CN108343315A - Key management method and terminal device - Google Patents
Key management method and terminal device Download PDFInfo
- Publication number
- CN108343315A CN108343315A CN201810073670.4A CN201810073670A CN108343315A CN 108343315 A CN108343315 A CN 108343315A CN 201810073670 A CN201810073670 A CN 201810073670A CN 108343315 A CN108343315 A CN 108343315A
- Authority
- CN
- China
- Prior art keywords
- key
- client
- locker
- sent
- instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B19/00—Keys; Accessories therefor
- E05B19/0082—Keys or shanks being removably stored in a larger object, e.g. a remote control or a key fob
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B19/00—Keys; Accessories therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Electromagnetism (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention is suitable for computer room tool management technical field, provides key management method and device.The method includes:The log-on message that client sends over is received, it is whether correct according to the client-side information verification log-on message to prestore;If it is correct to verify log-on message, sends barcode scanning and be prompted to client, so that client prompts the Quick Response Code on scanning key locker according to barcode scanning;Receiving client is sent after scanning the two-dimensional code first takes key to instruct, and first takes key instruction to carry client number;The tour range and access right for obtaining client are numbered according to client;It is pushed to client according to tour range and access right and can use key option;Receive client takes key to instruct according to can be sent with key option second, takes key instruction to be sent to key locker by second, so that key locker pops up corresponding key.After adopting the above scheme, key management efficiency can be improved, the working efficiency of staff is improved, ensures the safety of computer room.
Description
Technical field
The invention belongs to computer room tool management technical field more particularly to a kind of key management method and terminal devices.
Background technology
Information communications equipment room is that power marketing, safety in production, ERP etc. are important as electric power enterprise intelligent development basis
Operation system provides the information between physical space completion system and transmits and exchange, and is to realize business management modernization and power grid intelligence
The important infrastructure of change, in order to ensure the safe and stable operation of computer room information communication equipment, tour personnel need to be to compass of competency
Interior computer room carries out daily tour, and service personnel need to carry out repair and maintenance to faulty equipment, during which be related to multiple computer room disengaging,
Computer room safety becomes the important leverage of information communication system safe and stable operation.
Currently, computer room access card and key are managed collectively by regulating and controlling center, stored using traditional key locker, scheduling is on duty
Member is responsible for audit computer room and comes in and goes out personal information, implements key granting and retrieval management work, there is the degree of automation low, manpower
The wasting of resources, it is inefficient, information is easy to be lost the problems such as, cannot ensure the safety of computer room.
Invention content
In view of this, an embodiment of the present invention provides a kind of key management method and terminal devices, to solve the prior art
Middle key management the degree of automation is low, waste of human resource, inefficient problem.
The first aspect of the embodiment of the present invention provides a kind of key management method, includes the following steps:
The log-on message that client sends over is received, whether just according to the client-side information verification log-on message to prestore
Really;
If it is correct to verify the log-on message, sends barcode scanning and be prompted to the client, so that the client is according to institute
State the Quick Response Code on barcode scanning prompt scanning key locker;
Receiving the client is sent after scanning the Quick Response Code first takes key to instruct, and described first takes key to refer to
It enables and carries client number;
The tour range and access right of the client are obtained according to client number;
Key option can be used by being pushed to the client according to the tour range and the access right;
Receiving the client can be sent according to key option second takes key to instruct, and key is taken by described second
Spoon instruction is sent to the key locker, so that the key locker pops up corresponding key.
As further technical solution, the method further includes:
It receives the client is sent by scanning the Quick Response Code first and goes back key instruction, described first, which goes back key, refers to
It enables and carries the client number;
Determine that key to be given back, transmission second are gone back key and instructed to the key locker according to client number, with
The key locker is set to go back key instruction unpack according to described second;
It receives the key locker that the key locker is sent and is turned off prompt, being turned off prompt according to the key locker is sent completely
It instructs to the client.
It is described key option to be used to send according in the reception client as further technical solution
Second key is taken to instruct, take key instruction to be sent to the key locker by described second, so that key locker pop-up corresponds to
Key after, further include:
Record the time when key locker pops up corresponding key;
The pop-up time that the key locker pops up key is calculated according to the time;
If the pop-up time exceeds preset pop-up time threshold, the first warning message is sent to the client.
As further technical solution, the method further includes:
Detect the distance between the key of the key locker pop-up and described key locker;
If the distance exceeds preset distance range, the second warning message is sent to the client.
As further technical solution, the method further includes:
Receive the client-side information that multiple client sends over;
Preserve the client-side information that multiple client is sent.
The second aspect of the embodiment of the present invention provides a kind of key management device, including:
Log-on message module is verified, the log-on message sended over for receiving client is believed according to the client to prestore
Whether breath verification log-on message is correct;
Module is scanned the two-dimensional code, if correct for verifying the log-on message, barcode scanning sent and is prompted to the client, with
The client is set to prompt the Quick Response Code on scanning key locker according to the barcode scanning;
It receives first and takes key instruction module, first sent after scanning the Quick Response Code for receiving the client
Key is taken to instruct, described first takes key instruction to carry client number;
Client-side information module is obtained, for obtaining the tour range of the client according to client number and making
Use permission;
Push can use key module, can for being pushed to the client according to the tour range and the access right
With key option;
It receives and second takes key instruction module, the of key option transmission can be used for receiving the client according to
Two take key to instruct, and take key instruction to be sent to the key locker by described second, so that the key locker pops up corresponding key
Spoon.
As further technical solution, described device further includes:
It receives first and goes back key instruction module, for receiving the client by scanning the first of the Quick Response Code transmission
Also key instructs, and described first, which goes back key instruction, carries the client number;
It sends and second goes back key instruction module, for determining key to be given back according to client number, send the
Two, which go back key, instructs to the key locker, so that the key locker goes back key instruction unpack according to described second;
It is sent completely instruction module, prompt is turned off for receiving the key locker that the key locker is sent, according to the key
Spoon case is turned off prompt and is sent completely instruction to the client.
It is described after the reception second takes key instruction module as further technical solution, further include:
Record pop-up key time module, for recording the time when key locker pops up corresponding key;
The pop-up time module for calculating key, when popping up the pop-up of key for calculating the key locker according to the time
Between;
The first alarm message module is sent, if exceeding preset pop-up time threshold, transmission for the pop-up time
One warning message is to the client.
The third aspect of the embodiment of the present invention provide a kind of key management terminal device, including memory, processor with
And it is stored in the computer program that can be run in the memory and on the processor, the processor executes the calculating
The method realized such as above-mentioned first aspect is realized when machine program.
The fourth aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage
Media storage has computer program, and the side realized such as above-mentioned first aspect is realized when the computer program is executed by processor
Method.
Existing advantageous effect is the embodiment of the present invention compared with prior art:By automatically controlling the storage of key and taking
Go out, realize the automatic management of key, improves key management efficiency, and then improve the working efficiency of staff, ensure computer room
Safety.
Description of the drawings
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art
Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description be only the present invention some
Embodiment for those of ordinary skill in the art without having to pay creative labor, can also be according to these
Attached drawing obtains other attached drawings.
Fig. 1 is the step schematic diagram of key management method provided in an embodiment of the present invention;
Fig. 2 is the schematic diagram of key management device provided in an embodiment of the present invention;
Fig. 3 is the schematic diagram of key management device provided in an embodiment of the present invention;
Fig. 4 is the schematic diagram of key management terminal device provided in an embodiment of the present invention.
Specific implementation mode
In being described below, for illustration and not for limitation, it is proposed that such as tool of particular system structure, technology etc
Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific
The present invention can also be realized in the other embodiments of details.In other situations, it omits to well-known system, device, electricity
The detailed description of road and method, in case unnecessary details interferes description of the invention.
In order to illustrate technical solutions according to the invention, illustrated below by specific embodiment.
Embodiment one
As shown in Figure 1, be the step schematic diagram of key management method provided in an embodiment of the present invention, including:
Step S101 receives the log-on message that client sends over, and letter is logged according to the client-side information verification to prestore
Whether breath is correct.
Specifically, when automation accesses key, there are one clients by each user, it may also be said to be each client generation
One user of table, each client has login name and password, when user wants to take key, can input user name in client
And password, log-in instruction is sent to server end, after received server-side to log-in instruction, is tested according to the client-side information to prestore
Whether the log-on message that card client sends over is correct, that is, judges whether username and password matches.
Step S102, if verifying, the log-on message is correct, and transmission barcode scanning is prompted to the client, so that the client
End prompts the Quick Response Code on scanning key locker according to the barcode scanning.
Specifically, after verifying username and password successful match, server end sends barcode scanning and is prompted to client, reminds
Client scan Quick Response Code after client receives barcode scanning prompt, automatically opens barcode scanning function and starts to scan the two dimension on key locker
Code;When username and password does not have successful match, the prompt of client validation failure is returned to, reminds user's weight of client
New filling login information re-starts verification, until being proved to be successful, continue verify log-on message it is correct after step
Suddenly.
Step S103 receives the client is sent after scanning the Quick Response Code first and key is taken to instruct, and described the
One takes key instruction to carry client number.
Specifically, after the Quick Response Code that client scan succeeds on key locker, sends first and key is taken to instruct to server end,
First takes key instruction to carry client number;May be two if client does not scan successfully the Quick Response Code on key locker
Tie up code damage or other unpredictable problems, then sending scanning, unsuccessfully client is arrived in prompt, and client then re-starts scanning,
Until scanning successfully.
Step S104 obtains the tour range and access right of the client according to client number.
Specifically, client number represents the access right of user and makes an inspection tour range, different numbers represents different
User right, for example, client number is with the representative ordi-nary maintenance personnel of 1 beginning of number, client number is with 2 beginning of number
Management distribution personnel are represented, it is also to start with number 1 according to client number determination, such as client number to make an inspection tour range
, one layer of computer room is maked an inspection tour, with 2 beginning of number, makes an inspection tour two layers of computer room.
Step S105, key option can be used by being pushed to the client according to the tour range and the access right.
Specifically, determining the available key option of client, certainly, the quantity of key according to tour range and access right
May be one or more, it is also possible to not have, if can be zero with the quantity of key, sending can not be prompted with key to client
End can be numbered with key if can be not zero with key quantity and be sent to client for client selection.
Step S106 receives the client can be sent according to key option second and key is taken to instruct, by institute
Stating second takes key instruction to be sent to the key locker, so that the key locker pops up corresponding key.
Specifically, after client receives available key option, according to itself needs of user, a key option is selected
And send second and key is taken to instruct to server end, this second is taken key instruction to be sent to key locker, key by server end again
Case takes key instruction to pop up corresponding key according to second.
After adopting the above scheme, it by automatically controlling the storage and taking-up of key, realizes the automatic management of key, improves
Key management efficiency, and then the working efficiency of staff is improved, ensure the safety of computer room.
In addition, in a specific example, the method further includes:
It receives the client is sent by scanning the Quick Response Code first and goes back key instruction, described first, which goes back key, refers to
It enables and carries the client number.
Specifically, after user is finished the key, key is also gone back, server receives client by scanning the two-dimensional code
First sent goes back key instruction, and first, which goes back key instruction, also carries client number.
Determine that key to be given back, transmission second are gone back key and instructed to the key locker according to client number, with
The key locker is set to go back key instruction unpack according to described second.
Specifically, server end determines that key to be given back, transmission second are gone back key and instructed to key according to client number
Spoon case, key locker open corresponding key locker according to key to be given back.
It receives the key locker that the key locker is sent and is turned off prompt, being turned off prompt according to the key locker is sent completely
It instructs to the client.
Specifically, after having given back key, key locker is closed, the key locker that received server-side to key locker is sent is closed
It after prompt, is sent completely instruction and arrives client, complete this time to operate.
In addition, in a specific example, it is described key option to be used to send out according in the reception client
Second sent takes key to instruct, and takes key instruction to be sent to the key locker by described second, so that key locker pop-up pair
After the key answered, further include:
Record the time when key locker pops up corresponding key.
The pop-up time that the key locker pops up key is calculated according to the time.
If the pop-up time exceeds preset pop-up time threshold, the first warning message is sent to the client.
Specifically, after key is removed, server end can record the time of the corresponding key of key locker pop-up, with this
For the time started, the time that key is removed is calculated, in the server in store pop-up time in advance, it is super when the key pop-up time
When going out the pop-up time threshold of preservation, the first warning message is sent to client, user is reminded to give back key as early as possible.
In addition, in a specific example, the method further includes:
Detect the distance between the key of the key locker pop-up and described key locker.
If the distance exceeds preset distance range, the second warning message is sent to the client.
Specifically, distance of the key being ejected apart from key locker can not exceed preset distance range, when beyond pre-
If distance range when, then have key stolen or the case where user forgets to give back occur, send the second warning message to client
End.
In addition, in a specific example, the method further includes:
Receive the client-side information that multiple client sends over.
Preserve the client-side information that multiple client is sent.
Specifically, receive the client-side information that sends over of multiple client, client-side information include user name, password,
Client number, user's work number, address name and user identity card number etc. information, login of the username and password as client
Information, client number, user's work number, address name and user identity card number etc. are used for determining the identity and permission of user.
After adopting the above scheme, it by automatically controlling the storage and taking-up of key, realizes the automatic management of key, improves
Key management efficiency, and then the working efficiency of staff is improved, ensure the safety of computer room.
Embodiment two
As shown in Fig. 2, be the step schematic diagram of key management device provided in an embodiment of the present invention, including:
Verify log-on message module 201, the log-on message sended over for receiving client, according to the client to prestore
Whether Information Authentication log-on message is correct;
Module 202 is scanned the two-dimensional code, if correct for verifying the log-on message, barcode scanning sent and is prompted to the client
End, so that the client prompts the Quick Response Code on scanning key locker according to the barcode scanning;
It receives and first takes key instruction module 203, sent after scanning the Quick Response Code for receiving the client
First takes key to instruct, and described first takes key instruction to carry client number;
Client-side information module 204 is obtained, the tour range for obtaining the client according to client number
And access right;
Push can use key module 205, for being pushed to the client according to the tour range and the access right
End can use key option;
It receives second and takes key instruction module 206, key option can be used to send according to for receiving the client
Second key is taken to instruct, take key instruction to be sent to the key locker by described second, so that key locker pop-up corresponds to
Key.
After adopting the above scheme, it by automatically controlling the storage and taking-up of key, realizes the automatic management of key, improves
Key management efficiency, and then the working efficiency of staff is improved, ensure the safety of computer room.
Embodiment three
As shown in figure 3, be the step schematic diagram of key management device provided in an embodiment of the present invention, including:
Verify log-on message module 301, the log-on message sended over for receiving client, according to the client to prestore
Whether Information Authentication log-on message is correct;
Module 302 is scanned the two-dimensional code, if correct for verifying the log-on message, barcode scanning sent and is prompted to the client
End, so that the client prompts the Quick Response Code on scanning key locker according to the barcode scanning;
It receives and first takes key instruction module 303, sent after scanning the Quick Response Code for receiving the client
First takes key to instruct, and described first takes key instruction to carry client number;
Client-side information module 304 is obtained, the tour range for obtaining the client according to client number
And access right;
Push can use key module 305, for being pushed to the client according to the tour range and the access right
End can use key option;
It receives second and takes key instruction module 306, key option can be used to send according to for receiving the client
Second key is taken to instruct, take key instruction to be sent to the key locker by described second, so that key locker pop-up corresponds to
Key.
In addition, in a specific example, described device further includes:
It receives first and goes back key instruction module 307, for receiving the client by scanning the Quick Response Code transmission
First goes back key instruction, and described first, which goes back key instruction, carries the client number;
It sends second and goes back key instruction module 308, for determining key to be given back according to client number, send
Second, which goes back key, instructs to the key locker, so that the key locker goes back key instruction unpack according to described second;
It is sent completely instruction module 309, prompt is turned off for receiving the key locker that the key locker is sent, according to described
Key locker is turned off prompt and is sent completely instruction to the client.
In addition, in a specific example, after the reception second takes key instruction module 306, further include:
Record pop-up key time module 310, for recording the time when key locker pops up corresponding key;
The pop-up time module 311 for calculating key, for calculating the bullet that the key locker pops up key according to the time
Go out the time;
The first alarm message module 312 is sent, if exceeding preset pop-up time threshold for the pop-up time, is sent
First warning message is to the client.
In addition, in a specific example, described device further includes:
Detecting distance module 313, the distance between key and the key locker for detecting the key locker pop-up;
The second alarm message module 314 is sent, if exceeding preset distance range for the distance, sends the second alarm
Information is to the client.
In addition, in a specific example, described device further includes:
Receive client-side information module 315, the client-side information sended over for receiving multiple client;
Client-side information 316 is preserved, the client-side information for preserving multiple client transmission.
After adopting the above scheme, it by automatically controlling the storage and taking-up of key, realizes the automatic management of key, improves
Key management efficiency, and then the working efficiency of staff is improved, ensure the safety of computer room.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit
It is fixed.
Example IV
Fig. 4 is the schematic diagram of key management terminal device provided in an embodiment of the present invention, as shown in figure 4, the embodiment
Key management terminal device 4 includes:It processor 40, memory 41 and is stored in the memory 41 and can be in the processing
The computer program 42 run on device 40, such as key management procedures.When the processor 40 executes the computer program 42
Realize the step in above-mentioned each key management embodiment of the method, such as step 101 shown in FIG. 1 is to 106.Alternatively, the place
Reason device 40 realizes the function of each module/unit in above-mentioned each device embodiment, such as Fig. 2 institutes when executing the computer program 42
Show the function of module 201 to 206.
Illustratively, the computer program 42 can be divided into one or more module/units, it is one or
Multiple module/units are stored in the memory 41, and are executed by the processor 40, to complete the present invention.Described one
A or multiple module/units can be the series of computation machine program instruction section that can complete specific function, which is used for
Implementation procedure of the computer program 42 in the key management terminal device 4 is described.For example, the computer program 42
Synchronization module can be divided into, summarizing module, acquisition module, return to module (module in virtual bench).
The key management terminal device 4 can be desktop PC, notebook, palm PC and cloud server etc.
Computing device.Key management device/the terminal device may include, but be not limited only to, processor 40, memory 41.This field
Technical staff is appreciated that Fig. 4 is only the example of key management device/terminal device 4, does not constitute and is filled to key management
/ the restriction of terminal device 4 is set, may include either combining certain components or different than illustrating more or fewer components
Component, such as the key management device/terminal device can also include input-output equipment, network access equipment, bus etc..
Alleged processor 40 can be central processing unit (Central Processing Unit, CPU), can also be
Other general processors, digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor
Deng.
The memory 41 can be the internal storage unit of the key management device/terminal device 4, such as key pipe
Manage the hard disk or memory of device/terminal device 4.The memory 41 can also be the key management device/terminal device 4
The plug-in type hard disk being equipped on External memory equipment, such as the key management device/terminal device 4, intelligent memory card
(Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Into
One step, the memory 41 can also both include the key management device/terminal device 4 internal storage unit and also including
External memory equipment.The memory 41 is for storing the computer program and the key management device/terminal device
Other required programs and data.The memory 41 can be also used for temporarily storing the number that has exported or will export
According to.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each work(
Can unit, module division progress for example, in practical application, can be as needed and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device are divided into different functional units or module, more than completion
The all or part of function of description.Each functional unit, module in embodiment can be integrated in a processing unit, also may be used
It, can also be above-mentioned integrated during two or more units are integrated in one unit to be that each unit physically exists alone
The form that hardware had both may be used in unit is realized, can also be realized in the form of SFU software functional unit.In addition, each function list
Member, the specific name of module are also only to facilitate mutually distinguish, the protection domain being not intended to limit this application.Above system
The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment
The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may realize that lists described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, depends on the specific application and design constraint of technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed device/terminal device and method, it can be with
It realizes by another way.For example, device described above/terminal device embodiment is only schematical, for example, institute
The division of module or unit is stated, only a kind of division of logic function, formula that in actual implementation, there may be another division manner, such as
Multiple units or component can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately
A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be by some interfaces, device
Or INDIRECT COUPLING or the communication connection of unit, can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple
In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also
It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list
The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or
In use, can be stored in a computer read/write memory medium.Based on this understanding, the present invention realizes above-mentioned implementation
All or part of flow in example method, can also instruct relevant hardware to complete, the meter by computer program
Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on
The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation
Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium
May include:Any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic of the computer program code can be carried
Dish, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM,
Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described
The content that computer-readable medium includes can carry out increasing appropriate according to legislation in jurisdiction and the requirement of patent practice
Subtract, such as in certain jurisdictions, according to legislation and patent practice, computer-readable medium do not include be electric carrier signal and
Telecommunication signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although with reference to aforementioned reality
Applying example, invention is explained in detail, it will be understood by those of ordinary skill in the art that:It still can be to aforementioned each
Technical solution recorded in embodiment is modified or equivalent replacement of some of the technical features;And these are changed
Or replace, the spirit and scope for various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution should all
It is included within protection scope of the present invention.
Claims (10)
1. a kind of key management method, which is characterized in that include the following steps:
The log-on message that client sends over is received, it is whether correct according to the client-side information verification log-on message to prestore;
If it is correct to verify the log-on message, sends barcode scanning and be prompted to the client, so that the client is swept according to
Quick Response Code on code prompt scanning key locker;
Receiving the client is sent after scanning the Quick Response Code first takes key to instruct, and described first takes key instruction to take
Band client is numbered;
The tour range and access right of the client are obtained according to client number;
Key option can be used by being pushed to the client according to the tour range and the access right;
Receiving the client can be sent according to key option second takes key to instruct, and takes key to refer to by described second
Order is sent to the key locker, so that the key locker pops up corresponding key.
2. key management method as described in claim 1, which is characterized in that further include:
It receives the client is sent by scanning the Quick Response Code first and goes back key instruction, described first, which goes back key instruction, takes
It is numbered with the client;
Key to be given back is determined according to client number, and transmission second is gone back key and instructed to the key locker, so that institute
It states key locker and goes back key instruction unpack according to described second;
It receives the key locker that the key locker is sent and is turned off prompt, being turned off prompt according to the key locker is sent completely instruction
To the client.
3. key management method as described in claim 1, which is characterized in that it is described receive the client can according to
Second sent with key option takes key to instruct, and takes key instruction to be sent to the key locker by described second, so that described
After key locker pops up corresponding key, further include:
Record the time when key locker pops up corresponding key;
The pop-up time that the key locker pops up key is calculated according to the time;
If the pop-up time exceeds preset pop-up time threshold, the first warning message is sent to the client.
4. key management method as described in claim 1, which is characterized in that further include:
Detect the distance between the key of the key locker pop-up and described key locker;
If the distance exceeds preset distance range, the second warning message is sent to the client.
5. key management method as described in claim 1, which is characterized in that further include:
Receive the client-side information that multiple client sends over;
Preserve the client-side information that multiple client is sent.
6. a kind of key management device, which is characterized in that including:
Log-on message module is verified, the log-on message sended over for receiving client is tested according to the client-side information to prestore
Whether correct demonstrate,prove log-on message;
Module is scanned the two-dimensional code, if correct for verifying the log-on message, barcode scanning sent and is prompted to the client, so that institute
Client is stated to be prompted to scan the Quick Response Code on key locker according to the barcode scanning;
It receives first and takes key instruction module, key is taken for receiving the client is sent after scanning the Quick Response Code first
Spoon instruction, described first takes key instruction to carry client number;
Client-side information module is obtained, tour range and the right to use for obtaining the client according to client number
Limit;
Push can use key module, and key can be used for being pushed to the client according to the tour range and the access right
Spoon option;
It receives second and takes key instruction module, taken for receiving the client can be sent according to key option second
Key instructs, and takes key instruction to be sent to the key locker by described second, so that the key locker pops up corresponding key.
7. key management system as claimed in claim 6, which is characterized in that further include:
It receives first and goes back key instruction module, key is gone back by scanning the first of the Quick Response Code transmission for receiving the client
Spoon instruction, described first, which goes back key instruction, carries the client number;
It sends second and goes back key instruction module, for determining key to be given back according to client number, send second also
Key is instructed to the key locker, so that the key locker goes back key instruction unpack according to described second;
It is sent completely instruction module, prompt is turned off for receiving the key locker that the key locker is sent, according to the key locker
It is turned off prompt and is sent completely instruction to the client.
8. key management system as claimed in claim 6, which is characterized in that it is described receive second take key instruction module it
Afterwards, further include:
Record pop-up key time module, for recording the time when key locker pops up corresponding key;
The pop-up time module for calculating key, for calculating the pop-up time that the key locker pops up key according to the time;
The first alarm message module is sent, if exceeding preset pop-up time threshold for the pop-up time, sends the first report
Information is warned to the client.
9. a kind of key management terminal device, including memory, processor and it is stored in the memory and can be described
The computer program run on processor, which is characterized in that the processor realizes such as right when executing the computer program
It is required that the step of any one of 1 to 5 the method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, feature to exist
In when the computer program is executed by processor the step of any one of such as claim 1 to 5 of realization the method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810073670.4A CN108343315A (en) | 2018-01-25 | 2018-01-25 | Key management method and terminal device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810073670.4A CN108343315A (en) | 2018-01-25 | 2018-01-25 | Key management method and terminal device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108343315A true CN108343315A (en) | 2018-07-31 |
Family
ID=62960906
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810073670.4A Pending CN108343315A (en) | 2018-01-25 | 2018-01-25 | Key management method and terminal device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108343315A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109685483A (en) * | 2019-01-31 | 2019-04-26 | 张义青 | Key management system and key management method |
CN111415438A (en) * | 2018-12-19 | 2020-07-14 | 北京奇虎科技有限公司 | Unlocking control method and device, intelligent key, intelligent lock and safety device |
CN112598559A (en) * | 2020-12-24 | 2021-04-02 | 四川众望安全环保技术咨询有限公司 | Intelligent park comprehensive management method and device, storage medium and electronic equipment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102213041A (en) * | 2010-04-07 | 2011-10-12 | 浙江理工大学 | Centralized key management system based on pressure-sensitivity fingerprint identification and use method |
CN202711347U (en) * | 2012-07-04 | 2013-01-30 | 北京链家房地产经纪有限公司 | Intelligent key locker |
-
2018
- 2018-01-25 CN CN201810073670.4A patent/CN108343315A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102213041A (en) * | 2010-04-07 | 2011-10-12 | 浙江理工大学 | Centralized key management system based on pressure-sensitivity fingerprint identification and use method |
CN202711347U (en) * | 2012-07-04 | 2013-01-30 | 北京链家房地产经纪有限公司 | Intelligent key locker |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111415438A (en) * | 2018-12-19 | 2020-07-14 | 北京奇虎科技有限公司 | Unlocking control method and device, intelligent key, intelligent lock and safety device |
CN109685483A (en) * | 2019-01-31 | 2019-04-26 | 张义青 | Key management system and key management method |
CN112598559A (en) * | 2020-12-24 | 2021-04-02 | 四川众望安全环保技术咨询有限公司 | Intelligent park comprehensive management method and device, storage medium and electronic equipment |
CN112598559B (en) * | 2020-12-24 | 2024-04-12 | 四川众望安全环保技术咨询有限公司 | Comprehensive management method and device for intelligent park, storage medium and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105556919B (en) | Dual factor anthentication is carried out using service request bill | |
CN104601582B (en) | A kind of methods, devices and systems of transmission file | |
CN108343315A (en) | Key management method and terminal device | |
CN110223040A (en) | Project management method, device, electronic equipment and storage medium | |
CN104982019B (en) | Identity data management system for bulk article private identity data | |
CN108073351A (en) | The date storage method and credible chip of nonvolatile storage space in chip | |
CN105703901B (en) | Encryption data input method and encryption data input unit | |
CN110148003A (en) | A kind of carbon emissions trading method and system | |
CN108053088A (en) | A kind of Subscriber Management System, method and apparatus | |
CN103685244A (en) | Differentiated authentication method and differentiated authentication device | |
CN107135201A (en) | A kind of webserver login authentication method and device | |
CN107609797A (en) | Electric operating checking method and terminal device | |
CN107480554A (en) | A kind of right management method, rights management device and intelligent terminal | |
CN106681854A (en) | Information checking method, device and system | |
CN109543459A (en) | A kind of data deposit card method and apparatus | |
CN107438832A (en) | A kind of method for refreshing data, device and computer-readable recording medium | |
CN107182042A (en) | Short message channel method for evaluating quality, device, medium and system | |
CN107181795B (en) | Convenient filling method and system for wireless security terminal firmware | |
CN109446053A (en) | Test method, computer readable storage medium and the terminal of application program | |
CN108600184A (en) | A kind of equipment authentication method of embedded chip certificate | |
CN112311624B (en) | Cloud host testing method and device, storage medium and electronic equipment | |
CN109040146A (en) | Account logs in authorization method, server, computer equipment and storage medium | |
CN108965315A (en) | A kind of authentic authentication method of terminal device, device and terminal device | |
CN108806071A (en) | Self-service dispenser management method, self-service dispenser managing device and electronic equipment | |
CN106815761A (en) | E-voucher center card processing method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180731 |