CN218541943U - Secret-related carrier management and control system capable of real-time management and control - Google Patents

Secret-related carrier management and control system capable of real-time management and control Download PDF

Info

Publication number
CN218541943U
CN218541943U CN202221275806.8U CN202221275806U CN218541943U CN 218541943 U CN218541943 U CN 218541943U CN 202221275806 U CN202221275806 U CN 202221275806U CN 218541943 U CN218541943 U CN 218541943U
Authority
CN
China
Prior art keywords
secret
management
writer
control system
carrier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202221275806.8U
Other languages
Chinese (zh)
Inventor
黄海峰
黄军
陈小波
郭杭梁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huzhou Yirui Xin'an Technology Co ltd
Original Assignee
Huzhou Yirui Xin'an Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huzhou Yirui Xin'an Technology Co ltd filed Critical Huzhou Yirui Xin'an Technology Co ltd
Priority to CN202221275806.8U priority Critical patent/CN218541943U/en
Application granted granted Critical
Publication of CN218541943U publication Critical patent/CN218541943U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The utility model relates to a secret carrier management and control system capable of real-time management and control, which comprises a password cabinet, a back end system platform, a secret carrier, a passive RFID label arranged on the secret carrier and an RFID reader-writer used for detecting the passive RFID label; the back-end system platform is arranged on the password cabinet and is in communication connection with the RFID reader-writer; the secret carrier can be placed in a drawer of the password cabinet; the RFID reader-writer is provided with a plurality of antennas which correspond to the drawers one by one, and the antennas are arranged at the corresponding drawers and can be induced by the passive RFID tags. The method and the device have the advantages of real-time monitoring and intelligent management of the secret-related carriers.

Description

Secret-related carrier management and control system capable of real-time management and control
Technical Field
The utility model relates to a combination locker, concretely relates to secret-related carrier management and control system that can real-time management and control.
Background
At present, most of secret carriers are stored in a safety box, manual input is needed by workers, and the access is not managed well. And a camera or an infrared sensor is usually adopted for monitoring, and the monitored object is often the situation near the safe. The method has the problems of tedious management and low safety degree, and the situation that the confidential carrier is lost due to negligence of personnel can be caused.
Therefore, a confidential carrier which can be managed in real time and does not need manual entry of workers is needed.
SUMMERY OF THE UTILITY MODEL
The utility model aims at providing a secret carrier management and control system that involves who can real-time management and control to the above-mentioned problem that exists among the prior art.
In order to realize the purpose of the utility model, the utility model adopts the following technical scheme: the secret-related carrier management and control system capable of real-time management and control comprises a password cabinet, a back-end system platform, a secret-related carrier, a passive RFID tag arranged on the secret-related carrier and an RFID reader-writer used for detecting the passive RFID tag;
the back-end system platform is arranged on the password cabinet and is in communication connection with the RFID reader-writer;
the secret carrier can be placed in a drawer of the password cabinet;
and a plurality of antennae which are in one-to-one correspondence with the drawers are arranged on the RFID reader-writer, and the antennae are arranged at the corresponding drawers and can be induced by the passive RFID tags.
The working principle and the beneficial effects are as follows: 1. compared with the prior art, the RFID technology is adopted, so long as the confidential carrier leaves the range of the RFID reader-writer, the rear-end system platform can receive the signal loss condition, the confidential carrier is judged to be lost, and the passive RFID tag (passive tag) is not provided with a built-in battery, can be made into a shape similar to a paper sheet, and is favorable for being pasted on text data. When the passive RFID is out of the reading range of the reader-writer, the passive RFID tag is in a passive state, and when the passive RFID is in the reading range of the reader-writer, the passive RFID tag extracts a power supply required by the work of the passive RFID tag from radio frequency energy emitted by the reader-writer, and the transmission of the information of the passive RFID tag to the reader-writer is completed by adopting a reflection modulation mode. Therefore, data do not need to be recorded manually, and only the data of the corresponding classified carrier recorded on the passive RFID label is read and written by the RFID reader-writer.
2. The utility model provides a RFID read write line accessible antenna reads a plurality of passive RFID labels simultaneously to realize the control of many secret-related carriers, cooperate current control and infrared sensor's measure, can show and promote the security, in case lose the staff just can obtain information, thereby in time deal with, show to reduce the problem that secret-related carrier that personnel's input leads to lost and take place.
Further, the identity verifier is in communication connection with the back-end system platform and at least comprises a fingerprint instrument and a camera. This setting only verifies behind fingerprint or the camera discernment people's face through the fingerprint appearance, perhaps can open the drawer that the password cabinet corresponds always after dual verification and take out secret carrier, and the security performance is high, also can adopt the combination of other verification methods certainly, like password unblock, short message verification code unblock, two-dimensional code unblock, pronunciation unblock etc.. Certainly, the camera is not limited to discernment people's face, can also be used for taking a candid photograph when the user opens the password cabinet and pulls out the drawer, or takes a candid photograph when the user enters authentication again to save the evidence.
And further, the drawer locking device further comprises an electric control lock for independently locking the drawer, and the electric control lock is in communication connection with the back-end system platform. According to the arrangement, a single drawer is controlled through the electric control lock, and unified monitoring and control can be achieved on a back-end system platform.
Furthermore, the system also comprises an alarm which is in communication connection with the backend platform. According to the arrangement, the alarm can be operated through the alarm.
Further, the system also comprises a database which is in communication connection with the backend platform. According to the arrangement, after the RFID reader-writer reads and writes, the information of the confidential carrier obtained by reading and writing is recorded into the database and corresponds to the drawer where the confidential carrier is located, manual recording is completely not needed, and the confidential carrier is taken out and has a corresponding record.
Further, the database has at least an export backup function and an import restore function. By the arrangement, the safety performance of the database is better, and the loss caused by damage to the database due to an unexpected situation is reduced.
Furthermore, the RFID reader-writer is connected with the back-end system platform in an Ethernet encryption manner. With the arrangement, the safety performance can be further improved.
Furthermore, the back-end system platform adopts a Linux embedded operating system. The device can be mainly used for realizing real-time monitoring and visual management of related confidential carriers and providing a real-time alarm mechanism.
Further, the back-end system platform adopts a B/S architecture. The B/S architecture, namely the browser and server architecture mode, is a changed or improved architecture of the C/S architecture with the rise of Internet technology. Under the structure, the user work interface is realized by a WWW Browser, a few parts of business logic are realized at a front end (Browser), but the main business logic is realized at a Server end (Server), and a three-layer 3-tier structure is formed. The B/S architecture is a network architecture mode after WEB is started, and a WEB browser is the most main application software of a client. The mode unifies the client, and the core part for realizing the system function is centralized on the server, so that the development, maintenance and use of the system are simplified. The client only needs to install a Browser (Browser), such as Netscape Navigator or Internet Explorer, and the Server only needs to install databases such as Oracle, sybase, informix or SQL Server. And the browser performs data interaction with the database through the Web Server. Therefore, the load of the client computer is greatly simplified, the cost and the workload of system maintenance and upgrading are reduced, and the Total Cost (TCO) of a user is reduced. Thus, the method is very suitable for the application, and the cost can be obviously reduced.
Furthermore, a display is arranged on the code cabinet. The arrangement is not only convenient for user operation, but also convenient for workers to check background data during field maintenance.
Drawings
Fig. 1 is a schematic structural diagram of the present invention;
fig. 2 is a schematic structural diagram of an embodiment of the present invention;
FIG. 3 is a functional architecture diagram of a backend system platform.
In the figure, 1, a password cabinet; 2. a back-end system platform; 3. a secret carrier; 4. a passive RFID tag; 5. an RFID reader; 6. an identity verifier; 7. a display; 8. a drawer.
Detailed Description
The technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments. Based on the embodiments in the present invention, all other embodiments obtained by a person skilled in the art all belong to the protection scope of the present invention.
It will be understood by those skilled in the art that in the disclosure of the present invention, the terms "longitudinal", "lateral", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", etc., indicate orientations or positional relationships that are based on those shown in the drawings, which are merely for convenience in describing the present invention and to simplify the description, and do not indicate or imply that the device or element so referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus the terms are not to be construed as limiting the invention.
As shown in fig. 1-2, the system for managing and controlling the secret-related carrier 3 capable of real-time management and control includes a crypto cabinet 1, a back-end system platform 2, the secret-related carrier 3, a passive RFID tag 4 disposed on the secret-related carrier 3, and an RFID reader 5 for detecting the passive RFID tag 4.
The active RFID tag is internally provided with a battery, so that the volume reduction of the tag is limited, and the active RFID tag is not suitable for monitoring important information carriers with small volumes, and therefore, the passive RFID technology is introduced to make up for the defect. The passive RFID tag 4 (passive tag) has no built-in battery and can be made into a shape similar to paper sheets, so that the passive RFID tag is favorably stuck on text data. When the passive RFID is out of the reading range of the reader-writer, the passive RFID tag 4 is in a passive state, and when the passive RFID is in the reading range of the reader-writer, the passive RFID tag 4 extracts a power supply required by the work of the passive RFID tag from the radio frequency energy emitted by the reader-writer, and the information of the passive RFID tag 4 is transmitted to the reader-writer by adopting a reflection modulation mode.
Wherein, the approximate structure of the password cabinet 1 is basically the same as that of the existing password cabinet 1, a plurality of drawers 8 are arranged on the password cabinet 1, an electric control lock for independently locking the drawer 8 is arranged on each drawer 8, and the electric control lock is in communication connection with the back-end system platform 2. The single drawer 8 is controlled through the electric control lock, and unified monitoring and control can be achieved on the back-end system platform 2.
Preferably, the combination locker 1 further comprises an identity verifier 6 in communication connection with the backend system platform 2, the identity verifier 6 comprising at least a fingerprint sensor and a camera. Only after the fingerprint or the camera is verified through the fingerprint appearance, or after the dual verification, can open the drawer 8 that the password cabinet 1 corresponds always and take out the secret-related carrier 3, the security performance is high, and of course, the combination of other verification modes can be adopted, such as password unlocking, short message verification code unlocking, two-dimensional code unlocking, voice unlocking, and the like. Certainly, the camera is not limited to discernment people's face, can also be used for taking a candid photograph when the user opens the password cabinet and pulls out the drawer, or takes a candid photograph when the user enters authentication again to save the evidence.
Preferably, a display 7, such as a touch screen, is provided on the combination locker 1. The background data is convenient to view not only for user operation but also for workers during field maintenance.
The RFID reader-writer 5 is provided with a plurality of antennas which correspond to the drawers 8 one by one, and the antennas are arranged at the corresponding drawers 8 and can be induced by the passive RFID tags 4. The passive RFID tag 4 generally stores electronic data (information of the confidential carrier 3, such as name, date, etc.) in a default format, and the passive RFID tag 4 is attached to the surface of an object to be identified in an application. The reader/writer is also called a reading device, and can read and identify electronic data stored in the passive RFID tag 4 in a contactless manner during application, thereby achieving the purpose of automatically identifying an object.
In this embodiment, since the signal strength of the antenna wireless signal of the RFID reader/writer 5 is attenuated with the increase of the distance, the transmission power of the tag may be adjusted, and different tag transmission powers may be selected according to different safe area ranges. Thus, when the important equipment (the confidential carrier 3) leaves the cabinet in an unauthorized state (without being verified by the identity verifier 6), the cabinet monitoring and management interface gives an alarm in real time.
In this embodiment, the passive RFID tag 4 may also be initialized by the RFID reader 5, and information such as a text number and an authorized return time may be set. If a file (confidential carrier 3) is put into one of the drawers 8, the RFID reader/writer 5 can read the information of the passive RFID tag 4 on the file, such as the file name, and then write the warehousing time and the time to be returned, the file number, and the like to the passive RFID tag 4 according to the current time.
The back-end system platform 2 is arranged on the password cabinet 1 and is connected with the RFID reader-writer 5 through Ethernet encryption (private communication protocol). In the embodiment, the back-end system platform 2 is a centralized network management platform, and adopts a Linux embedded operating system and a B/S architecture. The back-end system platform 2 is arranged on a flat plate embedded in the compact cabinet. The method is mainly used for realizing the real-time monitoring and the visual management of the related secret-related carriers 3 and providing a real-time alarm mechanism. The back-end system implements visual management of the relevant information of the confidential carrier 3 and the device alarm, and the functional architecture diagram of the system is shown in fig. 3 as follows for explanation:
data acquisition:
the data collected from the label by the reader is sent to the centralized network management platform through the Ethernet, and the network management platform processes and stores the data.
Secret carrier 3 entry function:
and inputting the information of the confidential carrier 3 corresponding to the passive RFID tag 4ID through a centralized network management system.
Secret carrier 3 query function:
and inquiring the information of the confidential carrier 3 corresponding to the passive RFID tag 4ID in real time through a centralized network management system.
The secret carrier 3 leaves the authorization:
the administrator can log in the network management system to authorize the secret-related carrier 3 to leave the monitoring area, and the system can not give an alarm even if the secret-related carrier 3 which is authorized to move moves out of the safety area.
The confidential bearer 3 returns management:
the administrator can log in the network management system and authorize the secret-related carrier 3 to return to the monitoring area, so that the secret-related carrier 3 is normally monitored again, and the system will give an alarm when leaving the monitoring area again.
The alarm function is as follows:
when the confidential carrier 3 moves out of the security area in an unauthorized state, the system management interface gives an alarm or gives an alarm through an alarm. The network management system provides a default alarm condition, for example, the reader-writer cannot receive the information of the passive RFID tag 4.
Management functions of the database:
and providing export function of the database, namely providing backup of the database. The method provides the import function of the database, namely the recovery of the database, and provides different recovery strategies at the recovery time, including 2 recovery mechanisms of full recovery and incremental recovery.
The log function:
the log information of the network management server is checked, and relevant operation contents such as time record, operation and the like of a manager logging in the centralized network management platform are displayed.
In fig. 1, an industrial personal computer is a back-end system platform 2, a touch display 7 is a display screen, and data acquisition is an identity verifier 6.
The part of the utility model which is not described in detail is the prior art, so the utility model does not detail the part.
It is understood that the terms "a" and "an" should be interpreted as meaning that a number of one element or element is one in one embodiment, while a number of other elements is one in another embodiment, and the terms "a" and "an" should not be interpreted as limiting the number.
Although the terms of the cryptographic cabinet 1, the backend system platform 2, the secret-related carrier 3, the passive RFID tag 4, the RFID reader 5, the authentication device 6, the display 7, the drawer 8, etc. are used more often, the possibility of using other terms is not excluded. These terms are used merely to more conveniently describe and explain the nature of the present invention; they are to be construed in a manner that is inconsistent with the spirit of the invention.
The present invention is not limited to the above-mentioned best mode, and any person can obtain other products in various forms under the teaching of the present invention, but any change in shape or structure is made, and all the technical solutions that are the same as or similar to the present application fall within the protection scope of the present invention.

Claims (7)

1. The secret-related carrier management and control system capable of real-time management and control is characterized by comprising a password cabinet, a back-end system platform, a secret-related carrier, a passive RFID tag arranged on the secret-related carrier and an RFID reader-writer used for detecting the passive RFID tag;
the back-end system platform is arranged on the password cabinet and is in communication connection with the RFID reader-writer;
the secret-related carrier can be placed in a drawer of the password cabinet;
and the RFID reader-writer is provided with a plurality of antennas which correspond to the drawers one by one, and the antennas are arranged at the corresponding drawers and can be induced by the passive RFID tags.
2. The secret-related carrier management and control system capable of being managed and controlled in real time according to claim 1, further comprising an identity verifier in communication connection with the backend system platform, wherein the identity verifier at least comprises a fingerprint instrument and a camera.
3. The secret-related carrier management and control system capable of being managed and controlled in real time according to claim 1, further comprising an electrically controlled lock for individually locking the drawer, wherein the electrically controlled lock is in communication connection with the backend system platform.
4. The secret-involved carrier management and control system capable of being managed and controlled in real time according to claim 1, further comprising an alarm in communication connection with the backend system platform.
5. The classified carrier management and control system capable of being managed and controlled in real time according to claim 4, further comprising a database in communication connection with the backend system platform.
6. The secret-involved carrier management and control system capable of being managed and controlled in real time according to claim 1, wherein the RFID reader-writer is connected with the back-end system platform in an Ethernet encryption manner.
7. The secret-related carrier management and control system capable of being managed and controlled in real time according to any one of claims 1 to 6, wherein a display is arranged on the code cabinet.
CN202221275806.8U 2022-05-20 2022-05-20 Secret-related carrier management and control system capable of real-time management and control Active CN218541943U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202221275806.8U CN218541943U (en) 2022-05-20 2022-05-20 Secret-related carrier management and control system capable of real-time management and control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202221275806.8U CN218541943U (en) 2022-05-20 2022-05-20 Secret-related carrier management and control system capable of real-time management and control

Publications (1)

Publication Number Publication Date
CN218541943U true CN218541943U (en) 2023-02-28

Family

ID=85258212

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202221275806.8U Active CN218541943U (en) 2022-05-20 2022-05-20 Secret-related carrier management and control system capable of real-time management and control

Country Status (1)

Country Link
CN (1) CN218541943U (en)

Similar Documents

Publication Publication Date Title
CN102243773A (en) Entrance control system supported by multiple identities recognition
CN203606881U (en) Intelligent key cabinet
CN106296897A (en) The intelligent active electronic key of finger print identifying and passive smart lock and its implementation
CN104240409A (en) Intelligent tool cabinet
CN104008591A (en) Intelligent key cabinet
CN202404609U (en) Intelligent key management system
CN203894833U (en) Intelligent key cabinet
CN205210923U (en) Intelligence files management system
CN106327652A (en) System and method for protecting electronic intelligent door locks and fingerprint locks
CN104766409A (en) Long-distance electric storage box management system
CN201397545Y (en) Intelligent vehicle storage system
CN103927803A (en) Active radio frequency identification (RFID)-based power door lock control system
CN218541943U (en) Secret-related carrier management and control system capable of real-time management and control
CN106022403A (en) RFID-based maintenance recording system and method for workshop production equipment
CN201068706Y (en) Fingerprint storing cabinet system
CN218110751U (en) Tool storage management device
CN205206591U (en) Safe deposit box based on bar codes technique
CN208654938U (en) A kind of Multifunctional cabinet
CN210776961U (en) Material intelligent management cabinet
CN207425015U (en) A kind of Warehouse Management System based on Internet of Things
CN112185536A (en) Intelligent warehouse entry and exit management device for medical medicaments
CN205778165U (en) Intelligent storage cabinet
CN220691466U (en) Intelligent electronic equipment management cabinet
CN211928648U (en) File data secrecy equipment
CN215450247U (en) Bank low cabinet lock control system

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant