CN117877150A - Key management method, device, equipment and storage medium - Google Patents

Key management method, device, equipment and storage medium Download PDF

Info

Publication number
CN117877150A
CN117877150A CN202410268626.4A CN202410268626A CN117877150A CN 117877150 A CN117877150 A CN 117877150A CN 202410268626 A CN202410268626 A CN 202410268626A CN 117877150 A CN117877150 A CN 117877150A
Authority
CN
China
Prior art keywords
key
information
user
power supply
bin
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410268626.4A
Other languages
Chinese (zh)
Other versions
CN117877150B (en
Inventor
宫卿
李智
李博
张军
车恩熙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Gongjiao Yitong Technology Co ltd
Original Assignee
Tianjin Gongjiao Yitong Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin Gongjiao Yitong Technology Co ltd filed Critical Tianjin Gongjiao Yitong Technology Co ltd
Priority to CN202410268626.4A priority Critical patent/CN117877150B/en
Publication of CN117877150A publication Critical patent/CN117877150A/en
Application granted granted Critical
Publication of CN117877150B publication Critical patent/CN117877150B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The application relates to a key management method, a device, equipment and a storage medium, which are applied to the technical field of urban traffic, and the method comprises the following steps: responding to a key request of a user, and acquiring first biological information of the user, wherein the first biological information comprises at least one of face information, fingerprint information and iris information; determining first key information based on the first biological information and a preset work ticket, wherein the first key information comprises a key number; if the key corresponding to the key number is not stored in the corresponding key bin, generating key account information based on the key number; judging whether a key corresponding to the key number is abnormal or not based on the key standing account information; and if the key corresponding to the key number is abnormal, generating alarm information based on the key account information. The key management system has the effects of intelligently managing keys and reducing the disorder and confusion.

Description

Key management method, device, equipment and storage medium
Technical Field
The present disclosure relates to the technical field of urban traffic, and in particular, to a key management method, device, apparatus, and medium.
Background
Bus is an important public transport means, and takes an important place in people's trip, however, because the operation of bus involves a plurality of drivers and vehicles, management of key is a troublesome problem always, traditional key management mode has many shortages, for example key is easy to lose, is difficult to track and manage, and the handing-over of key also has the potential safety hazard.
At present, a special key cabinet is adopted to store keys, then a processing system is used for carrying out keys corresponding to each key bin, when a user intercepts the keys, a request is made to the processing system, the processing system inquires the key bin where the key bin is located and instructs the key bin to unlock, when the user returns the keys, a request is also made to the processing system, then the key bin is controlled to be opened, and after the processing system detects the keys, the key bin is closed.
In view of the above-mentioned problems of confusion and tracking failure of keys during the operation of buses, there is a need for a key management method, device, apparatus and storage medium.
Disclosure of Invention
In order to intelligently manage keys and reduce the disorder condition, the application provides a key management method, device, equipment and storage medium.
In a first aspect, the present application provides a key management method, which adopts the following technical scheme:
a key management method comprising:
responding to a key request of a user, and acquiring first biological information of the user, wherein the first biological information comprises at least one of face information, fingerprint information and iris information;
determining first key information based on the first biological information and a preset work ticket, wherein the first key information comprises a key number;
if the key corresponding to the key number is not stored in the corresponding key bin, generating key account information based on the key number;
judging whether a key corresponding to the key number is abnormal or not based on the key standing account information;
and if the key corresponding to the key number is abnormal, generating alarm information based on the key account information.
Through adopting above-mentioned technical scheme, when needing to take or deposit the key, gather user's first biological information through supervisory equipment, electronic equipment acquires first biological information, then electronic equipment confirms first key information according to first biological information and preset work ticket, realize the one-to-one of user and key, afterwards through judging whether the key that first key information corresponds exists in the key storehouse, if not, then become key account information according to the key number, rethread key account information judges whether the key exists unusual, when the key exists unusual, generate alarm information, whether take or deposit, can carry out intelligent management to the key through above-mentioned step, reduce the confusing condition.
Optionally, the determining the first key information based on the first biological information and the preset work ticket includes:
establishing a user biological information base, wherein the biological information base comprises the name, the work number, the face information, the fingerprint information and the iris information of each user;
acquiring a latest preset work ticket;
extracting the characteristics of the latest preset work ticket to obtain characteristic information, wherein the characteristic information comprises a user name and a work number;
extracting second biological information corresponding to the characteristic information from the user biological information base;
judging whether the second biological information is consistent with the first biological information;
if the second biological information is inconsistent with the first biological information, acquiring adjustment form information;
determining second key information based on the adjustment form information, wherein the second key information comprises a key number and a user name corresponding to the key number;
determining third biometric information based on the second key information and the user biometric information repository;
and if the third biological information is consistent with the first biological information, the second key information is used as first key information.
Optionally, the generating the key ledger information based on the key number includes:
Determining state information of a key corresponding to the key number and vehicle information of a vehicle corresponding to the key number based on the first key information, wherein the state information comprises use start time and first positioning information of the key corresponding to the key number, and the vehicle information comprises vehicle number information and vehicle running information;
acquiring second positioning information of a corresponding vehicle of a key corresponding to the key number;
judging whether a key corresponding to the key number and a corresponding vehicle of the key corresponding to the key number are in the same time space or not based on the first positioning information and the second positioning information;
and if the key corresponding to the key number and the corresponding vehicle corresponding to the key number are in the same time space, generating key standing account information based on the state information and the vehicle information.
Optionally, if the key number corresponds to the key and the corresponding vehicle of the key number corresponds to the key are not in the same time space, the method further includes:
sending an identification key coding request to a corresponding vehicle of a key corresponding to the key number;
receiving first coded information sent by a corresponding vehicle of a key corresponding to the key number;
Extracting second coded information of a key corresponding to the key number and third coded information of a spare key;
judging whether the first coding information is consistent with the second coding information or not;
if the first coding information is inconsistent with the second coding information, judging whether the first coding information is consistent with the third coding information or not;
if the first coded information is inconsistent with the third coded information, corresponding driver face information in a corresponding vehicle of the key corresponding to the key number is obtained;
if fourth biological information corresponding to the driver face information exists in the user biological information base, generating a key code record, wherein the key code record comprises first code information and a user name;
and generating early warning information based on the key code record, and sending the early warning information to a manager.
Optionally, before determining that the key corresponding to the key number has an abnormality, the method further includes:
determining a permission level of the user based on the first biometric information in response to a spare key application request;
if the authority level of the user is higher than a preset authority level, sending a spare key access instruction based on the authority level;
If the authority level of the user is lower than the preset authority level, acquiring manager user information with spare key authority, wherein the manager user information comprises names, contact ways and positions;
transmitting the spare key application request to a mobile terminal corresponding to the administrator user information;
and if receiving an approval request sent by the mobile terminal corresponding to the administrator user information, opening a key bin corresponding to the spare key and updating the spare key account record.
Optionally, before the generating the alarm information based on the key ledger information, the method further includes:
acquiring power supply information;
judging whether the key bin is normally powered or not based on the power supply information;
if the power supply of the key bin is abnormal, acquiring power supply information of the position of the key bin;
judging whether the power supply abnormality of the key cabin is a normal phenomenon or not based on the power supply information;
and if the power supply abnormality of the key cabin is an abnormal phenomenon, generating and sending a standby power supply starting instruction so as to lock the key cabin.
Optionally, before the generating and sending the instruction to start the standby power, the method further includes:
acquiring a power supply adjustment list, wherein the power supply adjustment list comprises a power supply period, a power-off period, a power supply range and a power-off range;
A power supply schedule is established based on the power supply adjustment list;
acquiring the abnormal power supply period of the key bin;
judging whether the abnormal power supply period of the key bin is consistent with the power supply schedule;
if the abnormal power supply period of the key bin is inconsistent with the power supply schedule, acquiring a monitoring video of the space where the key bin is located;
determining behavior information and identity information of the user based on the monitoring video;
and generating a behavior abnormal report based on the behavior information and the identity information.
In a second aspect, the present application provides a key management device, which adopts the following technical scheme:
a key management device, a response acquisition module and a control module, wherein the response acquisition module is used for responding to a key request of a user and acquiring first biological information of the user, and the first biological information comprises at least one of face information, fingerprint information and iris information;
the determining module is used for determining first key information based on the first biological information and a preset work ticket, wherein the first key information comprises a key number;
the generation module is used for generating key account information based on the key number if the key corresponding to the key number is not stored in the corresponding key bin;
The judging module is used for judging whether the key corresponding to the key number is abnormal or not based on the key standing account information; and if the key corresponding to the key number is abnormal, generating alarm information based on the key account information.
Through adopting above-mentioned technical scheme, when needing to take or deposit the key, gather user's first biological information through supervisory equipment, electronic equipment acquires first biological information, then electronic equipment confirms first key information according to first biological information and preset work ticket, realize the one-to-one of user and key, afterwards through judging whether the key that first key information corresponds exists in the key storehouse, if not, then become key account information according to the key number, rethread key account information judges whether the key exists unusual, when the key exists unusual, generate alarm information, whether take or deposit, can carry out intelligent management to the key through above-mentioned step, reduce the confusing condition.
In a third aspect, the present application provides an electronic device, which adopts the following technical scheme:
an electronic device comprising a processor coupled with a memory;
The memory has stored thereon a computer program that can be loaded by a processor and that performs the key management method according to any one of the first aspects.
In a fourth aspect, the present application provides a computer readable storage medium, which adopts the following technical scheme:
a computer-readable storage medium storing a computer program capable of being loaded by a processor and executing the key management method according to any one of the first aspects.
Drawings
Fig. 1 is a flow chart of a key management method according to an embodiment of the present application.
Fig. 2 is a block diagram of a key management device according to an embodiment of the present application.
Fig. 3 is a block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The present application is described in further detail below with reference to the accompanying drawings.
At present in urban bus management field, generally with the key of bus unified place in the key storage room of public transit total station, be provided with a plurality of key warehouses and electronic equipment in the key storage room, electronic equipment is connected with key warehouses electricity, is used for depositing the key of bus in the key warehouses, and the unified regulation and control through electronic equipment is all needed to take of all bus keys, in order to guarantee the normal operating in electronic equipment and key warehouses, electronic equipment and key warehouses and to the control in the key department storage room adopt two-way power supply design.
The embodiment of the application provides a key management method, which can be executed by electronic equipment, wherein the electronic equipment can be a server or terminal equipment, and the server can be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server for providing cloud computing service. The terminal device may be, but is not limited to, a smart phone, a tablet computer, a desktop computer, etc.
As shown in fig. 1, a key management method is described as follows (steps S101 to S104):
step S101, in response to a key request of a user, acquiring first biometric information of the user, where the first biometric information includes at least one of face information, fingerprint information, and iris information.
In this embodiment, before a user works every day, the user needs to go to a key storage room to open a key cabin through an electronic device to take the key, when the user needs to take the key, the user needs to want the electronic device to send a key request, that is, click a key taking button on a touch screen of the electronic device, after the electronic device receives the key request, the electronic device controls an acquisition device to acquire biological information of the user, wherein the acquisition device comprises a camera and a fingerprint acquisition device, when the biological information of the user needs to be acquired, face information and/or iris information of the user can be acquired through the camera, and fingerprint information of the user can be acquired through the fingerprint acquisition device.
Step S102, determining first key information based on the first biological information and a preset work ticket, wherein the first key information comprises a key number.
Specifically, determining the first key information based on the first biometric information and the preset work ticket includes: establishing a user biological information base, wherein the biological information base comprises the name, the work number, the face information, the fingerprint information and the iris information of each user; acquiring a latest preset work ticket; extracting features of the latest preset work ticket to obtain feature information, wherein the feature information comprises a user name and a work number; extracting second biological information corresponding to the characteristic information from a user biological information base; judging whether the second biological information is consistent with the first biological information; if the second biological information is inconsistent with the first biological information, acquiring adjustment form information; determining second key information based on the adjustment form information, wherein the second key information comprises a key number and a user name corresponding to the key number; determining third biometric information based on the second key information and the user biometric information repository; and if the third biological information is consistent with the first biological information, the second key information is used as the first key information.
In this embodiment, since personnel change exists and the bus on which the user works is determined by the working ticket, in order to more conveniently associate the user with the key required by the user, the biological information of all the users needs to be stored, namely, the resume user biological information base, the name, the job number, the face information, the fingerprint information and the iris information of each user are bound, the uniqueness is provided, and then the preset working ticket uploaded by the administrator is used for identification, so that the key of the user is finally determined.
The work ticket is a scheduling table of the user and comprises a bus running schedule, a corresponding name and work number of the user and a key which the user needs to take.
After the latest preset working ticket is obtained, the electronic equipment performs feature extraction on the latest preset working ticket to obtain feature information, namely, the user name and the work number corresponding to each key in the working ticket are obtained, then all second biological information corresponding to the feature information is searched in a user biological information base by taking the feature information as a key word, the electronic equipment packages the second biological information to generate a second biological information group, then the first biological information is compared with the second biological information group, whether the second biological information consistent with the first biological information exists in the second biological information group is judged, when the second biological information consistent with the first biological information exists, the electronic equipment determines the first key information according to the latest preset working ticket, and then the corresponding key bin is controlled to be opened, so that the user can conveniently take the key.
When the second biological information which is consistent with the first biological information does not exist, two conditions exist, firstly, the biological information of the user is possibly input and then is not uploaded into the biological information base of the user because the biological information base of the user is periodically updated, so that the user information base can be updated firstly and then is compared again; second, because the shift system is adopted, once the user working on the work ticket temporarily has a leave, when other users need to replace, but other users are not present on the work ticket at this time, the second biological information which is consistent with the first biological information does not exist in the second biological information group.
For the second situation, when knowing the leave-out situation of the user, the administrator needs to transmit the adjustment form to the electronic device through the internet, when the second biological information consistent with the first biological information is not queried after the user biological information base is updated, the electronic device is required to acquire the adjustment form information, then the second key information is determined according to the adjustment form information, the second key information comprises a key number, a user name corresponding to the key number and a user work number, at the moment, third biological information is searched in the biological information base according to the user name and the user work number, and when the third biological information is consistent with the first biological information, the second key information is used as the first key information to control the corresponding key bin to be opened.
In the generation of the second biological information group, duplicate checking and leak detection are also required according to the job number to ensure the integrity of the second biological information group, possibly because of the existence of a duplicate name of the user.
In this embodiment, if the second biometric information or the third biometric information which is identical to the first biometric information does not exist after the user biometric information library is traversed, it may be determined that the user cannot take the key at this time, and a prompt is required to be given to the administrator.
After the first key information has been determined, the electronic device needs to control the corresponding key bin to be opened, before the electronic device needs to detect whether a key exists in the key bin, and when the key corresponding to the key number is not placed in the corresponding key bin, the step S103 is shifted to; when the key corresponding to the key number is stored in the corresponding key bin, the opening is controlled.
Step S103, generating key ledger information based on the key number.
Specifically, generating the key ledger information based on the key number includes: determining state information of a key corresponding to a key number and vehicle information of a corresponding vehicle of the key corresponding to the key number based on the first key information, wherein the state information comprises use starting time and first positioning information of the key corresponding to the key number, and the vehicle information comprises vehicle number information and vehicle running information; acquiring second positioning information of a corresponding vehicle of a key corresponding to the key number; judging whether a key corresponding to the key number and a corresponding vehicle of the key corresponding to the key number are in the same time space or not based on the first positioning information and the second positioning information; if the key number corresponds to the key and the corresponding vehicle of the key number corresponds to the key are in the same time space, generating the key ledger information based on the state information and the vehicle information.
In this embodiment, when the key is not stored in the key bin, it may be because the driver of the previous day has not returned to the key bin, it may be because the user has taken the key by mistake, or it may be because the user has seen the wrong number when a plurality of users make a key request, and other users may be making the request of the key at the moment, thereby causing the situation of taking the key by mistake.
At this time, it is necessary to determine the state information of the corresponding key, including the use start time of the key number corresponding to the key and the first positioning information, and the vehicle information, including the vehicle number information and the vehicle running information, based on the first key information.
It should be noted that, the key corresponding to the key number is named as the first key, and the corresponding vehicle corresponding to the key corresponding to the number is the first vehicle; the first key is used in a period from a start time when the first key leaves the key bin to a finish time when the first key is put back into the key bin, and the first positioning information is position information of the first key.
When the first key is positioned, a positioning chip is arranged in the first key, and position information can be remotely sent to the electronic equipment.
After the vehicle information is acquired, whether the first vehicle runs according to a fixed running route or not can be judged through the vehicle information, so that whether the first key is lost or mishandled can be judged.
When the first vehicle runs according to the fixed running route, the first positioning information of the first key is judged to be wrong by the user when the first positioning information of the first key is consistent with the second positioning information of the first vehicle, and when the first positioning information of the first key is inconsistent with the second positioning information of the first key, the first key is judged to be lost at the moment, and the user starts the first vehicle by adopting other keys.
It should be noted that, the same time space is the same space where the first key and the first vehicle are located at the same time, and the same space is the longitude and latitude coordinates within the allowable range of the positioning chip error.
When the first key and the first vehicle are in the same time space, generating key account information according to the state information of the first key and the vehicle information of the first vehicle, wherein the key account information comprises the service time of the key and the driving route of the vehicle.
When the first key and the first vehicle are not in the same time space, the first key and the first vehicle may be a second key configured by the user, and at this time, the second key capable of starting the first vehicle needs to be determined, specifically:
sending an identification key coding request to a corresponding vehicle of a key corresponding to the key number; receiving first coded information sent by a corresponding vehicle of a key corresponding to the key number; extracting second coded information of a key corresponding to the key number and third coded information of the spare key; judging whether the first coded information is consistent with the second coded information or not, and if the first coded information is inconsistent with the second coded information, judging whether the first coded information is consistent with the third coded information or not; if the first code information is inconsistent with the third code information, corresponding driver face information in the corresponding vehicle of the key corresponding to the key number is obtained; if fourth biological information corresponding to the face information of the driver exists in the user biological information base, generating a key code record, wherein the key code record comprises first code information and a user name; and generating early warning information based on the key code record, and sending the early warning information to a manager.
In this embodiment, a radio frequency communication chip is further disposed inside each first key, and an RFID technology is adopted, that is, each first key has a corresponding key code, when the first key and the first vehicle are not in the same time space, the electronic device performs network communication with the first vehicle, after the communication is completed, the electronic device sends an identification key code request to the first vehicle, and after the first vehicle receives the identification key code request, the first vehicle detects first code information of the second key and transmits the first code information to the electronic device, and at this time, the electronic device further extracts second code information corresponding to the first key and third code information of a spare key corresponding to the first key from the internal memory.
Here, it may be that the first key and the first vehicle are not located in the same time space due to the positioning error of the positioning chip inside the first key, so it is further determined whether the second key is the first key, that is, when the first code information is consistent with the second code information, the first key and the second key may be determined to be the same key, and when the first code information is inconsistent with the second code information, the first code information is consistent with the third code information, and the second key is a spare key; when the first code information and the third code information are inconsistent, the second key can be judged to be a key which is configured by the user, at the moment, the face information of the driver of the user is required to be acquired through monitoring equipment of the first vehicle, then the face information of the driver is compared with the biological information in a biological information base of the user, if the biological information consistent with the fourth biological information exists in the biological information base of the user, a key code record is generated, and the key code record comprises the first code information and the user name; if the biological information consistent with the fourth biological information does not exist in the user biological information base, the alarm processing is needed immediately at the moment, and meanwhile, early warning information is sent to the manager.
In this embodiment, when the user takes the key, if the practical record of the key is normally recorded in the key account record, the first key is not abnormal at this time, and similarly, when the user stores the key, the first key can be normally placed in the key bin corresponding to the first key, and it can be determined that the first key is not abnormal.
Step S104, if the key corresponding to the key number is abnormal, generating alarm information based on the key account information.
In this embodiment, when the first key is abnormal, the electronic device generates alarm information according to the key account information, that is, generates alarm information from the fourth biometric information and/or the first encoded information.
Further, before determining that the key corresponding to the key number is abnormal, the method further includes: determining a permission level of the user based on the first biometric information in response to the spare key application request; if the authority level of the user is higher than the preset authority level, sending a spare key access instruction based on the authority level; if the authority level of the user is lower than the preset authority level, acquiring manager user information with spare key authority, wherein the manager user information comprises names, contact ways and positions; transmitting a spare key application request to a mobile terminal corresponding to the administrator user information; and if receiving an approval request sent by the mobile terminal corresponding to the user information of the manager, opening a key bin corresponding to the spare key and updating the spare key account record.
In this embodiment, the preset permission level is an administrator permission level, when the user wants to take the spare key, the permission level of the user needs to be determined according to the first biological information, and if the permission level of the user is higher than or equal to the preset permission level, the electronic device controls the key bin storing the spare key to be opened, and then the user takes the key.
When the authority level of the user is lower than the preset authority level, the user cannot take the spare key, the application needs to be submitted to the manager, the electronic equipment sends a spare key application request to the mobile terminal representing the manager through the Internet, and when the manager sends an approval request through the mobile terminal, the electronic equipment opens a key bin corresponding to the spare key and then updates the spare key account record so as to facilitate the later manager to inquire the practical record of the spare key.
Further, before generating the alarm information based on the key ledger information, the method further includes: acquiring power supply information; judging whether the key bin is normally powered on or not based on the power supply information; if the power supply of the key bin is abnormal, acquiring power supply information of the position of the key bin; judging whether the abnormal power supply of the key bin is normal or not based on the power supply information; if the abnormal power supply of the key bin is abnormal, generating and sending a standby power supply starting instruction to lock the key bin.
In this embodiment, there are two independent power supplies including a key bin and a monitoring power supply, and some users can break the power supply of the key bin independently, so that it is necessary to monitor the power supply information of the key bin at any time, that is, determine whether the power supply of the key bin is normal through the power supply information of the key bin, and once the power failure condition of the key bin occurs, that is, the power supply information of the position (key storage room) where the key bin is located is obtained by the electronic device, if the key storage room is normally powered at this time, the power supply abnormality of the key bin is an abnormal phenomenon, and if the power supply abnormality of the key storage room is at this time, the power supply abnormality of the key bin is a normal phenomenon, and electric personnel needs to be notified to overhaul lines.
When the abnormal power supply of the key bin is abnormal, the electronic equipment generates and starts a standby power supply instruction, the standby power supply instruction is sent to the standby power supply, and the standby power supply is started to lock the key bin.
It is worth to say that, the key is locked through the electro-magnet in the key bin, so once the key bin is powered off, the key bin does not possess the locking effect to the key.
Further, before generating and sending the instruction to start the standby power supply, the method further includes: acquiring a power supply adjustment list, wherein the power supply adjustment list comprises a power supply period, a power-off period, a power supply range and a power-off range; making a power supply schedule based on the power supply adjustment list; acquiring a power supply abnormal period of a key bin; judging whether the abnormal power supply period of the key bin is consistent with a power supply schedule; if the abnormal power supply period of the key bin is inconsistent with the power supply schedule, acquiring a monitoring video of the space where the key bin is located; determining behavior information and identity information of a user based on the monitoring video; and generating a behavioural abnormal report based on the behavioural information and the identity information.
In this embodiment, if the power is normally turned off, the relevant department sends a relevant notification, that is, a power adjustment list, where the power adjustment list includes a power supply period, a power off period, a power supply range and a power off range, according to the power adjustment list, the electronic device can make a power supply schedule, where the power supply schedule is a power supply period of the power grid, a power supply period of a standby power supply and a power off period, where the power off period is a power off period of the power grid, when the power supply abnormality period of the key bin is inconsistent with the power supply schedule, it can be determined that the power supply of the key bin is intentionally turned off, the electronic device performs image recognition through the monitoring camera and stores a monitoring video, after the electronic device extracts the monitoring video, the behavior information and the identity information of the user are extracted through an image recognition technology, the behavior information includes walking posture and action information of the user, the identity card number and face image of the identity information, then the behavior information and the power supply abnormality period of the key bin are generated into an abnormality report according to a preset abnormality report template, and the abnormality report is sent to the mobile terminal of the manager together, so as to realize safety monitoring of the key bin.
Fig. 2 is a block diagram of a key management device 200 according to an embodiment of the present application.
As shown in fig. 2, the key management device 200 mainly includes:
a response obtaining module 201, configured to obtain first biological information of a user in response to a key request of the user, where the first biological information includes at least one of face information, fingerprint information, and iris information;
a determining module 202, configured to determine first key information based on the first biological information and a preset work ticket, where the first key information includes a key number;
a generating module 203, configured to generate key ledger information based on the key number if the key corresponding to the key number is not stored in the corresponding key bin;
a judging module 204, configured to judge whether a key corresponding to the key number is abnormal based on the key ledger information; if the key corresponding to the key number is abnormal, generating alarm information based on the key account information.
As an optional implementation manner of this embodiment, the determining module 202 is further specifically configured to determine, based on the first biological information and the preset work ticket, the first key information includes: establishing a user biological information base, wherein the biological information base comprises the name, the work number, the face information, the fingerprint information and the iris information of each user; acquiring a latest preset work ticket; extracting features of the latest preset work ticket to obtain feature information, wherein the feature information comprises a user name and a work number; extracting second biological information corresponding to the characteristic information from a user biological information base; judging whether the second biological information is consistent with the first biological information; if the second biological information is inconsistent with the first biological information, acquiring adjustment form information; determining second key information based on the adjustment form information, wherein the second key information comprises a key number and a user name corresponding to the key number; determining third biometric information based on the second key information and the user biometric information repository; and if the third biological information is consistent with the first biological information, the second key information is used as the first key information.
As an optional implementation manner of this embodiment, the generating module 203 is further specifically configured to generate key ledger information based on the key number, including: determining state information of a key corresponding to a key number and vehicle information of a corresponding vehicle of the key corresponding to the key number based on the first key information, wherein the state information comprises use starting time and first positioning information of the key corresponding to the key number, and the vehicle information comprises vehicle number information and vehicle running information; acquiring second positioning information of a corresponding vehicle of a key corresponding to the key number; judging whether a key corresponding to the key number and a corresponding vehicle of the key corresponding to the key number are in the same time space or not based on the first positioning information and the second positioning information; if the key number corresponds to the key and the corresponding vehicle of the key number corresponds to the key are in the same time space, generating the key ledger information based on the state information and the vehicle information.
As an optional implementation manner of this embodiment, the generating module 203 is further specifically configured to, if the key number corresponds to the key and the corresponding vehicle of the key corresponding to the key number is not in the same time space, further include: sending an identification key coding request to a corresponding vehicle of a key corresponding to the key number; receiving first coded information sent by a corresponding vehicle of a key corresponding to the key number; extracting second coded information of a key corresponding to the key number and third coded information of the spare key; judging whether the first coded information is consistent with the second coded information or not, and if the first coded information is inconsistent with the second coded information, judging whether the first coded information is consistent with the third coded information or not; if the first code information is inconsistent with the third code information, corresponding driver face information in the corresponding vehicle of the key corresponding to the key number is obtained; if fourth biological information corresponding to the face information of the driver exists in the user biological information base, generating a key code record, wherein the key code record comprises first code information and a user name; and generating early warning information based on the key code record, and sending the early warning information to a manager.
As an optional implementation manner of this embodiment, the determining module 204 is further specifically configured to, before determining that the key corresponding to the key number has an abnormality, further include: determining a permission level of the user based on the first biometric information in response to the spare key application request; if the authority level of the user is higher than the preset authority level, sending a spare key access instruction based on the authority level; if the authority level of the user is lower than the preset authority level, acquiring manager user information with spare key authority, wherein the manager user information comprises names, contact ways and positions; transmitting a spare key application request to a mobile terminal corresponding to the administrator user information; and if receiving an approval request sent by the mobile terminal corresponding to the user information of the manager, opening a key bin corresponding to the spare key and updating the spare key account record.
As an optional implementation manner of this embodiment, the determining module 204 is further specifically configured to, before generating the alarm information based on the key ledger information, the method further includes: acquiring power supply information; judging whether the key bin is normally powered on or not based on the power supply information; if the power supply of the key bin is abnormal, acquiring power supply information of the position of the key bin; judging whether the abnormal power supply of the key bin is normal or not based on the power supply information; if the abnormal power supply of the key bin is abnormal, generating and sending a standby power supply starting instruction to lock the key bin.
As an optional implementation manner of this embodiment, the determining module 204 is further specifically configured to, before generating and sending the instruction to start the standby power supply, the method further includes: acquiring a power supply adjustment list, wherein the power supply adjustment list comprises a power supply period, a power-off period, a power supply range and a power-off range; making a power supply schedule based on the power supply adjustment list; acquiring a power supply abnormal period of a key bin; judging whether the abnormal power supply period of the key bin is consistent with a power supply schedule; if the abnormal power supply period of the key bin is inconsistent with the power supply schedule, acquiring a monitoring video of the space where the key bin is located; determining behavior information and identity information of a user based on the monitoring video; and generating a behavioural abnormal report based on the behavioural information and the identity information.
In one example, a module in any of the above apparatuses may be one or more integrated circuits configured to implement the above methods, for example: one or more application specific integrated circuits (application specific integratedcircuit, ASIC), or one or more digital signal processors (digital signal processor, DSP), or one or more field programmable gate arrays (field programmable gate array, FPGA), or a combination of at least two of these integrated circuit forms.
For another example, when a module in an apparatus may be implemented in the form of a scheduler of processing elements, the processing elements may be general-purpose processors, such as a central processing unit (central processing unit, CPU) or other processor that may invoke a program. For another example, the modules may be integrated together and implemented in the form of a system-on-a-chip (SOC).
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the apparatus and modules described above may refer to the corresponding process in the foregoing method embodiment, which is not repeated herein.
Fig. 3 is a block diagram of an electronic device 300 according to an embodiment of the present application.
As shown in FIG. 3, electronic device 300 includes a processor 301 and memory 302, and may further include an information input/information output (I/O) interface 303, one or more of a communication component 304, and a communication bus 305.
Wherein the processor 301 is configured to control the overall operation of the electronic device 300 to perform all or part of the steps of the key management method described above; the memory 302 is used to store various types of data to support operation at the electronic device 300, which may include, for example, instructions for any application or method operating on the electronic device 300, as well as application-related data. The Memory 302 may be implemented by any type or combination of volatile or non-volatile Memory devices, such as one or more of static random access Memory (Static Random Access Memory, SRAM), electrically erasable programmable Read-Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), erasable programmable Read-Only Memory (Erasable Programmable Read-Only Memory, EPROM), programmable Read-Only Memory (Programmable Read-Only Memory, PROM), read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic disk, or optical disk.
The I/O interface 303 provides an interface between the processor 301 and other interface modules, which may be a keyboard, mouse, buttons, etc. These buttons may be virtual buttons or physical buttons. The communication component 304 is used for wired or wireless communication between the electronic device 300 and other devices. Wireless communication, such as Wi-Fi, bluetooth, near field communication (Near Field Communication, NFC for short), 2G, 3G, or 4G, or a combination of one or more thereof, and accordingly the communication component 304 can include: wi-Fi part, bluetooth part, NFC part.
The electronic device 300 may be implemented by one or more application specific integrated circuits (Application Specific Integrated Circuit, abbreviated ASIC), digital signal processors (Digital Signal Processor, abbreviated DSP), digital signal processing devices (Digital Signal Processing Device, abbreviated DSPD), programmable logic devices (Programmable Logic Device, abbreviated PLD), field programmable gate arrays (Field Programmable Gate Array, abbreviated FPGA), controllers, microcontrollers, microprocessors, or other electronic components for performing the key management methods set forth in the above embodiments.
Communication bus 305 may include a pathway to transfer information between the aforementioned components. The communication bus 305 may be a PCI (Peripheral Component Interconnect, peripheral component interconnect standard) bus or an EISA (Extended Industry Standard Architecture ) bus, or the like. The communication bus 305 may be divided into an address bus, a data bus, a control bus, and the like.
The electronic device 300 may include, but is not limited to, mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), car terminals (e.g., car navigation terminals), and the like, and fixed terminals such as digital TVs, desktop computers, and the like, and may also be a server, and the like.
The present application also provides a computer readable storage medium having a computer program stored thereon, which when executed by a processor, implements the steps of the key management method described above.
The computer readable storage medium may include: a U-disk, a removable hard disk, a read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
The foregoing description is only of the preferred embodiments of the present application and is presented as a description of the principles of the technology being utilized. It will be appreciated by persons skilled in the art that the scope of the application referred to in this application is not limited to the specific combinations of features described above, but it is intended to cover other embodiments in which any combination of features described above or their equivalents is possible without departing from the spirit of the application. Such as the above-mentioned features and the technical features having similar functions (but not limited to) applied for in this application are replaced with each other.

Claims (10)

1. A key management method, comprising:
responding to a key request of a user, and acquiring first biological information of the user, wherein the first biological information comprises at least one of face information, fingerprint information and iris information;
Determining first key information based on the first biological information and a preset work ticket, wherein the first key information comprises a key number;
if the key corresponding to the key number is not stored in the corresponding key bin, generating key account information based on the key number;
judging whether a key corresponding to the key number is abnormal or not based on the key standing account information;
and if the key corresponding to the key number is abnormal, generating alarm information based on the key account information.
2. The method of claim 1, wherein the determining first key information based on the first biometric information and a preset work ticket comprises:
establishing a user biological information base, wherein the biological information base comprises the name, the work number, the face information, the fingerprint information and the iris information of each user;
acquiring a latest preset work ticket;
extracting the characteristics of the latest preset work ticket to obtain characteristic information, wherein the characteristic information comprises a user name and a work number;
extracting second biological information corresponding to the characteristic information from the user biological information base;
judging whether the second biological information is consistent with the first biological information;
If the second biological information is inconsistent with the first biological information, acquiring adjustment form information;
determining second key information based on the adjustment form information, wherein the second key information comprises a key number and a user name corresponding to the key number;
determining third biometric information based on the second key information and the user biometric information repository;
and if the third biological information is consistent with the first biological information, the second key information is used as first key information.
3. The method of claim 1, wherein the generating key ledger information based on the key number comprises:
determining state information of a key corresponding to the key number and vehicle information of a vehicle corresponding to the key number based on the first key information, wherein the state information comprises use start time and first positioning information of the key corresponding to the key number, and the vehicle information comprises vehicle number information and vehicle running information;
acquiring second positioning information of a corresponding vehicle of a key corresponding to the key number;
judging whether a key corresponding to the key number and a corresponding vehicle of the key corresponding to the key number are in the same time space or not based on the first positioning information and the second positioning information;
And if the key corresponding to the key number and the corresponding vehicle corresponding to the key number are in the same time space, generating key standing account information based on the state information and the vehicle information.
4. The method of claim 3, wherein if the key number corresponds to a key and the corresponding vehicle of the key number corresponds to a key is not in the same time space, the method further comprises:
sending an identification key coding request to a corresponding vehicle of a key corresponding to the key number;
receiving first coded information sent by a corresponding vehicle of a key corresponding to the key number;
extracting second coded information of a key corresponding to the key number and third coded information of a spare key;
judging whether the first coding information is consistent with the second coding information or not;
if the first coding information is inconsistent with the second coding information, judging whether the first coding information is consistent with the third coding information or not;
if the first coded information is inconsistent with the third coded information, corresponding driver face information in a corresponding vehicle of the key corresponding to the key number is obtained;
if fourth biological information corresponding to the driver face information exists in the user biological information base, generating a key code record, wherein the key code record comprises first code information and a user name;
And generating early warning information based on the key code record, and sending the early warning information to a manager.
5. The method of claim 1, wherein prior to determining that there is an abnormality in the key corresponding to the key number, the method further comprises:
determining a permission level of the user based on the first biometric information in response to a spare key application request;
if the authority level of the user is higher than a preset authority level, sending a spare key access instruction based on the authority level;
if the authority level of the user is lower than the preset authority level, acquiring manager user information with spare key authority, wherein the manager user information comprises names, contact ways and positions;
transmitting the spare key application request to a mobile terminal corresponding to the administrator user information;
and if receiving an approval request sent by the mobile terminal corresponding to the administrator user information, opening a key bin corresponding to the spare key and updating the spare key account record.
6. The method of claim 1, wherein prior to the generating alarm information based on the key ledger information, the method further comprises:
Acquiring power supply information;
judging whether the key bin is normally powered or not based on the power supply information;
if the power supply of the key bin is abnormal, acquiring power supply information of the position of the key bin;
judging whether the power supply abnormality of the key cabin is a normal phenomenon or not based on the power supply information;
and if the power supply abnormality of the key cabin is an abnormal phenomenon, generating and sending a standby power supply starting instruction so as to lock the key cabin.
7. The method of claim 6, wherein prior to said generating and transmitting the power up backup command, the method further comprises:
acquiring a power supply adjustment list, wherein the power supply adjustment list comprises a power supply period, a power-off period, a power supply range and a power-off range;
a power supply schedule is established based on the power supply adjustment list;
acquiring the abnormal power supply period of the key bin;
judging whether the abnormal power supply period of the key bin is consistent with the power supply schedule;
if the abnormal power supply period of the key bin is inconsistent with the power supply schedule, acquiring a monitoring video of the space where the key bin is located;
determining behavior information and identity information of the user based on the monitoring video;
and generating a behavior abnormal report based on the behavior information and the identity information.
8. A key management device, comprising:
the response acquisition module is used for responding to a key request of a user and acquiring first biological information of the user, wherein the first biological information comprises at least one of face information, fingerprint information and iris information;
the determining module is used for determining first key information based on the first biological information and a preset work ticket, wherein the first key information comprises a key number;
the generation module is used for generating key account information based on the key number if the key corresponding to the key number is not stored in the corresponding key bin;
the judging module is used for judging whether the key corresponding to the key number is abnormal or not based on the key standing account information; and if the key corresponding to the key number is abnormal, generating alarm information based on the key account information.
9. An electronic device comprising a processor coupled to a memory;
the processor is configured to execute a computer program stored in the memory to cause the electronic device to perform the method of any one of claims 1 to 7.
10. A computer readable storage medium comprising a computer program or instructions which, when run on a computer, cause the computer to perform the method of any of claims 1 to 7.
CN202410268626.4A 2024-03-11 2024-03-11 Key management method, device, equipment and storage medium Active CN117877150B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410268626.4A CN117877150B (en) 2024-03-11 2024-03-11 Key management method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410268626.4A CN117877150B (en) 2024-03-11 2024-03-11 Key management method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN117877150A true CN117877150A (en) 2024-04-12
CN117877150B CN117877150B (en) 2024-05-17

Family

ID=90581538

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410268626.4A Active CN117877150B (en) 2024-03-11 2024-03-11 Key management method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117877150B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN206931129U (en) * 2017-05-10 2018-01-26 安庆师范大学 Bus key intelligent management system
CN110163488A (en) * 2019-04-28 2019-08-23 西安艾润物联网技术服务有限责任公司 Officer's car key management method and device
CN110517384A (en) * 2019-08-23 2019-11-29 西安交通大学 A kind of key management box
BR102018015358A2 (en) * 2018-07-26 2020-02-04 Universidade Federal De Pernambuco adaptable system for regionalized control device location for a motor vehicle and method of enabling an automotive function
CN211961409U (en) * 2019-12-02 2020-11-20 广西电网有限责任公司柳州供电局 Special intelligent management box for secret key
CN113570753A (en) * 2021-02-01 2021-10-29 华录智达科技股份有限公司 Intelligent key cabinet system for bus station
CN215773577U (en) * 2021-07-07 2022-02-08 义乌市公安局 Multilayer tower type intelligent vehicle control system model

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN206931129U (en) * 2017-05-10 2018-01-26 安庆师范大学 Bus key intelligent management system
BR102018015358A2 (en) * 2018-07-26 2020-02-04 Universidade Federal De Pernambuco adaptable system for regionalized control device location for a motor vehicle and method of enabling an automotive function
CN110163488A (en) * 2019-04-28 2019-08-23 西安艾润物联网技术服务有限责任公司 Officer's car key management method and device
CN110517384A (en) * 2019-08-23 2019-11-29 西安交通大学 A kind of key management box
CN211961409U (en) * 2019-12-02 2020-11-20 广西电网有限责任公司柳州供电局 Special intelligent management box for secret key
CN113570753A (en) * 2021-02-01 2021-10-29 华录智达科技股份有限公司 Intelligent key cabinet system for bus station
CN215773577U (en) * 2021-07-07 2022-02-08 义乌市公安局 Multilayer tower type intelligent vehicle control system model

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈彩凤: "厦门地区变电站智能钥匙管理系统的研究与应用", 中国优秀硕士论文全文库, no. 4, 15 April 2019 (2019-04-15) *

Also Published As

Publication number Publication date
CN117877150B (en) 2024-05-17

Similar Documents

Publication Publication Date Title
CN102110211B (en) For the method and apparatus of Administrative Security event
CN103514386B (en) Permission control and management method of application program and electronic device
US8838738B2 (en) System and method for processing medical information through medical terminal
CN104570823A (en) Information processing method and information processing apparatus
JP5583871B1 (en) Work machine, work machine management system, and work machine management method
CN103403680A (en) Contextual history of computing objects
CN108388604A (en) User right data administrator, method and computer readable storage medium
US11651639B2 (en) Method, system and apparatus for equipment monitoring and access control
CN106980647B (en) Data distribution method and device for distributed file system
CN104135378A (en) Method of management control of Internet of Things gateways and management control entity for Internet of Things gateways
CN103914641A (en) Fingerprint management method and system
CN112735041A (en) Method, device, equipment and storage medium for borrowing shared product
CN102005089A (en) Method and system for remotely controlling intelligent card
US9652966B2 (en) Jumpers and methods of making and using same
CN117877150B (en) Key management method, device, equipment and storage medium
EP2881896B1 (en) Near field communication tag based data transfer
CN112258197A (en) Account management method, device, terminal and storage medium based on artificial intelligence
CN115242854B (en) Automobile remote control method and system
CN110992524A (en) Intelligent lock control method and system based on USB
CN105809788A (en) Electronic lock system and unlocking method thereof
CN115567218A (en) Data processing method and device of security certificate based on block chain and server
CN114331661A (en) Data verification method and device, electronic equipment and storage medium
CN108696573A (en) Service providing device and service provider system
CN116644397A (en) Accurate Estimation of Remaining Battery Charge in Mobile Carts
CN102419873A (en) Facility controlling system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant