting target, and the candidate storage cabinet may be selected based on the candidate storage cabinet, and the candidate storage cabinet may be used as a sorting target independent storage cabinet. It will be appreciated that the smaller the communication distance, the more front the candidate storage arrangement ranks.
As shown in fig. 5, when the monitoring device monitors that the target storage cabinets are all provided with the intelligent money boxes, the independent data processor establishes communication connection with the second target intelligent money boxes, and sends a locking signal to the second target intelligent money boxes, wherein the locking signal is used for controlling the second target intelligent money boxes to be locked.
FIG. 6 is a block diagram of a stand-alone data processor, as shown in FIG. 6, which is an example of a hardware device that may be used with aspects of the present invention, according to some embodiments of the present description. The stand-alone data processor is intended to represent various forms of digital electronic computer devices, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other suitable computers. The stand-alone data processor may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed herein.
As shown in fig. 6, the independent data processor includes a computing unit that can perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM) or a computer program loaded from a storage unit into a Random Access Memory (RAM). In the RAM, various programs and data required for the operation of the device may also be stored. The computing unit, ROM and RAM are connected to each other by a bus. An input/output (I/O) interface is also connected to the bus.
A plurality of components in a stand-alone data processor are connected to an I/O interface, comprising: an input unit, an output unit, a storage unit, and a communication unit. The input unit may be any type of device capable of inputting information to the independent data processor, and may receive input numeric or character information and generate key signal inputs related to user settings and/or function control of the independent data processor. The output unit may be any type of device capable of presenting information and may include, but is not limited to, a display, speakers, video/audio output terminals, vibrators, and/or printers. Storage units may include, but are not limited to, magnetic disks, optical disks. The communication unit allows the independent data processor to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunications networks, and may include, but is not limited to, modems, network cards, infrared communication devices, wireless communication transceivers and/or chipsets, such as bluetooth (TM) devices, wiFi devices, wiMax devices, cellular communication devices, and/or the like.
The computing unit may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of computing units include, but are not limited to, central Processing Units (CPUs), graphics Processing Units (GPUs), various specialized Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, digital Signal Processors (DSPs), and any suitable processors, controllers, microcontrollers, and the like. The computing unit performs the various methods and processes described above.
While the basic concepts have been described above, it will be apparent to those skilled in the art that the foregoing detailed disclosure is by way of example only and is not intended to be limiting. Although not explicitly described herein, various modifications, improvements, and adaptations to the present disclosure may occur to one skilled in the art. Such modifications, improvements, and modifications are intended to be suggested within this specification, and therefore, such modifications, improvements, and modifications are intended to be included within the spirit and scope of the exemplary embodiments of the present invention.
Meanwhile, the specification uses specific words to describe the embodiments of the specification. Reference to "one embodiment," "an embodiment," and/or "some embodiments" means that a particular feature, structure, or characteristic is associated with at least one embodiment of the present description. Thus, it should be emphasized and should be appreciated that two or more references to "an embodiment" or "one embodiment" or "an alternative embodiment" in various positions in this specification are not necessarily referring to the same embodiment. Furthermore, certain features, structures, or characteristics of one or more embodiments of the present description may be combined as suitable.
Furthermore, the order in which the elements and sequences are processed, the use of numerical letters, or other designations in the description are not intended to limit the order in which the processes and methods of the description are performed unless explicitly recited in the claims. While certain presently useful inventive embodiments have been discussed in the foregoing disclosure, by way of various examples, it is to be understood that such details are merely illustrative and that the appended claims are not limited to the disclosed embodiments, but, on the contrary, are intended to cover all modifications and equivalent arrangements included within the spirit and scope of the embodiments of the present disclosure. For example, while the system components described above may be implemented by hardware devices, they may also be implemented solely by software solutions, such as installing the described system on an existing server or mobile device.
Likewise, it should be noted that in order to simplify the presentation disclosed in this specification and thereby aid in understanding one or more inventive embodiments, various features are sometimes grouped together in a single embodiment, figure, or description thereof. This method of disclosure, however, is not intended to imply that more features than are presented in the claims are required for the present description. Indeed, less than all of the features of a single embodiment disclosed above.
It should be noted that, the user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present application are information and data authorized by the user or sufficiently authorized by each party, and the collection, use and processing of the related data need to comply with the related laws and regulations and standards of the related country and region.
Finally, it should be understood that the embodiments described in this specification are merely illustrative of the principles of the embodiments of this specification. Other variations are possible within the scope of this description. Thus, by way of example, and not limitation, alternative configurations of embodiments of the present specification may be considered as consistent with the teachings of the present specification. Accordingly, the embodiments of the present specification are not limited to only the embodiments explicitly described and depicted in the present specification.

Claims (10)

1. An intelligent money box management system based on multidimensional information, which is characterized in that the system is applied to a service library, the service library is used for storing intelligent money boxes, a plurality of independent data processors are arranged in the service library, each independent data processor corresponds to at least one intelligent money box, and each independent data processor is communicated with the corresponding intelligent money box through a first short-range wireless communication device, and the system comprises:
The data processing platform is used for receiving a first unlocking request of at least one first target intelligent money box sent by first management user terminal equipment and a second unlocking request of at least one first target intelligent money box sent by second management user terminal equipment, generating an unlocking password of the at least one first target intelligent money box based on the first unlocking request and the second unlocking request, and performing secondary encryption on the unlocking password to generate an unlocking password after secondary encryption;
the authority verification device is arranged in the service library, and is used for performing authority verification on the first management user and the second management user when a first distance between the first management user terminal device and the service library and a second distance between the second management user terminal device and the service library are smaller than a preset distance threshold value, and sending an authority verification result to the data processing platform;
the data processing platform is further used for sending the unlocking password after the secondary encryption to the first management user terminal equipment, the second management user terminal equipment and at least one target independent data processor corresponding to the at least one first target intelligent money box when the permission verification result is permission verification passing;
The first management user terminal device is further used for performing secondary decryption on the secondarily encrypted unlocking password to generate a first generated password, the first generated password is sent to the target independent data processor, the second management user terminal device is further used for performing secondary decryption on the secondarily encrypted unlocking password to generate a second generated password, and the second generated password is sent to the target independent data processor;
the target independent data processor is further used for performing secondary decryption on the unlocking password after secondary encryption to generate a third generated password, generating an unlocking judgment result based on the first generated password, the second generated password and the third generated password, sharing the unlocking judgment result to other target independent data processors when the unlocking judgment result is unlocking, and sending unlocking signals to the at least one first target intelligent money box by all target independent data processors corresponding to the at least one first target intelligent money box, wherein the unlocking signals are used for controlling the first target intelligent money box to unlock.
2. The intelligent cash box management system based on multi-dimensional information of claim 1, wherein the first unlocking request comprises at least a device identification of the first management user terminal device, a target unlocking period, and a cash box identification of the at least one first target intelligent cash box;
The second unlocking request comprises a device identifier of the second management user terminal device, a target unlocking time period and a money box identifier of the at least one first target intelligent money box;
the data processing platform generates an unlocking password of the at least one first target intelligent money box based on the first unlocking request and the second unlocking request, and the unlocking password comprises the following steps:
the data processing platform judges whether the first management user terminal device is matched with the second management user terminal device or not based on the device identifier of the first management user terminal device included in the first unlocking request and the device identifier of the second management user terminal device included in the second unlocking request;
when judging that the first management user terminal equipment is matched with the second management user terminal equipment, judging whether target money box information is matched or not based on the money box identification of the at least one first target intelligent money box included in the first unlocking request and the money box identification of the at least one first target intelligent money box included in the second unlocking request;
when judging that the target money box information is matched, judging whether the at least one first target intelligent money box is in an unlocking state or not through all target independent data processors corresponding to the at least one first target intelligent money box;
If the at least one first target intelligent money box is judged to be in the unlocking state, an unlocking password of the at least one first target intelligent money box is generated based on the equipment identifier of the first management user terminal equipment, the equipment identifier of the second management user terminal equipment, the target unlocking time period and the money box identifier of the at least one first target intelligent money box.
3. The intelligent money box management system based on multidimensional information according to claim 2, wherein the performing the secondary encryption on the unlocking password to generate the unlocking password after the secondary encryption comprises:
performing primary encryption on the unlocking password based on a private key corresponding to the first management user terminal equipment, performing secondary encryption on the unlocking password after primary encryption based on the position information of the service library and a first random number, generating a first encryption password, and generating a first encryption identifier based on the position information of the service library and the first random number according to an encryption function;
performing primary encryption on the unlocking password based on a private key corresponding to the second management user terminal equipment, performing secondary encryption on the unlocking password after the primary encryption based on the position information of the service library and a second random number, generating a second encryption password, and generating a second encryption identifier based on the position information of the service library and the second random number according to the encryption function;
The data processing platform sends the unlocking password after the secondary encryption to the first management user terminal device, the second management user terminal device and at least one target independent data processor corresponding to the at least one first target intelligent money box, and the data processing platform comprises:
transmitting the first encryption password and the first encryption identifier to the first management user terminal equipment;
and sending the second encryption password and the second encryption identifier to the second management user terminal equipment.
4. The intelligent money box management system based on multidimensional information according to claim 3, wherein the performing the secondary encryption on the unlocking password to generate the unlocking password after the secondary encryption comprises:
determining a preset computational force load of all the target independent data processors corresponding to the at least one first target intelligent cash box in the target unlocking time period based on the historical computational force loads of all the target independent data processors corresponding to the at least one first target intelligent cash box;
determining target independent data processors used for decryption in the target independent data processors based on preset calculation force loads of the target independent data processors in the target unlocking time period;
Performing primary encryption on the unlocking password based on a private key corresponding to the target independent data processor for decryption, performing secondary encryption on the unlocking password after primary encryption based on the position information of the service library and a third random number, generating a third encryption password, and generating a third encryption identifier based on the position information of the service library and the third random number according to the encryption function;
the data processing platform sends the unlocking password after the secondary encryption to the first management user terminal device, the second management user terminal device and at least one target independent data processor corresponding to the at least one first target intelligent money box, and the data processing platform comprises:
and sending the third encryption password and the third encryption identifier to the second management user terminal equipment and sending the third encryption password and the third encryption identifier to the target independent data processor for decryption.
5. The intelligent cash box management system based on multidimensional information as claimed in claim 4, wherein the first management user terminal device is further configured to perform secondary decryption on the secondarily encrypted unlock password, and generate a first generated password, including:
Solving the encryption function based on the first encryption identifier and the real-time position of the first management user terminal equipment to obtain the first random number;
decrypting the first encrypted password for the first time based on the first random number and the real-time position of the first management user terminal device, decrypting the first encrypted password after the first decryption for the second time based on a private key corresponding to the first management user terminal device, and obtaining the first generated password;
the second management user terminal device is further configured to decrypt the unlocking password after the second encryption, and generate a second generated password, where the second generated password includes:
solving the encryption function based on the second encryption identifier and the real-time position of the second management user terminal equipment to obtain the second random number;
decrypting the second encrypted password for the first time based on the second random number and the real-time position of the second management user terminal device, decrypting the first decrypted second encrypted password for the second time based on a private key corresponding to the second management user terminal device, and obtaining the second generated password;
The target independent data processor performs secondary decryption on the unlocking password after secondary encryption, and the target independent data processor comprises the following steps:
the target independent data processor for decryption solves the encryption function based on the third encryption identifier and the real-time position of the target independent data processor for decryption to obtain the third random number;
and decrypting the third encryption password for the first time based on the third random number and the real-time position of the target independent data processor for decryption, decrypting the decrypted third encryption password for the second time based on the private key corresponding to the target independent data processor for decryption, and obtaining the third generated password.
6. The intelligent money box management system based on multidimensional information according to claim 5, wherein the target independent data processor for decryption is further configured to send a close range wireless communication request to the first management user terminal device and the second management user terminal device when the authority verification result is that the authority verification is passed, and establish a close range wireless communication connection with the first management user terminal device and the second management user terminal device;
The first management user terminal device is further configured to send the first generated password to the target independent data processor for decryption;
the second management user terminal device is further configured to send the second generated password to the target independent data processor for decryption;
the target independent data processor for decryption is further configured to generate an unlocking determination result based on the first generated password, the second generated password and the third generated password, and share the unlocking determination result to other target independent data processors when the unlocking determination result is unlocking, where all target independent data processors corresponding to the at least one first target intelligent money box send an unlocking signal to the at least one first target intelligent money box based on the unlocking determination result.
7. The intelligent money box management system based on multi-dimensional information according to any one of claims 1-6, wherein the rights verification device comprises a controller, a first depth image acquisition device and a second depth image acquisition device, wherein the first depth image acquisition device is used for acquiring a depth image of the first management user, and the second depth image acquisition device is used for acquiring a depth image of the second management user;
The authority verification device performs authority verification on a first management user and a second management user, and comprises:
the controller generates a first illumination sequence, controls the first depth image acquisition device to sequentially emit illumination with multiple colors according to the illumination sequence and acquires a plurality of depth images of a first management user;
the controller generates a second illumination sequence, and controls the second depth image acquisition device to sequentially emit illumination with multiple colors according to the illumination sequence and acquire a plurality of depth images of a second management user;
the controller determines a first color sequence to be verified based on the depth images of the plurality of first management users, and judges whether the first color sequence to be verified corresponds to the first illumination sequence;
the controller determines a second color sequence to be verified based on the depth images of the plurality of second management users, and judges whether the second color sequence to be verified corresponds to the second illumination sequence;
when the first color sequence to be verified corresponds to the first illumination sequence and the second color sequence to be verified corresponds to the second illumination sequence, extracting first background features based on the depth images of the plurality of first management users, extracting second background features based on the depth images of the plurality of second management users, and judging whether the first background features are matched with the second background features;
When the first background feature is matched with the second background feature, extracting a first face feature based on the depth images of the plurality of first management users, extracting a second face feature based on the depth images of the plurality of second management users, and performing authority verification based on the first face feature and the second face feature.
8. The intelligent cash box management system based on multi-dimensional information according to any one of claims 1-6, wherein a plurality of storage cabinets are further arranged in the service library, the storage cabinets are used for placing the intelligent cash boxes, monitoring equipment is arranged in the service library, one monitoring equipment corresponds to at least one storage cabinet and is used for acquiring relevant information of the corresponding storage cabinet, one independent data processor corresponds to at least one monitoring equipment and is used for receiving relevant information of the corresponding storage cabinet acquired by the monitoring equipment and determining states of the storage cabinets based on the relevant information of the corresponding storage cabinet.
9. The intelligent cash box management system based on multi-dimensional information of claim 8, wherein the data processing platform is further configured to receive a first locking request sent by the first management user terminal device for at least one second target intelligent cash box and a second locking request sent by the second management user terminal device for the at least one second target intelligent cash box;
When a first distance between the first management user terminal equipment and the service library and a second distance between the second management user terminal equipment and the service library are smaller than a preset distance threshold value, the authority verification equipment performs authority verification on the first management user and the second management user, and sends an authority verification result to the data processing platform;
when the right verification result is right verification passing, the data processing platform determines at least one target storage cabinet for storing the at least one second target intelligent money box from the plurality of storage cabinets based on the state of the storage cabinets determined by the independent data processor;
after the monitoring equipment monitors that the intelligent money boxes are placed in the target storage cabinets, the independent data processor is in communication connection with the second target intelligent money boxes, and sends a locking signal to the second target intelligent money boxes, wherein the locking signal is used for controlling the second target intelligent money boxes to lock.
10. The intelligent cash box management system based on multi-dimensional information of claim 9, wherein the data processing platform determines at least one target storage cabinet for storing the at least one second target intelligent cash box from the plurality of storage cabinets based on the state of the storage cabinets determined by the independent data processor, comprising:
Determining a candidate storage cabinet in an empty state;
and determining the at least one target storage cabinet based on the position information of the candidate storage cabinets, the communication distance between the second target intelligent money box and the plurality of independent data processors and the current computational power load of the plurality of independent data processors.
CN202310724947.6A 2023-06-19 2023-06-19 Intelligent money box management system based on multidimensional information Active CN116484346B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310724947.6A CN116484346B (en) 2023-06-19 2023-06-19 Intelligent money box management system based on multidimensional information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310724947.6A CN116484346B (en) 2023-06-19 2023-06-19 Intelligent money box management system based on multidimensional information

Publications (2)

Publication Number Publication Date
CN116484346A CN116484346A (en) 2023-07-25
CN116484346B true CN116484346B (en) 2023-08-22

Family

ID=87214127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310724947.6A Active CN116484346B (en) 2023-06-19 2023-06-19 Intelligent money box management system based on multidimensional information

Country Status (1)

Country Link
CN (1) CN116484346B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116935519B (en) * 2023-09-15 2023-12-12 四川金投科技股份有限公司 Intelligent lock based on short-range wireless communication technology and control method thereof

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107181714A (en) * 2016-03-09 2017-09-19 阿里巴巴集团控股有限公司 Verification method and device, the generation method of service code and device based on service code
CN109493494A (en) * 2018-12-15 2019-03-19 深圳壹账通智能科技有限公司 Method for unlocking, device, equipment and medium based on smart lock
CN111541543A (en) * 2020-03-18 2020-08-14 中国平安人寿保险股份有限公司 Information verification method and device, computer equipment and storage medium
CN111639890A (en) * 2020-05-12 2020-09-08 中信银行股份有限公司 Money box management method and system, terminal device and computer readable storage medium
CN112822630A (en) * 2021-01-12 2021-05-18 上海钧正网络科技有限公司 Data processing method of device and computer-readable storage medium
CN113409499A (en) * 2021-07-31 2021-09-17 郑州信大捷安信息技术股份有限公司 Method and system for realizing dynamic password of coded lock
CN114780984A (en) * 2022-06-21 2022-07-22 深圳市晨创科技有限公司 Intelligent money box handover management method and system
CN114945929A (en) * 2020-01-10 2022-08-26 资本一号服务有限责任公司 Transfer of transactions from a corrupted ATM to another ATM

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014004930A1 (en) * 2012-06-27 2014-01-03 Treefrog Developments, Inc. Tracking and control of personal effects

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107181714A (en) * 2016-03-09 2017-09-19 阿里巴巴集团控股有限公司 Verification method and device, the generation method of service code and device based on service code
CN109493494A (en) * 2018-12-15 2019-03-19 深圳壹账通智能科技有限公司 Method for unlocking, device, equipment and medium based on smart lock
CN114945929A (en) * 2020-01-10 2022-08-26 资本一号服务有限责任公司 Transfer of transactions from a corrupted ATM to another ATM
CN111541543A (en) * 2020-03-18 2020-08-14 中国平安人寿保险股份有限公司 Information verification method and device, computer equipment and storage medium
CN111639890A (en) * 2020-05-12 2020-09-08 中信银行股份有限公司 Money box management method and system, terminal device and computer readable storage medium
CN112822630A (en) * 2021-01-12 2021-05-18 上海钧正网络科技有限公司 Data processing method of device and computer-readable storage medium
CN113409499A (en) * 2021-07-31 2021-09-17 郑州信大捷安信息技术股份有限公司 Method and system for realizing dynamic password of coded lock
CN114780984A (en) * 2022-06-21 2022-07-22 深圳市晨创科技有限公司 Intelligent money box handover management method and system

Also Published As

Publication number Publication date
CN116484346A (en) 2023-07-25

Similar Documents

Publication Publication Date Title
US5548721A (en) Method of conducting secure operations on an uncontrolled network
CN116484346B (en) Intelligent money box management system based on multidimensional information
CN109478279A (en) Method and system for realizing block chain
CN109255873A (en) Bluetooth method for unlocking, apparatus and system
CN109766707A (en) Data processing method, device, equipment and medium based on block chain
CN102571357A (en) Signature realization method and signature realization device
CN115118419B (en) Data transmission method of security chip, security chip device, equipment and medium
CN116776386A (en) Cloud service data information security management method and system
CN103686711B (en) Method for connecting network and electronic equipment
CN112398861A (en) Encryption system and method for sensitive data in web configuration system
CN116842557A (en) Image supervision platform and method based on privacy intersection and blockchain
CN105940403A (en) Information processing device, information processing method, program, and server
CN113506108A (en) Account management method, device, terminal and storage medium
CN104426894B (en) A kind of register method of terminal applies, business platform equipment and terminal
CN111783111A (en) Artificial intelligent identification cloud platform for power grid equipment inspection and identification realization method
CN206922774U (en) A kind of on-site verification system based on mobile terminal
CN116935519B (en) Intelligent lock based on short-range wireless communication technology and control method thereof
CN117011963B (en) Intelligent lock and intelligent door control system based on electronic key
CN116561182B (en) Power data storage method and system based on block chain
CN117407849B (en) Industrial data security protection method and system based on industrial Internet technology
CN117220992B (en) Cloud security management monitoring method and system supporting commercial cryptographic algorithm
CN115333761B (en) Equipment communication method and device applied to ship and server
CN115374422B (en) Anti-disclosure electronic signature verification method based on block chain
CN112507269B (en) Website background risk assessment system
CN117972789A (en) Artificial intelligence water affair data management method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant