CN115471937B - File management device and application method - Google Patents
File management device and application method Download PDFInfo
- Publication number
- CN115471937B CN115471937B CN202211167327.9A CN202211167327A CN115471937B CN 115471937 B CN115471937 B CN 115471937B CN 202211167327 A CN202211167327 A CN 202211167327A CN 115471937 B CN115471937 B CN 115471937B
- Authority
- CN
- China
- Prior art keywords
- verification information
- verification
- information
- acquisition module
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000012795 verification Methods 0.000 claims abstract description 320
- 238000004891 communication Methods 0.000 claims description 14
- 101150060512 SPATA6 gene Proteins 0.000 claims description 12
- 238000004590 computer program Methods 0.000 claims description 3
- 239000000284 extract Substances 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000003384 imaging method Methods 0.000 description 2
- 230000000981 bystander Effects 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- A—HUMAN NECESSITIES
- A47—FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
- A47B—TABLES; DESKS; OFFICE FURNITURE; CABINETS; DRAWERS; GENERAL DETAILS OF FURNITURE
- A47B63/00—Cabinets, racks or shelf units, specially adapted for storing books, documents, forms, or the like
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/10—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property
- G07F17/12—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property comprising lockable containers, e.g. for accepting clothes to be cleaned
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to the technical field of file management and provides a file management device and a use method thereof. The invention can carry out multiple verification on the user authority, and improves the security of the paper file.
Description
Technical Field
The invention relates to the technical field of file management, in particular to a file management device and a use method thereof.
Background
Archives are raw records with preservation value which are directly formed in social activities of people, and take on unique demands in social processes. The files include paper files and electronic files. No matter paper archives or electronic archives, targeted management is needed to protect archival data's safety, the convenience of customers stores.
The applicant finds some typical prior art through a large number of searches, for example, patent application number 202010377290.7 discloses an intelligent filing cabinet safety system, which solves the problems of quick, simple and intelligent management and judgment for personnel with reference and access rights of different types of paper files and improves the safety of the paper files. In another example, patent application number 201610213139.3 discloses a file management device, which is convenient and fast to operate, especially suitable for large-information-quantity file management, by recording file box information, and searching a target file by using a manipulator through instructions according to information of an information storage device. As another example, patent application number 202010104735.4 discloses a file management system, which effectively improves the encryption difficulty, avoids outsiders from cracking and opening the file cabinet, and greatly avoids the possibility of outsiders logging in by intelligently changing passwords and adjusting the input mode of inputting the passwords.
Therefore, there are many technical solutions that have not been proposed for the problems (such as how to improve the security of the paper files) that are needed to be handled in the practical application of file management.
Disclosure of Invention
Based on this, in order to improve the security of paper files, the invention provides a file management device and a use method thereof, and the specific technical scheme is as follows:
A file management device comprises a processor, a cabinet body with a plurality of storage positions and a plurality of electronic doors, wherein the storage positions are used for storing file files, and the electronic doors are arranged on the storage positions and correspond to the storage positions one by one; the archive management device further comprises a first acquisition module and a second acquisition module.
The first acquisition module is used for acquiring first verification information and second verification information associated with the first verification information, verifying the user permission according to the first verification information and the second verification information, and if the user permission passes the verification, generating a first verification success result and feeding back to the processor.
The second acquisition module is used for acquiring user identity information and second verification information, verifying the user authority according to the user identity information and the second verification information, and if the user authority passes the verification, generating a second verification success result and feeding back the second verification success result to the processor.
The processor is further used for opening the electronic door corresponding to the user identity information according to the first verification success result and the second verification success result.
The archive management device verifies the user permission by setting the first acquisition module and the second acquisition module and respectively utilizing the first verification information, the second verification information and the user identity information, and not only comprises independent verification of the user permission by the first verification information and the second verification information, but also comprises joint verification of the user permission by the user identity information and the second verification information, so that multiple verification can be carried out on the user permission, and the security of the paper archive is improved.
Further, the second obtaining module includes a camera unit, and the archive management device further includes:
The input module is in communication connection with the first acquisition module and is used for acquiring first verification information input by a user and feeding the first verification information back to the first acquisition module;
the display module is used for generating and displaying second verification information according to the first verification information;
The camera shooting unit is used for shooting a real-time area image, and acquiring user identity information and second verification information according to the real-time area image.
Further, the first acquisition module includes a first camera unit, the second acquisition module includes a second camera unit, and the archive management device further includes:
The input module is in communication connection with the first acquisition module and is used for acquiring first verification information input by a user and feeding the first verification information back to the first acquisition module;
the display module is used for generating and displaying second verification information according to the first verification information;
The first camera unit is used for shooting a first real-time area image and acquiring second verification information according to the first real-time area image, and the second camera unit is used for acquiring a second real-time area image and acquiring user identity information and the second verification information according to the second real-time area image.
Further, the first verification information is a randomly updated digital verification code, and the second verification information is a hash sequence of the first verification information.
A file management device using method comprises the following steps:
s1, a first acquisition module acquires first verification information and second verification information associated with the first verification information;
s2, the first acquisition module verifies the user authority according to the first verification information and the second verification information, and if the user authority passes the verification, a first verification success result is generated and fed back to the processor;
s3, a second acquisition module acquires user identity information and second verification information;
S4, the second acquisition module verifies the user permission according to the user identity information and the second verification information, and if the user permission passes the verification, a second verification success result is generated and fed back to the processor;
And S5, the processor opens or closes the electronic door corresponding to the user identity information according to the first verification success result and the second verification success result.
Further, in step S1, the specific method for the first acquisition module to acquire the first verification information and the second verification information associated with the first verification information includes the following steps:
providing an input module in communication connection with a first acquisition module, acquiring first verification information input by a user through the input module and feeding back the first verification information to the first acquisition module;
Providing a display module, wherein the display module generates and displays second verification information according to the first verification information;
The first acquisition module acquires the second verification information displayed by the display module.
Further, in step S3, the specific method for the second acquisition module to acquire the user identity information and the second verification information includes the following steps:
The camera unit is used for shooting a real-time area image;
and the second acquisition module acquires user identity information and second verification information according to the real-time area image.
Further, in step S1, the specific method for the first acquisition module to acquire the first verification information and the second verification information associated with the first verification information includes the following steps:
providing an input module in communication connection with a first acquisition module, acquiring first verification information input by a user through the input module and feeding back the first verification information to the first acquisition module;
Providing a display module, wherein the display module generates and displays second verification information according to the first verification information;
Shooting a first real-time area image through a first shooting unit of a first acquisition module and acquiring second verification information according to the first real-time area image;
and acquiring a second real-time area image through a second camera unit of the second acquisition device and acquiring user identity information and second verification information according to the second real-time area image.
Further, the first verification information is a randomly updated digital verification code, and the second verification information is a hash sequence of the first verification information.
Further, a computer-readable storage medium stores a computer program which, when executed, implements the archive management device usage method.
Drawings
The invention will be further understood from the following description taken in conjunction with the accompanying drawings. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the embodiments. Like reference numerals designate corresponding parts throughout the different views.
FIG. 1 is a schematic diagram illustrating an overall structure of a file management apparatus according to an embodiment of the present invention;
FIG. 2 is a schematic diagram illustrating an overall structure of a file management apparatus according to an embodiment of the invention.
Reference numerals illustrate:
1. an input module; 2. a display module; 3. an image pickup unit.
Detailed Description
The present invention will be described in further detail with reference to the following examples thereof in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the detailed description and specific examples are intended for purposes of illustration only and are not intended to limit the scope of the invention.
It will be understood that when an element is referred to as being "fixed to" another element, it can be directly on the other element or intervening elements may also be present. When an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may also be present. The terms "vertical," "horizontal," "left," "right," and the like are used herein for illustrative purposes only and are not meant to be the only embodiment.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used herein in the description of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. The term "and/or" as used herein includes any and all combinations of one or more of the associated listed items.
The terms "first" and "second" in this specification do not denote a particular quantity or order, but rather are used for distinguishing between similar or identical items.
As shown in fig. 1, an archive management device according to an embodiment of the present invention includes a processor, a cabinet having a plurality of storage locations, and a plurality of electronic doors, wherein the storage locations are used for storing archive files, and the electronic doors are mounted on the storage locations and correspond to the storage locations one by one; the archive management device further comprises a first acquisition module and a second acquisition module.
The first acquisition module is used for acquiring first verification information and second verification information associated with the first verification information, verifying the user permission according to the first verification information and the second verification information, and if the user permission passes the verification, generating a first verification success result and feeding back to the processor.
The second acquisition module is used for acquiring user identity information and second verification information, verifying the user authority according to the user identity information and the second verification information, and if the user authority passes the verification, generating a second verification success result and feeding back the second verification success result to the processor.
The processor is further used for opening the electronic door corresponding to the user identity information according to the first verification success result and the second verification success result. Each user is assigned a unique storage location. After the electronic door is opened, the user can access the paper file.
The electronic door comprises a door body and an electronic lock, wherein the door body is hinged on the storage position, and the electronic lock is in communication connection or electric connection with the processor. Since the electronic door belongs to the prior art, the details are not repeated here.
Specifically, the first verification information includes, but is not limited to, a randomly updated digital verification code, and the second verification information is a hash sequence of the first verification information.
The digital verification code can be sent to the user who needs to access the paper file in a short message mode. Preferably, the digital authentication code may be sent to a mobile terminal or a wearable device that is tied to the user's personal identity.
The purpose of the first verification information being a randomly updated digital verification code is to randomly and dynamically update the first verification information, so that the reliability of user authority verification is improved.
The first verification information is converted through a hash function to obtain a corresponding hash sequence which is used as second verification information, so that the first verification information and the second verification information are associated with each other.
The first authentication information may be generated by the processor and sent to the mobile terminal or the wearable device, and the user acquires the first authentication information through the mobile terminal or the wearable device and feeds back to the first acquisition means.
After the first acquisition device acquires the first verification information and the second verification information, verifying the user permission according to the first verification information and the second verification information, and if the first verification information is matched with the second verification information, generating a first verification success result through verification and feeding back to the processor by the user permission.
Of course, the first verification information generated by the processor may be a digital tag or an image tag, and sent to the mobile terminal of the user, and the user displays the first verification information through the mobile terminal. The first acquisition device scans and acquires first verification information displayed by the user mobile terminal. Here, the second verification information may be a hash sequence obtained by performing digital transcoding and hash transformation on the first verification information.
The second authentication information is displayed by the display module, and the display module is configured to be acquirable by the first acquisition device and the second acquisition device. The second authentication information is provided for the purpose that the first acquisition means can authenticate the user right by acquiring and verifying whether the first authentication information matches the second authentication information. Meanwhile, the second acquisition device extracts the user face image and the second verification information in the real-time area image by acquiring the real-time area image within the preset radius range of the cabinet body, and can perform joint verification on the user identity information and the second verification information.
Because the mobile terminal or the wearable equipment is bound with the personal identity of the user, the first acquisition device can independently verify the user permission by utilizing the first verification information and the second verification information by acquiring the second verification information and the first verification information fed back by the mobile terminal or the wearable equipment. That is, when the first authentication information and the second authentication information are matched and consistent, and the first authentication information fed back by the mobile terminal or the wearable device is matched and consistent with the first authentication information generated by the processor, the user authority passes the authentication and generates a first authentication success result.
The second acquisition module is used for acquiring user identity information and second verification information, and carrying out joint verification on the user permission according to the user identity information and the second verification information. Here, the user identity information is a user face image.
Joint verification means that: the second acquisition module extracts a user face image and second verification information in the real-time area image by acquiring the real-time area image within the preset radius range of the cabinet body, if the user face image and the second verification information are both in the same real-time area image and are respectively matched with the pre-stored user face image and the pre-stored first verification information, the user authority passes verification, and if the user authority passes verification, a second verification success result is generated and fed back to the processor.
The archive management device verifies the user permission by setting the first acquisition module and the second acquisition module and respectively utilizing the first verification information, the second verification information and the user identity information, and not only comprises independent verification of the user permission by the first verification information and the second verification information, but also comprises joint verification of the user permission by the user identity information and the second verification information, so that multiple verification can be carried out on the user permission, and the security of the paper archive is improved.
In one embodiment, the second obtaining module includes a camera unit, and the archive management device further includes an input module and a display module.
The input module is in communication connection with the first acquisition module and is used for acquiring first verification information input by a user and feeding the first verification information back to the first acquisition module.
After the processor sends the first verification information to the mobile terminal or the portable device, the user feeds back the first verification information to the first acquisition module through the input module. Because the mobile terminal and the wearable equipment are bound with the personal identity of the user, when the second verification information acquired by the first acquisition device is matched and consistent with the first verification information input by the user, the user permission can be judged to pass the verification.
The display module is used for generating and displaying second verification information according to the first verification information. The camera shooting unit is used for shooting a real-time area image, and acquiring user identity information and second verification information according to the real-time area image.
The second acquisition module extracts user identity information and second verification information in the real-time area image shot by the shooting unit, and if the user identity information and the second verification information are both in the same real-time area image and are respectively matched with the pre-stored user identity information image and the pre-stored first verification information, the user authority can be judged to pass verification, and a second verification success result is generated.
Here, the user identity information may be a user face image. The display module is in communication connection with the first acquisition module and feeds back the generated second verification information to the first acquisition module.
The display module is configured to be able to be photographed by the image pickup unit of the second acquisition module, and the image pickup unit of the second acquisition module is configured to be able to photograph the display module and the face image of the user at the same time. For example, as shown in fig. 2, the input module 1 is mounted on one side of the cabinet, the display module 2 is mounted on the other side of the cabinet, and the image pickup unit 3 of the second acquisition module is mounted on the top of the input module. That is, the display module is disposed opposite to the input module, and when the user inputs the first verification information through the input module, the image capturing unit of the second acquisition module can capture a real-time area image including a face image of the user and the display module. The camera unit 3 of the second acquisition module is preferably a wide angle camera or a dome camera in order to be able to capture both the display module and the user's face image area.
By setting the input module, the first acquisition module can conveniently acquire the first verification information input by the user. The display module and the camera unit are arranged, and the user permission can be verified by identifying the user face image and the second verification information in the real-time area image.
In one embodiment, the first obtaining module includes a first camera unit, the second obtaining module includes a second camera unit, and the archive management device further includes an input module and a display module.
The input module is in communication connection with the first acquisition module and is used for acquiring first verification information input by a user and feeding the first verification information back to the first acquisition module. After the processor sends the first verification information to the mobile terminal or the portable device, the user feeds back the first verification information to the first acquisition module through the input module.
The display module is used for generating and displaying second verification information according to the first verification information.
The first camera unit is used for shooting a first real-time area image and acquiring second verification information according to the first real-time area image, and the second camera unit is used for acquiring a second real-time area image and acquiring user identity information and the second verification information according to the second real-time area image.
Here, the second authentication information is displayed by the display module, and the first acquisition module acquires the second authentication information by the first real-time area image captured by the first imaging unit.
Through setting up input module, display module and first camera unit, can make things convenient for first acquisition module to acquire first verification information and second verification information. Through setting up display module and second camera unit, can make things convenient for the second to acquire user identity information and second verification information by the second acquisition module.
As a preferred technical solution, the first verification information may also be an image tag, such as a two-dimensional code tag, and the processor generates the image tag and sends the image tag to the mobile terminal. The mobile terminal displays the image tag and captures a photograph by the first photographing unit.
That is, the first acquisition module includes a first camera unit, the second verification information is displayed through the display module, the display module is installed opposite to the camera unit, and the second verification information displayed by the display module can be captured and shot by the camera unit.
The user displays the image tag through the mobile terminal and aligns the mobile terminal screen to the camera unit without manually inputting the first authentication information. In this way, the first real-time area image is acquired through the first camera unit of the first acquisition module, and the first verification information and the second verification information in the first real-time area image can be extracted. If the first verification information and the second verification information in the first real-time area image are matched and consistent, the user authority passes the verification, and a first verification success result is generated and fed back to the processor.
The second acquisition module comprises a second camera shooting unit, the second camera shooting unit is used for shooting a second real-time area image, and the second acquisition module can verify the user permission by extracting user identity information and second verification information in the second real-time area image; if the user authority passes the verification, a second verification success result is generated and fed back to the processor.
The first real-time area image comprises first verification information and second verification information, the first verification information is matched with the second verification information, and the first verification information is consistent with the second verification information, so that the mobile terminal bound with the personal identity of the user is in the preset radius range of the cabinet body, and the first verification information fed back by the user through the mobile terminal is accurate.
Here, the first acquiring means verifies the user right by the first verification information and the second verification information in the first real-time area image, which includes not only individual verification of the user right by the first verification information and the second verification information, but also verification of the user right by the actual location of the mobile terminal bound to the user's personal identity in practice.
In summary, by setting the first camera unit and the second camera unit, the archive management device can utilize the first verification information and the second verification information in the first real-time area image, the actual position of the mobile terminal bound with the personal identity of the user, the user identity information and the second verification information in the second real-time area image to perform multiple verification on the user authority, thereby improving the security of the paper archive.
In one embodiment, a method for using a file management apparatus includes the steps of:
S1, a first acquisition module acquires first verification information and second verification information associated with the first verification information.
S2, the first acquisition module verifies the user authority according to the first verification information and the second verification information, and if the user authority passes the verification, a first verification success result is generated and fed back to the processor.
S3, the second acquisition module acquires user identity information and second verification information.
And S4, the second acquisition module verifies the user permission according to the user identity information and the second verification information, and if the user permission passes the verification, a second verification success result is generated and fed back to the processor.
And S5, the processor opens or closes the electronic door corresponding to the user identity information according to the first verification success result and the second verification success result.
Specifically, in step S1, the specific method for the first acquisition module to acquire the first verification information and the second verification information associated with the first verification information includes the following steps:
s10, providing a communication connection input module with a first acquisition module, acquiring first verification information input by a user through the input module and feeding back the first verification information to the first acquisition module;
s11, providing a display module, and generating and displaying second verification information by the display module according to the first verification information.
S12, the first acquisition module acquires the second verification information displayed by the display module.
In step S3, the specific method for obtaining the user identity information and the second verification information by the second obtaining module includes the following steps:
S30, shooting a real-time area image through an imaging unit;
s31, the second acquisition module acquires user identity information and second verification information according to the real-time area image.
The first verification information is a randomly updated digital verification code, and the second verification information is a hash sequence of the first verification information.
The file management device uses the method to verify the user rights by arranging the first acquisition module and the second acquisition module and respectively utilizing the first verification information, the second verification information and the user identity information, which not only comprises the independent verification of the user rights by the first verification information and the second verification information, but also comprises the joint verification of the user rights by the user identity information and the second verification information, so that multiple verification can be carried out on the user rights, and the security of the paper file is improved.
In one embodiment, in step S1, a specific method for acquiring the first verification information and the second verification information associated with the first verification information by the first acquisition module includes the following steps:
providing an input module in communication connection with a first acquisition module, acquiring first verification information input by a user through the input module and feeding back the first verification information to the first acquisition module;
Providing a display module, wherein the display module generates and displays second verification information according to the first verification information;
Shooting a first real-time area image through a first shooting unit of a first acquisition module and acquiring second verification information according to the first real-time area image;
and acquiring a second real-time area image through a second camera unit of the second acquisition device and acquiring user identity information and second verification information according to the second real-time area image.
Through setting up input module, display module and first camera unit, can make things convenient for first acquisition module to acquire first verification information and second verification information. Through setting up display module and second camera unit, can make things convenient for the second to acquire user identity information and second verification information by the second acquisition module.
In one embodiment, before sending the first verification information to the mobile terminal, the processor sends a coordinate acquisition request to the mobile terminal, the mobile terminal sends self-positioning coordinates to the processor according to the coordinate acquisition request, and the processor generates the first verification information according to the self-positioning coordinates of the mobile terminal and feeds back the first verification information to the mobile terminal. Specifically, the mobile terminal obtains the positioning coordinate value by using the self-positioning module, and the processor converts the positioning coordinate into the first verification information by using a preset algorithm (such as a hash function).
On the mobile terminal, a corresponding applet or virtual button is provided. The user generates a file acquisition request through an applet or a virtual button and sends the file acquisition request to the processor, and the processor generates a coordinate acquisition request according to the file acquisition request.
In this way, the first verification information is directly related to the positioning coordinates of the mobile terminal, and the second verification information is indirectly related to the positioning coordinates of the mobile terminal. The processor acquires the first verification information through the positioning coordinates of the mobile terminal, so that the user permission can be better verified, and the user permission verification is ensured to be accurate. Because the positioning coordinates of the mobile terminal are always in continuous change when the user goes to the archive office for accessing the paper archive office, the positioning coordinates of the mobile terminal are utilized to acquire the first verification information, so that the random update of the first verification information can be ensured, and the safety of the first verification information and the paper archive access is improved.
As a preferred technical solution, the method for randomly updating the first verification information is a randomly updated digital verification code, and includes the following steps:
Firstly, installing a coded lock in a storage position, wherein the coded lock is in signal connection with a processor, and the processor acquires a code of the coded lock and takes the code as a code seed number; the combination lock is configured to change a combination seed number in response to a user operation. Specifically, the coded lock is a dial wheel type electronic coded lock, and a user changes the coded seed number by dialing the dial wheel.
The coded lock adopts the function of a dial wheel type electronic coded lock, and can keep the coded seed number set by a user after the electronic door is closed, so that a processor can conveniently acquire the coded seed number finally set by the user.
And secondly, the processor acquires the password seed number of the password lock after the storage level electronic door finishes the access of the paper file (namely, when the electronic door is in a closed state), and sends a coordinate acquisition request to the mobile terminal, the mobile terminal sends self-positioning coordinates to the processor according to the coordinate acquisition request, and the processor generates first verification information according to the self-positioning coordinates fed back by the mobile terminal and the password seed number and feeds back the first verification information to the mobile terminal.
Specifically, the mobile terminal obtains the positioning coordinate value by using the self-positioning module, and the processor converts the positioning coordinate and the password seed number into the first verification information by using a preset algorithm (such as a hash function). For example, the positioning coordinates and the password seed number may be spliced, xored, or co-xored, and then converted into the first verification information by a preset algorithm.
Therefore, by installing the coded lock in the storage position, a user cannot easily see the coded seed number by bystanders when setting the coded seed number, and the safety of the coded seed number is ensured. On the basis, even if the positioning coordinates sent to the processor by the mobile terminal of the user are acquired by other people, the other people cannot acquire correct first verification information according to the positioning coordinates and a preset algorithm by utilizing the password seed numbers and the positioning coordinates of the mobile terminal, so that the safety of accessing the paper files is further improved.
In one embodiment, a computer readable storage medium stores a computer program that when executed implements the archive management device usage method.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples illustrate only a few embodiments of the invention, which are described in detail and are not to be construed as limiting the scope of the invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the invention, which are all within the scope of the invention. Accordingly, the scope of protection of the present invention is to be determined by the appended claims.
Claims (8)
1. The utility model provides a archives management device, includes the treater, has the cabinet body and a plurality of electron door of a plurality of storing positions, and the storing position is used for storing archive file, and the electron door is installed on the storing position and with storing position one-to-one, its characterized in that, archives management device still includes:
The first acquisition module is used for acquiring first verification information and second verification information associated with the first verification information, verifying the user permission according to the first verification information and the second verification information, and if the user permission passes the verification, generating a first verification success result and feeding back to the processor;
the second acquisition module is used for acquiring user identity information and second verification information, verifying the user authority according to the user identity information and the second verification information, and if the user authority passes the verification, generating a second verification success result and feeding back the second verification result to the processor;
The processor is further used for opening an electronic door corresponding to the user identity information according to the first verification success result and the second verification success result;
Wherein, the second acquisition module includes the camera unit, archives management device still includes:
The input module is in communication connection with the first acquisition module and is used for acquiring first verification information input by a user and feeding the first verification information back to the first acquisition module;
the display module is used for generating and displaying second verification information according to the first verification information;
The camera shooting unit is used for shooting a real-time area image, and acquiring user identity information and second verification information according to the real-time area image.
2. A archive management device according to claim 1, wherein the first acquisition module comprises a first camera unit and the second acquisition module comprises a second camera unit, the archive management device further comprising:
The input module is in communication connection with the first acquisition module and is used for acquiring first verification information input by a user and feeding the first verification information back to the first acquisition module;
the display module is used for generating and displaying second verification information according to the first verification information;
The first camera unit is used for shooting a first real-time area image and acquiring second verification information according to the first real-time area image, and the second camera unit is used for acquiring a second real-time area image and acquiring user identity information and the second verification information according to the second real-time area image.
3. A archive management device according to claim 1 wherein the first authentication information is a randomly updated digital authentication code and the second authentication information is a hash sequence of the first authentication information.
4. The file management device using method is characterized by comprising the following steps:
s1, a first acquisition module acquires first verification information and second verification information associated with the first verification information;
s2, the first acquisition module verifies the user authority according to the first verification information and the second verification information, and if the user authority passes the verification, a first verification success result is generated and fed back to the processor;
s3, a second acquisition module acquires user identity information and second verification information;
S4, the second acquisition module verifies the user permission according to the user identity information and the second verification information, and if the user permission passes the verification, a second verification success result is generated and fed back to the processor;
s5, the processor opens or closes the electronic door corresponding to the user identity information according to the first verification success result and the second verification success result;
in step S1, the specific method for acquiring the first verification information and the second verification information associated with the first verification information by the first acquisition module includes the following steps:
providing an input module in communication connection with a first acquisition module, acquiring first verification information input by a user through the input module and feeding back the first verification information to the first acquisition module;
Providing a display module, wherein the display module generates and displays second verification information according to the first verification information;
The first acquisition module acquires the second verification information displayed by the display module.
5. A method for using a profile management device as in claim 4, wherein in step S3, the specific method for obtaining the user identity information and the second verification information by the second obtaining module comprises the following steps:
The camera unit is used for shooting a real-time area image;
and the second acquisition module acquires user identity information and second verification information according to the real-time area image.
6. A method for using a file management apparatus according to claim 4, wherein in step S1, the specific method for the first obtaining module to obtain the first verification information and the second verification information associated with the first verification information includes the steps of:
providing an input module in communication connection with a first acquisition module, acquiring first verification information input by a user through the input module and feeding back the first verification information to the first acquisition module;
Providing a display module, wherein the display module generates and displays second verification information according to the first verification information;
Shooting a first real-time area image through a first shooting unit of a first acquisition module and acquiring second verification information according to the first real-time area image;
and acquiring a second real-time area image through a second camera unit of the second acquisition device and acquiring user identity information and second verification information according to the second real-time area image.
7. A method of using a profile management device as in claim 5, wherein the first authentication information is a randomly updated digital authentication code and the second authentication information is a hash of the first authentication information.
8. A computer readable storage medium, wherein the computer readable storage medium stores a computer program which when executed implements a method of using the archive management device of any one of claims 4 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211167327.9A CN115471937B (en) | 2022-09-23 | 2022-09-23 | File management device and application method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211167327.9A CN115471937B (en) | 2022-09-23 | 2022-09-23 | File management device and application method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115471937A CN115471937A (en) | 2022-12-13 |
CN115471937B true CN115471937B (en) | 2024-04-19 |
Family
ID=84335573
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211167327.9A Active CN115471937B (en) | 2022-09-23 | 2022-09-23 | File management device and application method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115471937B (en) |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103646201A (en) * | 2013-12-09 | 2014-03-19 | 东南大学 | Verification method achieved by combining human faces with identities |
CN104184589A (en) * | 2014-08-26 | 2014-12-03 | 重庆邮电大学 | Identity authentication method, terminal device and system |
WO2017024550A1 (en) * | 2015-08-12 | 2017-02-16 | 刘文婷 | Anti-theft system and method for mobile terminal |
CN110415414A (en) * | 2019-07-31 | 2019-11-05 | 中国工商银行股份有限公司 | The unlocking method and device of dynamic puzzle-lock based on both sides' verifying |
CN110570553A (en) * | 2019-08-09 | 2019-12-13 | 深圳市天彦通信股份有限公司 | Personnel management method and related device |
CN111063067A (en) * | 2019-12-25 | 2020-04-24 | 深圳市龙侨华实业有限公司 | Intelligent access control system based on voice control |
CN111783059A (en) * | 2020-07-23 | 2020-10-16 | 北京如易行科技有限公司 | Man-code integrated brake passing riding system and method |
CN112252853A (en) * | 2020-10-16 | 2021-01-22 | 南通路远科技信息有限公司 | Cipher lock system based on geographical position and opening method thereof |
CN112309525A (en) * | 2020-11-09 | 2021-02-02 | 南通市第一人民医院 | Refractive development file management method and device |
CN113763616A (en) * | 2021-08-20 | 2021-12-07 | 太原市高远时代科技有限公司 | Multi-sensor-based non-inductive safe outdoor case access control system and method |
WO2022052780A1 (en) * | 2020-09-10 | 2022-03-17 | 华为技术有限公司 | Identity verification method and apparatus, and device and storage medium |
CN114268453A (en) * | 2021-11-17 | 2022-04-01 | 中国南方电网有限责任公司 | Power system unlocking method and device, computer equipment and storage medium |
CN114697117A (en) * | 2022-04-07 | 2022-07-01 | 中国工商银行股份有限公司 | Verification method, device, scrambler and system based on positioning information |
CN217061056U (en) * | 2021-09-06 | 2022-07-26 | 联想(北京)有限公司 | Intelligent door lock |
-
2022
- 2022-09-23 CN CN202211167327.9A patent/CN115471937B/en active Active
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103646201A (en) * | 2013-12-09 | 2014-03-19 | 东南大学 | Verification method achieved by combining human faces with identities |
CN104184589A (en) * | 2014-08-26 | 2014-12-03 | 重庆邮电大学 | Identity authentication method, terminal device and system |
WO2017024550A1 (en) * | 2015-08-12 | 2017-02-16 | 刘文婷 | Anti-theft system and method for mobile terminal |
CN110415414A (en) * | 2019-07-31 | 2019-11-05 | 中国工商银行股份有限公司 | The unlocking method and device of dynamic puzzle-lock based on both sides' verifying |
CN110570553A (en) * | 2019-08-09 | 2019-12-13 | 深圳市天彦通信股份有限公司 | Personnel management method and related device |
CN111063067A (en) * | 2019-12-25 | 2020-04-24 | 深圳市龙侨华实业有限公司 | Intelligent access control system based on voice control |
CN111783059A (en) * | 2020-07-23 | 2020-10-16 | 北京如易行科技有限公司 | Man-code integrated brake passing riding system and method |
WO2022052780A1 (en) * | 2020-09-10 | 2022-03-17 | 华为技术有限公司 | Identity verification method and apparatus, and device and storage medium |
CN112252853A (en) * | 2020-10-16 | 2021-01-22 | 南通路远科技信息有限公司 | Cipher lock system based on geographical position and opening method thereof |
CN112309525A (en) * | 2020-11-09 | 2021-02-02 | 南通市第一人民医院 | Refractive development file management method and device |
CN113763616A (en) * | 2021-08-20 | 2021-12-07 | 太原市高远时代科技有限公司 | Multi-sensor-based non-inductive safe outdoor case access control system and method |
CN217061056U (en) * | 2021-09-06 | 2022-07-26 | 联想(北京)有限公司 | Intelligent door lock |
CN114268453A (en) * | 2021-11-17 | 2022-04-01 | 中国南方电网有限责任公司 | Power system unlocking method and device, computer equipment and storage medium |
CN114697117A (en) * | 2022-04-07 | 2022-07-01 | 中国工商银行股份有限公司 | Verification method, device, scrambler and system based on positioning information |
Non-Patent Citations (1)
Title |
---|
王子 ; .信息系统用户身份认证的安全性分析.信息技术与信息化.2017,(第06期),全文. * |
Also Published As
Publication number | Publication date |
---|---|
CN115471937A (en) | 2022-12-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230084139A1 (en) | Biometric authentication method, system, and computer program | |
EP3196801B1 (en) | Face recognition method, device and computer readable storage medium | |
CN107993326A (en) | The identification of identity-based card and method for unlocking, the apparatus and system of recognition of face | |
US20120032781A1 (en) | Remote personal authentication system and method using biometrics | |
US20060104483A1 (en) | Wireless digital image capture device with biometric readers | |
CN111340634B (en) | System and method for assisting mobile equipment in implementing screen crush risk | |
CN109118606B (en) | Facial recognition attendance process authentication method | |
KR20130009356A (en) | Authentication method and device using otp including biometric data | |
CN101958892A (en) | Electronic data protection method, device and system based on face recognition | |
US20100103193A1 (en) | Image monitor apparatus and computer-readable storage medium storing image monitor program | |
KR101577036B1 (en) | Access authentication system and method based ip camera | |
CN110765434A (en) | Identity authentication method and device, electronic equipment and storage medium | |
CN108959884B (en) | Human authentication verification device and method | |
CN105787319B (en) | Portable terminal based on iris recognition and method thereof | |
CN115471937B (en) | File management device and application method | |
CN111581622A (en) | Information processing method and device and electronic equipment | |
CN111832458A (en) | Anti-theft method and system | |
CN211149466U (en) | Hotel testimony of witness unification authentication equipment | |
CN105468938A (en) | Mobile terminal and security control method thereof | |
TW202044076A (en) | Verifying method of specified condition, verifying software of specified condition, device and server for executing verification of specified condition | |
CN109684810B (en) | Information processing method and system | |
KR20160044834A (en) | Security apparatus for terminal and method thereof | |
CN110990812A (en) | Device access setting method, device access setting control method, device access control device, electronic device, and medium | |
CN113612772B (en) | Method and system for encrypting and accessing large-screen equipment file/application | |
CN110149203A (en) | Evidence processing method and processing device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |