Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
In the prior art, related data of the same article is stored in the same safety box, for example, for a car sales center, a car inspection certificate file and a car key are placed in the same safety box, so that when the safety box is opened, the car inspection certificate file and the car key can be correspondingly obtained, and loss is brought to the car sales center; moreover, because the special person is responsible for storing the data, an effective supervision means is lacked, and the safety of data storage is also reduced.
In the embodiment of the invention, different associated data of the same article or different articles are respectively placed in different data cabinets, only one data cabinet for storing different associated data of the same article can be opened at the same time, and the data cabinet for storing the other associated data of the article can be opened only after the data taken out from the data cabinet is authorized data, so that the data does not necessarily have direct association relationship, and the user can set the association degree between the data cabinets. Therefore, related personnel can be effectively prevented from taking out different related data of the same article at one time, and the safety of data storage is reduced. For example, the automobile inspection certificate document is placed in a document data cabinet, the automobile key is placed in a key data cabinet, the document data cabinet and the key data cabinet are mutually associated, when a worker opens the document data cabinet, the automobile inspection certificate document can be taken out, but the article data cabinet cannot be opened at the same time, only when the automobile inspection certificate document taken out by the worker is an authorized document and closes the document data cabinet, the article data cabinet can be opened, the automobile key can be taken out, and the authorization authentication is carried out on the taken automobile key, so that the phenomena that unauthorized documents and keys of automobile sales shops are taken out simultaneously and the inside and outside of banks are hooked are prevented effectively, and the safety of data storage is improved.
Radio Frequency Identification (RFID) is a non-contact automatic Identification technology that has rapidly developed in recent years, also called an electronic tag, and can automatically identify a target object and acquire related data by spatial coupling using a Radio Frequency signal, and can work in various severe environments.
The RFID tag is composed of a coupling element and a chip, each tag has a unique electronic code and is attached to an object to identify a target object, when the RFID tag enters a magnetic field, the RFID tag receives a radio frequency signal sent by a reader, and product information stored in the chip is sent out by means of energy obtained by induced current.
In the embodiment of the invention, the RFID technology can be utilized to monitor the data operation in the data cabinet so as to improve the safety of data storage.
FIG. 1 is a diagram of a data storage system according to an embodiment of the present invention. Referring to FIG. 1, the data retention management system comprises: a standard card making subsystem, a background management subsystem, a first data keeping subsystem and a second data keeping subsystem, wherein,
the system comprises a system Identification card subsystem, a management subsystem and a display subsystem, wherein the system Identification card subsystem is used for identifying bar code information arranged on first data and second data associated with the first data, respectively generating first Radio Frequency Identification (RFID) anti-tearing electronic tag information and second RFID anti-tearing electronic tag information for identifying the first data and the second data according to the identified bar code information, writing the generated first RFID anti-tearing electronic tag information into a first RFID anti-tearing electronic tag of the first data, writing the second RFID anti-tearing electronic tag information into a second RFID anti-tearing electronic tag of the second data, and outputting the first and second RFID anti-tearing electronic tag information to the management subsystem; and generating first and second RFID electronic door key card information for respectively starting the first data keeping subsystem and the second data keeping subsystem, writing the generated first RFID electronic door key card information into the first RFID electronic door key card, and writing the second RFID electronic door key card information into the second RFID electronic door key card.
The anti-tearing electronic tag can be a vulnerable type tag, and other electronic tags can be used according to the requirements of users.
The first data keeping subsystem is used for storing first data, receiving first RFID electronic door key card information sent by a first RFID electronic door key card, determining the opening state of the stored first data keeping subsystem identifier as an interlocking identifier, matching the interlocking identifier with the prestored RFID electronic door key card information, if the interlocking identifier is consistent with the interlocking identifier, opening the first data keeping subsystem and sending a first data keeping subsystem opening signal to the background management subsystem, and after the first data keeping subsystem is closed, sending a first data keeping subsystem closing signal to the background management subsystem;
after the first data keeping subsystem is started, triggering and starting a timer, and when the set timing time is up, if the first data keeping subsystem is detected not to be closed, sending a signal that the first data keeping subsystem is not closed to the background management subsystem;
detecting the placed first data, and if the first data is detected to be taken away, sending first RFID anti-tearing electronic tag information corresponding to the taken away first data to a background management subsystem to carry an offline identification; if the first data are detected to be put back, sending first RFID anti-tearing electronic tag information corresponding to the put-back first data to a background management subsystem, and carrying an online identifier;
the second data keeping subsystem is used for storing second data, receiving second RFID electronic door key card information sent by a second RFID electronic door key card, determining the openable state of the stored second data keeping subsystem identifier as an interlocking identifier, matching the interlocking identifier with the prestored RFID electronic door key card information, if the interlocking identifier is consistent with the interlocking identifier, starting the second data keeping subsystem and sending a second data keeping subsystem starting signal to the background management subsystem, and after the second data keeping subsystem is closed, sending a second data keeping subsystem closing signal to the background management subsystem;
after the second data keeping subsystem is started, triggering and starting a timer, and when the set timing time is up, if the second data keeping subsystem is detected not to be closed, sending a signal that the second data keeping subsystem is not closed to the background management subsystem;
detecting the placed second data, and if the second data is detected to be taken away, sending RFID anti-tearing electronic tag information corresponding to the taken-away second data to the background management subsystem to carry an offline identification; if the second data are detected to be put back, the RFID anti-tearing electronic tag information corresponding to the put-back second data is sent to the background management subsystem, and the background management subsystem carries the online identification;
the background management subsystem is used for storing information output by the marking card subsystem, receiving a first data keeping subsystem starting signal sent by the first data keeping subsystem, sending a second data keeping subsystem identifier to a second data keeping subsystem as a closing signal, receiving first RFID anti-tearing electronic tag information containing an online identifier or an offline identifier, matching the information with the stored information, and sending a second data keeping subsystem identifier to the second data keeping subsystem as an openable signal after the matching is successful and the first data keeping subsystem closing signal is received; receiving first and second RFID anti-tear electronic tag information carrying online identification, matching the first and second RFID anti-tear electronic tag information with stored information, and performing alarm processing according to a preset alarm strategy when the matching is unsuccessful;
receiving a second data keeping subsystem starting signal sent by a second data keeping subsystem, sending a first data keeping subsystem identifier to a first data keeping subsystem as a closing signal, receiving second RFID anti-tearing electronic tag information, matching the second RFID anti-tearing electronic tag information with the stored information, and sending a first data keeping subsystem identifier to the first data keeping subsystem as an openable signal after the second data keeping subsystem closing signal is received after the second data keeping subsystem information is successfully matched;
and receiving the non-closing signals of the first and second data keeping subsystems and carrying out alarm processing according to a preset alarm strategy.
In this embodiment, the second data-keeping subsystem identifier and the first data-keeping subsystem identifier are interlock identifiers, that is, the first data-keeping subsystem identifier is in an openable state of the interlock identifier, and the second data-keeping subsystem identifier is in a closed state of the interlock identifier. The data includes a first data of the same article and a second data associated with the first data, and of course, a third data associated with the first data box, etc. For example, for a car sales shop, the data may include a file and a car key, the RFID anti-tear electronic tag information of the file and the RFID anti-tear electronic tag information of the car key both correspond to one article, and only the authorized car key can be obtained through the RFID anti-tear electronic tag information of the authorized file, or only the file can be obtained through the RFID anti-tear electronic tag information of the authorized car key, and the authorized car key cannot be obtained through the RFID anti-tear electronic tag information of the unauthorized file, or the file is obtained through the RFID anti-tear electronic tag information of the unauthorized car key, so that the security of data storage is improved.
In this embodiment, for a data keeping subsystem that needs to store different associated data of the same item, for example, for a car sales shop, in order to prevent a potential safety hazard caused by the fact that an authorized file or a key is taken out at the same time, an incompatible storage method is adopted, that is, a file is stored in one file data cabinet, a key (car key) is stored in another data cabinet (for example, a key data cabinet), and meanwhile, different staff can respectively store RFID electronic door key cards for opening the data cabinets.
In practical application, if the data has no bar code information, the RFID anti-tearing electronic tag information can be directly generated for the data.
The material stored by the first material-keeping subsystem may comprise material of different articles with the same attribute, for example, a plurality of files may be stored.
The information pre-stored in the first data keeping subsystem and the second data keeping subsystem can be sent by the mark making card subsystem or can be input by an administrator.
In practical applications, the functions executed by the background management subsystem may be executed by the first data-saving subsystem and the first data-saving subsystem, respectively, or of course, some of the functions executed by the first data-saving subsystem and the first data-saving subsystem may be collectively executed and controlled by the background management subsystem. The following description briefly takes the centralized execution control performed by the back-end management subsystem as an example.
The first data keeping subsystem is used for storing first data, receiving first RFID electronic door key card information sent by a first RFID electronic door key card, matching the first RFID electronic door key card information with prestored RFID electronic door key card information, and sending first data keeping subsystem starting request information to the background management subsystem if the first data keeping subsystem information is consistent with the prestored RFID electronic door key card information; after the first data keeping subsystem is closed, a first data keeping subsystem closing signal is sent to the background management subsystem;
after the first data keeping subsystem is started, triggering and starting a timer, and when the set timing time is up, if the first data keeping subsystem is detected not to be closed, sending a signal that the first data keeping subsystem is not closed to the background management subsystem;
detecting the placed first data, and if the first data is detected to be taken away, sending first RFID anti-tearing electronic tag information corresponding to the taken away first data to a background management subsystem to carry an offline identification; if the first data are detected to be put back, sending first RFID anti-tearing electronic tag information corresponding to the put-back first data to a background management subsystem, and carrying an online identifier;
the second data keeping subsystem is used for storing second data, receiving second RFID electronic door key card information sent by a second RFID electronic door key card, matching the second RFID electronic door key card information with prestored RFID electronic door key card information, and sending second data keeping subsystem starting request information to the background management subsystem if the second RFID electronic door key card information is consistent with the prestored RFID electronic door key card information; after the second data keeping subsystem is closed, a second data keeping subsystem closing signal is sent to the background management subsystem;
after the second data keeping subsystem is started, triggering and starting a timer, and when the set timing time is up, if the second data keeping subsystem is detected not to be closed, sending a signal that the second data keeping subsystem is not closed to the background management subsystem;
detecting the placed second data, and if the second data is detected to be taken away, sending RFID anti-tearing electronic tag information corresponding to the taken-away second data to the background management subsystem to carry an offline identification; if the second data are detected to be put back, the RFID anti-tearing electronic tag information corresponding to the put-back second data is sent to the background management subsystem, and the background management subsystem carries the online identification;
the background management subsystem is used for storing information output by the marking card subsystem, receiving the opening request information of the first data keeping subsystem, inquiring the stored identifier of the first data keeping subsystem, if the information is openable, sending the opening request confirmation information of the first data keeping subsystem to the first data keeping subsystem, and setting the identifier of the second data keeping subsystem to be locked; if the data is locked, rejecting the opening request of the first data keeping subsystem;
receiving information of a first RFID anti-tearing electronic tag, matching the information with stored information, and setting the identifier of the second data keeping subsystem to be openable after the matching is successful and a closing signal of the first data keeping subsystem is received; receiving first and second RFID anti-tear electronic tag information carrying online identification, matching the first and second RFID anti-tear electronic tag information with stored information, and performing alarm processing according to a preset alarm strategy when the matching is unsuccessful;
receiving second data keeping subsystem opening request information sent by a second data keeping subsystem, inquiring the stored first data keeping subsystem identification and the second data keeping subsystem identification, if both the first data keeping subsystem identification and the second data keeping subsystem identification are openable, sending second data keeping subsystem opening request confirmation information to the second data keeping subsystem, and setting the first data keeping subsystem identification to be locked; if the data is locked, rejecting the opening request of the second data keeping subsystem;
receiving information of a second RFID anti-tearing electronic tag, matching the information with stored information, and setting the identifier of the first data keeping subsystem to be openable after the matching is successful and a closing signal of the second data keeping subsystem is received;
and receiving the non-closing signals of the first and second data keeping subsystems and carrying out alarm processing according to a preset alarm strategy. Of course, the short message warning prompt function can be customized according to the requirements of customers.
In practical application, it is also possible to allow the car key to be taken out from the second data-keeping subsystem only by taking out the file from the first data-keeping subsystem, putting back the authorized file within a preset timing time and closing the first data-keeping subsystem, so that it is possible to effectively prevent related persons from taking out different related data of the same article, thereby reducing the security of data keeping. For example, a car certification document is placed in a document cabinet, a car key is placed in another article cabinet, the document cabinet and the article cabinet are associated with each other, when a worker opens the document cabinet, the car certification document can be taken out, but the article cabinet cannot be opened, and only when the worker returns the car certification document to the document cabinet and closes the document cabinet, the article cabinet can be opened and the car key can be taken out, so that even if the worker obtains any one of the car certification document and the car key, the worker cannot handle all procedures for purchasing a car. Of course, if the user needs to purchase the car, the car certification document and the car key are required to be taken out by the staff with special authorization.
The structure of the embodiment of the present invention will be specifically described below.
The system of the marking card comprises a bar code reader, an RFID anti-tearing electronic tag information generator and an RFID reader-writer, wherein,
the bar code reader is used for reading bar code information arranged on the data and outputting the read bar code information to the RFID anti-tearing electronic tag information generator;
in this embodiment, the barcode reader reads barcode information through laser, so as to convert the barcode information into a subsequent RFID anti-tear electronic tag using radio frequency.
Further, the bar code reader is also used for outputting the bar code information on the RFID electronic door key card to the RFID anti-tearing electronic tag information configurator.
The RFID anti-tearing electronic tag information generator is used for generating RFID anti-tearing electronic tag information of identification data containing the bar code information according to the received bar code information, generating RFID electronic door key card information for starting the data keeping subsystem, outputting the RFID electronic door key card information to the RFID reader-writer, and outputting the RFID anti-tearing electronic tag information and the RFID electronic door key card information to the background management subsystem;
and the RFID reader-writer is used for writing the received RFID anti-tearing electronic tag information into the data anti-tearing electronic tag and writing the received RFID electronic door key card information into the RFID electronic door key card.
In this embodiment, the number of the RFID anti-tear electronic tags generated by the RFID reader/writer may be determined according to actual needs. After the RFID anti-tear electronic tag is generated, the worker attaches the generated RFID anti-tear electronic tag to a corresponding position of the document, for example, a corresponding file data page or a corresponding position of the key, and the file RFID anti-tear electronic tag information and the key RFID anti-tear electronic tag information are associated with each other.
In practical application, the bar code reader, the RFID anti-tear electronic tag information generator and the RFID reader-writer may be directly purchased products, the RFID anti-tear electronic tag and the RFID electronic key card are generally composed of a coupling element and a chip, and are also products in the prior art, have unique electronic codes, and are attached to an article to identify a target object, and antennas are built in the RFID anti-tear electronic tag and the RFID electronic key card and used for communicating with antennas built in a data cabinet.
The first data cabinet and the second data cabinet have the same structure and function, and will be referred to as data cabinets hereinafter, and will be described as data cabinets.
The filing cabinet includes: the system comprises an RFID electronic door key card module, an information processing module, a storage module, a data detection module, a wireless module, a data cabinet opening and closing state detection module and a timing module; wherein,
the RFID electronic door key card module is used for receiving the RFID electronic door key card information sent by the RFID electronic door key card and sending the RFID electronic door key card information to the information processing module; receiving the matching information of the RFID electronic door key card sent by the information processing module, and opening the data cabinet;
the information processing module is used for receiving the RFID electronic door key card information, matching the RFID electronic door key card information with the prestored RFID electronic door key card information, and returning the RFID electronic door key card matching information to the RFID electronic door key card module if the RFID electronic door key card information is consistent with the prestored RFID electronic door key card information;
receiving the position information sent by the data detection module, acquiring RFID anti-tearing electronic tag information corresponding to the position information from the storage module, carrying an identifier contained in the position information, and sending the information to the wireless module;
the storage module is used for storing the information of the RFID electronic door key card, the information of the RFID anti-tearing electronic tag and the position information of the RFID anti-tearing electronic tag;
the data detection module is used for detecting whether the data in the data cabinet is taken away or not, and if the data is detected to be taken away, the position information carrying the taken-away identification, namely the offline identification is sent to the information processing module; if the data is detected to be put back, the position information carrying the put-back mark, namely the online mark, is sent to the information processing module.
In this embodiment, a specially designed method is used to place data, such as a document or a key, so that the document and key detection module can detect whether the document or the key is removed according to the designed method. The special design method is not in the discussed scope of the present invention, and in practical application, the document or the key may be placed by other methods, and whether the document or the key is removed may also be detected, which is not described herein again.
The data cabinet opening and closing state detection module is used for outputting a first trigger signal to the timing module and sending a first data keeping subsystem opening signal to the wireless module after detecting that the data cabinet is opened, and outputting a second trigger signal to the timing module and sending a first data keeping subsystem closing signal to the wireless module after detecting that the data cabinet is closed;
the timing module is used for timing after receiving the first trigger signal, and sending a data cabinet non-closing signal to the wireless module when the set timing time is up and the second trigger signal is not received;
and if the second trigger signal is received when the set timing time is not up, waiting for re-triggering and timing after the first trigger signal is received next time.
And the wireless module is used for receiving the RFID anti-tearing electronic tag information output by the information processing module, the first data keeping subsystem opening signal and the first data keeping subsystem closing signal output by the data cabinet opening and closing state detection module, and the data cabinet not closing signal sent by the timing module, and sending the data cabinet not closing signal to the background management subsystem. Of course, a wired communication module is also possible.
Further, the data cabinet further comprises: and the camera shooting module is used for triggering and starting camera shooting after receiving the first trigger signal, outputting camera shooting data to the storage module for storage, and stopping camera shooting after receiving the second trigger signal. Thus, the detection module of the open and close state of the file cabinet sends information to the timing module and also sends information to the camera module.
Preferably, the data cabinet further comprises: the data cabinet movement sensing module is used for outputting a first trigger signal to the camera module when detecting that the data cabinet moves, and outputting a second trigger signal to the camera module when detecting that the data cabinet stops moving. Therefore, when the data cabinet moves, the camera shooting module sends the collected camera shooting data to the alarm machine at the background of the background management subsystem or the bank management system through the wireless module, and the alarm machine plays and stores the camera shooting data and triggers alarm at the same time.
Certainly, in practical application, the camera module can also send the collected camera data in real time during the starting period of the data cabinet through the wireless module, so that the background management subsystem or the bank management system can observe the field condition of the data cabinet in real time.
Preferably, the data cabinet further comprises: a display module and an interface module, wherein,
the display module is used for providing a human-computer interaction function, displaying information returned by the background management subsystem and displaying data information corresponding to an operation request input by a user to the user;
in this embodiment, the data information includes one or any combination of information on the number of files or keys, RFID anti-tear electronic tag information, content information, file or key usage record information, and identification information.
The display module may be a liquid crystal display with operation keys.
And the interface module is used for outputting the data information corresponding to the operation request input by the user to the connected external interface equipment according to the instruction of the user.
In practical application, the interface module can also read system upgrading software information from an external interface device connected with the interface module to upgrade the data cabinet.
In the above example, the data cabinet movement sensing module may be a displacement sensor, that is, whether the data cabinet moves can be detected by the displacement sensor, and for the working principle of the displacement sensor, the installation method, and how to determine whether the data cabinet moves, reference may be made to related technical documents, which is not described herein again.
In practical application, the cabinet body of the data cabinet can adopt a metal structure, the metal structure is an all-metal structure, and the RFID antenna of the wireless module is built-in, so that information on the RFID anti-tearing electronic tag cannot be read from the outside, and the data cabinet has a very high shielding effect.
The background management subsystem comprises: a storage module, a data processing module and an alarm module, wherein,
the data processing module is used for receiving the first data keeping subsystem opening request information, inquiring the first data keeping subsystem identification stored in the storage module, if the first data keeping subsystem identification is openable, sending first data keeping subsystem opening request confirmation information to the first data keeping subsystem, and setting the second data keeping subsystem identification to be locked;
receiving the second data keeping subsystem opening request information, inquiring the second data keeping subsystem identification stored in the storage module, if the second data keeping subsystem identification is openable, sending second data keeping subsystem opening request confirmation information to the second data keeping subsystem, and setting the first data keeping subsystem identification to be locked;
receiving information of a first RFID anti-tearing electronic tag, matching the information with stored information, and setting the identifier of the second data keeping subsystem to be openable after the matching is successful and a closing signal of the first data keeping subsystem is received; receiving first and second RFID anti-tearing electronic tag information carrying online identification, matching the information with stored information, and sending an alarm trigger signal to an alarm module when the matching is unsuccessful;
receiving second data keeping subsystem opening request information sent by a second data keeping subsystem, inquiring the stored first data keeping subsystem identification and the second data keeping subsystem identification, if both the first data keeping subsystem identification and the second data keeping subsystem identification are openable, sending second data keeping subsystem opening request confirmation information to the second data keeping subsystem, and setting the first data keeping subsystem identification to be locked;
receiving information of a second RFID anti-tearing electronic tag, matching the information with stored information, and setting the identifier of the first data keeping subsystem to be openable after the matching is successful and a closing signal of the second data keeping subsystem is received;
and receiving the non-closing signals of the first and second data keeping subsystems and sending alarm trigger signals to the alarm module.
And the storage module is used for storing the RFID anti-tearing electronic tag information, the RFID electronic key card information, the first data keeping subsystem identifier, the second data keeping subsystem identifier and the alarm strategy.
And the alarm module is used for receiving the alarm trigger signal, carrying out alarm processing according to the alarm strategy stored by the storage module, generating alarm information and sending the alarm information.
In this embodiment, the alarm policy stored in the storage module includes: the alarm information receiver information corresponding to the first or second data storage subsystem, for example, the terminal information of the related personnel managing the first or second data cabinet.
Furthermore, the background management subsystem further comprises a camera shooting data playback module, and the camera shooting data playback module is used for reading corresponding camera shooting data from the storage module according to an externally input instruction and playing back the camera shooting data.
In this embodiment, the camera module may be implemented by a hidden camera; the Display module may be implemented by a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) Display, or other types of displays; the interface module can be realized by a USB interface; the data processing module, the information processing module, the data detection module and the alarm module can be realized by one or a plurality of processors; the storage module may be implemented by a random access memory, a flash memory, or the like.
FIG. 2 is a schematic diagram of another embodiment of a data storage system. Referring to fig. 2, the data keeping system is composed of a system marking card subsystem, a plurality of data cabinets and a background management subsystem. Wherein,
the system of standard cards is the same as the system of standard cards in figure 1.
FIG. 3 is a diagram illustrating a structure of a system of a tag card according to an embodiment of the present invention. Referring to fig. 3, a worker reads bar code information of data by using a bar code reader and inputs the bar code information into a computer, the computer generates radio frequency identification anti-tear electronic tags for identifying the data according to the obtained bar code information, the radio frequency identification anti-tear electronic tags are respectively attached to a file and an automobile key, and the radio frequency identification anti-tear electronic tags output information to a database server in a background management subsystem through an RFID reader-writer; the functions mainly comprise:
decoding bar code
The existing file generally adopts Quick Response (QR) codes (international standard codes, other code systems are compatible), a worker scans the QR codes into a computer by using a handheld or desktop bar code reader scanning gun, and the computer reads out bar code information of the QR codes through pre-installed QR code decoding software.
Second, RFID coding
And the computer software converts the interpreted bar code information into an RFID code.
Third, write RFID anti-tearing electronic label
The RFID anti-tearing electronic tags are customized in batches in advance, and computer related system software only needs to control the RFID writer to write the content correspondingly converted into the RFID codes in the storage area.
Each RFID anti-tearing electronic tag has a globally unique ID number, and the system software reads the ID number and records the ID number to a database server for identity confirmation of the tag within the validity period. The system software writes the original file or the bar code information on the automobile key in the data area in the RFID anti-tear electronic tag and is used for distinguishing different files and keys.
In practical application, for files, RFID electronic tags can be attached to fixed areas; for the key, because the key is different according to specific motorcycle type, and the area is limited again, so we adopt the disposable RFID electronic tags of knot formula structure, in case take off the label, the label is damaged promptly, has not been used.
Fourth, write the RFID entrance guard's card of the filing cabinet
And the computer relation system software generates a corresponding number of data cabinet RFID access cards (RFID electronic access cards) according to the ID of the registered sales shop.
The data cabinet RFID access card is strictly corresponding to the data cabinet of each registered sales shop, and when the system software writes the data cabinet RFID access card, the sales shop (data cabinet RFID access card identification) corresponding to the data cabinet RFID access card and the specific number of the data cabinet RFID access cards distributed to the sales shop are recorded.
Fifthly, data uploading
And uploading all the service data to a database server by the computer relation system software.
The data cabinets comprise a data cabinet A and a data cabinet B of the automobile sales A shop and two data cabinets of the automobile sales B shop, and the structure of the data cabinets is the same as that of the data cabinet shown in the figure 1, and the details are not repeated here.
In this embodiment, the data cabinet may communicate with the 3G wireless access device in the background management subsystem through the 3G wireless network.
FIG. 4a is a schematic diagram of an external structure of a data cabinet according to an embodiment of the present invention. FIG. 4a is a schematic diagram of an internal structure of a data cabinet according to an embodiment of the present invention. Referring to fig. 4a and 4b, the data cabinet utilizes the mutual control patent technology, i.e. the data cabinet is correlated with the data cabinet storing other data of the same article, thereby ensuring the safety of the article in the cabinet. The data cabinet adopts inside and outside structure, and as for inner structure, in order to improve the utilization ratio in space, adopts multiple gate-type structure, both can guarantee the quantity of depositing file and key like this, can guarantee the accuracy of reading again.
FIG. 5 is a diagram illustrating placement of files in a data cabinet according to an embodiment of the invention. Referring to fig. 5, a plurality of data gates are included, which is illustrated as a first data gate and a second data gate, the first data gate includes 10 layers, 10 files are orderly placed in each layer, and gaps between the files can ensure that the data cabinet can identify RFID tags on the files.
FIG. 6 is a schematic diagram of a key of a vehicle in a data cabinet according to an embodiment of the present invention. Referring to fig. 6, the car key is placed in a similar manner to the documents, except that the slot of each document is designed as a small box.
The background management subsystem comprises a 3G wireless access device, a data receiving and sending server, a data processing server, a service machine, an alarm machine, a short message sending server, a short message sending device and a database server, wherein the 3G wireless access device is connected with the data receiving and sending server, the data receiving and sending server is connected with the data processing server through a local area network or a proprietary network, the short message sending server is connected with the short message sending device, and the service machine, the alarm machine, the short message sending server and the database server are respectively connected with one another through the local area network or the proprietary network.
And the data receiving and sending server is used for being responsible for communication between the remote data cabinet and the data processing server as well as the service terminal.
In this embodiment, taking an automobile sales center as an example, the automobile sales center includes a plurality of automobile shops, the data cabinets of all the automobile shops perform data interaction with the data receiving and sending server, all the data are uploaded to the data processing server through the data receiving and sending server, then various instructions issued by the data processing server and the service terminal are sent to the data cabinets of all the automobile shops through the data receiving and sending server, and the data cabinets execute corresponding operations according to the received instructions.
The data receiving and sending server is connected with one or more groups of 3G wireless transceiving equipment through a plurality of serial port cards, and the specific number can be determined according to the specific number of the data cabinets.
And the data processing server analyzes and processes the data uploaded by the data receiving and sending server, sends the data needing alarming and reminding to the alarm machine for processing, sends the real-time control data to each data cabinet, and sends the related data to the database server for storage.
In this embodiment, the software for processing data in the data processing server is designed in a multi-thread structure, each thread supervises one or more vehicle shop communication data, and the number of the data processing servers may also be determined according to the specific number of the data cabinets.
There may be a plurality of service machines, and the number of the service machines may be set according to actual working requirements.
In this embodiment, the function of the service machine is to check the use record and the sales condition of each file and key, remotely turn on a camera to check the field condition, and the like.
The software in the service machine adopts a C/S structure, the server side of the service machine is a data receiving and sending server, and in practical application, a plurality of special data channels can be designed on the data receiving and sending server to ensure the real-time performance and stability of service data and video data transmission and calling. The number of the special data channels determines the number of the set service machines.
And the alarm machine is used for sending out a sound alarm after receiving the alarm and reminding data, displaying or playing the alarm and reminding data and uploading the alarm and reminding data to the short message sending server.
In this embodiment, the alarm software in the alarm device adopts a C/S structure, and the server side thereof is a data processing server, and a plurality of alarm devices can be set according to actual conditions.
And the short message sending server is used for sending the alarm and reminding data sent by the alarm to the mobile phone of the relevant responsible person through a wireless network.
In this embodiment, the sms server may use a modem (modem) with low cost and high efficiency.
And the database server is used for storing all data uploaded by the data cabinet and the system marking card subsystem and supporting the query function of the business machine.
In this embodiment, the database server may be designed using MySQL.
FIG. 7 is a flowchart illustrating a data storage method according to an embodiment of the present invention. Referring to fig. 7, the process includes:
step 701, the system label card subsystem respectively generates RFID anti-tearing electronic label information of identification data according to bar code information on a plurality of data associated with the same article, respectively writes the generated RFID anti-tearing electronic label information into the associated data, generates RFID electronic door key card information for a plurality of data storage subsystems associated with the same article and writes the RFID electronic door key card information into the associated RFID electronic door key cards;
step 702, the data keeping subsystem receives the information of the RFID electronic door key card, determines that the stored data keeping subsystem corresponding to the RFID electronic door key card is openable, matches the information of the RFID electronic door key card stored in advance, and if the information is consistent, opens the data keeping subsystem, triggers a start timer, and sends a data keeping subsystem opening signal to the background management subsystem;
step 703, detecting the placed data, and if the data is detected to be taken away, sending the RFID anti-tearing electronic tag information corresponding to the taken-away data to the background management subsystem, wherein the RFID anti-tearing electronic tag information carries an offline identifier; if the data are detected to be put back, the RFID anti-tearing electronic tag information corresponding to the put-back data is sent to the background management subsystem, and the online identification is carried;
step 704, timing, when the set timing time is up, if detecting that the data-keeping subsystem is not closed, sending a signal that the data-keeping subsystem is not closed to the background management subsystem;
705, the background management subsystem receives a data keeping subsystem starting signal, sends a data keeping subsystem identifier to a related data keeping subsystem as a closing signal, receives RFID anti-tearing electronic tag information, matches the RFID anti-tearing electronic tag information with stored information, and sends the data keeping subsystem identifier to the related data keeping subsystem as an openable signal after the RFID anti-tearing electronic tag information is successfully matched and the data keeping subsystem closing signal is received; receiving RFID anti-tearing electronic tag information carrying online identification, matching with the stored information, and receiving a data keeping subsystem non-closing signal when the matching is unsuccessful, and performing alarm processing according to a preset alarm strategy.
FIG. 8 is a schematic diagram of a working process of a data cabinet according to an embodiment of the present invention. Referring to fig. 8, the process includes:
step 801, receiving information of a data cabinet RFID access card, and matching the stored information of the data cabinet RFID access card;
in the step, a worker holds an authorized data cabinet RFID access card to approach the data cabinet, the data cabinet identifies the data cabinet RFID access card information, judges whether the data cabinet RFID access card information is stored in a storage area, if so, the data cabinet RFID access card is a legal access card, and executes the next step; if the RFID access card does not exist, the data cabinet RFID access card is an illegal access card, and an opening refusing signal is displayed to the staff.
The information of the RFID access card of the data cabinet with the opening authority is stored in the data cabinet in advance, the information can be input by a worker with the authority, and the information of the RFID access card of the data cabinet can be issued to the data cabinet for storage when the RFID access card of the data cabinet is generated by the marking card subsystem.
Further, password information using the RFID access card is stored in the data cabinet in advance, after the data cabinet judges that the information of the RFID access card of the data cabinet is stored in the storage area, a worker is requested to input the password information, if the password information is correctly input, the follow-up steps are executed, and if the password information is not correctly input, the process is ended.
Step 802, successfully matching, and sending a data cabinet RFID access card authentication request to the outside, wherein the data cabinet RFID access card authentication request carries information of the data cabinet RFID access card;
in the step, a data cabinet RFID access card authentication request is sent to the background management subsystem, and the data cabinet RFID access card information is carried.
Step 803, receiving the identification request confirmation information of the RFID access card of the data cabinet, and opening the data cabinet;
in the step, a data cabinet RFID access card authentication request is received to a background management subsystem, whether a data cabinet associated with the data cabinet corresponding to the data cabinet RFID access card identification is closed or not is judged according to the data cabinet RFID access card identification carried in the data cabinet RFID access card information, if yes, data cabinet RFID access card authentication request confirmation information is returned to the data cabinet, and if not, request rejection information is returned. Or if the stored data cabinet identification corresponding to the data cabinet RFID access card identification is openable, returning data cabinet RFID access card authentication request confirmation information to the data cabinet, and setting the data keeping subsystem identification associated with the data keeping subsystem to be locked.
Step 804, starting a timer to time;
in this step, in order to improve the security of data storage, when the data cabinet is opened, the timer is started to time to ensure that the data cabinet is closed within the preset timing time.
Step 805, acquiring information of the RFID anti-tearing electronic tag of the removed file, and sending the information of the off-line anti-tearing electronic tag to the outside;
in this step, when the worker takes the file away, the RFID antenna built in the data cabinet cannot detect the anti-tear electronic tag information of the file at the preset position of the file, and queries the corresponding relationship between the pre-stored file position information and the RFID anti-tear electronic tag information according to the position information stored in the file, marks the RFID anti-tear electronic tag information corresponding to the position information as offline, and sends the offline information to the background management subsystem.
And after receiving the information of the RFID anti-tearing electronic tag carrying the offline, the background management subsystem marks the data cabinet corresponding to the information of the RFID anti-tearing electronic tag as the offline. In the following, if the background management subsystem receives the information of the RFID anti-tearing electronic tag carrying the offline information of the same data cabinet, the data cabinet mark is not updated.
Step 806, obtaining the RFID anti-tear electronic tag information of the playback file, confirming whether the playback file is authorized, if yes, executingstep 807;
in this step, the RFID antenna built in the data cabinet detects that the removed file is placed back at a preset position of the file, acquires the anti-tearing electronic tag information of the file, and inquires whether the anti-tearing electronic tag information is stored, if yes, the played file is authorized, otherwise, the played file is prompted to be an unauthorized file, and a worker is required to replace the unauthorized file.
In practical application, a worker may also take out multiple files at one time, in order to ensure the ordered placement of the files, the file position information and the anti-tearing electronic tag information may also be respectively matched with the corresponding relationship between the pre-stored file position information and the anti-tearing electronic tag information, and if both the file position information and the anti-tearing electronic tag information can be matched with each other, the file is an authorized file and is placed at the original position; and if the matching fails, prompting corresponding information.
Step 807, determining whether the data cabinet is closed within a preset timing time, and if so, sending the anti-tearing electronic tag information of the playback file subjected to authorization confirmation outwards and carrying an online identifier.
In this step, if the timer receives a trigger signal for closing the data cabinet within a preset timing time, the timer is cleared and waits for the next trigger, and meanwhile, the data cabinet sends the anti-tear electronic tag information of the playback file authorized and confirmed in step 706 to the background management subsystem, carrying an online identifier, and if a plurality of playback files authorized and confirmed exist, the anti-tear electronic tag information of the last playback file authorized and confirmed can be sent only.
If the timer does not receive the trigger signal for closing the data cabinet within the preset timing time, triggering an alarm according to a preset alarm strategy, and sending a signal that the data cabinet is not closed on time to the background management subsystem, wherein the signal carries the identification of the data cabinet.
Step 808, receiving the RFID anti-tear electronic tag information carrying the online identifier, and updating the information cabinet identifier and the associated information cabinet identifier.
In this step, after receiving the RFID anti-tear electronic tag information carrying the online identifier, the data cabinet identifier of the data cabinet is set to be openable, and the data keeping subsystem identifier associated with the data keeping subsystem is set to be openable.
It should be noted that the above example is described by taking the file out of the data cabinet as an example, and the workflow for taking out the car key from the data cabinet is similar to the file taking out, and is not repeated herein. Meanwhile, the embodiment of the invention can also be applied to a plurality of data cabinets for respectively storing the data related to each object, and the method for taking out the data is also similar to the above.
FIG. 9 is a schematic view of another process of the operation of the data cabinet according to the embodiment of the present invention. Referring to fig. 9, the process includes:
step 901, a worker holds an authorized RFID data cabinet door key to open a file data cabinet and close the file data cabinet after taking out a file;
step 902, judging whether the data cabinet is closed, if so, executing step 903, otherwise, executing step 911;
step 903, the system automatically judges whether the taken-out file is authorized, if so, step 904 is executed, otherwise, step 912 is executed;
step 904, the worker can open the key cabinet to get the key and close the key cabinet;
step 905, determine whether the key cabinet is closed, if yes, go to step 906, otherwise go to step 913;
step 906, the system automatically judges whether the key taken out is authorized, if so, step 907 is executed, otherwise, step 814 is executed;
step 907, the system stores all the records in a database server;
911, if the system is not closed after five minutes, the system gives an alarm and sends a short message or calls for reminding;
step 912, the system automatically refuses the staff of the sales shop to open the key data cabinet and give an alarm, and the system sends a short message or calls a call to remind;
step 913, if the system is not closed after five minutes, the system alarms and sends a short message or calls for reminding;
step 914, the system automatically refuses the staff of the sales shop to open the file data cabinet and give an alarm, then checks whether the key is put into the cabinet every 30 minutes, if the key is not put into the cabinet after 2 hours, the system sends a short message or calls for reminding.
This process ends.
In the above example, it is needless to say that the data cabinet storing another data related to the same article may be opened, another data may be taken out, authorization determination may be performed on the another data, and the recorded data may be stored in the database server after authorization determination is performed. Referring to the right flow of fig. 9, the operation flow is similar to the left flow of fig. 9, and is not repeated here.
As can be seen from the above, the data keeping system and method of the embodiment of the present invention adopt the RFID technology, and since the RFID is an application technology that is easy to operate, simple, practical, and particularly suitable for flexibility of automation control, the identification work does not require manual intervention, and can support both the read-only work mode and the read-write work mode, and does not require contact or aiming; can freely work under various severe environments: the short-distance radio frequency product is not afraid of severe environments such as oil stain, dust pollution and the like, and can replace bar codes. The unique advantages of the method are incomparable with other identification technologies. For example, the following aspects are included:
the reading is convenient and quick: the reading of data need not the light source, can see through the extranal packing even and go on, and effective identification distance is longer, when adopting the initiative RFID who takes the battery from tearing electronic tags, and effective identification distance can reach more than 30 meters.
The recognition speed is high: as soon as the RFID anti-tearing electronic tag enters the magnetic field, the reader can read information in the RFID anti-tearing electronic tag instantly, and can process a plurality of RFID anti-tearing electronic tags simultaneously to realize batch identification.
The data capacity is large: in the prior art, a two-dimensional bar code with the largest data capacity, such as PDF417, can store only 2725 numbers at most, and if letters are included, the storage amount is less; the RFID anti-tearing electronic tag can be expanded to dozens of K according to the needs of users;
long service life and wide application range: the RFID anti-tearing electronic tag adopts a radio communication mode, can be applied to high-pollution environments and radioactive environments such as dust, oil stains and the like, and has a service life greatly longer than that of a printed bar code due to the closed package.
The tag data can be dynamically changed: data can be written into the RFID anti-tearing electronic tag by using the programmer, so that the RFID anti-tearing electronic tag is endowed with the function of an interactive portable data file, and the writing time is shorter than that of printing a bar code.
Better security: the RFID anti-tearing electronic tag can be embedded or attached to products of different shapes and types, and password protection can be set for reading and writing of tag data, so that the RFID anti-tearing electronic tag has higher safety.
Dynamic real-time communication: the RFID anti-tearing electronic tag can communicate with the reader at the frequency of 50-100 times per second, so that the position of the RFID anti-tearing electronic tag can be dynamically tracked and monitored as long as an object attached to the RFID anti-tearing electronic tag appears in the effective identification range of the reader.
The data cabinet communicates through the 3G wireless network, and 3G wireless communication covers the whole country, does not have the blind area, and it is fast, stable high to have communication speed, supports big data traffic for information transmission's real-time, flexibility greatly increased.
The data cabinet can be opened by the corresponding authorized RFID electronic door key card for multiple times, so that the file data cabinet can be opened for multiple times to look up, supplement and take out files; the key data cabinet can be opened for a plurality of times to take out the keys for the work of the user such as car watching, car checking, garage moving and the like, and when the reminding time set by the system is up and the time is not put in the garage, the system can send reminding short messages to relevant responsible persons, thereby avoiding the abnormal situation; meanwhile, by adopting a dual-machine mutual control patent technology, namely the file data cabinet and the key data cabinet are mutually associated and controlled, the file data cabinet and the key data cabinet can not be opened at the same time, so that the key data cabinet can not be opened when unauthorized files are taken from the file data cabinet; on the contrary, when an unauthorized key is taken out from the key file cabinet, the file cabinet is not allowed to be opened, so that unauthorized files and the key can be effectively prevented from being taken out simultaneously, and the problem of safe storage of the files and the key is thoroughly solved. For banks, the risk of cheating credit is effectively avoided, so that the problem that the banks need to park workers to a sales shop is solved, the labor cost is saved, and the cheating credit phenomenon of internal and external collusion is avoided; for the car shops, the risk of losing files and keys even vehicles is effectively avoided, the convenience of using the files and the keys is not influenced at all, and the specific sale conditions of all the sales shops can be mastered in real time; furthermore, prompt and warning information can be given in time when abnormal conditions occur, and effective basis for follow-up after the fact is provided.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.