[go: up one dir, main page]

CN119360478A - Key management method, computer program product and electronic device - Google Patents

Key management method, computer program product and electronic device Download PDF

Info

Publication number
CN119360478A
CN119360478A CN202411470903.6A CN202411470903A CN119360478A CN 119360478 A CN119360478 A CN 119360478A CN 202411470903 A CN202411470903 A CN 202411470903A CN 119360478 A CN119360478 A CN 119360478A
Authority
CN
China
Prior art keywords
information
target
bin
tag
display panel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202411470903.6A
Other languages
Chinese (zh)
Inventor
简耀峰
凌忠标
关家华
王师
屈子淇
张晗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Power Grid Co Ltd
Foshan Power Supply Bureau of Guangdong Power Grid Corp
Original Assignee
Guangdong Power Grid Co Ltd
Foshan Power Supply Bureau of Guangdong Power Grid Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Power Grid Co Ltd, Foshan Power Supply Bureau of Guangdong Power Grid Corp filed Critical Guangdong Power Grid Co Ltd
Priority to CN202411470903.6A priority Critical patent/CN119360478A/en
Publication of CN119360478A publication Critical patent/CN119360478A/en
Pending legal-status Critical Current

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

本申请提供了一种钥匙管理方法、计算机程序产品和电子设备,钥匙有多个,标签有多个,钥匙与标签一一对应地连接,柜体包括多个仓位,仓位用于一一对应地插入带有标签的钥匙,该方法包括:在各仓位内存在带有标签的钥匙的情况下,将各仓位上锁;获取至少一个仓位内标签对应的记载信息,并将获取到的所有的记载信息传输至显示面板上,以使得显示面板显示接收到的记载信息,其中,记载信息为表征与标签所连接的钥匙的信息;接收目标记载信息,并确定目标记载信息对应的标签为目标标签,目标记载信息为响应于作用在显示面板上的第一预定操作确定的记载信息;控制目标标签所在的仓位解锁。本申请解决了现有技术中对于大量钥匙管理的规范性较差的问题。

The present application provides a key management method, a computer program product, and an electronic device, wherein there are multiple keys, multiple tags, the keys are connected to the tags in a one-to-one correspondence, the cabinet includes multiple bins, and the bins are used to insert the keys with tags in a one-to-one correspondence, and the method includes: when there are keys with tags in each bin, each bin is locked; the record information corresponding to the tag in at least one bin is obtained, and all the obtained record information is transmitted to the display panel so that the display panel displays the received record information, wherein the record information is information representing the key connected to the tag; the target record information is received, and the tag corresponding to the target record information is determined as the target tag, and the target record information is the record information determined in response to a first predetermined operation acting on the display panel; the bin where the target tag is located is controlled to be unlocked. The present application solves the problem of poor standardization of large-scale key management in the prior art.

Description

Key management method, computer program product, and electronic device
Technical Field
The present application relates to the field of key management technology, and in particular, to a key management method, a computer readable storage medium, a computer program product, and an electronic device.
Background
In places such as hotels, second-hand house transactions and house leasing markets, a large number of keys need to be managed, in the prior art, a plurality of keys are generally directly hung on different hooks, and the different hooks are marked, so that the plurality of different keys are managed, the management mode has less recorded information, and the management standardization is poor, so that a more convenient method for managing the keys is needed.
Disclosure of Invention
The main object of the present application is to provide a key management method, a computer readable storage medium, a computer program product and an electronic device, which at least solve the problem of poor standardization of a large number of key management in the prior art.
In order to achieve the above object, according to one aspect of the present application, there is provided a key management method, a plurality of keys and a plurality of labels, wherein the keys are connected with the labels in a one-to-one correspondence manner, a cabinet body comprises a plurality of bins for inserting the keys with the labels in a one-to-one correspondence manner, the method comprises locking each bin when the keys with the labels exist in each bin, acquiring record information corresponding to the labels in at least one bin, and transmitting all acquired record information to a display panel, so that the display panel displays the received record information, wherein the record information is information representing the keys connected with the labels, receiving target record information, determining the labels corresponding to the target record information to be target labels, the target record information being record information determined in response to a first predetermined operation acting on the display panel, and controlling unlocking of the target bin.
Optionally, acquiring record information corresponding to the tag in at least one bin, and transmitting all acquired record information to a display panel, wherein the record information comprises acquiring identity information of an administrator, wherein the administrator is used for managing a plurality of keys, the identity information comprises at least one of face information, fingerprint information, voiceprint information, IC (INTEGRATED CIRCUIT) card information and ID (identity) card information, acquiring record information of all the tags connected with the keys corresponding to the identity information, and transmitting the record information of all the tags corresponding to the identity information to the display panel.
Optionally, controlling the bin where the target tag is located to unlock comprises receiving return time information and return place information, wherein the return time information represents future return time of the target tag, the return place information represents future return place of the target tag, establishing constraint conditions of the target tag according to the return time information and the return place information, and controlling the bin where the target tag is located to unlock.
Optionally, after the bin where the target tag is located is controlled to be unlocked, the method further comprises the steps of judging whether the target tag is out of the range of the constraint condition or not, and sending an alarm signal when the target tag is out of the range of the constraint condition.
Optionally, the plurality of cabinet bodies are used for judging whether the target label exceeds the range of the constraint condition or not, wherein the method comprises the steps of uploading the constraint condition to a cloud server, controlling the plurality of cabinet bodies to acquire the constraint condition from the cloud server respectively, judging whether the target label is inserted into the bin of any cabinet body in the returning time information and the returning location information, and determining that the target label exceeds the range of the constraint condition under the condition that the target label is not inserted into the bin of any cabinet body in the returning time information or the returning location information.
Optionally, after the bin where the target tag is located is controlled to be unlocked, the method further comprises the steps of determining the bin where the target tag is located as a target bin, judging whether the target tag is moved out of the target bin within a preset time period, and controlling the target bin to be locked again under the condition that the target tag is not moved out of the target bin within the preset time period.
Optionally, the method further comprises controlling the display panel to display in a warehouse state when the label is located in the corresponding warehouse space, and controlling the display panel to display in a warehouse-out state when the label is moved out of the corresponding warehouse space.
According to another aspect of the present application, there is provided a computer-readable storage medium including a stored program, wherein the program, when executed, controls a device in which the computer-readable storage medium is located to perform any one of the key management methods.
According to yet another aspect of the present application, there is provided a computer program product comprising computer instructions which, when executed by a processor, implement any of the key management methods described.
According to yet another aspect of the present application, there is provided an electronic device comprising one or more processors, a memory, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs comprising instructions for performing any of the key management methods.
According to the technical scheme, a plurality of keys are provided, the plurality of the keys are connected with the labels in a one-to-one correspondence manner, the cabinet body comprises a plurality of bin positions, the bin positions are used for inserting the keys with the labels in a one-to-one correspondence manner, firstly, when the keys with the labels exist in the bin positions, each bin position is locked, then, the recorded information corresponding to the labels in at least one bin position is acquired, the acquired recorded information is transmitted to the display panel, the display panel displays the received recorded information, then, the target recorded information is received, the label corresponding to the target recorded information is determined to be the target label, and finally, unlocking of the bin position where the target label is located is controlled, wherein the target recorded information is recorded information determined in response to a first preset operation acted on the display panel. Compared with the problem of poor standardization of a large number of key management in the prior art, the key is connected with the labels, when the keys with the labels exist in all bin positions, all bin positions are locked to limit the labels to move out of the bin positions, recorded information corresponding to the labels in at least one bin position is acquired, and the recorded information is transmitted to the display panel, so that a user can select the recorded information corresponding to the labels from the display panel, the bin positions where the labels corresponding to the recorded information are located can be controlled to be unlocked and opened, the keys can be conveniently stored and managed, the information of the keys can be recorded in time, and the keys can be conveniently checked when the keys are needed to be used, and can be more efficiently and scientifically managed.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application. In the drawings:
fig. 1 is a block diagram showing a hardware configuration of a mobile terminal performing a key management method according to an embodiment of the present application;
fig. 2 shows a flow chart of a key management method according to an embodiment of the application.
Wherein the above figures include the following reference numerals:
102. processor, 104, memory, 106, transmission equipment, 108, input and output equipment.
Detailed Description
It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other. The application will be described in detail below with reference to the drawings in connection with embodiments.
In order that those skilled in the art will better understand the present application, a technical solution in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate in order to describe the embodiments of the application herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
As described in the background art, the prior art has poor standardization for a large number of key management, and in order to solve the above problems, embodiments of the present application provide a key management method, a computer-readable storage medium, a computer program product, and an electronic device.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
The method embodiments provided in the embodiments of the present application may be performed in a mobile terminal, a computer terminal or similar computing device. Taking the mobile terminal as an example, fig. 1 is a block diagram of a hardware structure of the mobile terminal according to a key management method according to an embodiment of the present application. As shown in fig. 1, a mobile terminal may include one or more (only one is shown in fig. 1) processors 102 (the processor 102 may include, but is not limited to, a microprocessor MCU or a processing device such as a programmable logic device FPGA) and a memory 104 for storing data, wherein the mobile terminal may also include a transmission device 106 for communication functions and an input-output device 108. It will be appreciated by those skilled in the art that the structure shown in fig. 1 is merely illustrative and not limiting of the structure of the mobile terminal described above. For example, the mobile terminal may also include more or fewer components than shown in fig. 1, or have a different configuration than shown in fig. 1.
The memory 104 may be used to store computer programs, such as software programs and modules of application software, such as computer programs corresponding to the key management method in the embodiment of the present invention, and the processor 102 executes the computer programs stored in the memory 104 to perform various functional applications and data processing, that is, implement the method described above. Memory 104 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory remotely located relative to the processor 102, which may be connected to the mobile terminal via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof. The transmission device 106 is used to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the mobile terminal. In one example, the transmission device 106 includes a network adapter (Network Interface Controller, simply referred to as a NIC) that can connect to other network devices through a base station to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is configured to communicate with the internet wirelessly.
In the present embodiment, a key management method operating on a mobile terminal, a computer terminal, or a similar computing device is provided, it should be noted that the steps illustrated in the flowchart of the drawings may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowchart, in some cases the steps illustrated or described may be performed in an order different from that herein.
Fig. 2 is a flowchart of a key management method according to an embodiment of the present application. The number of keys is plural, the number of labels is plural, the keys are connected with the labels in a one-to-one correspondence, the cabinet body comprises a plurality of storage spaces, the storage spaces are used for inserting the keys with the labels in a one-to-one correspondence, as shown in fig. 2, the method comprises the following steps:
Step S201, when the key with the label exists in each bin, locking each bin;
Step S202, acquiring the record information corresponding to the tag in at least one bin, and transmitting all acquired record information to a display panel so that the display panel displays the received record information, wherein the record information is information representing the key connected with the tag;
Step S203, receiving target record information, and determining the label corresponding to the target record information as a target label, wherein the target record information is the record information determined in response to a first preset operation acted on the display panel;
Step S204, controlling the bin where the target tag is located to unlock.
Through the embodiment, the plurality of keys are provided, the plurality of labels are provided, the keys are connected with the labels in a one-to-one correspondence manner, the cabinet body comprises a plurality of bins, the bins are used for inserting the keys with the labels in a one-to-one correspondence manner, firstly, when the keys with the labels exist in the bins, each bin is locked, then, the recorded information corresponding to the labels in at least one bin is acquired, the acquired recorded information is transmitted to the display panel, so that the display panel displays the received recorded information, then, the target recorded information is received, the label corresponding to the target recorded information is determined to be the target label, and finally, the bin in which the target label is located is controlled to be unlocked, wherein the target recorded information is recorded information determined in response to a first preset operation acted on the display panel. Compared with the problem of poor standardization of a large number of key management in the prior art, the key is connected with the labels, when the keys with the labels exist in all bin positions, all bin positions are locked to limit the labels to move out of the bin positions, recorded information corresponding to the labels in at least one bin position is acquired, and the recorded information is transmitted to the display panel, so that a user can select the recorded information corresponding to the labels from the display panel, the bin positions where the labels corresponding to the recorded information are located can be controlled to be unlocked and opened, the keys can be conveniently stored and managed, the information of the keys can be recorded in time, and the keys can be conveniently checked when the keys are needed to be used, and can be more efficiently and scientifically managed.
Specifically, a key to be managed is connected to a label, the label is inserted into any bin of the cabinet body, the bin with the label is locked, at the moment, corresponding recorded information on the label can be acquired, recorded information is output to a display panel, the information (namely, recorded information) of the key connected with the label is displayed by the display panel, the bin is locked, so that the label is limited to be moved out of the bin, when the label in the bin is required to be taken out, the recorded information corresponding to the label is selected from the display panel, and unlocking and opening of the bin where the label corresponding to the recorded information is located can be controlled.
In particular, in embodiments of the present application, the key and tag are always connected together.
In an alternative scheme, acquiring the record information corresponding to the labels in at least one bin and transmitting all acquired record information to a display panel comprises acquiring identity information of a manager, wherein the manager is used for managing a plurality of keys, the identity information comprises at least one of face information, fingerprint information, voiceprint information, IC card information and ID card information, acquiring the record information of the labels connected with all the keys corresponding to the identity information, and transmitting all the record information of the labels corresponding to the identity information to the display panel. In this embodiment, by receiving the identity information (such as at least one of face information, fingerprint information, voiceprint information, IC card information, or ID card information) of the manager, it is ensured that only the authorized manager can access the key information, which increases the security of key management, and in addition, the record information of the tag to which the corresponding key is connected can be obtained according to the identity information of the manager, which means that the information displayed on the display panel is specific to the specific manager and not general information of all keys, thereby improving the relevance and practicality of the information, and by transmitting the record information of all the tags corresponding to the manager to the display panel, the manager can check the information of all the related keys at one time, instead of searching one by one, which can improve the efficiency of key management and reduce the time consumption of the manager in searching and confirming the key information.
Specifically, a user (i.e. manager) can put a plurality of keys into a plurality of bins for storage, and inputs one or more of face information, fingerprint information, voiceprint information, an IC card and an ID card of the user as manager information, when the cabinet body obtains one or more of the face information, the fingerprint information, the voiceprint information, the IC card and the ID card, the plurality of keys stored by the user are displayed, so that the user can conveniently select different keys for use, and the management and access efficiency of the plurality of keys is effectively improved.
According to some exemplary embodiments of the present application, controlling the bin unlocking where the target tag is located includes receiving return time information and return place information, wherein the return time information characterizes future return time of the target tag, the return place information characterizes future return place of the target tag, establishing constraint conditions of the target tag according to the return time information and the return place information, and controlling the bin unlocking where the target tag is located. In this embodiment, by setting the return time information and the return location information, only when these conditions are satisfied, the bin where the target tag is located is unlocked, so that an unauthorized person can be prevented from taking the key at an incorrect time or location, and the security management of the key is further improved.
Specifically, the return time information is information determined in response to a second predetermined operation acting on the display panel, and the return place information is information determined in response to a third predetermined operation acting on the display panel.
In other embodiments, after the bin where the target tag is located is controlled to be unlocked, the method further includes determining whether the target tag is out of the range of the constraint condition, and sending an alarm signal if the target tag is out of the range of the constraint condition. In the embodiment, whether the target label exceeds the range of the constraint condition is judged, and an alarm is sent out in time when the target label exceeds the range, so that the safety of key management is further enhanced.
Specifically, when a key with a part having strict management limit is taken out, the time (i.e. returning time information) required to be returned and the place limit (i.e. returning place information) required to be returned can be input into the display panel for input, at the moment, constraint limits (i.e. constraint conditions) are established for the key required to be borrowed, then the bin is controlled to be unlocked and opened, the key is taken out, when the key is not returned in the specified time or the specified place, at the moment, the range exceeding the constraint condition limits is judged, the display panel can be controlled to send an alarm signal, so that the key manager can conveniently learn, and the convenience of management is improved.
According to other exemplary embodiments of the present application, the plurality of cabinets may be provided, and determining whether the target tag is out of the range of the constraint condition includes uploading the constraint condition to a cloud server, and controlling the plurality of cabinets to obtain the constraint condition from the cloud server, respectively, determining whether the target tag is inserted into the bin of any one of the cabinets within the return time information and the return location information, and determining that the target tag is out of the range of the constraint condition if the target tag is not inserted into the bin of any one of the cabinets within the return time information or the return location information. In this embodiment, by uploading constraint conditions to the cloud server, the plurality of cabinets can obtain the latest constraint conditions from the same source, so that all cabinets can be ensured to follow the same management rule, the complexity of manual update and management is reduced, in addition, users can return to different cabinets according to use needs, and the convenience of use is improved.
Specifically, the cabinet body can be one or a plurality of cabinet bodies for networking management.
Specifically, when the cabinet body has a plurality of, when returning the key to the position in storehouse of arbitrary cabinet body in the restriction scope of returning time, returning place, can satisfy the scope of constraint condition, so can make things convenient for the user to return to in the cabinet body of difference according to the use needs, improve the convenience of use.
In still other alternatives of the present application, after controlling the bin in which the target tag is located to unlock, the method further includes determining that the bin in which the target tag is located is a target bin, determining whether the target tag is moved out of the target bin within a preset time period, and controlling the target bin to be locked again if the target tag is not moved out of the target bin within the preset time period. In this embodiment, by the automatic re-locking mechanism, it is ensured that the key is not exposed for a long time due to forgetting, thereby further reducing the security risk.
Specifically, when the bin is unlocked, if the label in the bin is not taken out in time, the risk that the label can be moved out at will exists, so that when the bin with the label is unlocked, whether the label is positioned in the bin in a preset time is judged, and when the label is not moved out of the bin, the bin is locked again. When the bin with the label is selected to be unlocked, if the label is not taken out within the preset time, the bin can be locked again, and the label is limited to be taken out, so that the situation that the bin is opened by false touch is prevented, and the use safety is improved.
In the actual application process, the person skilled in the art can set the preset time length according to the empirical value, and the preset time length can also be obtained through multiple experiments, and the application is not particularly limited.
In still other alternatives, the method further comprises controlling the display panel to display in a warehouse status if the label is located in the corresponding warehouse space, and controlling the display panel to display in a warehouse out status if the label is moved out of the corresponding warehouse space. In this embodiment, by displaying the in-store or out-of-store state of the tag on the display panel in real time, the manager can quickly understand the current position of each key, and such real-time monitoring is helpful to improve the efficiency and accuracy of key management.
Specifically, the reader/writer for reading information from the tag in the bin may scan the tag inserted in the bin only once, and in order to monitor whether the tag exists in the bin in real time, in this embodiment, the bin with the tag is kept to acquire the recorded information and marked as in the bin state on the display panel. The bin can continuously acquire recorded information of the labels loaded in the bin, and the labels in the bin are marked in a bin state on the display panel, so that whether the information of the labels loaded in the bin is convenient to directly observe. Further, controlling the display panel to display in a warehouse status includes controlling the display panel to display text and light. The state of whether the bin is loaded with the tag can be clearly recorded by the characters, and the state of whether the bin is loaded with the tag is correspondingly indicated by different lights, so that whether a plurality of bins are loaded with the tag can be conveniently and rapidly browsed.
Specifically, in order to facilitate the observation of the status of a plurality of bins on the display panel, in this embodiment, when the label is moved out of the bins, the label is controlled to be in the out-of-bin status on the display panel. When the recorded information corresponding to the label cannot be detected in the bin, the label in the bin is marked to be in a warehouse-out state on the display panel, so that whether the information of the label is loaded in the bin or not can be conveniently and directly observed. Further, controlling the display panel to display in a warehouse-out state includes controlling the display panel to display text and light. Similarly, the state of whether the bin is loaded with the label can be clearly recorded by the text, and whether the bin is loaded with the label is correspondingly indicated by different lights, so that whether a plurality of bins are loaded with the labels can be conveniently and rapidly browsed.
In other embodiments, the method further includes receiving improvement log information, which is information generated in response to a modification operation acting on the display panel, after transmitting all of the obtained log information to the display panel.
Specifically, the recorded information is displayed on the display panel, the user modifies the recorded information on the display panel, and the modified recorded information (i.e., the modified recorded information) is displayed. After the label is inserted into the bin, the record information corresponding to the label is displayed on the display panel, and at the moment, the record information can be recorded in advance, the record information can be modified to be matched with different keys correspondingly connected, and the modified record information is displayed, so that the use is more flexible and convenient.
In order to enable those skilled in the art to more clearly understand the technical solution of the present application, the implementation process of the key management method of the present application will be described in detail below with reference to specific embodiments.
The embodiment relates to a specific key management method, including a plurality of keys and a plurality of labels, wherein the keys are connected with the labels in a one-to-one correspondence manner, the cabinet body includes a plurality of bins, and the bins are used for inserting the keys with the labels in a one-to-one correspondence manner, and the method includes the following steps:
Step S1, under the condition that a key with a label exists in each bin, locking each bin;
S2, acquiring recording information corresponding to at least one bin inner label, and transmitting all acquired recording information to a display panel so that the display panel displays the received recording information, wherein the recording information is information representing a key connected with the label;
Step S3, receiving target record information, and determining a label corresponding to the target record information as a target label, wherein the target record information is the record information determined in response to a first preset operation acted on the display panel;
S4, controlling bin unlocking where the target tag is located;
And S5, determining the bin position where the target label is positioned as a target bin position, judging whether the target label is moved out of the target bin position within a preset time period, and controlling the target bin position to be locked again under the condition that the target label is not moved out of the target bin position within the preset time period.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
Specifically, the embodiment of the application relates to the acquisition, storage, use, processing and the like of data, which all meet the relevant regulations of national laws and regulations.
In the embodiments of the present application, when related processing is performed according to user information, user behavior data, user history data, user location information, and other data related to user identity or characteristics, permission or consent of the user is obtained first, and the collection, use, processing, and the like of the data comply with related laws and regulations and standards of related countries and regions. In addition, when the embodiment of the application needs to acquire the sensitive personal information of the user, the independent permission or independent consent of the user is acquired through popup or jump to a confirmation page and the like, and after the independent permission or independent consent of the user is definitely acquired, the necessary relevant data of the user for enabling the embodiment of the application to normally operate is acquired.
The embodiment of the invention provides a computer readable storage medium, which comprises a stored program, wherein the device where the computer readable storage medium is located is controlled to execute the key management method when the program runs.
Specifically, the key management method includes:
Step S201, when the key with the label exists in each bin, locking each bin;
Step S202, acquiring the record information corresponding to the tag in at least one bin, and transmitting all acquired record information to a display panel so that the display panel displays the received record information, wherein the record information is information representing the key connected with the tag;
Step S203, receiving target record information, and determining the label corresponding to the target record information as a target label, wherein the target record information is the record information determined in response to a first preset operation acted on the display panel;
Step S204, controlling the bin where the target tag is located to unlock.
Optionally, acquiring record information corresponding to the labels in at least one bin, and transmitting all acquired record information to a display panel, wherein the record information comprises acquiring identity information of a manager, the manager is used for managing a plurality of keys, the identity information comprises at least one of face information, fingerprint information, voiceprint information, IC card information and ID card information, acquiring record information of the labels connected with all the keys corresponding to the identity information, and transmitting the record information of all the labels corresponding to the identity information to the display panel.
Optionally, controlling the bin where the target tag is located to unlock includes receiving return time information and return place information, wherein the return time information represents a future return time of the target tag, the return place information represents a future return place of the target tag, establishing constraint conditions of the target tag according to the return time information and the return place information, and controlling the bin where the target tag is located to unlock.
Optionally, after the bin where the target tag is located is controlled to be unlocked, the method further comprises the steps of judging whether the target tag is out of the range of the constraint condition or not, and sending an alarm signal when the target tag is out of the range of the constraint condition.
Optionally, the plurality of the cabinets are used for judging whether the target label exceeds the range of the constraint condition or not, the method comprises the steps of uploading the constraint condition to a cloud server, controlling the plurality of the cabinets to acquire the constraint condition from the cloud server, judging whether the target label is inserted into the bin of any one of the cabinets in the returning time information and the returning place information, and determining that the target label exceeds the range of the constraint condition when the target label is not inserted into the bin of any one of the cabinets in the returning time information or the returning place information.
Optionally, after the bin where the target tag is located is controlled to be unlocked, the method further includes determining the bin where the target tag is located as a target bin, judging whether the target tag is moved out of the target bin within a preset time period, and controlling the target bin to be locked again when the target tag is not moved out of the target bin within the preset time period.
Optionally, the method further comprises controlling the display panel to display in a warehouse status when the label is located in the corresponding warehouse space, and controlling the display panel to display in a warehouse out status when the label is moved out of the corresponding warehouse space.
The application also provides a computer program product comprising computer instructions which, when executed by a processor, at least realize the following method steps of step S201, locking each bin when the key with the tag exists in each bin, step S202, acquiring record information corresponding to the tag in at least one bin, and transmitting all acquired record information to a display panel so that the display panel displays the received record information, wherein the record information is information representing the key connected with the tag, step S203, receiving target record information, determining the tag corresponding to the target record information as a target tag, determining the target record information as the record information determined in response to a first preset operation acted on the display panel, and step S204, controlling the bin where the target tag is located to be unlocked.
Optionally, acquiring record information corresponding to the labels in at least one bin, and transmitting all acquired record information to a display panel, wherein the record information comprises acquiring identity information of a manager, the manager is used for managing a plurality of keys, the identity information comprises at least one of face information, fingerprint information, voiceprint information, IC card information and ID card information, acquiring record information of the labels connected with all the keys corresponding to the identity information, and transmitting the record information of all the labels corresponding to the identity information to the display panel.
Optionally, controlling the bin where the target tag is located to unlock includes receiving return time information and return place information, wherein the return time information represents a future return time of the target tag, the return place information represents a future return place of the target tag, establishing constraint conditions of the target tag according to the return time information and the return place information, and controlling the bin where the target tag is located to unlock.
Optionally, after the bin where the target tag is located is controlled to be unlocked, the method further comprises the steps of judging whether the target tag is out of the range of the constraint condition or not, and sending an alarm signal when the target tag is out of the range of the constraint condition.
Optionally, the plurality of the cabinets are used for judging whether the target label exceeds the range of the constraint condition or not, the method comprises the steps of uploading the constraint condition to a cloud server, controlling the plurality of the cabinets to acquire the constraint condition from the cloud server, judging whether the target label is inserted into the bin of any one of the cabinets in the returning time information and the returning place information, and determining that the target label exceeds the range of the constraint condition when the target label is not inserted into the bin of any one of the cabinets in the returning time information or the returning place information.
Optionally, after the bin where the target tag is located is controlled to be unlocked, the method further includes determining the bin where the target tag is located as a target bin, judging whether the target tag is moved out of the target bin within a preset time period, and controlling the target bin to be locked again when the target tag is not moved out of the target bin within the preset time period.
Optionally, the method further comprises controlling the display panel to display in a warehouse status when the label is located in the corresponding warehouse space, and controlling the display panel to display in a warehouse out status when the label is moved out of the corresponding warehouse space.
The embodiment of the application also provides electronic equipment, which comprises one or more processors, a memory and one or more programs, wherein the one or more programs are stored in the memory and are configured to be executed by the one or more processors, and the one or more programs comprise a key management method for executing any one of the above.
The embodiment of the application also provides a key management system which comprises a plurality of keys, a plurality of labels, a cabinet body, a display panel and a processor, wherein the keys are connected with the labels in a one-to-one correspondence manner, the cabinet body comprises a plurality of storage spaces, the storage spaces are used for inserting the keys with the labels in a one-to-one correspondence manner, and the processor is used for executing any one of the key management methods.
The embodiment of the application also provides a key management cabinet which comprises a memory, a processor and a program stored on the memory and capable of running on the processor, wherein the program is executed by the processor to realize any one of the key management methods.
It will be appreciated by those skilled in the art that the modules or steps of the invention described above may be implemented in a general purpose computing device, they may be concentrated on a single computing device, or distributed across a network of computing devices, they may be implemented in program code executable by computing devices, so that they may be stored in a storage device for execution by computing devices, and in some cases, the steps shown or described may be performed in a different order than that shown or described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple modules or steps of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, etc., such as Read Only Memory (ROM) or flash RAM. Memory is an example of a computer-readable medium.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
From the above description, it can be seen that the above embodiments of the present application achieve the following technical effects:
In the key management method, a plurality of keys are provided, the plurality of keys are connected with the labels in a one-to-one correspondence manner, the cabinet body comprises a plurality of bins, the bins are used for inserting the keys with the labels in a one-to-one correspondence manner, firstly, when the keys with the labels exist in the bins, each bin is locked, then, the recorded information corresponding to the labels in at least one bin is acquired, the acquired recorded information is transmitted to a display panel, the display panel displays the received recorded information, then, the target recorded information is received, the label corresponding to the target recorded information is determined to be the target label, and finally, the bin where the target label is located is controlled to be unlocked, wherein the target recorded information is recorded information determined in response to a first preset operation acted on the display panel. Compared with the problem of poor standardization of a large number of key management in the prior art, the key is connected with the labels, when the keys with the labels exist in all bin positions, all bin positions are locked to limit the labels to move out of the bin positions, recorded information corresponding to the labels in at least one bin position is acquired, and the recorded information is transmitted to the display panel, so that a user can select the recorded information corresponding to the labels from the display panel, the bin positions where the labels corresponding to the recorded information are located can be controlled to be unlocked and opened, the keys can be conveniently stored and managed, the information of the keys can be recorded in time, and the keys can be conveniently checked when the keys are needed to be used, and can be more efficiently and scientifically managed.
The above description is only of the preferred embodiments of the present application and is not intended to limit the present application, but various modifications and variations can be made to the present application by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (10)

1.一种钥匙管理方法,其特征在于,钥匙有多个,标签有多个,所述钥匙与所述标签一一对应地连接,柜体包括多个仓位,所述仓位用于一一对应地插入带有所述标签的所述钥匙,所述方法包括:1. A key management method, characterized in that there are multiple keys and multiple tags, the keys are connected to the tags in a one-to-one correspondence, the cabinet includes multiple bins, the bins are used to insert the keys with the tags in a one-to-one correspondence, and the method includes: 在各所述仓位内存在带有所述标签的所述钥匙的情况下,将各所述仓位上锁;When the key with the tag is present in each of the storage locations, locking each of the storage locations; 获取至少一个所述仓位内所述标签对应的记载信息,并将获取到的所有的所述记载信息传输至显示面板上,以使得所述显示面板显示接收到的所述记载信息,其中,所述记载信息为表征与所述标签所连接的所述钥匙的信息;Acquire the record information corresponding to the tag in at least one of the bins, and transmit all the acquired record information to a display panel so that the display panel displays the received record information, wherein the record information is information representing the key connected to the tag; 接收目标记载信息,并确定所述目标记载信息对应的所述标签为目标标签,所述目标记载信息为响应于作用在所述显示面板上的第一预定操作确定的所述记载信息;receiving target record information, and determining that the tag corresponding to the target record information is a target tag, wherein the target record information is the record information determined in response to a first predetermined operation acting on the display panel; 控制所述目标标签所在的所述仓位解锁。Control the bin where the target tag is located to unlock. 2.根据权利要求1所述的钥匙管理方法,其特征在于,获取至少一个所述仓位内所述标签对应的记载信息,并将获取到的所有的所述记载信息传输至显示面板上,包括:2. The key management method according to claim 1, characterized in that obtaining the record information corresponding to the tag in at least one of the bins and transmitting all the obtained record information to the display panel comprises: 获取管理者的身份信息,所述管理者用于管理多个所述钥匙,所述身份信息包括人脸信息、指纹信息、声纹信息、IC卡信息以及ID卡信息中至少之一;Acquire identity information of a manager, the manager is used to manage the plurality of keys, the identity information comprising at least one of face information, fingerprint information, voiceprint information, IC card information and ID card information; 获取所述身份信息对应的所有的所述钥匙所连接的所述标签的所述记载信息;Acquire the record information of the tags connected to all the keys corresponding to the identity information; 将所述身份信息对应的所有的所述标签的所述记载信息传输至所述显示面板上。The recorded information of all the tags corresponding to the identity information is transmitted to the display panel. 3.根据权利要求1所述的钥匙管理方法,其特征在于,控制所述目标标签所在的所述仓位解锁,包括:3. The key management method according to claim 1, characterized in that controlling the unlocking of the bin where the target tag is located comprises: 接收归还时间信息和归还地点信息,其中,所述归还时间信息表征所述目标标签未来的归还时间,所述归还地点信息表征所述目标标签未来的归还地点;Receiving return time information and return location information, wherein the return time information represents the future return time of the target tag, and the return location information represents the future return location of the target tag; 根据所述归还时间信息和所述归还地点信息,建立所述目标标签的约束条件;Establishing constraint conditions of the target tag according to the return time information and the return location information; 控制所述目标标签所在的所述仓位解锁。Control the bin where the target tag is located to unlock. 4.根据权利要求3所述的钥匙管理方法,其特征在于,在控制所述目标标签所在的所述仓位解锁之后,所述方法还包括:4. The key management method according to claim 3, characterized in that after controlling the unlocking of the bin where the target tag is located, the method further comprises: 判断所述目标标签是否超出所述约束条件的范围;Determining whether the target tag exceeds the range of the constraint condition; 在所述目标标签超出所述约束条件的范围的情况下,发出报警信号。When the target tag exceeds the range of the constraint condition, an alarm signal is issued. 5.根据权利要求4所述的钥匙管理方法,其特征在于,所述柜体有多个,判断所述目标标签是否超出所述约束条件的范围,包括:5. The key management method according to claim 4, characterized in that there are multiple cabinets, and judging whether the target tag exceeds the range of the constraint condition comprises: 将所述约束条件上传至云服务器,并控制多个所述柜体分别从所述云服务器获取所述约束条件;Uploading the constraint conditions to a cloud server, and controlling the plurality of cabinets to obtain the constraint conditions from the cloud server respectively; 判断所述目标标签是否在所述归还时间信息和所述归还地点信息内插入至任一个所述柜体的所述仓位内;Determine whether the target tag is inserted into the bin of any of the cabinets within the return time information and the return location information; 在所述目标标签未在所述归还时间信息或者所述归还地点信息内插入至任一个所述柜体的所述仓位内的情况下,确定所述目标标签超出所述约束条件的范围。When the target tag is not inserted into the bin of any one of the cabinets in the return time information or the return location information, it is determined that the target tag exceeds the range of the constraint condition. 6.根据权利要求1所述的钥匙管理方法,其特征在于,在控制所述目标标签所在的所述仓位解锁之后,所述方法还包括:6. The key management method according to claim 1, characterized in that after controlling the storage location where the target tag is located to be unlocked, the method further comprises: 确定所述目标标签所在的所述仓位为目标仓位;Determine the bin where the target tag is located as the target bin; 判断所述目标标签在预设时长内是否被移出所述目标仓位;Determine whether the target tag is moved out of the target location within a preset time period; 在所述目标标签在所述预设时长内未被移出所述目标仓位的情况下,控制所述目标仓位重新上锁。When the target tag is not moved out of the target location within the preset time period, the target location is controlled to be locked again. 7.根据权利要求1所述的钥匙管理方法,其特征在于,所述方法还包括:7. The key management method according to claim 1, characterized in that the method further comprises: 在所述标签位于对应的所述仓位内的情况下,控制所述显示面板上显示为在库状态;When the tag is located in the corresponding bin, controlling the display panel to display an in-stock status; 在所述标签被移出对应的所述仓位的情况下,控制所述显示面板上显示为出库状态。When the label is moved out of the corresponding storage location, the display panel is controlled to display the out-of-warehouse status. 8.一种计算机可读存储介质,其特征在于,所述计算机可读存储介质包括存储的程序,其中,在所述程序运行时控制所述计算机可读存储介质所在设备执行权利要求1至7中任意一项所述的钥匙管理方法。8. A computer-readable storage medium, characterized in that the computer-readable storage medium includes a stored program, wherein when the program is executed, the device where the computer-readable storage medium is located is controlled to execute the key management method according to any one of claims 1 to 7. 9.一种计算机程序产品,包括计算机指令,其特征在于,所述计算机指令被处理器执行时实现权利要求1至7中任意一项所述的钥匙管理方法。9. A computer program product, comprising computer instructions, characterized in that when the computer instructions are executed by a processor, the key management method according to any one of claims 1 to 7 is implemented. 10.一种电子设备,其特征在于,包括:一个或多个处理器,存储器,以及一个或多个程序,其中,所述一个或多个程序被存储在所述存储器中,并且被配置为由所述一个或多个处理器执行,所述一个或多个程序包括用于执行权利要求1至7中任意一项所述的钥匙管理方法。10. An electronic device, characterized in that it comprises: one or more processors, a memory, and one or more programs, wherein the one or more programs are stored in the memory and are configured to be executed by the one or more processors, and the one or more programs include a key management method for executing any one of claims 1 to 7.
CN202411470903.6A 2024-10-21 2024-10-21 Key management method, computer program product and electronic device Pending CN119360478A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411470903.6A CN119360478A (en) 2024-10-21 2024-10-21 Key management method, computer program product and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411470903.6A CN119360478A (en) 2024-10-21 2024-10-21 Key management method, computer program product and electronic device

Publications (1)

Publication Number Publication Date
CN119360478A true CN119360478A (en) 2025-01-24

Family

ID=94316586

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411470903.6A Pending CN119360478A (en) 2024-10-21 2024-10-21 Key management method, computer program product and electronic device

Country Status (1)

Country Link
CN (1) CN119360478A (en)

Similar Documents

Publication Publication Date Title
US9824327B2 (en) Systems and methods for capturing and managing information pertaining to asset spares inventories
GB2528818A (en) Item locker arrangement
Renold et al. An internet based RFID library management system
EP3120281B1 (en) Dynamic identity checking
CN110677174A (en) Shelf checking method based on wireless radio frequency identification and related device
US20180177319A1 (en) System and method for secure lock box with near proximity awareness
US10949802B2 (en) Storage cabinet
US10474938B2 (en) Inventory management system
US10358289B2 (en) Storage cabinet
US11475399B2 (en) Storage cabinet
US20190325178A1 (en) Monitoring apparatus and method for casino chip management
CN106484853A (en) document analysis method and device
CN1804853B (en) Be convenient to utilize system and the implementation method of RFID process
EP2881896B1 (en) Near field communication tag based data transfer
CN109408720A (en) Information recommendation method, system and medium based on electronics lock screen
CN119360478A (en) Key management method, computer program product and electronic device
US20180278472A1 (en) System and method for performing mass renaming of list of items at run-time with variable differentiation factor
CN104346165A (en) Information processing apparatus, information processing method, program, storage medium, and information processing system
KR101378781B1 (en) Method for providing check service by using mobile device and computer readable recording medium applying the same
US6315198B1 (en) Key cabinet for equipping an access control system and access control method and system using this key cabinet
KR20200088003A (en) Inventory control system based on nfc and mobile app and its method
CN109272070A (en) Article access monitoring and managing method, system and computer equipment based on RFID
EP2680496B1 (en) Method, system and controller for accessing intellectual space, and intellectual space interface server
US20220083958A1 (en) Kiosk device having storage bins
JP2010117857A (en) Document management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination