Embodiment
As shown in Figure 1; Net was as concerning security matters carrier information and application carrier in close year; Zone in physically having covered concerning security matters office, concerning security matters archive office, concerning security matters carrier warehouse, concerning security matters building, concerning security matters unit garden and the transportation of concerning security matters carrier and tyre way; Logically carried concerning security matters carrier intelligent monitor system; Comprise transportation of concerning security matters office supervisory system, concerning security matters archive office supervisory system, concerning security matters building supervisory system, concerning security matters unit's garden supervisory system, concerning security matters carrier warehouse supervisory system and concerning security matters carrier and the application system that provides around concerning security matters carrier security monitoring demand such as supervisory system in addition, realize to the concerning security matters carrier comprise buying, allot, transport, put in storage, take, in addition, give back, make an inventory and the intelligent monitoring of the Life cycle of destruction etc.Through close year net; Concerning security matters unit and supervisory department pass through corresponding authority; Can grasp allocation and operating position, geographical location circumstances and the violation record of each concerning security matters carrier in real time, the transparency, reliability and the security that have improved the concerning security matters carrier monitoring greatly.
Close year net is the carrier of concerning security matters carrier intelligent monitor system.It is platform that concerning security matters carrier intelligent monitor system is meant in the concerning security matters units such as all kinds of Party and government offices that relate to state secret and military enterprise with the network; Be used to carry and the electronic information that relates to the monitoring of concerning security matters carrier Life cycle such as comprise transportation, put in storage, take and give back; Comprise concerning security matters office supervisory system, concerning security matters archive office supervisory system, concerning security matters building supervisory system, concerning security matters unit's garden supervisory system, concerning security matters carrier warehouse supervisory system and transportation of concerning security matters carrier and tyre supervisory system etc.; Above-mentioned each system is through RF (Radio Frequency; Radio frequency), GPRS (General Packet Radio Service; GPRS) or GPS communication modes such as (Global Position System, GPSs) insert close year net.Wherein, the concerning security matters carrier mainly comprises archives, technical information, important drawing, floppy disk, CD, USB flash disk, portable hard drive, hard disk and tape etc.
The utility model provides, and close year net carried that core technology that all kinds of concerning security matters carrier monitoring system adopted is identical, and the embodiment of the utility model has set forth concerning security matters office supervisory system.
Concerning security matters office supervisory system comprises recognition system, gate control system, warning system, monitoring camera and cigarette thalposis sensor etc.Recognition system comprises the RFID label that is used for the unique identification of concerning security matters carrier, first antenna and second antenna and the read write line that is used to expand the read write line identification range; Wherein, The RFID label adopts mode such as stickup, seal, embedding and concerning security matters carrier to bind; Make the RFID label and the concerning security matters carrier of unique correspondence is inseparable with it, information such as the name of an article of the concerning security matters carrier that this RFID tag record is bound with it, model, affiliated unit, custodian, level of confidentiality, secret phase.First antenna and second antenna are respectively applied for and are positioned over both sides, concerning security matters office gateway; Read write line is positioned over the concerning security matters office inlet outside; First antenna is connected with read write line through cable with second antenna, and read write line is connected through netting twine with the information center server.
Gate control system comprises the electronic lock and the read write line that places the concerning security matters office door inlet outside that is used to control the door switching of concerning security matters office; Wherein, electronic lock is connected with the information center server through cable, and read write line is connected with the information center server through netting twine.
Warning system comprises acoustic-optic alarm and note dispensing device, and wherein, acoustic-optic alarm and note dispensing device are positioned in the concerning security matters office, and acoustic-optic alarm and note dispensing device keep being connected with the information center server through cable respectively.
The monitoring camera that is used for monitoring in real time situation in the concerning security matters office is connected through netting twine with the information center server.
The cigarette thalposis sensor that is used to gather environmental factor in the concerning security matters office is connected with the information center server.
Background server, user terminal, rfid interrogator, RFID label and alarm monitoring equipment that native system adopts are universal product.
As shown in Figure 4, concerning security matters carrier warehouse-in and the step of distributing are following:
(A1) the concerning security matters carrier is fixed close.Security management person's logon information central server 100; The concerning security matters carrier is unified close surely through concerning security matters carrier intelligent monitor system; Be provided with security classification, security deadline, fixed close foundation, deciphering according to, know individuation security information such as scope, and above-mentioned information is offered the storekeeper.Wherein, security classification is divided into top secret, secret, secret and non-close;
(A2) concerning security matters carrier information typing.Behind storekeeper's log-on message central server 100; The concerning security matters carrier security information that will be obtained by step (A1) and other individual informations of concerning security matters carrier write the database of RFID label and information center's server 100 in the lump like the name of an article, model, affiliated unit, custodian etc.;
(A3) the concerning security matters carrier is bound the RFID label.The storekeeper binds the RFID label of concerning security matters carrier and the corresponding individual information of typing, and binding mode is stickup, plastic packaging, embedding, suspension etc., makes concerning security matters carrier and RFID label inseparable, especially makes the RFID label not best in the human eye visual range.
(A4) concerning security matters carrier distribution.The storekeeper is according to the custodian's information in each concerning security matters office and human needs and the concerning security matters carrier individual information, with the concerning security matters carrier distribution to each concerning security matters office and individual, and with the database of assignment information entry information central server 100.
(A5) finish.This concerning security matters carrier distribution work is accomplished, and the database of information center's server 100 has been accomplished the typing of the individual information clauses and subclauses such as buying, warehouse-in and distribution of concerning security matters carriers, and storekeeper and security management person finish login sessions, end of operation.
So far, concerning security matters carrier office has become close year needs the minimum perform region of monitoring in real time in the net.
For the tyre monitoring of concerning security matters carrier, owing in above-mentioned concerning security matters carrier warehouse-in process, accomplished the binding of concerning security matters carrier and RFID label, and all stored the individual information of concerning security matters carriers in RFID label and the information center's server 100.The employee's who stores on the identification card department information, personal information and security classification.Wherein, security classification is divided into top secret, secret, secret and non-close, and grade from high to low; If employee's security classification be secret, then can't secret in addition and above concerning security matters carrier, in addition; Be greater than or equal in employee's level of confidentiality under the situation of concerning security matters carrier level of confidentiality; Must judge then employee's concerning security matters carrier applies for whether having passed through to examine in addition, is examining under the situation about passing through, can allow employee's tyre concerning security matters carrier to go out.
As shown in Figure 5, the detailed process that the concerning security matters carrier is monitored in addition is following:
(B1) the concerning security matters carrier is applied in addition.The employee proposes the concerning security matters carrier and applies in addition through concerning security matters office network termination login in inner close year concerning security matters carrier intelligent monitor system.Wherein, the employee must provide the relevant information ofidentification card 301 and the individual information of application concerning security matters carrier in addition to concerning security matters carrier intelligent monitor system;
(B2) examine application in addition automatically.Concerning security matters carrier intelligent monitor system is at first examined according to employee'sidentification card 301 and the security information in the concerning security matters carrier individual information automatically; If employee's level of confidentiality is greater than or equal to the level of confidentiality of concerning security matters carrier; Then examine automatically through, get into step (B3), otherwise; The concerning security matters carrier is applied for out of court in addition, gets into step (B5);
(B3) application is in addition examined in manual work.Concerning security matters carrier intelligent monitor system applies for being pushed to security management person in addition with the concerning security matters carrier; Security management person carries out manual work according to leaders' such as the tyre origin of an incident and project leader written instructions and examines; Add an approval record in addition if manual work is examined through, concerning security matters carrier intelligent monitor system to the database of information center's server 100, this record comprises concerning security matters carrier, identity identification information and time etc. in addition of employee and concerning security matters office in addition; And entering step (B4); Otherwise the concerning security matters carrier is applied for out of court in addition, gets into step (B5);
(B4) the concerning security matters carrier affirmation of going out in addition.The employee carriesfirst antenna 202, second antenna, 203 zones that the concerning security matters carrier gets into both sides, concerning security matters office gateway, and at this moment, all concerning security matters carriers that 200 couples of employees of recognition system carry carry out batch and discern automatically; Read separately the RFID label E PC sign indicating number of binding, and submit to information center's server 100, information center's server is compared the tyre approval record that obtains in itself and the step (B3); If than correct, information center's server 100 is deleted above-mentioned tyre approval record from database, and the electronic lock in gate control system 300 302 is assigned unlock instruction immediately; Open the concerning security matters office door, let pass, get into step (B5); Otherwise; If comparison failure or do not have approval record in addition, then information center's server 100 is assigned alarm command to warning system 400 and is carried out sound and light alarm and SMS alarm, and database is write down and deposits in this violation operation; Recorded content comprises employee and concerning security matters carrier identity information, running time and Video Document etc., gets into step (B5);
(B5) finish.This concerning security matters carrier is monitored completion in addition.
Below through by embodiment and accompanying drawing the utility model being described in further detail, but following examples only are illustrative, and the protection domain of the utility model does not receive the restriction of these embodiment.
The close year net that the utility model provides based on Internet of Things; Its core application is a concerning security matters carrier intelligent monitor system; This system comprises concerning security matters office supervisory system, concerning security matters archive office supervisory system, concerning security matters building supervisory system, concerning security matters unit's garden supervisory system, concerning security matters carrier warehouse supervisory system and transportation of concerning security matters carrier and tyre supervisory system etc.; For the gordian technique and the principle of each system of more representative description, emphasis is set forth concerning security matters office supervisory system.
The illustrative view of functional configuration of concerning security matters office supervisory system is as shown in Figure 2, comprises the information center's server 100 that is in the host computer aspect and the recognition system 200, gate control system 300, warning system 400,monitoring camera 500 and thecigarette thalposis sensor 600 that are in the slave computer aspect.The concerning security matters zone is concerning security matters personnel's a Administrative Area, and the concerning security matters carrier comprises PC 701,portable machine 702, portablehard drive 703,USB flash disk 704 andpaper document 705 etc.
In order further to set forth function, physical location and the mutual association thereof of above-mentioned each system, combine the schematic layout pattern in kind of concerning security matters office supervisory system at present, as shown in Figure 3, the scale and the operating mode of total system are set forth as follows more specifically.
Said information center server 100 is the data center of concerning security matters office supervisory system; Middleware, information handling system, database etc. have been comprised; Label information in order to read write line is read is handled, and its function relates to concrete system applies, as realizing information encryption or safety certification etc.The real-time dynamic data of concerning security matters office comprises that all operations record, the monitoring of concerning security matters office environment and the safeguard information etc. of single concerning security matters carrier all are stored in the database of information center's server 100.
Said information center server 100 provides the network service based on ICP/IP protocol, makes the user of authority carry out data access through close year net easily.Especially; For the supvr who possesses system manager's authority; Can be configured concerning security matters office supervisory system through the Intranet client browser, for example, the setting of the launching of system maintenance and renewal, each functional module, user account information, role assignments and force issuing of access control policy etc.; Simultaneously, can also be to video record, in violation of rules and regulations the record and the leakage of a state or party secret etc. inquired about and trace to the source.Person in charge and supervisory organ then can pass through close year net, and be very clear to allocation, use and the violation situation etc. of concerning security matters carrier in each scoping unit.
Said information center server 100 data centers as concerning security matters office supervisory system; Receive, handle and store the data message of submitting to by recognition system 200, gate control system 300, warning system 400,video monitoring system 500 andcigarette thalposis sensor 600; Simultaneously; According to business demand control command is assigned by above system, realize the interlock between above-mentioned each system.
Said recognition system 200 comprisesRFID label 201,first antenna 202, second antenna 203, read write line 204.Above-mentionedRFID label 201 adopts mode such as stickups, plastic packaging, embedding, suspension and concerning security matters carrier to bind; Make the RFID label and the concerning security matters carrier of unique correspondence is inseparable with it; This RFID tag record has with it information such as the name of an article, model, affiliated unit, custodian, level of confidentiality, secret phase of the concerning security matters carrier of binding; Simultaneously, come each concerning security matters carrier of unique identification through the EPC in the RFID label 201 (Electric Product Code, electronic product code).
First antenna 202, second antenna 203 be used to the to extend reading distance and the scope of read write line 204 through the operation to read write line 204, can be provided with opening, power parameter and the scan pattern etc. of itsfirst antenna 202, second antenna 203.Read the EPC information in theRFID label 201 throughfirst antenna 202, second antenna 203 or read write line 204; Thereby realize identification to the concerning security matters carrier; Subsequently, with other individual informations of each EPC information and concerning security matters carrier entry information central server 100 in the lump.
Said gate control system 300 comprisesidentification card 301, electronic lock 302 and read write line 204.Wherein,Identification card 301 is used for the employee is carried out identification, includes the RFID label, and packing forms can customize according to real needs; EPC in this identification card is as employee's identity recognition number; And can change to uniqueness identification informations such as employee's job number, identification card number according to concrete needs, in addition, also comprise employee's security information in this identification card.
The read write line 204 orfirst antenna 202, second antenna 203 read the individual identification information of employee's identity identification information and concerning security matters carrier; And above-mentioned information submitted to information center's server 100 through forms such as USB, serial ports or netting twines; Information center's server 100 judges through the individual identification information of above-mentioned employee's identity identification information and concerning security matters carrier whether this is legal in addition; And determine whether sending unlock instructions according to judged result to electronic lock 302, its basis for estimation be the concerning security matters carrier apply in addition examine the result.Above-mentioned electronic lock 302 is installed on concerning security matters office door lock place, receives the unlock instruction that information center's server 100 is assigned through interface shapes such as USB, serial ports or netting twines, serves as come in and go out gate inhibition's card reader of concerning security matters office of employee.
Said warning system 400 comprises acoustic-optic alarm 401 andnote dispensing device 402, keeps being connected with information center server 100 through interface shapes such as USB, serial ports or netting twines.Information center's server 100 detects abnormal conditions; For example; The concerning security matters carrier is in addition illegal, and then information center's server 100 is given warning system 400 with sending controling instruction, and warning system 400 is opened acoustic-optic alarms and sent preset alarming short message to designated mobile phone number.
500 pairs of concerning security matters offices of said monitoring camera carry out 24 hours video monitorings, and Video Document is stored in information center's server 100.There are the user or the keeper of authority to have access to above-mentioned Video Document, and realize consulting in real time of concerning security matters office's image through clientbrowser.Monitoring camera 500 is connected with information center server 100 maintenances through interface shapes such as USB, serial ports or netting twines.
The inner environmental factors such as cigarette temperature of 600 pairs of concerning security matters offices of said cigarette thalposis sensor are carried out early warning, and the early warning mode can adopt with above-mentioned warning system 400 and link.Cigarette thalposis sensor 600 is connected with information center server 100 maintenances through interface shapes such as USB, serial ports or netting twines.
For the ease of setting forth the tyre and the inventory procedure of concerning security matters carrier in the concerning security matters office, be necessary earlier the warehouse-in and the assigning process of concerning security matters carrier to be described, following content is used to describe the warehouse-in and the assigning process of concerning security matters carrier.
For the warehouse-in of concerning security matters carrier, at first the concerning security matters carrier is carried out one by one or in batches fixed close, subsequently by security management person; The storekeeper writes the RFID label of binding with the concerning security matters carrier with decide confidential information and other individual informations of concerning security matters carrier; Simultaneously, above-mentioned information all is uploaded to information center's server 100, last; The storekeeper puts into concerning security matters carrier warehouse with the classification of concerning security matters carrier, accomplishes the in-stockroom operation of concerning security matters carrier.In the assigning process of concerning security matters carrier, according to the custodian's information in each concerning security matters office and a human needs and the concerning security matters carrier individual information, the concerning security matters carrier is distributed by the storekeeper.
Our body intelligent control method of a kind of concerning security matters based on RFID, information center's server is provided with information handling system, middleware and database, and information handling system links to each other with database through middleware; Information handling system is to the warehouse-in of concerning security matters carrier and go out library information and handle; Middleware is used for the data message after handling was carried out the heavy and encoding process of elimination; Remove redundant information and adopt unified coded format that data message is reintegrated, the real-time dynamic data in database storing concerning security matters zone; Said method for supervising comprises the warehouse-in process and tyre monitor procedure of concerning security matters carrier.
Described method, the warehouse-in process of concerning security matters carrier comprises:
A1) the concerning security matters carrier is fixed close: security management person's logon information central server, through information handling system the concerning security matters carrier is unified closely surely, and level of confidentiality and individuation information are set, and above-mentioned information is offered the storekeeper;
A2) concerning security matters carrier information typing: storekeeper's log-on message central server writes RFID label and database with level of confidentiality that obtains and individuation information;
A3) the concerning security matters carrier is bound the RFID label: the storekeeper binds the RFID label of concerning security matters carrier and corresponding level of confidentiality of typing and individuation information;
A4) concerning security matters carrier distribution: the storekeeper is according to the custodian's information in the individuation information of each concerning security matters office of concerning security matters zone and a human needs and concerning security matters carrier; The concerning security matters carrier distribution is arrived each concerning security matters office and individual, and with the assignment information input database;
A5) finish the warehouse-in process: storekeeper and security management person finish login sessions, end of operation.
Described method, the outbound monitor procedure of concerning security matters carrier comprises:
B1) the concerning security matters carrier is applied in addition: employee's log-on message central server proposes the concerning security matters carrier and applies in addition; The employee must provide the relevant information of identification card and the level of confidentiality and the individuation information of application concerning security matters carrier in addition to information center's server;
B2) examine in addition application automatically: the level of confidentiality and the individuation information of the concerning security matters carrier that information handling system provides according to the employee; Compare with the corresponding information of database; Automatically examine according to the security information of identification card and concerning security matters carrier then; If employee's level of confidentiality is greater than or equal to the level of confidentiality of concerning security matters carrier, then examine automatically through, get into step B3; Otherwise the concerning security matters carrier is applied for out of court in addition, gets into step B5;
B3) application is in addition examined in manual work: information handling system applies for being pushed to security management person in addition with the concerning security matters carrier; Security management person applies for according to the concerning security matters carrier in addition and responsible official written instructions are carried out manual work and examined; If manual work examine through; Information handling system is added approval record in addition to database, and gets into step B4; Otherwise the concerning security matters carrier is applied for out of court in addition, gets into step B5;
B4) the concerning security matters carrier affirmation of going out in addition: the employee carries first antenna, second antenna area that the concerning security matters carrier gets into both sides, gateway, concerning security matters zone; Read write line all concerning security matters carriers that the employee is carried carry out batch identification automatically then; Read the RFID label product electronics sign indicating number of binding separately, and submit to the information handling system of information center's server; Information handling system is compared the tyre approval record that this product electronics sign indicating number and step B3 obtain, if than correct, information handling system is deleted above-mentioned tyre approval record from database, and assigns unlock instruction to electronic lock immediately, opens the concerning security matters zone; If comparison is failed or is not had approval record in addition; Then the information handling system of information center's server is assigned alarm command to acoustic-optic alarm and note dispensing device respectively and is carried out sound and light alarm and SMS alarm, and database is write down and deposits in this violation operation;
B5) finish the outbound monitor procedure.
Above content keypoint has been described the concerning security matters carrier tyre monitor procedure in concerning security matters office; Similarly, be prototype with concerning security matters office, with security monitoring range expansion to the concerning security matters floor of concerning security matters carrier, concerning security matters building, whole concerning security matters unit garden; As shown in Figure 6; Security monitoring borders such as the office gateway in the concerning security matters unit garden, stair corridor gateway, unit garden toran all will be disposed concerning security matters carrier intelligent monitor system and insert intramural privately owned close year net, realize that the concerning security matters carrier all is in the controlled scope of safety, further; Privately owned close year net between each concerning security matters unit networked, the final close year net that forms unification.
Monitor application class in addition seemingly for maintain secrecy detailed process and realization principle and the above-mentioned concerning security matters office of inspection applications, the application of stair corridor, building channel application etc. of concerning security matters office, repeat no more here based on concerning security matters carrier intelligent monitor system.
For shown in Figure 1 close year net and concerning security matters carrier intelligent monitor system concerning security matters archive office, concerning security matters carrier warehouse and the transportation of concerning security matters carrier and in addition the application in the monitoring and above-mentioned concerning security matters office monitor application class in addition seemingly, repeat no more here.
Should be clear and definite, described embodiment only is a part of embodiment of the utility model, rather than whole embodiment.Based on the embodiment in the utility model, those of ordinary skills are not making the every other embodiment that is obtained under the new work prerequisite of creation, all belong to the scope of the utility model protection.