CN215006659U - Management system of confidential files - Google Patents

Management system of confidential files Download PDF

Info

Publication number
CN215006659U
CN215006659U CN202121160288.0U CN202121160288U CN215006659U CN 215006659 U CN215006659 U CN 215006659U CN 202121160288 U CN202121160288 U CN 202121160288U CN 215006659 U CN215006659 U CN 215006659U
Authority
CN
China
Prior art keywords
confidential
rfid
file
files
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202121160288.0U
Other languages
Chinese (zh)
Inventor
吴先明
李知键
周建元
杜永耀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
China Construction Bank Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp filed Critical China Construction Bank Corp
Priority to CN202121160288.0U priority Critical patent/CN215006659U/en
Application granted granted Critical
Publication of CN215006659U publication Critical patent/CN215006659U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model relates to a file management technical field, the utility model discloses a management system of secret-related file, include: the system comprises a two-dimensional code scanning gun, an RFID label printer, an RFID intelligent cabinet and a confidential computer, wherein the two-dimensional code scanning gun is used for scanning a two-dimensional code on a confidential file to obtain identification information of the confidential file; the RFID label printer is used for generating an RFID label of the confidential file according to the identification information of the confidential file; the RFID intelligent cabinet is used for storing the confidential files and obtaining circulation track information of the confidential files by reading RFID labels of the confidential files; secret computer is used for the identification information and the circulation orbit information of record secret file, the utility model discloses based on RFID label printer and RFID intelligence cabinet, through the RFID label that generates and read secret file, realized the automated management of secret file circulation orbit information, improved the managerial efficiency and the security of secret file.

Description

Management system of confidential files
Technical Field
The utility model relates to a file management technical field, in particular to management system of secret-related file.
Background
The current situation of network security is severe, and large-scale network attacks and network stealing events occur frequently. The confidential documents are mostly managed in the prior art in a manner of manual participation, so that the management efficiency is low, and greater potential safety hazards exist.
In view of the above problems, no effective solution has been proposed.
SUMMERY OF THE UTILITY MODEL
The embodiment of the utility model provides a management system of secret-related file for improve the managerial efficiency and the security of secret-related file, this system includes:
the two-dimensional code scanning gun is used for scanning the two-dimensional code on the confidential file to obtain the identification information of the confidential file;
the RFID label printer is used for generating an RFID label of the confidential file according to the identification information of the confidential file, wherein the RFID label is adhered to the surface of the confidential file;
the RFID intelligent cabinet is used for storing the confidential files and obtaining circulation track information of the confidential files by reading RFID tags of the confidential files;
and the confidential computer is used for recording the identification information and the circulation track information of the confidential file.
Furthermore, the two-dimensional code scanning gun, the RFID label printer and the secret-related computer are deployed in a machine key room, the number of the RFID intelligent cabinets is multiple, and the machine key room and each business department are respectively deployed with one RFID intelligent cabinet.
Further, an RFID reader is arranged in the RFID intelligent cabinet and used for reading an RFID tag on the confidential file in the RFID intelligent cabinet when the confidential file is put into or taken out of the RFID intelligent cabinet, so as to obtain circulation track information of the confidential file between the confidential rooms and each business department.
Further, still be used for in the RFID intelligence cabinet: monitoring the position information of the confidential files through an RFID reader;
and the confidential computer is also used for recording the position information of the confidential file.
Further, the method also comprises the following steps: and the transmission equipment is used for transmitting the circulation track information of the confidential documents between the confidential documents in the confidential rooms and all the business departments to the confidential computer in a one-way mode.
Furthermore, the transmission equipment is three-in-one single-guide equipment.
Further, the crypto-computer is specifically configured to:
and registering the confidential files according to the identification information of the confidential files.
Further, the system further comprises: a registration terminal for:
after the confidential files are registered, the RFID tags of the confidential files sent by the administrator mobile terminal are received, and the RFID tags are bound with the confidential files registered in the confidential computer, wherein the administrator mobile terminal is used for reading the RFID tags of the confidential files.
Further, the RFID tag includes: RFID code and identification information of the confidential file.
Further, the secret computer is further configured to:
when the circulation track information of the confidential file is received, identifying the RFID number of the RFID label associated with the circulation track information;
inquiring the registered confidential files corresponding to the RFID numbers according to the RFID numbers;
and updating the state information of the registered classified files according to the circulation track information.
Further, the identification information of the confidential file at least comprises: file number, file title, confidential level, urgency and affiliated business department.
Furthermore, a fingerprint instrument is arranged outside the RFID intelligent cabinet and used for identifying fingerprint information of workers.
Furthermore, a face recognition instrument is arranged outside the RFID intelligent cabinet and used for recognizing face information of workers.
Furthermore, a card reader is arranged outside the RFID intelligent cabinet and used for identifying and recognizing card information inserted by a user.
The embodiment of the utility model provides a pass through: scanning a two-dimensional code on the confidential document by a two-dimensional code scanning gun to obtain identification information of the confidential document; the RFID label printer generates an RFID label of the confidential file according to the identification information of the confidential file; the RFID intelligent cabinet stores the confidential files, and circulation track information of the confidential files is obtained by reading RFID tags of the confidential files; the confidential computer records identification information and circulation track information of the confidential files, and then based on the RFID label printer and the RFID intelligent cabinet, the RFID labels of the confidential files are generated and read, so that automatic management of circulation track information of the confidential files is achieved, and management efficiency and safety of the confidential files are improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts. In the drawings:
fig. 1 is a schematic diagram of a management system structure of a confidential document in an embodiment of the present invention;
fig. 2 is a schematic diagram of a management system of confidential documents according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of an overall framework of a management system for confidential documents according to an embodiment of the present invention;
fig. 4 is a schematic diagram of an RFID smart cabinet structure according to an embodiment of the present invention;
fig. 5 is a schematic diagram of another structure of the management system for confidential documents in the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments. Based on the embodiments in the present invention, all other embodiments obtained by a person skilled in the art without creative work belong to the protection scope of the present invention.
In order to solve prior art and manage secret file based on artificial mode of participating in, the security is poor, the technical problem of inefficiency, the embodiment of the utility model provides a management system of secret file for improve the managerial efficiency and the security of secret file, fig. 1 is the embodiment of the utility model provides an in the embodiment of the schematic diagram of management system structure of secret file, as shown in fig. 1, this system includes:
the two-dimensional code scanning gun 01 is used for scanning a two-dimensional code on a confidential file to obtain identification information of the confidential file;
the RFID label printer 02 is used for generating an RFID label of the confidential file according to the identification information of the confidential file, wherein the RFID label is adhered to the surface of the confidential file;
the RFID intelligent cabinet 03 is used for storing the confidential files and obtaining circulation track information of the confidential files by reading RFID tags of the confidential files;
and the secret computer 04 is used for recording the identification information and the circulation track information of the secret-related files.
As shown in fig. 1, the embodiment of the present invention provides a method for manufacturing a semiconductor device by: scanning a two-dimensional code on the confidential document by a two-dimensional code scanning gun to obtain identification information of the confidential document; the RFID label printer generates an RFID label of the confidential file according to the identification information of the confidential file; the RFID intelligent cabinet stores the confidential files, and circulation track information of the confidential files is obtained by reading RFID tags of the confidential files; the confidential computer records identification information and circulation track information of the confidential files, and then based on the RFID label printer and the RFID intelligent cabinet, the RFID labels of the confidential files are generated and read, so that automatic management of circulation track information of the confidential files is achieved, and management efficiency and safety of the confidential files are improved.
In one embodiment, the two-dimensional code scanning gun 01, the RFID label printer 02 and the confidential computer 04 are deployed in a machine key room, and the RFID intelligent cabinet 03 comprises a plurality of units, wherein the machine key room and each business department respectively deploy one RFID intelligent cabinet 03.
In one embodiment, the identification information of the confidential file at least comprises: file number, file title, confidential level, urgency and affiliated business department.
In one embodiment, the crypto computer 04 is specifically configured to:
and registering the confidential files according to the identification information of the confidential files.
In one embodiment, the system further comprises: a registration terminal for:
after the confidential files are registered, the RFID tags of the confidential files sent by the administrator mobile terminal are received, and the RFID tags are bound with the confidential files registered in the confidential computer, wherein the administrator mobile terminal is used for reading the RFID tags of the confidential files.
In one embodiment, an RFID tag includes: RFID code and identification information of the confidential file.
In specific implementation, the confidential documents are registered, distributed, circulated, recorded, stored and the like in the confidential documents management system, fig. 2 is a schematic diagram of an embodiment of the management system for the confidential documents in the embodiment of the present invention, fig. 3 is a schematic diagram of an overall framework of the management system for the confidential documents in the embodiment of the present invention, as shown in fig. 2 and fig. 3, in the embodiment of the present invention, a two-dimensional code scanning gun 01, an RFID tag printer 02, a confidential computer 04 and an RFID smart cabinet 03 are deployed in the confidential documents management system, the RFID smart cabinet 03 is used for storing the confidential documents, an entrance and exit detection device is installed on the confidential documents entrance guard, when the business department comes, after the entrance and exit detection, the confidential documents are firstly taken out from the RFID smart cabinet 03 in the confidential documents management system, two-dimensional codes are pre-pasted on the surfaces of the confidential documents, and the identification information of the confidential documents in the two-dimensional codes can be, for example, the document numbers, The file title, the classified grade, the emergency degree, the affiliated business department and the like, and other information can be included, and the utility model discloses do not regard this as the restriction.
The RFID intelligent cabinets 03 are respectively deployed in the key rooms and all business departments, network connection is established between the RFID intelligent cabinets 03 of the business departments through an office local area network, and the RFID intelligent cabinet 03 of the key room only conducts information transmission with the confidential computer 04 in the key room.
Then, the two-dimensional code scanning gun 01 scans the two-dimensional code on the confidential file to read the identification information of the confidential file, the two-dimensional code scanning gun 01 is connected with the confidential computer 04 and can send the identification information of the confidential file to the confidential computer 04, the confidential computer 04 registers the confidential file in a management system, then the RFID label printer 02 is connected with the confidential computer 04, the RFID label printer 02 can read the identification information of the confidential file to generate the RFID label of the confidential file, wherein the RFID label comprises: the RFID code and the identification information of the confidential file in the two-dimensional code, the RFID label printer 02 can directly write the RFID code and edit the plaintext part of the two-dimensional code, the RFID label is adhered to the surface of the confidential file, and finally, the confidential file and the RFID electronic label are bound.
When the confidential files are bound, a manager mobile terminal can be held by a manager administrator, the confidential computer 04 can comprise a registration terminal, the registration terminal is in communication connection with the manager mobile terminal, the confidential files manager scans RFID tags on the surfaces of the confidential files through the manager mobile terminal and sends the confidential files to the registration terminal, the registration terminal binds the RFID tags with the confidential files registered in the confidential computer after reading the RFID tags, unique automatic binding of the confidential files and the RFID electronic tags is achieved, and the RFID tags serve as unique identifications of the confidential files after successful binding.
In one embodiment, an RFID reader 031 is disposed in the RFID smart cabinet 03, and is configured to read an RFID tag on a confidential file in the RFID smart cabinet 03 when the confidential file is put into or taken out of the RFID smart cabinet 03, so as to obtain information about a circulation track of the confidential file between a confidential room and each business department.
In one embodiment, the RFID smart cabinet 03 is further configured to: and monitoring the position information of the confidential files through an RFID reader.
In one embodiment, a fingerprint device 032 is provided outside the RFID intelligent cabinet 03 for identifying fingerprint information of a worker.
In one embodiment, a face recognition instrument 033 is arranged outside the RFID intelligent cabinet 03 to recognize face information of a worker.
In one embodiment, a card reader 034 is provided outside the RFID smart cabinet 03 for identifying card information inserted by a worker.
In specific implementation, fig. 4 is the embodiment of the utility model provides a schematic diagram of RFID intelligence cabinet structure, as shown in fig. 4, deposit the secret-related file that has pasted the RFID label in the RFID intelligence cabinet 03 of key room, wait for corresponding staff to draw, RFID intelligence cabinet 03 outside is provided with fingerprint appearance 032, face identification appearance 033, personnel's information identification equipment such as card reader 034, card reader 034 can read staff's male IC ID/RFID card, the staff is before opening arbitrary RFID intelligence cabinet 03, at first need carry out identification and authorization through fingerprint appearance 032, face identification appearance 033, card reader 034 or other password input device, produce the instruction of unblanking after identification and authorization pass through, open RFID intelligence cabinet 03, can improve the security of secret-related file in RFID intelligence cabinet like this. After the staff of the business department receives the confidential files, the confidential files are stored in the RFID intelligent cabinet 03 of the business department.
The RFID reader 031 is arranged in the RFID intelligent cabinet 03, data acquisition perception based on the ultrahigh frequency RFID electronic tag can be achieved, when secret-related files are placed in or taken out of any RFID intelligent cabinet 03, the RFID reader 031 is started to work, the RFID reader 031 can read RFID tags on the secret-related files in the RFID intelligent cabinet 03, the secret-related files in the RFID intelligent cabinet 03 are checked through an external computing device, circulation track information of the secret-related files between a confidential room and each business department is obtained, and automatic recording of access of the secret-related files is achieved.
The RFID intelligent cabinet 03 can read the RFID label information of the confidential files in the cabinet through the RFID reader 31, the RFID label number and the RFID intelligent cabinet 03 information are transmitted to the confidential computer 04, the confidential computer 04 compares the RFID label number, and the position information is marked to the corresponding confidential files, so that the position information of the files is monitored.
Fig. 5 is a schematic diagram of another structure of a management system for confidential documents in an embodiment of the present invention, as shown in fig. 5, in an embodiment, the system further includes: and the transmission equipment 05 is used for transmitting the circulation track information of the confidential documents between the confidential rooms and each business department to the confidential computer 04 in a one-way mode.
In one embodiment, the transport apparatus 05 is a three-in-one single lead apparatus.
When the security of secret-related files is further guaranteed during specific implementation, the secret-related computer is prevented from being attacked by an external network, in the embodiment of the utility model, the circulation track information of the secret-related files between the confidential office and each business department is transmitted to the secret-related computer 04 in a one-way mode through the three-in-one single-guide device, the three-in-one single-guide device carries out authorization authentication management and audit on the USB of the secret-related computer 04 through installing an agent program and a deployment controller on the secret-related computer 04, blocks a possible information leakage channel of the secret-related computer 04, carries out one-way control on a physical layer on the information transmitted to the secret-related computer 04 through the USB mobile storage device, effectively prevents the secret-related information from reversely flowing into the USB mobile storage device in the information transmission process, and fundamentally solves the threat of secret-related software to the secret-related information.
In one embodiment, the crypto computer 04 is further configured to:
when the circulation track information of the confidential file is received, identifying the RFID number of the RFID label associated with the circulation track information;
inquiring the registered confidential files corresponding to the RFID numbers according to the RFID numbers;
and updating the state information of the registered classified files according to the circulation track information.
In the specific implementation, after the confidential computer 04 receives the circulation track information of the confidential file through the three-in-one single-guide device, the trigger on the confidential computer 04 analyzes the circulation track information, identifies the RFID number of the RFID tag associated with the circulation track information, queries the registered confidential file corresponding to the RFID number according to the RFID number, and finally updates the state information of the registered confidential file according to the circulation track information, and the confidential computer 04 can also record the position information of the confidential file, so that the confidential file identification information, circulation track information and position information are recorded by the confidential computer 04, and when a leader takes out or puts back the confidential file in the process of wholesale reading, the confidential file can be perceived dynamically in real time by the confidential room, for example, after the leader finishes wholesale reading the confidential file, the confidential file can be put into the RFID intelligent cabinet 03, and the stored list information of the confidential file can be displayed on the display screen of the RFID intelligent cabinet 03, the leader can select operations such as storing and signing for each confidential file, when the signing is selected and determined, the RFID intelligent cabinet 03 can transmit the stored RFID label of the confidential file, the information of the RFID intelligent cabinet 03 and the state information of the confidential file to the confidential computer 04 in the confidential room, and the administrator can know the leader reading state by looking up the state updating information of the automatically popped file in the confidential computer 04, so that the communication cost of file circulation can be reduced, and the management efficiency is improved.
The business management of the crypto-computer 04 may also be implemented, which may include, for example: the management of confidential information such as file information management, file adoption management, file inventory management, file clearing management, personnel management, unit information management and the like can be realized through a parameter maintenance module, and the administrator can realize the management of personnel and unit information through a parameter configuration mode and can immediately take effect after modification.
A specific example is given below to facilitate understanding of how the invention may be carried out.
The method comprises the following steps that a two-dimensional code scanning gun, an RFID label printer, a confidential computer and an RFID intelligent cabinet are arranged in a main unit room, the RFID intelligent cabinets are respectively arranged in each business department, each RFID intelligent cabinet 03 of the business department establishes network connection through an office local area network, and the RFID intelligent cabinet of the main unit room only carries out information transmission with the confidential computer in the main unit room;
the method comprises the following steps that a worker of a business department performs identity recognition and authorization through a fingerprint instrument, a face recognition instrument, a card reader or other password input equipment, an unlocking instruction is generated after the identity recognition and authorization are passed, an RFID intelligent cabinet of a key room is opened, and confidential files are put into the RFID intelligent cabinet of the key room;
after the identity identification and the authorization of the staff in the confidential room pass, the confidential files are taken out from the RFID intelligent cabinet in the confidential room, two-dimensional codes are pasted on the surfaces of the confidential files in advance, the two-dimensional codes comprise identification information of the confidential files, and the identification information comprises: file number, file title, confidential level, emergency degree, affiliated business department and the like;
the two-dimensional code scanning gun scans the two-dimensional code on the confidential file, reads the identification information of the confidential file, and sends the identification information of the confidential file to the confidential computer, and the confidential computer automatically registers the confidential file in the system;
the RFID label printer generates an RFID label of the confidential file according to the identification information of the confidential file, wherein the RFID label comprises: the RFID label printer is used for directly writing the RFID code and editing the plaintext part of the two-dimensional code, and the RFID label is adhered to the surface of the confidential file;
the confidential files with the RFID labels are put into an RFID intelligent cabinet of the confidential room by workers in the confidential room to wait for the corresponding workers to pick up the confidential files;
the method comprises the following steps that a worker of a business department performs identity recognition and authorization through a fingerprint instrument, a face recognition instrument, a card reader or other password input equipment, an unlocking instruction is generated after the identity recognition and authorization are passed, an RFID intelligent cabinet of a confidential room is opened, a confidential file is obtained, and the confidential file is stored in the RFID intelligent cabinet of the business department;
when secret-related files are put into or taken out of any RFID intelligent cabinet, an RFID reader in the RFID intelligent cabinet starts to work, an RFID label on the secret-related files in the RFID intelligent cabinet is read, the secret-related files in the RFID intelligent cabinet are checked through an external computing device, circulation track information of the secret-related files between a key room and each business department is obtained, and position information of the secret-related files is monitored;
the circulation track information of the confidential documents between the confidential documents in the confidential rooms and each business department and the position information of the confidential documents are transmitted to the confidential computer in a one-way mode through three-in-one single-guide equipment;
and after receiving the circulation track information and the position information of the confidential file, the confidential computer analyzes the circulation track information and the position information, identifies the RFID number of the RFID label associated with the circulation track information and the position information, inquires the registered confidential file corresponding to the RFID number according to the RFID number and updates the state information of the registered confidential file according to the circulation track information.
To sum up, the embodiment of the utility model provides a pass through: scanning a two-dimensional code on the confidential document by a two-dimensional code scanning gun to obtain identification information of the confidential document; the RFID label printer generates an RFID label of the confidential file according to the identification information of the confidential file; the RFID intelligent cabinet stores the confidential files, and circulation track information of the confidential files is obtained by reading RFID tags of the confidential files; the confidential computer records identification information and circulation track information of the confidential files, and then based on the RFID label printer and the RFID intelligent cabinet, through reading the RFID labels of the confidential files, automatic management of the circulation track information of the confidential files is achieved, and management efficiency and safety of the confidential files are improved.
Furthermore, the embodiment of the utility model provides a with two-dimensional code scanning rifle, RFID label printer and concerning with secret computer arrangement in the key room, key room and each business department arrange a RFID intelligence cabinet respectively for the information registration and the state update of concerning with secret file are gone on in key room, only transmit the RFID label of concerning with secret file between each business department, have ensured the security of concerning with secret file.
The embodiment of the utility model provides a through trinity single lead equipment with concerning secret file circulation orbit information unidirectional transmission to concerning secret computer between the key room and each business department, further ensured concerning the security of secret file, avoid concerning secret computer to receive external network's attack.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment. In this document, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. The terms "upper", "lower", and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience in describing the present invention and simplifying the description, but do not indicate or imply that the referred devices or elements must have a specific orientation, be constructed and operated in a specific orientation, and thus should not be construed as limiting the present invention. Unless expressly stated or limited otherwise, the terms "mounted," "connected," and "connected" are intended to be inclusive and mean, for example, that they may be fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present invention can be understood according to specific situations by those skilled in the art. It should be noted that, in the present invention, the embodiments and features of the embodiments may be combined with each other without conflict. The present invention is not limited to any single aspect, nor is it limited to any single embodiment, nor is it limited to any combination and/or permutation of these aspects and/or embodiments. Moreover, each aspect and/or embodiment of the present invention may be used alone or in combination with one or more other aspects and/or embodiments thereof.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; although the present invention has been described in detail with reference to the foregoing embodiments, it should be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the scope of the embodiments of the present invention, and are intended to be covered by the claims and the specification.

Claims (14)

1. A management system for confidential documents, comprising:
the two-dimensional code scanning gun is used for scanning the two-dimensional code on the confidential file to obtain the identification information of the confidential file;
the RFID label printer is used for generating an RFID label of the confidential file according to the identification information of the confidential file, wherein the RFID label is adhered to the surface of the confidential file;
the RFID intelligent cabinet is used for storing the confidential files and obtaining circulation track information of the confidential files by reading RFID tags of the confidential files;
and the confidential computer is used for recording the identification information and the circulation track information of the confidential file.
2. The system of claim 1, wherein the two-dimensional code scanning gun, the RFID tag printer and the secret-related computer are deployed in a key room, and the RFID intelligent cabinets comprise a plurality of RFID intelligent cabinets, wherein one RFID intelligent cabinet is deployed in the key room and each business department.
3. The system as claimed in claim 2, wherein an RFID reader is disposed in the RFID smart cabinet, and is configured to read an RFID tag on the confidential file in the RFID smart cabinet when the confidential file is put into or taken out of the RFID smart cabinet, so as to obtain information on circulation tracks of the confidential file between the confidential room and each business department.
4. The system of claim 2, wherein the RFID smart cabinet is further configured to: monitoring the position information of the confidential files through an RFID reader;
and the confidential computer is also used for recording the position information of the confidential file.
5. The system of claim 2, further comprising: and the transmission equipment is used for transmitting the circulation track information of the confidential documents between the confidential documents in the confidential rooms and all the business departments to the confidential computer in a one-way mode.
6. The system of claim 5, wherein the transport device is a three-in-one single lead device.
7. The system of claim 1, wherein the crypto computer is specifically configured to:
and registering the confidential files according to the identification information of the confidential files.
8. The system of claim 7, further comprising: a registration terminal for:
after the confidential files are registered, the RFID tags of the confidential files sent by the administrator mobile terminal are received, and the RFID tags are bound with the confidential files registered in the confidential computer, wherein the administrator mobile terminal is used for reading the RFID tags of the confidential files.
9. The system of claim 7, wherein the RFID tag comprises: RFID code and identification information of the confidential file.
10. The system of claim 9, wherein the crypto computer is further to:
when the circulation track information of the confidential file is received, identifying the RFID number of the RFID label associated with the circulation track information;
inquiring the registered confidential files corresponding to the RFID numbers according to the RFID numbers;
and updating the state information of the registered classified files according to the circulation track information.
11. The system of claim 1, wherein the identification information of the classified file at least comprises: file number, file title, confidential level, urgency and affiliated business department.
12. The system of claim 1, wherein a fingerprint device is arranged outside the RFID intelligent cabinet and used for identifying fingerprint information of workers.
13. The system of claim 1, wherein a face recognition instrument is arranged outside the RFID intelligent cabinet and used for recognizing face information of workers.
14. The system of claim 1, wherein a card reader is provided outside the RFID smart cabinet for identifying card information inserted by a user.
CN202121160288.0U 2021-05-27 2021-05-27 Management system of confidential files Active CN215006659U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202121160288.0U CN215006659U (en) 2021-05-27 2021-05-27 Management system of confidential files

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202121160288.0U CN215006659U (en) 2021-05-27 2021-05-27 Management system of confidential files

Publications (1)

Publication Number Publication Date
CN215006659U true CN215006659U (en) 2021-12-03

Family

ID=79087695

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202121160288.0U Active CN215006659U (en) 2021-05-27 2021-05-27 Management system of confidential files

Country Status (1)

Country Link
CN (1) CN215006659U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115018029A (en) * 2022-08-01 2022-09-06 广东维信智联科技有限公司 Anti-disclosure management system and management method for administrative files

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115018029A (en) * 2022-08-01 2022-09-06 广东维信智联科技有限公司 Anti-disclosure management system and management method for administrative files
CN115018029B (en) * 2022-08-01 2022-11-04 广东维信智联科技有限公司 Anti-disclosure management system and management method for administrative files

Similar Documents

Publication Publication Date Title
CN102819891B (en) ATM (automatic teller machine) clearing and cash replenishing control system and method
EP3806046A1 (en) Method and system for permitting remote check-in and coordinating access control
US8738918B2 (en) Document evidence and article retrieval and identification system
CN104680622A (en) Visitor ingress-egress registration management system and method
CN207946884U (en) A kind of locker management system
CN203084794U (en) Logistics device
CN215006659U (en) Management system of confidential files
CN108460876A (en) A kind of time sync-type Quick Response Code guard method and system
US20090031397A1 (en) Use management system
CN103593687A (en) Internet of things intelligent management control cabinet system
CN104240014A (en) Door access control method and door access control platform
CN101638017A (en) Novel confidential folder
CN103297236A (en) User identity verification and authorization system
CN104299331B (en) Information processing method and system
CN204926245U (en) Key management box and key management system
CN202887311U (en) ATM clearing and banknote adding control system
CN106470203A (en) Information getting method and device
CN110688551A (en) RFID-based security file whole-process management system and method
CN104866879B (en) Realize method, system and the lead sealing of power equipment inspection
CN109005167A (en) A kind of processing method of authentication data, device, server and storage medium
CN105913508B (en) A kind of Work attendance method based on intelligent NFC label
US7688980B2 (en) Cryptographic-key generation and management
CN115346300B (en) Work ticket access method, device, medium and electronic equipment
CN207424922U (en) Intelligent police equipment manages system
CN115600624A (en) Entity seal storage system and method based on RFID technology

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant