Detailed Description
It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other. The application will be described in detail below with reference to the drawings in connection with embodiments.
In order that those skilled in the art will better understand the present application, a technical solution in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate in order to describe the embodiments of the application herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
As described in the background art, the prior art has poor standardization for a large number of key management, and in order to solve the above problems, embodiments of the present application provide a key management method, a computer-readable storage medium, a computer program product, and an electronic device.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
The method embodiments provided in the embodiments of the present application may be performed in a mobile terminal, a computer terminal or similar computing device. Taking the mobile terminal as an example, fig. 1 is a block diagram of a hardware structure of the mobile terminal according to a key management method according to an embodiment of the present application. As shown in fig. 1, a mobile terminal may include one or more (only one is shown in fig. 1) processors 102 (the processor 102 may include, but is not limited to, a microprocessor MCU or a processing device such as a programmable logic device FPGA) and a memory 104 for storing data, wherein the mobile terminal may also include a transmission device 106 for communication functions and an input-output device 108. It will be appreciated by those skilled in the art that the structure shown in fig. 1 is merely illustrative and not limiting of the structure of the mobile terminal described above. For example, the mobile terminal may also include more or fewer components than shown in fig. 1, or have a different configuration than shown in fig. 1.
The memory 104 may be used to store computer programs, such as software programs and modules of application software, such as computer programs corresponding to the key management method in the embodiment of the present invention, and the processor 102 executes the computer programs stored in the memory 104 to perform various functional applications and data processing, that is, implement the method described above. Memory 104 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory remotely located relative to the processor 102, which may be connected to the mobile terminal via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof. The transmission device 106 is used to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the mobile terminal. In one example, the transmission device 106 includes a network adapter (Network Interface Controller, simply referred to as a NIC) that can connect to other network devices through a base station to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is configured to communicate with the internet wirelessly.
In the present embodiment, a key management method operating on a mobile terminal, a computer terminal, or a similar computing device is provided, it should be noted that the steps illustrated in the flowchart of the drawings may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowchart, in some cases the steps illustrated or described may be performed in an order different from that herein.
Fig. 2 is a flowchart of a key management method according to an embodiment of the present application. The number of keys is plural, the number of labels is plural, the keys are connected with the labels in a one-to-one correspondence, the cabinet body comprises a plurality of storage spaces, the storage spaces are used for inserting the keys with the labels in a one-to-one correspondence, as shown in fig. 2, the method comprises the following steps:
Step S201, when the key with the label exists in each bin, locking each bin;
Step S202, acquiring the record information corresponding to the tag in at least one bin, and transmitting all acquired record information to a display panel so that the display panel displays the received record information, wherein the record information is information representing the key connected with the tag;
Step S203, receiving target record information, and determining the label corresponding to the target record information as a target label, wherein the target record information is the record information determined in response to a first preset operation acted on the display panel;
Step S204, controlling the bin where the target tag is located to unlock.
Through the embodiment, the plurality of keys are provided, the plurality of labels are provided, the keys are connected with the labels in a one-to-one correspondence manner, the cabinet body comprises a plurality of bins, the bins are used for inserting the keys with the labels in a one-to-one correspondence manner, firstly, when the keys with the labels exist in the bins, each bin is locked, then, the recorded information corresponding to the labels in at least one bin is acquired, the acquired recorded information is transmitted to the display panel, so that the display panel displays the received recorded information, then, the target recorded information is received, the label corresponding to the target recorded information is determined to be the target label, and finally, the bin in which the target label is located is controlled to be unlocked, wherein the target recorded information is recorded information determined in response to a first preset operation acted on the display panel. Compared with the problem of poor standardization of a large number of key management in the prior art, the key is connected with the labels, when the keys with the labels exist in all bin positions, all bin positions are locked to limit the labels to move out of the bin positions, recorded information corresponding to the labels in at least one bin position is acquired, and the recorded information is transmitted to the display panel, so that a user can select the recorded information corresponding to the labels from the display panel, the bin positions where the labels corresponding to the recorded information are located can be controlled to be unlocked and opened, the keys can be conveniently stored and managed, the information of the keys can be recorded in time, and the keys can be conveniently checked when the keys are needed to be used, and can be more efficiently and scientifically managed.
Specifically, a key to be managed is connected to a label, the label is inserted into any bin of the cabinet body, the bin with the label is locked, at the moment, corresponding recorded information on the label can be acquired, recorded information is output to a display panel, the information (namely, recorded information) of the key connected with the label is displayed by the display panel, the bin is locked, so that the label is limited to be moved out of the bin, when the label in the bin is required to be taken out, the recorded information corresponding to the label is selected from the display panel, and unlocking and opening of the bin where the label corresponding to the recorded information is located can be controlled.
In particular, in embodiments of the present application, the key and tag are always connected together.
In an alternative scheme, acquiring the record information corresponding to the labels in at least one bin and transmitting all acquired record information to a display panel comprises acquiring identity information of a manager, wherein the manager is used for managing a plurality of keys, the identity information comprises at least one of face information, fingerprint information, voiceprint information, IC card information and ID card information, acquiring the record information of the labels connected with all the keys corresponding to the identity information, and transmitting all the record information of the labels corresponding to the identity information to the display panel. In this embodiment, by receiving the identity information (such as at least one of face information, fingerprint information, voiceprint information, IC card information, or ID card information) of the manager, it is ensured that only the authorized manager can access the key information, which increases the security of key management, and in addition, the record information of the tag to which the corresponding key is connected can be obtained according to the identity information of the manager, which means that the information displayed on the display panel is specific to the specific manager and not general information of all keys, thereby improving the relevance and practicality of the information, and by transmitting the record information of all the tags corresponding to the manager to the display panel, the manager can check the information of all the related keys at one time, instead of searching one by one, which can improve the efficiency of key management and reduce the time consumption of the manager in searching and confirming the key information.
Specifically, a user (i.e. manager) can put a plurality of keys into a plurality of bins for storage, and inputs one or more of face information, fingerprint information, voiceprint information, an IC card and an ID card of the user as manager information, when the cabinet body obtains one or more of the face information, the fingerprint information, the voiceprint information, the IC card and the ID card, the plurality of keys stored by the user are displayed, so that the user can conveniently select different keys for use, and the management and access efficiency of the plurality of keys is effectively improved.
According to some exemplary embodiments of the present application, controlling the bin unlocking where the target tag is located includes receiving return time information and return place information, wherein the return time information characterizes future return time of the target tag, the return place information characterizes future return place of the target tag, establishing constraint conditions of the target tag according to the return time information and the return place information, and controlling the bin unlocking where the target tag is located. In this embodiment, by setting the return time information and the return location information, only when these conditions are satisfied, the bin where the target tag is located is unlocked, so that an unauthorized person can be prevented from taking the key at an incorrect time or location, and the security management of the key is further improved.
Specifically, the return time information is information determined in response to a second predetermined operation acting on the display panel, and the return place information is information determined in response to a third predetermined operation acting on the display panel.
In other embodiments, after the bin where the target tag is located is controlled to be unlocked, the method further includes determining whether the target tag is out of the range of the constraint condition, and sending an alarm signal if the target tag is out of the range of the constraint condition. In the embodiment, whether the target label exceeds the range of the constraint condition is judged, and an alarm is sent out in time when the target label exceeds the range, so that the safety of key management is further enhanced.
Specifically, when a key with a part having strict management limit is taken out, the time (i.e. returning time information) required to be returned and the place limit (i.e. returning place information) required to be returned can be input into the display panel for input, at the moment, constraint limits (i.e. constraint conditions) are established for the key required to be borrowed, then the bin is controlled to be unlocked and opened, the key is taken out, when the key is not returned in the specified time or the specified place, at the moment, the range exceeding the constraint condition limits is judged, the display panel can be controlled to send an alarm signal, so that the key manager can conveniently learn, and the convenience of management is improved.
According to other exemplary embodiments of the present application, the plurality of cabinets may be provided, and determining whether the target tag is out of the range of the constraint condition includes uploading the constraint condition to a cloud server, and controlling the plurality of cabinets to obtain the constraint condition from the cloud server, respectively, determining whether the target tag is inserted into the bin of any one of the cabinets within the return time information and the return location information, and determining that the target tag is out of the range of the constraint condition if the target tag is not inserted into the bin of any one of the cabinets within the return time information or the return location information. In this embodiment, by uploading constraint conditions to the cloud server, the plurality of cabinets can obtain the latest constraint conditions from the same source, so that all cabinets can be ensured to follow the same management rule, the complexity of manual update and management is reduced, in addition, users can return to different cabinets according to use needs, and the convenience of use is improved.
Specifically, the cabinet body can be one or a plurality of cabinet bodies for networking management.
Specifically, when the cabinet body has a plurality of, when returning the key to the position in storehouse of arbitrary cabinet body in the restriction scope of returning time, returning place, can satisfy the scope of constraint condition, so can make things convenient for the user to return to in the cabinet body of difference according to the use needs, improve the convenience of use.
In still other alternatives of the present application, after controlling the bin in which the target tag is located to unlock, the method further includes determining that the bin in which the target tag is located is a target bin, determining whether the target tag is moved out of the target bin within a preset time period, and controlling the target bin to be locked again if the target tag is not moved out of the target bin within the preset time period. In this embodiment, by the automatic re-locking mechanism, it is ensured that the key is not exposed for a long time due to forgetting, thereby further reducing the security risk.
Specifically, when the bin is unlocked, if the label in the bin is not taken out in time, the risk that the label can be moved out at will exists, so that when the bin with the label is unlocked, whether the label is positioned in the bin in a preset time is judged, and when the label is not moved out of the bin, the bin is locked again. When the bin with the label is selected to be unlocked, if the label is not taken out within the preset time, the bin can be locked again, and the label is limited to be taken out, so that the situation that the bin is opened by false touch is prevented, and the use safety is improved.
In the actual application process, the person skilled in the art can set the preset time length according to the empirical value, and the preset time length can also be obtained through multiple experiments, and the application is not particularly limited.
In still other alternatives, the method further comprises controlling the display panel to display in a warehouse status if the label is located in the corresponding warehouse space, and controlling the display panel to display in a warehouse out status if the label is moved out of the corresponding warehouse space. In this embodiment, by displaying the in-store or out-of-store state of the tag on the display panel in real time, the manager can quickly understand the current position of each key, and such real-time monitoring is helpful to improve the efficiency and accuracy of key management.
Specifically, the reader/writer for reading information from the tag in the bin may scan the tag inserted in the bin only once, and in order to monitor whether the tag exists in the bin in real time, in this embodiment, the bin with the tag is kept to acquire the recorded information and marked as in the bin state on the display panel. The bin can continuously acquire recorded information of the labels loaded in the bin, and the labels in the bin are marked in a bin state on the display panel, so that whether the information of the labels loaded in the bin is convenient to directly observe. Further, controlling the display panel to display in a warehouse status includes controlling the display panel to display text and light. The state of whether the bin is loaded with the tag can be clearly recorded by the characters, and the state of whether the bin is loaded with the tag is correspondingly indicated by different lights, so that whether a plurality of bins are loaded with the tag can be conveniently and rapidly browsed.
Specifically, in order to facilitate the observation of the status of a plurality of bins on the display panel, in this embodiment, when the label is moved out of the bins, the label is controlled to be in the out-of-bin status on the display panel. When the recorded information corresponding to the label cannot be detected in the bin, the label in the bin is marked to be in a warehouse-out state on the display panel, so that whether the information of the label is loaded in the bin or not can be conveniently and directly observed. Further, controlling the display panel to display in a warehouse-out state includes controlling the display panel to display text and light. Similarly, the state of whether the bin is loaded with the label can be clearly recorded by the text, and whether the bin is loaded with the label is correspondingly indicated by different lights, so that whether a plurality of bins are loaded with the labels can be conveniently and rapidly browsed.
In other embodiments, the method further includes receiving improvement log information, which is information generated in response to a modification operation acting on the display panel, after transmitting all of the obtained log information to the display panel.
Specifically, the recorded information is displayed on the display panel, the user modifies the recorded information on the display panel, and the modified recorded information (i.e., the modified recorded information) is displayed. After the label is inserted into the bin, the record information corresponding to the label is displayed on the display panel, and at the moment, the record information can be recorded in advance, the record information can be modified to be matched with different keys correspondingly connected, and the modified record information is displayed, so that the use is more flexible and convenient.
In order to enable those skilled in the art to more clearly understand the technical solution of the present application, the implementation process of the key management method of the present application will be described in detail below with reference to specific embodiments.
The embodiment relates to a specific key management method, including a plurality of keys and a plurality of labels, wherein the keys are connected with the labels in a one-to-one correspondence manner, the cabinet body includes a plurality of bins, and the bins are used for inserting the keys with the labels in a one-to-one correspondence manner, and the method includes the following steps:
Step S1, under the condition that a key with a label exists in each bin, locking each bin;
S2, acquiring recording information corresponding to at least one bin inner label, and transmitting all acquired recording information to a display panel so that the display panel displays the received recording information, wherein the recording information is information representing a key connected with the label;
Step S3, receiving target record information, and determining a label corresponding to the target record information as a target label, wherein the target record information is the record information determined in response to a first preset operation acted on the display panel;
S4, controlling bin unlocking where the target tag is located;
And S5, determining the bin position where the target label is positioned as a target bin position, judging whether the target label is moved out of the target bin position within a preset time period, and controlling the target bin position to be locked again under the condition that the target label is not moved out of the target bin position within the preset time period.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
Specifically, the embodiment of the application relates to the acquisition, storage, use, processing and the like of data, which all meet the relevant regulations of national laws and regulations.
In the embodiments of the present application, when related processing is performed according to user information, user behavior data, user history data, user location information, and other data related to user identity or characteristics, permission or consent of the user is obtained first, and the collection, use, processing, and the like of the data comply with related laws and regulations and standards of related countries and regions. In addition, when the embodiment of the application needs to acquire the sensitive personal information of the user, the independent permission or independent consent of the user is acquired through popup or jump to a confirmation page and the like, and after the independent permission or independent consent of the user is definitely acquired, the necessary relevant data of the user for enabling the embodiment of the application to normally operate is acquired.
The embodiment of the invention provides a computer readable storage medium, which comprises a stored program, wherein the device where the computer readable storage medium is located is controlled to execute the key management method when the program runs.
Specifically, the key management method includes:
Step S201, when the key with the label exists in each bin, locking each bin;
Step S202, acquiring the record information corresponding to the tag in at least one bin, and transmitting all acquired record information to a display panel so that the display panel displays the received record information, wherein the record information is information representing the key connected with the tag;
Step S203, receiving target record information, and determining the label corresponding to the target record information as a target label, wherein the target record information is the record information determined in response to a first preset operation acted on the display panel;
Step S204, controlling the bin where the target tag is located to unlock.
Optionally, acquiring record information corresponding to the labels in at least one bin, and transmitting all acquired record information to a display panel, wherein the record information comprises acquiring identity information of a manager, the manager is used for managing a plurality of keys, the identity information comprises at least one of face information, fingerprint information, voiceprint information, IC card information and ID card information, acquiring record information of the labels connected with all the keys corresponding to the identity information, and transmitting the record information of all the labels corresponding to the identity information to the display panel.
Optionally, controlling the bin where the target tag is located to unlock includes receiving return time information and return place information, wherein the return time information represents a future return time of the target tag, the return place information represents a future return place of the target tag, establishing constraint conditions of the target tag according to the return time information and the return place information, and controlling the bin where the target tag is located to unlock.
Optionally, after the bin where the target tag is located is controlled to be unlocked, the method further comprises the steps of judging whether the target tag is out of the range of the constraint condition or not, and sending an alarm signal when the target tag is out of the range of the constraint condition.
Optionally, the plurality of the cabinets are used for judging whether the target label exceeds the range of the constraint condition or not, the method comprises the steps of uploading the constraint condition to a cloud server, controlling the plurality of the cabinets to acquire the constraint condition from the cloud server, judging whether the target label is inserted into the bin of any one of the cabinets in the returning time information and the returning place information, and determining that the target label exceeds the range of the constraint condition when the target label is not inserted into the bin of any one of the cabinets in the returning time information or the returning place information.
Optionally, after the bin where the target tag is located is controlled to be unlocked, the method further includes determining the bin where the target tag is located as a target bin, judging whether the target tag is moved out of the target bin within a preset time period, and controlling the target bin to be locked again when the target tag is not moved out of the target bin within the preset time period.
Optionally, the method further comprises controlling the display panel to display in a warehouse status when the label is located in the corresponding warehouse space, and controlling the display panel to display in a warehouse out status when the label is moved out of the corresponding warehouse space.
The application also provides a computer program product comprising computer instructions which, when executed by a processor, at least realize the following method steps of step S201, locking each bin when the key with the tag exists in each bin, step S202, acquiring record information corresponding to the tag in at least one bin, and transmitting all acquired record information to a display panel so that the display panel displays the received record information, wherein the record information is information representing the key connected with the tag, step S203, receiving target record information, determining the tag corresponding to the target record information as a target tag, determining the target record information as the record information determined in response to a first preset operation acted on the display panel, and step S204, controlling the bin where the target tag is located to be unlocked.
Optionally, acquiring record information corresponding to the labels in at least one bin, and transmitting all acquired record information to a display panel, wherein the record information comprises acquiring identity information of a manager, the manager is used for managing a plurality of keys, the identity information comprises at least one of face information, fingerprint information, voiceprint information, IC card information and ID card information, acquiring record information of the labels connected with all the keys corresponding to the identity information, and transmitting the record information of all the labels corresponding to the identity information to the display panel.
Optionally, controlling the bin where the target tag is located to unlock includes receiving return time information and return place information, wherein the return time information represents a future return time of the target tag, the return place information represents a future return place of the target tag, establishing constraint conditions of the target tag according to the return time information and the return place information, and controlling the bin where the target tag is located to unlock.
Optionally, after the bin where the target tag is located is controlled to be unlocked, the method further comprises the steps of judging whether the target tag is out of the range of the constraint condition or not, and sending an alarm signal when the target tag is out of the range of the constraint condition.
Optionally, the plurality of the cabinets are used for judging whether the target label exceeds the range of the constraint condition or not, the method comprises the steps of uploading the constraint condition to a cloud server, controlling the plurality of the cabinets to acquire the constraint condition from the cloud server, judging whether the target label is inserted into the bin of any one of the cabinets in the returning time information and the returning place information, and determining that the target label exceeds the range of the constraint condition when the target label is not inserted into the bin of any one of the cabinets in the returning time information or the returning place information.
Optionally, after the bin where the target tag is located is controlled to be unlocked, the method further includes determining the bin where the target tag is located as a target bin, judging whether the target tag is moved out of the target bin within a preset time period, and controlling the target bin to be locked again when the target tag is not moved out of the target bin within the preset time period.
Optionally, the method further comprises controlling the display panel to display in a warehouse status when the label is located in the corresponding warehouse space, and controlling the display panel to display in a warehouse out status when the label is moved out of the corresponding warehouse space.
The embodiment of the application also provides electronic equipment, which comprises one or more processors, a memory and one or more programs, wherein the one or more programs are stored in the memory and are configured to be executed by the one or more processors, and the one or more programs comprise a key management method for executing any one of the above.
The embodiment of the application also provides a key management system which comprises a plurality of keys, a plurality of labels, a cabinet body, a display panel and a processor, wherein the keys are connected with the labels in a one-to-one correspondence manner, the cabinet body comprises a plurality of storage spaces, the storage spaces are used for inserting the keys with the labels in a one-to-one correspondence manner, and the processor is used for executing any one of the key management methods.
The embodiment of the application also provides a key management cabinet which comprises a memory, a processor and a program stored on the memory and capable of running on the processor, wherein the program is executed by the processor to realize any one of the key management methods.
It will be appreciated by those skilled in the art that the modules or steps of the invention described above may be implemented in a general purpose computing device, they may be concentrated on a single computing device, or distributed across a network of computing devices, they may be implemented in program code executable by computing devices, so that they may be stored in a storage device for execution by computing devices, and in some cases, the steps shown or described may be performed in a different order than that shown or described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple modules or steps of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, etc., such as Read Only Memory (ROM) or flash RAM. Memory is an example of a computer-readable medium.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
From the above description, it can be seen that the above embodiments of the present application achieve the following technical effects:
In the key management method, a plurality of keys are provided, the plurality of keys are connected with the labels in a one-to-one correspondence manner, the cabinet body comprises a plurality of bins, the bins are used for inserting the keys with the labels in a one-to-one correspondence manner, firstly, when the keys with the labels exist in the bins, each bin is locked, then, the recorded information corresponding to the labels in at least one bin is acquired, the acquired recorded information is transmitted to a display panel, the display panel displays the received recorded information, then, the target recorded information is received, the label corresponding to the target recorded information is determined to be the target label, and finally, the bin where the target label is located is controlled to be unlocked, wherein the target recorded information is recorded information determined in response to a first preset operation acted on the display panel. Compared with the problem of poor standardization of a large number of key management in the prior art, the key is connected with the labels, when the keys with the labels exist in all bin positions, all bin positions are locked to limit the labels to move out of the bin positions, recorded information corresponding to the labels in at least one bin position is acquired, and the recorded information is transmitted to the display panel, so that a user can select the recorded information corresponding to the labels from the display panel, the bin positions where the labels corresponding to the recorded information are located can be controlled to be unlocked and opened, the keys can be conveniently stored and managed, the information of the keys can be recorded in time, and the keys can be conveniently checked when the keys are needed to be used, and can be more efficiently and scientifically managed.
The above description is only of the preferred embodiments of the present application and is not intended to limit the present application, but various modifications and variations can be made to the present application by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application.