CN108009789A - Method and apparatus for managing security tools and instruments detection - Google Patents
Method and apparatus for managing security tools and instruments detection Download PDFInfo
- Publication number
- CN108009789A CN108009789A CN201711193098.7A CN201711193098A CN108009789A CN 108009789 A CN108009789 A CN 108009789A CN 201711193098 A CN201711193098 A CN 201711193098A CN 108009789 A CN108009789 A CN 108009789A
- Authority
- CN
- China
- Prior art keywords
- censorship
- instruments
- managing security
- security tools
- sent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- Tourism & Hospitality (AREA)
- Operations Research (AREA)
- Marketing (AREA)
- Economics (AREA)
- Data Mining & Analysis (AREA)
- Health & Medical Sciences (AREA)
- Electromagnetism (AREA)
- Quality & Reliability (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of method and apparatus for managing security tools and instruments detection.This method includes:The censorship request that default terminal is sent is received, wherein, censorship carries the identification information for the managing security tools and instruments for needing censorship in asking;Censorship receive information is requested to generate according to censorship, wherein, the censored time of managing security tools and instruments is carried in censorship receive information;Censorship receive information is sent to default terminal.By the present invention, the effect for reducing managing security tools and instruments censorship process operation complexity is reached.
Description
Technical field
The present invention relates to power domain, in particular to a kind of method and apparatus for managing security tools and instruments detection.
Background technology
Power industry is the basic activity of the national economic development, while is also the higher industry of security risk, in electric power row
In industry security system building, managing security tools and instruments is an indispensable part.Managing security tools and instruments is that production team is engaged in safely fortune
Row, safeguard, overhaul, the most basic and essential Work tool of repairing work, closely bound up with keeping the safety in production.Therefore, it is necessary to
Censorship periodically is carried out to managing security tools and instruments, it is ensured that it is safe and reliable, could ensure the safety of production.
At present, managing security tools and instruments censorship lacks censorship flow and the technical support of system, and managing security tools and instruments detection places an order
And censorship majority relies on telephonic communication, providing for managing security tools and instruments numbering is also how more spuious by mail, short message, wechat etc.
Mode, testing crew can not check managing security tools and instruments and whether numbering correspond, testing crew is to work after Work tool is received
After the completion of utensil experiment, hand-kept test data, last Advise By Wire censorship unit gets managing security tools and instruments.
1. censorship unit majority places an order by phone, accuracy and actual effect are poor.
2. managing security tools and instruments species of large quantities is more, in detection management it is possible that chaotic, coding is caused to malfunction, Wu Fabao
Confirm border Work tool and the one-to-one corresponding of numbering.
3. recording test data by hand after the completion of experiment, efficiency is low, and easily error and loss.
4. test report can only print papery version, inefficiency and inconvenience by detection side.
For the problem of managing security tools and instruments censorship process is complicated in correlation technique, effective solve not yet is proposed at present
Scheme.
The content of the invention
It is a primary object of the present invention to provide a kind of method and apparatus for managing security tools and instruments detection, to solve safety
The problem of Work tool censorship process is complicated.
To achieve these goals, according to an aspect of the invention, there is provided a kind of be used for what managing security tools and instruments detected
Method, this method include:The censorship request that default terminal is sent is received, wherein, carried in the censorship request and need censorship
The identification information of managing security tools and instruments;Censorship receive information is requested to generate according to the censorship, wherein, in the censorship receive information
Carry the censored time of the managing security tools and instruments;The censorship receive information is sent to the default terminal.
Further, after the censorship receive information is sent to the default terminal, the method further includes:
The identification information that the censored time obtains the managing security tools and instruments of current censorship by presetting APP barcode scannings;Judge current censorship
Whether the identification information of managing security tools and instruments matches with the identification information of the managing security tools and instruments for treating censorship;In the feelings of successful match
Under condition, prompt message is exported, wherein, the managing security tools and instruments that the prompt message is used to prompt current censorship treats censorship to be described
Managing security tools and instruments.
Further, after prompt message is exported, the method further includes:To the managing security tools and instruments of the current censorship
It is detected, obtains detection data;The detection data are uploaded to by the default terminal by the default APP.
Further, after detection data are obtained, the method further includes:The detection data are imported into report mould
Plate, generates test report;Affix one's seal the test report;The test report after affixing one's seal is sent to the default end
End.
Further, the identification information of the managing security tools and instruments for treating censorship includes at least:Treat the managing security tools and instruments of censorship
Species, model, coding.
To achieve these goals, according to another aspect of the present invention, a kind of managing security tools and instruments that is used for is additionally provided to detect
Device, which includes:Receiving unit, the censorship request sent for receiving default terminal, wherein, in the censorship request
Carry the identification information for the managing security tools and instruments for needing censorship;Generation unit, receives for requesting to generate censorship according to the censorship
Information, wherein, the censored time of the managing security tools and instruments is carried in the censorship receive information;Transmitting element, for by institute
State censorship receive information and be sent to the default terminal.
Further, described device further includes:Acquiring unit, for the censorship receive information is sent to it is described pre-
If after terminal, the identification information of the managing security tools and instruments of current censorship is obtained by default APP barcode scannings in the censored time;Sentence
Disconnected unit, the identification information of managing security tools and instruments for judging current censorship are believed with the mark of the managing security tools and instruments for treating censorship
Whether breath matches;Output unit, in the case of successful match, exporting prompt message, wherein, the prompt message is used for
The managing security tools and instruments for prompting current censorship is the managing security tools and instruments for treating censorship.
Further, described device further includes:Detection unit, for after prompt message is exported, currently being sent to described
The managing security tools and instruments of inspection is detected, and obtains detection data;Uploading unit, for by the default APP by the testing number
According to being uploaded to the default terminal.
To achieve these goals, according to another aspect of the present invention, a kind of storage medium is additionally provided, including storage
Program, wherein, equipment execution is of the present invention where the storage medium is controlled when described program is run is used for safe work
The method of utensil detection.
To achieve these goals, according to another aspect of the present invention, a kind of processor is additionally provided, for running journey
Sequence, wherein, described program performs the method for the present invention for managing security tools and instruments detection when running.
The present invention is asked by receiving the censorship that default terminal is sent, wherein, carry the peace for needing censorship in censorship request
The identification information of full Work tool;Censorship receive information is requested to generate according to censorship, wherein, carry safety in censorship receive information
The censored time of Work tool;Censorship receive information is sent to default terminal, it is multiple to solve the operation of managing security tools and instruments censorship process
The problem of miscellaneous, and then reduce the effect of managing security tools and instruments censorship process operation complexity.
Brief description of the drawings
The attached drawing for forming the part of the application is used for providing a further understanding of the present invention, schematic reality of the invention
Apply example and its explanation is used to explain the present invention, do not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of the method for being used for managing security tools and instruments detection according to a first embodiment of the present invention;
Fig. 2 is the schematic diagram of the method for being used for managing security tools and instruments detection according to a second embodiment of the present invention;
Fig. 3 is a kind of flow chart of optional managing security tools and instruments intelligent measurement according to embodiments of the present invention;And
Fig. 4 is the schematic diagram of the device for being used for managing security tools and instruments detection according to embodiments of the present invention.
Embodiment
It should be noted that in the case where there is no conflict, the feature in embodiment and embodiment in the application can phase
Mutually combination.Below with reference to the accompanying drawings and the present invention will be described in detail in conjunction with the embodiments.
In order to make those skilled in the art more fully understand application scheme, below in conjunction with the embodiment of the present application
Attached drawing, is clearly and completely described the technical solution in the embodiment of the present application, it is clear that described embodiment is only
The embodiment of the application part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people
Member's all other embodiments obtained without making creative work, should all belong to the model of the application protection
Enclose.
It should be noted that term " first " in the description and claims of this application and above-mentioned attached drawing, "
Two " etc. be for distinguishing similar object, without for describing specific order or precedence.It should be appreciated that so use
Data can exchange in the appropriate case, so as to embodiments herein described herein.In addition, term " comprising " and " tool
Have " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing series of steps or unit
Process, method, system, product or equipment are not necessarily limited to those steps clearly listed or unit, but may include without clear
It is listing to Chu or for the intrinsic other steps of these processes, method, product or equipment or unit.
An embodiment of the present invention provides a kind of method for managing security tools and instruments detection.
Fig. 1 is the flow chart of the method for being used for managing security tools and instruments detection according to a first embodiment of the present invention, such as Fig. 1 institutes
Show, this method comprises the following steps:
Step S102:The censorship request that default terminal is sent is received, wherein, carry the safety for needing censorship in censorship request
The identification information of Work tool;
Step S104:Censorship receive information is requested to generate according to censorship, wherein, safe work is carried in censorship receive information
The censored time of utensil;
Step S106:Censorship receive information is sent to default terminal.
The censorship request that the embodiment is sent using default terminal is received, wherein, carried in censorship request and need censorship
The identification information of managing security tools and instruments;Censorship receive information is requested to generate according to censorship, wherein, peace is carried in censorship receive information
The censored time of full Work tool;Censorship receive information is sent to default terminal, solves the operation of managing security tools and instruments censorship process
The problem of complicated, and then reduce the effect of managing security tools and instruments censorship process operation complexity.
In embodiments of the present invention, default terminal can be the computer PC terminals of censorship unit, and default terminal can pass through
The modes such as barcode scanning send censorship request, can be according to censorship after the censorship request that detection unit recipient to default terminal is sent
Censorship receive information is requested to generate, censored time is arranged for managing security tools and instruments to be measured, is then sent to censorship receive information pre-
If in terminal.Technical solution in this way can be that managing security tools and instruments to be measured arranges censorship, generate censorship information, detecting
When can more convenient verification censorship managing security tools and instruments, reduce managing security tools and instruments censorship process operation complexity,
Managing security tools and instruments detection management can be made to become standardized and orderly, improve the efficiency and accuracy of managing security tools and instruments detection work, it is real
Now reduce the purpose that detection manpower and materials are spent.
Alternatively, after censorship receive information is sent to default terminal, obtained in censored time by default APP barcode scannings
Take the identification information of the managing security tools and instruments of current censorship;Judge the identification information of the managing security tools and instruments of current censorship and treat censorship
Whether the identification information of managing security tools and instruments matches;In the case of successful match, prompt message is exported, wherein, prompt message is used
It is the managing security tools and instruments for treating censorship in the managing security tools and instruments of the current censorship of prompting.
Alternatively, after prompt message is exported, the managing security tools and instruments of current censorship is detected, obtains testing number
According to;Default terminal is uploaded to by data are detected by default APP.
Alternatively, after detection data are obtained, detection data is imported into report template, generate test report;To surveying
Examination report is affixed one's seal;Test report after affixing one's seal is sent to default terminal.
Alternatively, treat that the identification information of the managing security tools and instruments of censorship includes at least:Treat the managing security tools and instruments of censorship species,
Model, coding.
The embodiment of the present invention realizes censorship unit computer PC terminals, censorship personnel mobile phone terminal, detection unit computer PC
Connection between terminal, testing staff's mobile phone terminal.Fig. 2 is according to a second embodiment of the present invention for managing security tools and instruments detection
Method schematic diagram, as shown in Figure 2.Censorship unit is detected application simultaneously by computer terminal or mobile phone terminal according to demand
Place an order.Detect unit and application is received by computer terminal or mobile phone terminal, apply after being accepted, pass through computer end or mobile phone terminal
Notify censorship unit censored time.
Censorship unit is sent managing security tools and instruments to detection unit, the special APP of detection unit personnel mobile phone by the designated time
Managing security tools and instruments bar code is scanned, the managing security tools and instruments identity that cell phone application auto-associating computer end censorship unit is sent
Coding, and automatically confirm that whether be the batch managing security tools and instruments, after confirmation is errorless, censorship personnel are received.
Testing crew starts testing inspection.During experiment, testing crew is special by managing security tools and instruments intelligent checking system
APP records test data, and is uploaded to the computer terminal of detection unit.Finally, electronic report is in detection unit
Computer terminal generates.
A kind of optional managing security tools and instruments intelligent measurement flow is as shown in Figure 3.The censorship stage:Censorship side passes through PC client
End special-purpose software or cell phone application place an order, and single planted agent includes the related letter such as species, model, coding of managing security tools and instruments to be checked
Breath;Detection side receives detection side's order placement information in pc client or cell phone application end, arranges detection plan, while pass through PC client
End or the cell phone application end notice specific censored time in censorship side;Censorship side carries out censorship by the censored time of agreement;Testing crew
Managing security tools and instruments bar code is scanned using cell phone application, while the account with placing an order carries out verification and compares automatically, confirms safe work device
Tool corresponds.Detection-phase:After the completion of scanning, testing crew carries out testing inspection to Work tool, while test data is led to
Cross cell phone application and directly enter system;PC ends receive the test data that cell phone application uploads, and print qualified label, while automatically will examination
Result Import Reports masterplate is tested, generates test report.Get the stage:After detection is fully completed, censorship unit is notified by PC ends
Get the time, while the electronic edition test report for being stamped seal is sent to censorship unit;Censorship unit is got according to agreement
Time gets the managing security tools and instruments of completed experiment.
The technical solution of the embodiment of the present invention improves efficiency and essence that managing security tools and instruments detects work by procedure below
True property, saves manpower and materials.
(1) censorship side is placed an order by computer end or cell phone application end and sends species, model, coding of managing security tools and instruments etc.
Relevant information, lower list mode is flexible, and reliability is high, not error-prone.
(2) testing crew realizes the scanning of coding using cell phone application, and the account sent automatically with censorship unit carries out pair
Than ensureing that managing security tools and instruments corresponds.
(3) result of the test is directly carried out typing by testing crew after the completion of experiment by cell phone application, and direct at PC ends
The examining report of E-seal is stamped in generation, simple and convenient.
(4) examining report for being stamped E-seal is directly sent to by censorship unit by intelligent measurement platform, avoided
The paper waste that papery examining report is brought, it is convenient and efficient, reduce cost.
Practice test of the technical solution of the embodiment of the present invention through Electric Power Research Institute of State Grid Beijing Electric Power Company, examination
With working well.
It should be noted that step shown in the flowchart of the accompanying drawings can be in such as a group of computer-executable instructions
Performed in computer system, although also, show logical order in flow charts, in some cases, can be with not
The order being same as herein performs shown or described step.
An embodiment of the present invention provides a kind of device for managing security tools and instruments detection, this is used for managing security tools and instruments detection
Device can be used for the method for being used for managing security tools and instruments detection for performing the embodiment of the present invention.
Fig. 4 is the schematic diagram of the device for being used for managing security tools and instruments detection according to embodiments of the present invention, as shown in figure 4, should
Device includes:
Receiving unit 10, the censorship request sent for receiving default terminal, wherein, carried in censorship request and need censorship
Managing security tools and instruments identification information;
Generation unit 20, for requesting to generate censorship receive information according to censorship, wherein, carried in censorship receive information
The censored time of managing security tools and instruments;
Transmitting element 30, for censorship receive information to be sent to default terminal.
Alternatively, which further includes:Acquiring unit, for after censorship receive information is sent to default terminal,
The identification information for obtaining the managing security tools and instruments of current censorship by presetting APP barcode scannings in censored time;Judging unit, for judging
Whether the identification information of managing security tools and instruments of the identification information of the managing security tools and instruments of current censorship with treating censorship matches;Output is single
Member, in the case of successful match, exporting prompt message, wherein, prompt message is used for the safe work for prompting current censorship
Utensil is the managing security tools and instruments for treating censorship.
Alternatively, which further includes:Detection unit, for after prompt message is exported, to the safety of current censorship
Work tool is detected, and obtains detection data;Uploading unit, for being uploaded to default terminal by data are detected by default APP.
The embodiment uses receiving unit 10, the censorship request sent for receiving default terminal, wherein, in censorship request
Carry the identification information for the managing security tools and instruments for needing censorship;Generation unit 20, letter is received for requesting to generate censorship according to censorship
Breath, wherein, the censored time of managing security tools and instruments is carried in censorship receive information;Transmitting element 30, believes for censorship to be received
Breath is sent to default terminal, solves the problems, such as that managing security tools and instruments censorship process is complicated, and then the safe work of reduction
The effect of utensil censorship process operation complexity.
The managing security tools and instruments detection device that is used for includes processor and memory, above-mentioned receiving unit, generation unit, etc.
As program unit storage in memory, above procedure unit stored in memory is performed by processor to realize phase
The function of answering.
Kernel is included in processor, is gone in memory to transfer corresponding program unit by kernel.Kernel can set one
Or more, reduce managing security tools and instruments censorship process operation complexity by adjusting kernel parameter.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/
Or the form such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM), memory includes at least one deposit
Store up chip.
An embodiment of the present invention provides a kind of storage medium, program is stored thereon with, it is real when which is executed by processor
The existing method for managing security tools and instruments detection.
An embodiment of the present invention provides a kind of processor, the processor is used for operation program, wherein, described program operation
It is used for the method for managing security tools and instruments detection described in Shi Zhihang.
An embodiment of the present invention provides a kind of equipment, equipment includes processor, memory and storage on a memory and can
The program run on a processor, when processor executive program, realize following steps:The censorship request that default terminal is sent is received,
Wherein, the identification information for the managing security tools and instruments for needing censorship is carried in censorship request;Censorship is requested to generate according to censorship and receives letter
Breath, wherein, the censored time of managing security tools and instruments is carried in censorship receive information;Censorship receive information is sent to default whole
End.Equipment herein can be server, PC, PAD, mobile phone etc..
Present invention also provides a kind of computer program product, when being performed on data processing equipment, is adapted for carrying out just
The program of beginningization there are as below methods step:The censorship request that default terminal is sent is received, wherein, carried in censorship request and need to be sent
The identification information of the managing security tools and instruments of inspection;Censorship receive information is requested to generate according to censorship, wherein, carried in censorship receive information
There is the censored time of managing security tools and instruments;Censorship receive information is sent to default terminal.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program
Product.Therefore, the application can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.Moreover, the application can use the computer for wherein including computer usable program code in one or more
The computer program production that usable storage medium is implemented on (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The application is with reference to the flow according to the method for the embodiment of the present application, equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that it can be realized by computer program instructions every first-class in flowchart and/or the block diagram
The combination of flow and/or square frame in journey and/or square frame and flowchart and/or the block diagram.These computer programs can be provided
The processors of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that the instruction performed by computer or the processor of other programmable data processing devices, which produces, to be used in fact
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or
The instruction performed on other programmable devices is provided and is used for realization in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in a square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/
Or the form such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Memory is computer-readable Jie
The example of matter.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus
Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein
Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability
Comprising so that process, method, commodity or equipment including a series of elements not only include those key elements, but also wrapping
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment it is intrinsic will
Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including key element
Also there are other identical element in process, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product.
Therefore, the application can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Form.Deposited moreover, the application can use to can use in one or more computers for wherein including computer usable program code
The shape for the computer program product that storage media is implemented on (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
It these are only embodiments herein, be not limited to the application.To those skilled in the art,
The application can have various modifications and variations.All any modifications made within spirit herein and principle, equivalent substitution,
Improve etc., it should be included within the scope of claims hereof.
Claims (10)
- A kind of 1. method for managing security tools and instruments detection, it is characterised in that including:The censorship request that default terminal is sent is received, wherein, the managing security tools and instruments that needs censorship is carried in the censorship request Identification information;Censorship receive information is requested to generate according to the censorship, wherein, the safe work is carried in the censorship receive information The censored time of utensil;The censorship receive information is sent to the default terminal.
- 2. according to the method described in claim 1, it is characterized in that, the censorship receive information is being sent to the default end After end, the method further includes:The identification information for obtaining the managing security tools and instruments of current censorship by presetting APP barcode scannings in the censored time;Judge the identification information of the managing security tools and instruments of current censorship and the managing security tools and instruments for treating censorship identification information whether Matching;In the case of successful match, prompt message is exported, wherein, the prompt message is used for the safe work for prompting current censorship Utensil is the managing security tools and instruments for treating censorship.
- 3. according to the method described in claim 2, it is characterized in that, after prompt message is exported, the method further includes:The managing security tools and instruments of the current censorship is detected, obtains detection data;The detection data are uploaded to by the default terminal by the default APP.
- 4. according to the method described in claim 3, it is characterized in that, after detection data are obtained, the method further includes:The detection data are imported into report template, generate test report;Affix one's seal the test report;The test report after affixing one's seal is sent to the default terminal.
- 5. according to the method described in claim 1, it is characterized in that, the identification information of the managing security tools and instruments for treating censorship at least Including:Treat the species, model, coding of the managing security tools and instruments of censorship.
- A kind of 6. device for managing security tools and instruments detection, it is characterised in that including:Receiving unit, the censorship request sent for receiving default terminal, wherein, carried in the censorship request and need censorship The identification information of managing security tools and instruments;Generation unit, for requesting to generate censorship receive information according to the censorship, wherein, carried in the censorship receive information There is the censored time of the managing security tools and instruments;Transmitting element, for the censorship receive information to be sent to the default terminal.
- 7. device according to claim 6, it is characterised in that described device further includes:Acquiring unit, for after the censorship receive information is sent to the default terminal, leading in the censored time Cross the identification information that default APP barcode scannings obtain the managing security tools and instruments of current censorship;Judging unit, identification information and the managing security tools and instruments for treating censorship of the managing security tools and instruments for judging current censorship Whether identification information matches;Output unit, in the case of successful match, exporting prompt message, wherein, the prompt message is used to prompt to work as The managing security tools and instruments of preceding censorship is the managing security tools and instruments for treating censorship.
- 8. device according to claim 7, it is characterised in that described device further includes:Detection unit, for after prompt message is exported, being detected, being examined to the managing security tools and instruments of the current censorship Survey data;Uploading unit, for the detection data to be uploaded to the default terminal by the default APP.
- A kind of 9. storage medium, it is characterised in that the storage medium includes the program of storage, wherein, run in described program When control the storage medium where the managing security tools and instruments that is used in equipment perform claim requirement 1 to 5 described in any one detect Method.
- A kind of 10. processor, it is characterised in that the processor is used for operation program, wherein, right of execution when described program is run Profit requires the method for being used for managing security tools and instruments detection described in any one in 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711193098.7A CN108009789A (en) | 2017-11-24 | 2017-11-24 | Method and apparatus for managing security tools and instruments detection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711193098.7A CN108009789A (en) | 2017-11-24 | 2017-11-24 | Method and apparatus for managing security tools and instruments detection |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108009789A true CN108009789A (en) | 2018-05-08 |
Family
ID=62053511
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711193098.7A Pending CN108009789A (en) | 2017-11-24 | 2017-11-24 | Method and apparatus for managing security tools and instruments detection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108009789A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109560771A (en) * | 2018-11-20 | 2019-04-02 | 青海黄河上游水电开发有限责任公司光伏产业技术分公司 | Method, computer readable storage medium and the computer equipment of test sample |
CN112100685A (en) * | 2020-08-10 | 2020-12-18 | 广东省特种设备检测研究院珠海检测院 | Encryption and tamper-proof processing method for checking and detecting electronic report |
CN113392283A (en) * | 2021-06-22 | 2021-09-14 | 南方电网电力科技股份有限公司 | Safety tool detection data processing method and device |
CN114298063A (en) * | 2021-11-30 | 2022-04-08 | 国网北京市电力公司 | Information update processing method and device for safety tool, storage medium and equipment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106532954A (en) * | 2016-12-09 | 2017-03-22 | 国网山东省电力公司微山县供电公司 | Grounding state monitoring method and system |
CN106874974A (en) * | 2017-02-28 | 2017-06-20 | 国网安徽省电力公司合肥供电公司 | A kind of Work tool Mobile solution implementation method based on technology of Internet of things |
-
2017
- 2017-11-24 CN CN201711193098.7A patent/CN108009789A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106532954A (en) * | 2016-12-09 | 2017-03-22 | 国网山东省电力公司微山县供电公司 | Grounding state monitoring method and system |
CN106874974A (en) * | 2017-02-28 | 2017-06-20 | 国网安徽省电力公司合肥供电公司 | A kind of Work tool Mobile solution implementation method based on technology of Internet of things |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109560771A (en) * | 2018-11-20 | 2019-04-02 | 青海黄河上游水电开发有限责任公司光伏产业技术分公司 | Method, computer readable storage medium and the computer equipment of test sample |
CN112100685A (en) * | 2020-08-10 | 2020-12-18 | 广东省特种设备检测研究院珠海检测院 | Encryption and tamper-proof processing method for checking and detecting electronic report |
CN113392283A (en) * | 2021-06-22 | 2021-09-14 | 南方电网电力科技股份有限公司 | Safety tool detection data processing method and device |
CN114298063A (en) * | 2021-11-30 | 2022-04-08 | 国网北京市电力公司 | Information update processing method and device for safety tool, storage medium and equipment |
CN114298063B (en) * | 2021-11-30 | 2024-01-23 | 国网北京市电力公司 | Information updating processing method and device for safety tool, storage medium and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108009789A (en) | Method and apparatus for managing security tools and instruments detection | |
WO2022094934A1 (en) | Site location-based system and method for management of engineering quality acceptance | |
CN107797919A (en) | The method and computing device of a kind of automatic test | |
CN108628748B (en) | Automatic test management method and automatic test management system | |
CN101620697A (en) | Integrated detection system and method of management and control | |
CN107423181A (en) | The automated testing method and device of a kind of uniform storage device | |
CN109684847A (en) | Self-repairing method, device, equipment and the storage medium of script loophole | |
CN111444692A (en) | Intelligent environment experiment comprehensive control method, system, computer and storage medium | |
CN205193846U (en) | Automatic recorder that circulates of laboratory sample based on only identification code | |
CN106991483A (en) | It is a kind of that the implementation detected is examined applied to special equipment | |
CN112380255A (en) | Service processing method, device, equipment and storage medium | |
CN110058998A (en) | Method for testing software and device | |
CN108269059B (en) | Data management system | |
CN110490472A (en) | A kind of GROUP OF HYDROPOWER STATIONS technical supervision intelligent service system, method, terminal and storage medium based on Internet of Things | |
CN111444051A (en) | Complete machine production testing method and system for product | |
CN112185497A (en) | Occupational health supervision method and system | |
CN109471791A (en) | A kind of demand response communication consistency testing system and method | |
CN111210535A (en) | Intelligent inspection system for scheduling master station system equipment | |
CN109299016A (en) | Assessment document structure tree method, system and terminal device | |
CN109767092A (en) | Monitoring method, device, storage medium and processor | |
CN111125066B (en) | Method and device for detecting functions of database auditing equipment | |
CN210955189U (en) | Sample entrusted detection logistics and information management system based on block chain | |
CN113408749A (en) | Operation and maintenance data generation method, device, equipment and storage medium | |
CN107341645A (en) | Demand of human resources information processing method, device, computer equipment and storage medium | |
CN116383061A (en) | Method and related device for testing basic platform interface of substation control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180508 |
|
RJ01 | Rejection of invention patent application after publication |