CN108343315A - Key management method and terminal device - Google Patents

Key management method and terminal device Download PDF

Info

Publication number
CN108343315A
CN108343315A CN201810073670.4A CN201810073670A CN108343315A CN 108343315 A CN108343315 A CN 108343315A CN 201810073670 A CN201810073670 A CN 201810073670A CN 108343315 A CN108343315 A CN 108343315A
Authority
CN
China
Prior art keywords
key
client
locker
sent
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810073670.4A
Other languages
Chinese (zh)
Inventor
董彦军
刘平
张建臣
胡立章
刘芳
雷阳
董正坤
宋峥峥
梅勇
徐珊
赵小萌
王亚静
王尧
刘玮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Information and Telecommunication Branch of State Grid Hebei Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Information and Telecommunication Branch of State Grid Hebei Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Information and Telecommunication Branch of State Grid Hebei Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201810073670.4A priority Critical patent/CN108343315A/en
Publication of CN108343315A publication Critical patent/CN108343315A/en
Pending legal-status Critical Current

Links

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B19/00Keys; Accessories therefor
    • E05B19/0082Keys or shanks being removably stored in a larger object, e.g. a remote control or a key fob
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B19/00Keys; Accessories therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes

Landscapes

  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention is suitable for computer room tool management technical field, provides key management method and device.The method includes:The log-on message that client sends over is received, it is whether correct according to the client-side information verification log-on message to prestore;If it is correct to verify log-on message, sends barcode scanning and be prompted to client, so that client prompts the Quick Response Code on scanning key locker according to barcode scanning;Receiving client is sent after scanning the two-dimensional code first takes key to instruct, and first takes key instruction to carry client number;The tour range and access right for obtaining client are numbered according to client;It is pushed to client according to tour range and access right and can use key option;Receive client takes key to instruct according to can be sent with key option second, takes key instruction to be sent to key locker by second, so that key locker pops up corresponding key.After adopting the above scheme, key management efficiency can be improved, the working efficiency of staff is improved, ensures the safety of computer room.

Description

Key management method and terminal device
Technical field
The invention belongs to computer room tool management technical field more particularly to a kind of key management method and terminal devices.
Background technology
Information communications equipment room is that power marketing, safety in production, ERP etc. are important as electric power enterprise intelligent development basis Operation system provides the information between physical space completion system and transmits and exchange, and is to realize business management modernization and power grid intelligence The important infrastructure of change, in order to ensure the safe and stable operation of computer room information communication equipment, tour personnel need to be to compass of competency Interior computer room carries out daily tour, and service personnel need to carry out repair and maintenance to faulty equipment, during which be related to multiple computer room disengaging, Computer room safety becomes the important leverage of information communication system safe and stable operation.
Currently, computer room access card and key are managed collectively by regulating and controlling center, stored using traditional key locker, scheduling is on duty Member is responsible for audit computer room and comes in and goes out personal information, implements key granting and retrieval management work, there is the degree of automation low, manpower The wasting of resources, it is inefficient, information is easy to be lost the problems such as, cannot ensure the safety of computer room.
Invention content
In view of this, an embodiment of the present invention provides a kind of key management method and terminal devices, to solve the prior art Middle key management the degree of automation is low, waste of human resource, inefficient problem.
The first aspect of the embodiment of the present invention provides a kind of key management method, includes the following steps:
The log-on message that client sends over is received, whether just according to the client-side information verification log-on message to prestore Really;
If it is correct to verify the log-on message, sends barcode scanning and be prompted to the client, so that the client is according to institute State the Quick Response Code on barcode scanning prompt scanning key locker;
Receiving the client is sent after scanning the Quick Response Code first takes key to instruct, and described first takes key to refer to It enables and carries client number;
The tour range and access right of the client are obtained according to client number;
Key option can be used by being pushed to the client according to the tour range and the access right;
Receiving the client can be sent according to key option second takes key to instruct, and key is taken by described second Spoon instruction is sent to the key locker, so that the key locker pops up corresponding key.
As further technical solution, the method further includes:
It receives the client is sent by scanning the Quick Response Code first and goes back key instruction, described first, which goes back key, refers to It enables and carries the client number;
Determine that key to be given back, transmission second are gone back key and instructed to the key locker according to client number, with The key locker is set to go back key instruction unpack according to described second;
It receives the key locker that the key locker is sent and is turned off prompt, being turned off prompt according to the key locker is sent completely It instructs to the client.
It is described key option to be used to send according in the reception client as further technical solution Second key is taken to instruct, take key instruction to be sent to the key locker by described second, so that key locker pop-up corresponds to Key after, further include:
Record the time when key locker pops up corresponding key;
The pop-up time that the key locker pops up key is calculated according to the time;
If the pop-up time exceeds preset pop-up time threshold, the first warning message is sent to the client.
As further technical solution, the method further includes:
Detect the distance between the key of the key locker pop-up and described key locker;
If the distance exceeds preset distance range, the second warning message is sent to the client.
As further technical solution, the method further includes:
Receive the client-side information that multiple client sends over;
Preserve the client-side information that multiple client is sent.
The second aspect of the embodiment of the present invention provides a kind of key management device, including:
Log-on message module is verified, the log-on message sended over for receiving client is believed according to the client to prestore Whether breath verification log-on message is correct;
Module is scanned the two-dimensional code, if correct for verifying the log-on message, barcode scanning sent and is prompted to the client, with The client is set to prompt the Quick Response Code on scanning key locker according to the barcode scanning;
It receives first and takes key instruction module, first sent after scanning the Quick Response Code for receiving the client Key is taken to instruct, described first takes key instruction to carry client number;
Client-side information module is obtained, for obtaining the tour range of the client according to client number and making Use permission;
Push can use key module, can for being pushed to the client according to the tour range and the access right With key option;
It receives and second takes key instruction module, the of key option transmission can be used for receiving the client according to Two take key to instruct, and take key instruction to be sent to the key locker by described second, so that the key locker pops up corresponding key Spoon.
As further technical solution, described device further includes:
It receives first and goes back key instruction module, for receiving the client by scanning the first of the Quick Response Code transmission Also key instructs, and described first, which goes back key instruction, carries the client number;
It sends and second goes back key instruction module, for determining key to be given back according to client number, send the Two, which go back key, instructs to the key locker, so that the key locker goes back key instruction unpack according to described second;
It is sent completely instruction module, prompt is turned off for receiving the key locker that the key locker is sent, according to the key Spoon case is turned off prompt and is sent completely instruction to the client.
It is described after the reception second takes key instruction module as further technical solution, further include:
Record pop-up key time module, for recording the time when key locker pops up corresponding key;
The pop-up time module for calculating key, when popping up the pop-up of key for calculating the key locker according to the time Between;
The first alarm message module is sent, if exceeding preset pop-up time threshold, transmission for the pop-up time One warning message is to the client.
The third aspect of the embodiment of the present invention provide a kind of key management terminal device, including memory, processor with And it is stored in the computer program that can be run in the memory and on the processor, the processor executes the calculating The method realized such as above-mentioned first aspect is realized when machine program.
The fourth aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage Media storage has computer program, and the side realized such as above-mentioned first aspect is realized when the computer program is executed by processor Method.
Existing advantageous effect is the embodiment of the present invention compared with prior art:By automatically controlling the storage of key and taking Go out, realize the automatic management of key, improves key management efficiency, and then improve the working efficiency of staff, ensure computer room Safety.
Description of the drawings
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description be only the present invention some Embodiment for those of ordinary skill in the art without having to pay creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is the step schematic diagram of key management method provided in an embodiment of the present invention;
Fig. 2 is the schematic diagram of key management device provided in an embodiment of the present invention;
Fig. 3 is the schematic diagram of key management device provided in an embodiment of the present invention;
Fig. 4 is the schematic diagram of key management terminal device provided in an embodiment of the present invention.
Specific implementation mode
In being described below, for illustration and not for limitation, it is proposed that such as tool of particular system structure, technology etc Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific The present invention can also be realized in the other embodiments of details.In other situations, it omits to well-known system, device, electricity The detailed description of road and method, in case unnecessary details interferes description of the invention.
In order to illustrate technical solutions according to the invention, illustrated below by specific embodiment.
Embodiment one
As shown in Figure 1, be the step schematic diagram of key management method provided in an embodiment of the present invention, including:
Step S101 receives the log-on message that client sends over, and letter is logged according to the client-side information verification to prestore Whether breath is correct.
Specifically, when automation accesses key, there are one clients by each user, it may also be said to be each client generation One user of table, each client has login name and password, when user wants to take key, can input user name in client And password, log-in instruction is sent to server end, after received server-side to log-in instruction, is tested according to the client-side information to prestore Whether the log-on message that card client sends over is correct, that is, judges whether username and password matches.
Step S102, if verifying, the log-on message is correct, and transmission barcode scanning is prompted to the client, so that the client End prompts the Quick Response Code on scanning key locker according to the barcode scanning.
Specifically, after verifying username and password successful match, server end sends barcode scanning and is prompted to client, reminds Client scan Quick Response Code after client receives barcode scanning prompt, automatically opens barcode scanning function and starts to scan the two dimension on key locker Code;When username and password does not have successful match, the prompt of client validation failure is returned to, reminds user's weight of client New filling login information re-starts verification, until being proved to be successful, continue verify log-on message it is correct after step Suddenly.
Step S103 receives the client is sent after scanning the Quick Response Code first and key is taken to instruct, and described the One takes key instruction to carry client number.
Specifically, after the Quick Response Code that client scan succeeds on key locker, sends first and key is taken to instruct to server end, First takes key instruction to carry client number;May be two if client does not scan successfully the Quick Response Code on key locker Tie up code damage or other unpredictable problems, then sending scanning, unsuccessfully client is arrived in prompt, and client then re-starts scanning, Until scanning successfully.
Step S104 obtains the tour range and access right of the client according to client number.
Specifically, client number represents the access right of user and makes an inspection tour range, different numbers represents different User right, for example, client number is with the representative ordi-nary maintenance personnel of 1 beginning of number, client number is with 2 beginning of number Management distribution personnel are represented, it is also to start with number 1 according to client number determination, such as client number to make an inspection tour range , one layer of computer room is maked an inspection tour, with 2 beginning of number, makes an inspection tour two layers of computer room.
Step S105, key option can be used by being pushed to the client according to the tour range and the access right.
Specifically, determining the available key option of client, certainly, the quantity of key according to tour range and access right May be one or more, it is also possible to not have, if can be zero with the quantity of key, sending can not be prompted with key to client End can be numbered with key if can be not zero with key quantity and be sent to client for client selection.
Step S106 receives the client can be sent according to key option second and key is taken to instruct, by institute Stating second takes key instruction to be sent to the key locker, so that the key locker pops up corresponding key.
Specifically, after client receives available key option, according to itself needs of user, a key option is selected And send second and key is taken to instruct to server end, this second is taken key instruction to be sent to key locker, key by server end again Case takes key instruction to pop up corresponding key according to second.
After adopting the above scheme, it by automatically controlling the storage and taking-up of key, realizes the automatic management of key, improves Key management efficiency, and then the working efficiency of staff is improved, ensure the safety of computer room.
In addition, in a specific example, the method further includes:
It receives the client is sent by scanning the Quick Response Code first and goes back key instruction, described first, which goes back key, refers to It enables and carries the client number.
Specifically, after user is finished the key, key is also gone back, server receives client by scanning the two-dimensional code First sent goes back key instruction, and first, which goes back key instruction, also carries client number.
Determine that key to be given back, transmission second are gone back key and instructed to the key locker according to client number, with The key locker is set to go back key instruction unpack according to described second.
Specifically, server end determines that key to be given back, transmission second are gone back key and instructed to key according to client number Spoon case, key locker open corresponding key locker according to key to be given back.
It receives the key locker that the key locker is sent and is turned off prompt, being turned off prompt according to the key locker is sent completely It instructs to the client.
Specifically, after having given back key, key locker is closed, the key locker that received server-side to key locker is sent is closed It after prompt, is sent completely instruction and arrives client, complete this time to operate.
In addition, in a specific example, it is described key option to be used to send out according in the reception client Second sent takes key to instruct, and takes key instruction to be sent to the key locker by described second, so that key locker pop-up pair After the key answered, further include:
Record the time when key locker pops up corresponding key.
The pop-up time that the key locker pops up key is calculated according to the time.
If the pop-up time exceeds preset pop-up time threshold, the first warning message is sent to the client.
Specifically, after key is removed, server end can record the time of the corresponding key of key locker pop-up, with this For the time started, the time that key is removed is calculated, in the server in store pop-up time in advance, it is super when the key pop-up time When going out the pop-up time threshold of preservation, the first warning message is sent to client, user is reminded to give back key as early as possible.
In addition, in a specific example, the method further includes:
Detect the distance between the key of the key locker pop-up and described key locker.
If the distance exceeds preset distance range, the second warning message is sent to the client.
Specifically, distance of the key being ejected apart from key locker can not exceed preset distance range, when beyond pre- If distance range when, then have key stolen or the case where user forgets to give back occur, send the second warning message to client End.
In addition, in a specific example, the method further includes:
Receive the client-side information that multiple client sends over.
Preserve the client-side information that multiple client is sent.
Specifically, receive the client-side information that sends over of multiple client, client-side information include user name, password, Client number, user's work number, address name and user identity card number etc. information, login of the username and password as client Information, client number, user's work number, address name and user identity card number etc. are used for determining the identity and permission of user.
After adopting the above scheme, it by automatically controlling the storage and taking-up of key, realizes the automatic management of key, improves Key management efficiency, and then the working efficiency of staff is improved, ensure the safety of computer room.
Embodiment two
As shown in Fig. 2, be the step schematic diagram of key management device provided in an embodiment of the present invention, including:
Verify log-on message module 201, the log-on message sended over for receiving client, according to the client to prestore Whether Information Authentication log-on message is correct;
Module 202 is scanned the two-dimensional code, if correct for verifying the log-on message, barcode scanning sent and is prompted to the client End, so that the client prompts the Quick Response Code on scanning key locker according to the barcode scanning;
It receives and first takes key instruction module 203, sent after scanning the Quick Response Code for receiving the client First takes key to instruct, and described first takes key instruction to carry client number;
Client-side information module 204 is obtained, the tour range for obtaining the client according to client number And access right;
Push can use key module 205, for being pushed to the client according to the tour range and the access right End can use key option;
It receives second and takes key instruction module 206, key option can be used to send according to for receiving the client Second key is taken to instruct, take key instruction to be sent to the key locker by described second, so that key locker pop-up corresponds to Key.
After adopting the above scheme, it by automatically controlling the storage and taking-up of key, realizes the automatic management of key, improves Key management efficiency, and then the working efficiency of staff is improved, ensure the safety of computer room.
Embodiment three
As shown in figure 3, be the step schematic diagram of key management device provided in an embodiment of the present invention, including:
Verify log-on message module 301, the log-on message sended over for receiving client, according to the client to prestore Whether Information Authentication log-on message is correct;
Module 302 is scanned the two-dimensional code, if correct for verifying the log-on message, barcode scanning sent and is prompted to the client End, so that the client prompts the Quick Response Code on scanning key locker according to the barcode scanning;
It receives and first takes key instruction module 303, sent after scanning the Quick Response Code for receiving the client First takes key to instruct, and described first takes key instruction to carry client number;
Client-side information module 304 is obtained, the tour range for obtaining the client according to client number And access right;
Push can use key module 305, for being pushed to the client according to the tour range and the access right End can use key option;
It receives second and takes key instruction module 306, key option can be used to send according to for receiving the client Second key is taken to instruct, take key instruction to be sent to the key locker by described second, so that key locker pop-up corresponds to Key.
In addition, in a specific example, described device further includes:
It receives first and goes back key instruction module 307, for receiving the client by scanning the Quick Response Code transmission First goes back key instruction, and described first, which goes back key instruction, carries the client number;
It sends second and goes back key instruction module 308, for determining key to be given back according to client number, send Second, which goes back key, instructs to the key locker, so that the key locker goes back key instruction unpack according to described second;
It is sent completely instruction module 309, prompt is turned off for receiving the key locker that the key locker is sent, according to described Key locker is turned off prompt and is sent completely instruction to the client.
In addition, in a specific example, after the reception second takes key instruction module 306, further include:
Record pop-up key time module 310, for recording the time when key locker pops up corresponding key;
The pop-up time module 311 for calculating key, for calculating the bullet that the key locker pops up key according to the time Go out the time;
The first alarm message module 312 is sent, if exceeding preset pop-up time threshold for the pop-up time, is sent First warning message is to the client.
In addition, in a specific example, described device further includes:
Detecting distance module 313, the distance between key and the key locker for detecting the key locker pop-up;
The second alarm message module 314 is sent, if exceeding preset distance range for the distance, sends the second alarm Information is to the client.
In addition, in a specific example, described device further includes:
Receive client-side information module 315, the client-side information sended over for receiving multiple client;
Client-side information 316 is preserved, the client-side information for preserving multiple client transmission.
After adopting the above scheme, it by automatically controlling the storage and taking-up of key, realizes the automatic management of key, improves Key management efficiency, and then the working efficiency of staff is improved, ensure the safety of computer room.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
Example IV
Fig. 4 is the schematic diagram of key management terminal device provided in an embodiment of the present invention, as shown in figure 4, the embodiment Key management terminal device 4 includes:It processor 40, memory 41 and is stored in the memory 41 and can be in the processing The computer program 42 run on device 40, such as key management procedures.When the processor 40 executes the computer program 42 Realize the step in above-mentioned each key management embodiment of the method, such as step 101 shown in FIG. 1 is to 106.Alternatively, the place Reason device 40 realizes the function of each module/unit in above-mentioned each device embodiment, such as Fig. 2 institutes when executing the computer program 42 Show the function of module 201 to 206.
Illustratively, the computer program 42 can be divided into one or more module/units, it is one or Multiple module/units are stored in the memory 41, and are executed by the processor 40, to complete the present invention.Described one A or multiple module/units can be the series of computation machine program instruction section that can complete specific function, which is used for Implementation procedure of the computer program 42 in the key management terminal device 4 is described.For example, the computer program 42 Synchronization module can be divided into, summarizing module, acquisition module, return to module (module in virtual bench).
The key management terminal device 4 can be desktop PC, notebook, palm PC and cloud server etc. Computing device.Key management device/the terminal device may include, but be not limited only to, processor 40, memory 41.This field Technical staff is appreciated that Fig. 4 is only the example of key management device/terminal device 4, does not constitute and is filled to key management / the restriction of terminal device 4 is set, may include either combining certain components or different than illustrating more or fewer components Component, such as the key management device/terminal device can also include input-output equipment, network access equipment, bus etc..
Alleged processor 40 can be central processing unit (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor Deng.
The memory 41 can be the internal storage unit of the key management device/terminal device 4, such as key pipe Manage the hard disk or memory of device/terminal device 4.The memory 41 can also be the key management device/terminal device 4 The plug-in type hard disk being equipped on External memory equipment, such as the key management device/terminal device 4, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Into One step, the memory 41 can also both include the key management device/terminal device 4 internal storage unit and also including External memory equipment.The memory 41 is for storing the computer program and the key management device/terminal device Other required programs and data.The memory 41 can be also used for temporarily storing the number that has exported or will export According to.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each work( Can unit, module division progress for example, in practical application, can be as needed and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device are divided into different functional units or module, more than completion The all or part of function of description.Each functional unit, module in embodiment can be integrated in a processing unit, also may be used It, can also be above-mentioned integrated during two or more units are integrated in one unit to be that each unit physically exists alone The form that hardware had both may be used in unit is realized, can also be realized in the form of SFU software functional unit.In addition, each function list Member, the specific name of module are also only to facilitate mutually distinguish, the protection domain being not intended to limit this application.Above system The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may realize that lists described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, depends on the specific application and design constraint of technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed device/terminal device and method, it can be with It realizes by another way.For example, device described above/terminal device embodiment is only schematical, for example, institute The division of module or unit is stated, only a kind of division of logic function, formula that in actual implementation, there may be another division manner, such as Multiple units or component can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be by some interfaces, device Or INDIRECT COUPLING or the communication connection of unit, can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or In use, can be stored in a computer read/write memory medium.Based on this understanding, the present invention realizes above-mentioned implementation All or part of flow in example method, can also instruct relevant hardware to complete, the meter by computer program Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium May include:Any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic of the computer program code can be carried Dish, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described The content that computer-readable medium includes can carry out increasing appropriate according to legislation in jurisdiction and the requirement of patent practice Subtract, such as in certain jurisdictions, according to legislation and patent practice, computer-readable medium do not include be electric carrier signal and Telecommunication signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although with reference to aforementioned reality Applying example, invention is explained in detail, it will be understood by those of ordinary skill in the art that:It still can be to aforementioned each Technical solution recorded in embodiment is modified or equivalent replacement of some of the technical features;And these are changed Or replace, the spirit and scope for various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of key management method, which is characterized in that include the following steps:
The log-on message that client sends over is received, it is whether correct according to the client-side information verification log-on message to prestore;
If it is correct to verify the log-on message, sends barcode scanning and be prompted to the client, so that the client is swept according to Quick Response Code on code prompt scanning key locker;
Receiving the client is sent after scanning the Quick Response Code first takes key to instruct, and described first takes key instruction to take Band client is numbered;
The tour range and access right of the client are obtained according to client number;
Key option can be used by being pushed to the client according to the tour range and the access right;
Receiving the client can be sent according to key option second takes key to instruct, and takes key to refer to by described second Order is sent to the key locker, so that the key locker pops up corresponding key.
2. key management method as described in claim 1, which is characterized in that further include:
It receives the client is sent by scanning the Quick Response Code first and goes back key instruction, described first, which goes back key instruction, takes It is numbered with the client;
Key to be given back is determined according to client number, and transmission second is gone back key and instructed to the key locker, so that institute It states key locker and goes back key instruction unpack according to described second;
It receives the key locker that the key locker is sent and is turned off prompt, being turned off prompt according to the key locker is sent completely instruction To the client.
3. key management method as described in claim 1, which is characterized in that it is described receive the client can according to Second sent with key option takes key to instruct, and takes key instruction to be sent to the key locker by described second, so that described After key locker pops up corresponding key, further include:
Record the time when key locker pops up corresponding key;
The pop-up time that the key locker pops up key is calculated according to the time;
If the pop-up time exceeds preset pop-up time threshold, the first warning message is sent to the client.
4. key management method as described in claim 1, which is characterized in that further include:
Detect the distance between the key of the key locker pop-up and described key locker;
If the distance exceeds preset distance range, the second warning message is sent to the client.
5. key management method as described in claim 1, which is characterized in that further include:
Receive the client-side information that multiple client sends over;
Preserve the client-side information that multiple client is sent.
6. a kind of key management device, which is characterized in that including:
Log-on message module is verified, the log-on message sended over for receiving client is tested according to the client-side information to prestore Whether correct demonstrate,prove log-on message;
Module is scanned the two-dimensional code, if correct for verifying the log-on message, barcode scanning sent and is prompted to the client, so that institute Client is stated to be prompted to scan the Quick Response Code on key locker according to the barcode scanning;
It receives first and takes key instruction module, key is taken for receiving the client is sent after scanning the Quick Response Code first Spoon instruction, described first takes key instruction to carry client number;
Client-side information module is obtained, tour range and the right to use for obtaining the client according to client number Limit;
Push can use key module, and key can be used for being pushed to the client according to the tour range and the access right Spoon option;
It receives second and takes key instruction module, taken for receiving the client can be sent according to key option second Key instructs, and takes key instruction to be sent to the key locker by described second, so that the key locker pops up corresponding key.
7. key management system as claimed in claim 6, which is characterized in that further include:
It receives first and goes back key instruction module, key is gone back by scanning the first of the Quick Response Code transmission for receiving the client Spoon instruction, described first, which goes back key instruction, carries the client number;
It sends second and goes back key instruction module, for determining key to be given back according to client number, send second also Key is instructed to the key locker, so that the key locker goes back key instruction unpack according to described second;
It is sent completely instruction module, prompt is turned off for receiving the key locker that the key locker is sent, according to the key locker It is turned off prompt and is sent completely instruction to the client.
8. key management system as claimed in claim 6, which is characterized in that it is described receive second take key instruction module it Afterwards, further include:
Record pop-up key time module, for recording the time when key locker pops up corresponding key;
The pop-up time module for calculating key, for calculating the pop-up time that the key locker pops up key according to the time;
The first alarm message module is sent, if exceeding preset pop-up time threshold for the pop-up time, sends the first report Information is warned to the client.
9. a kind of key management terminal device, including memory, processor and it is stored in the memory and can be described The computer program run on processor, which is characterized in that the processor realizes such as right when executing the computer program It is required that the step of any one of 1 to 5 the method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, feature to exist In when the computer program is executed by processor the step of any one of such as claim 1 to 5 of realization the method.
CN201810073670.4A 2018-01-25 2018-01-25 Key management method and terminal device Pending CN108343315A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810073670.4A CN108343315A (en) 2018-01-25 2018-01-25 Key management method and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810073670.4A CN108343315A (en) 2018-01-25 2018-01-25 Key management method and terminal device

Publications (1)

Publication Number Publication Date
CN108343315A true CN108343315A (en) 2018-07-31

Family

ID=62960906

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810073670.4A Pending CN108343315A (en) 2018-01-25 2018-01-25 Key management method and terminal device

Country Status (1)

Country Link
CN (1) CN108343315A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109685483A (en) * 2019-01-31 2019-04-26 张义青 Key management system and key management method
CN111415438A (en) * 2018-12-19 2020-07-14 北京奇虎科技有限公司 Unlocking control method and device, intelligent key, intelligent lock and safety device
CN112598559A (en) * 2020-12-24 2021-04-02 四川众望安全环保技术咨询有限公司 Intelligent park comprehensive management method and device, storage medium and electronic equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102213041A (en) * 2010-04-07 2011-10-12 浙江理工大学 Centralized key management system based on pressure-sensitivity fingerprint identification and use method
CN202711347U (en) * 2012-07-04 2013-01-30 北京链家房地产经纪有限公司 Intelligent key locker

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102213041A (en) * 2010-04-07 2011-10-12 浙江理工大学 Centralized key management system based on pressure-sensitivity fingerprint identification and use method
CN202711347U (en) * 2012-07-04 2013-01-30 北京链家房地产经纪有限公司 Intelligent key locker

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111415438A (en) * 2018-12-19 2020-07-14 北京奇虎科技有限公司 Unlocking control method and device, intelligent key, intelligent lock and safety device
CN109685483A (en) * 2019-01-31 2019-04-26 张义青 Key management system and key management method
CN112598559A (en) * 2020-12-24 2021-04-02 四川众望安全环保技术咨询有限公司 Intelligent park comprehensive management method and device, storage medium and electronic equipment
CN112598559B (en) * 2020-12-24 2024-04-12 四川众望安全环保技术咨询有限公司 Comprehensive management method and device for intelligent park, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
CN105556919B (en) Dual factor anthentication is carried out using service request bill
CN104601582B (en) A kind of methods, devices and systems of transmission file
CN108343315A (en) Key management method and terminal device
CN110223040A (en) Project management method, device, electronic equipment and storage medium
CN104982019B (en) Identity data management system for bulk article private identity data
CN108073351A (en) The date storage method and credible chip of nonvolatile storage space in chip
CN105703901B (en) Encryption data input method and encryption data input unit
CN110148003A (en) A kind of carbon emissions trading method and system
CN108053088A (en) A kind of Subscriber Management System, method and apparatus
CN103685244A (en) Differentiated authentication method and differentiated authentication device
CN107135201A (en) A kind of webserver login authentication method and device
CN107609797A (en) Electric operating checking method and terminal device
CN107480554A (en) A kind of right management method, rights management device and intelligent terminal
CN106681854A (en) Information checking method, device and system
CN109543459A (en) A kind of data deposit card method and apparatus
CN107438832A (en) A kind of method for refreshing data, device and computer-readable recording medium
CN107182042A (en) Short message channel method for evaluating quality, device, medium and system
CN107181795B (en) Convenient filling method and system for wireless security terminal firmware
CN109446053A (en) Test method, computer readable storage medium and the terminal of application program
CN108600184A (en) A kind of equipment authentication method of embedded chip certificate
CN112311624B (en) Cloud host testing method and device, storage medium and electronic equipment
CN109040146A (en) Account logs in authorization method, server, computer equipment and storage medium
CN108965315A (en) A kind of authentic authentication method of terminal device, device and terminal device
CN108806071A (en) Self-service dispenser management method, self-service dispenser managing device and electronic equipment
CN106815761A (en) E-voucher center card processing method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180731