Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Unattended key management method

A key management and key technology, applied in the field of unattended key management, can solve problems such as hidden dangers, increase hidden dangers, and wrong key storage, and achieve the effect of avoiding damage, reducing hidden dangers, and ensuring reasonable utilization.

Inactive Publication Date: 2013-12-18
李冬
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, most of the places that need to manage keys still rely on manpower, which requires the arrangement of special management personnel and the occupation of dedicated offices, and due to the limitation of the work and rest time of management personnel, part of the supervision time will be vacant, which will bring great harm. Potential safety hazards; mistakes in the work of managers often lead to wrong storage of keys and bring serious consequences; at the same time, the records of key collection and return mostly rely on ledgers, which are easy to cheat, alter, and difficult to save and record clearly, increasing security risks , and in the event of an accident, it is time-consuming and laborious to check the records one by one; the competent department cannot know the whereabouts and usage of the keys in real time; and other security loopholes caused by human negligence are not conducive to the orderly management of keys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unattended key management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0025] see figure 1 , the invention provides an unattended key management method, comprising the following steps:

[0026] S1. Record the key usage plan and the identity information of the user in the system server;

[0027] S2. Receiving: The user logs in to the system server through a specific reader for identification, and completes the verification of the user's identity information and usage plan. If the verification is correct, the server system will open the video surveillance probe and open the key cabinet door at the same time; use The visitor picks up the key at the designated location;

[0028] S3. Recycling: After using the key, the user logs in to the system server through a specific reader for identification, and completes the verification of the user's identity information and usage plan. If the verification is correct, the server syst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an unattended key management method. A key usage plan and identity information of a user are recorded in a system server first; the user logs in the system server for identity recognition through a specific reader to complete the verification of the identity information of the user and the usage plan; if the verification result is correct, a server system starts a video monitoring probe, and a key cabinet is opened at the same time; the user takes a key from a specified position; after using the key, the user logs in the system server for identity recognition through the reader; if the verification result is correct, the server system starts the video monitoring probe, and the key cabinet is opened at the same time; the user returns the key to a key storing position. If a key which is inconsistent with the usage plan is taken or the key is not returned at due time, the system triggers an alarm. By means of the unattended key management method, intelligent management of the key can be realized, unreasonable usage of the key is avoided, and property safety of the user is guaranteed.

Description

technical field [0001] The invention relates to an intelligent management system, in particular to an unattended key management method. Background technique [0002] At present, most of the places that need to manage keys still rely on manpower, which requires the arrangement of special management personnel and the occupation of dedicated offices, and due to the limitation of the work and rest time of management personnel, part of the supervision time will be vacant, which will bring great harm. Potential safety hazards; mistakes in the work of managers often lead to wrong storage of keys and bring serious consequences; at the same time, the records of key collection and return mostly rely on ledgers, which are easy to cheat, alter, and difficult to save and record clearly, increasing security risks , and in the event of an accident, it is time-consuming and laborious to check the records one by one; the competent department cannot know the whereabouts and usage of the keys ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
Inventor 李冬
Owner 李冬
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products