CN108009789A - Method and apparatus for managing security tools and instruments detection - Google Patents

Method and apparatus for managing security tools and instruments detection Download PDF

Info

Publication number
CN108009789A
CN108009789A CN201711193098.7A CN201711193098A CN108009789A CN 108009789 A CN108009789 A CN 108009789A CN 201711193098 A CN201711193098 A CN 201711193098A CN 108009789 A CN108009789 A CN 108009789A
Authority
CN
China
Prior art keywords
censorship
instruments
managing security
security tools
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711193098.7A
Other languages
Chinese (zh)
Inventor
杨博
赵雪骞
李洪斌
穆克彬
曹全智
谢欢
钱梦迪
秦欢
张玉佳
门业堃
朱戎
于钊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Beijing Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Beijing Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Beijing Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201711193098.7A priority Critical patent/CN108009789A/en
Publication of CN108009789A publication Critical patent/CN108009789A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • Quality & Reliability (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of method and apparatus for managing security tools and instruments detection.This method includes:The censorship request that default terminal is sent is received, wherein, censorship carries the identification information for the managing security tools and instruments for needing censorship in asking;Censorship receive information is requested to generate according to censorship, wherein, the censored time of managing security tools and instruments is carried in censorship receive information;Censorship receive information is sent to default terminal.By the present invention, the effect for reducing managing security tools and instruments censorship process operation complexity is reached.

Description

Method and apparatus for managing security tools and instruments detection
Technical field
The present invention relates to power domain, in particular to a kind of method and apparatus for managing security tools and instruments detection.
Background technology
Power industry is the basic activity of the national economic development, while is also the higher industry of security risk, in electric power row In industry security system building, managing security tools and instruments is an indispensable part.Managing security tools and instruments is that production team is engaged in safely fortune Row, safeguard, overhaul, the most basic and essential Work tool of repairing work, closely bound up with keeping the safety in production.Therefore, it is necessary to Censorship periodically is carried out to managing security tools and instruments, it is ensured that it is safe and reliable, could ensure the safety of production.
At present, managing security tools and instruments censorship lacks censorship flow and the technical support of system, and managing security tools and instruments detection places an order And censorship majority relies on telephonic communication, providing for managing security tools and instruments numbering is also how more spuious by mail, short message, wechat etc. Mode, testing crew can not check managing security tools and instruments and whether numbering correspond, testing crew is to work after Work tool is received After the completion of utensil experiment, hand-kept test data, last Advise By Wire censorship unit gets managing security tools and instruments.
1. censorship unit majority places an order by phone, accuracy and actual effect are poor.
2. managing security tools and instruments species of large quantities is more, in detection management it is possible that chaotic, coding is caused to malfunction, Wu Fabao Confirm border Work tool and the one-to-one corresponding of numbering.
3. recording test data by hand after the completion of experiment, efficiency is low, and easily error and loss.
4. test report can only print papery version, inefficiency and inconvenience by detection side.
For the problem of managing security tools and instruments censorship process is complicated in correlation technique, effective solve not yet is proposed at present Scheme.
The content of the invention
It is a primary object of the present invention to provide a kind of method and apparatus for managing security tools and instruments detection, to solve safety The problem of Work tool censorship process is complicated.
To achieve these goals, according to an aspect of the invention, there is provided a kind of be used for what managing security tools and instruments detected Method, this method include:The censorship request that default terminal is sent is received, wherein, carried in the censorship request and need censorship The identification information of managing security tools and instruments;Censorship receive information is requested to generate according to the censorship, wherein, in the censorship receive information Carry the censored time of the managing security tools and instruments;The censorship receive information is sent to the default terminal.
Further, after the censorship receive information is sent to the default terminal, the method further includes: The identification information that the censored time obtains the managing security tools and instruments of current censorship by presetting APP barcode scannings;Judge current censorship Whether the identification information of managing security tools and instruments matches with the identification information of the managing security tools and instruments for treating censorship;In the feelings of successful match Under condition, prompt message is exported, wherein, the managing security tools and instruments that the prompt message is used to prompt current censorship treats censorship to be described Managing security tools and instruments.
Further, after prompt message is exported, the method further includes:To the managing security tools and instruments of the current censorship It is detected, obtains detection data;The detection data are uploaded to by the default terminal by the default APP.
Further, after detection data are obtained, the method further includes:The detection data are imported into report mould Plate, generates test report;Affix one's seal the test report;The test report after affixing one's seal is sent to the default end End.
Further, the identification information of the managing security tools and instruments for treating censorship includes at least:Treat the managing security tools and instruments of censorship Species, model, coding.
To achieve these goals, according to another aspect of the present invention, a kind of managing security tools and instruments that is used for is additionally provided to detect Device, which includes:Receiving unit, the censorship request sent for receiving default terminal, wherein, in the censorship request Carry the identification information for the managing security tools and instruments for needing censorship;Generation unit, receives for requesting to generate censorship according to the censorship Information, wherein, the censored time of the managing security tools and instruments is carried in the censorship receive information;Transmitting element, for by institute State censorship receive information and be sent to the default terminal.
Further, described device further includes:Acquiring unit, for the censorship receive information is sent to it is described pre- If after terminal, the identification information of the managing security tools and instruments of current censorship is obtained by default APP barcode scannings in the censored time;Sentence Disconnected unit, the identification information of managing security tools and instruments for judging current censorship are believed with the mark of the managing security tools and instruments for treating censorship Whether breath matches;Output unit, in the case of successful match, exporting prompt message, wherein, the prompt message is used for The managing security tools and instruments for prompting current censorship is the managing security tools and instruments for treating censorship.
Further, described device further includes:Detection unit, for after prompt message is exported, currently being sent to described The managing security tools and instruments of inspection is detected, and obtains detection data;Uploading unit, for by the default APP by the testing number According to being uploaded to the default terminal.
To achieve these goals, according to another aspect of the present invention, a kind of storage medium is additionally provided, including storage Program, wherein, equipment execution is of the present invention where the storage medium is controlled when described program is run is used for safe work The method of utensil detection.
To achieve these goals, according to another aspect of the present invention, a kind of processor is additionally provided, for running journey Sequence, wherein, described program performs the method for the present invention for managing security tools and instruments detection when running.
The present invention is asked by receiving the censorship that default terminal is sent, wherein, carry the peace for needing censorship in censorship request The identification information of full Work tool;Censorship receive information is requested to generate according to censorship, wherein, carry safety in censorship receive information The censored time of Work tool;Censorship receive information is sent to default terminal, it is multiple to solve the operation of managing security tools and instruments censorship process The problem of miscellaneous, and then reduce the effect of managing security tools and instruments censorship process operation complexity.
Brief description of the drawings
The attached drawing for forming the part of the application is used for providing a further understanding of the present invention, schematic reality of the invention Apply example and its explanation is used to explain the present invention, do not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of the method for being used for managing security tools and instruments detection according to a first embodiment of the present invention;
Fig. 2 is the schematic diagram of the method for being used for managing security tools and instruments detection according to a second embodiment of the present invention;
Fig. 3 is a kind of flow chart of optional managing security tools and instruments intelligent measurement according to embodiments of the present invention;And
Fig. 4 is the schematic diagram of the device for being used for managing security tools and instruments detection according to embodiments of the present invention.
Embodiment
It should be noted that in the case where there is no conflict, the feature in embodiment and embodiment in the application can phase Mutually combination.Below with reference to the accompanying drawings and the present invention will be described in detail in conjunction with the embodiments.
In order to make those skilled in the art more fully understand application scheme, below in conjunction with the embodiment of the present application Attached drawing, is clearly and completely described the technical solution in the embodiment of the present application, it is clear that described embodiment is only The embodiment of the application part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people Member's all other embodiments obtained without making creative work, should all belong to the model of the application protection Enclose.
It should be noted that term " first " in the description and claims of this application and above-mentioned attached drawing, " Two " etc. be for distinguishing similar object, without for describing specific order or precedence.It should be appreciated that so use Data can exchange in the appropriate case, so as to embodiments herein described herein.In addition, term " comprising " and " tool Have " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing series of steps or unit Process, method, system, product or equipment are not necessarily limited to those steps clearly listed or unit, but may include without clear It is listing to Chu or for the intrinsic other steps of these processes, method, product or equipment or unit.
An embodiment of the present invention provides a kind of method for managing security tools and instruments detection.
Fig. 1 is the flow chart of the method for being used for managing security tools and instruments detection according to a first embodiment of the present invention, such as Fig. 1 institutes Show, this method comprises the following steps:
Step S102:The censorship request that default terminal is sent is received, wherein, carry the safety for needing censorship in censorship request The identification information of Work tool;
Step S104:Censorship receive information is requested to generate according to censorship, wherein, safe work is carried in censorship receive information The censored time of utensil;
Step S106:Censorship receive information is sent to default terminal.
The censorship request that the embodiment is sent using default terminal is received, wherein, carried in censorship request and need censorship The identification information of managing security tools and instruments;Censorship receive information is requested to generate according to censorship, wherein, peace is carried in censorship receive information The censored time of full Work tool;Censorship receive information is sent to default terminal, solves the operation of managing security tools and instruments censorship process The problem of complicated, and then reduce the effect of managing security tools and instruments censorship process operation complexity.
In embodiments of the present invention, default terminal can be the computer PC terminals of censorship unit, and default terminal can pass through The modes such as barcode scanning send censorship request, can be according to censorship after the censorship request that detection unit recipient to default terminal is sent Censorship receive information is requested to generate, censored time is arranged for managing security tools and instruments to be measured, is then sent to censorship receive information pre- If in terminal.Technical solution in this way can be that managing security tools and instruments to be measured arranges censorship, generate censorship information, detecting When can more convenient verification censorship managing security tools and instruments, reduce managing security tools and instruments censorship process operation complexity, Managing security tools and instruments detection management can be made to become standardized and orderly, improve the efficiency and accuracy of managing security tools and instruments detection work, it is real Now reduce the purpose that detection manpower and materials are spent.
Alternatively, after censorship receive information is sent to default terminal, obtained in censored time by default APP barcode scannings Take the identification information of the managing security tools and instruments of current censorship;Judge the identification information of the managing security tools and instruments of current censorship and treat censorship Whether the identification information of managing security tools and instruments matches;In the case of successful match, prompt message is exported, wherein, prompt message is used It is the managing security tools and instruments for treating censorship in the managing security tools and instruments of the current censorship of prompting.
Alternatively, after prompt message is exported, the managing security tools and instruments of current censorship is detected, obtains testing number According to;Default terminal is uploaded to by data are detected by default APP.
Alternatively, after detection data are obtained, detection data is imported into report template, generate test report;To surveying Examination report is affixed one's seal;Test report after affixing one's seal is sent to default terminal.
Alternatively, treat that the identification information of the managing security tools and instruments of censorship includes at least:Treat the managing security tools and instruments of censorship species, Model, coding.
The embodiment of the present invention realizes censorship unit computer PC terminals, censorship personnel mobile phone terminal, detection unit computer PC Connection between terminal, testing staff's mobile phone terminal.Fig. 2 is according to a second embodiment of the present invention for managing security tools and instruments detection Method schematic diagram, as shown in Figure 2.Censorship unit is detected application simultaneously by computer terminal or mobile phone terminal according to demand Place an order.Detect unit and application is received by computer terminal or mobile phone terminal, apply after being accepted, pass through computer end or mobile phone terminal Notify censorship unit censored time.
Censorship unit is sent managing security tools and instruments to detection unit, the special APP of detection unit personnel mobile phone by the designated time Managing security tools and instruments bar code is scanned, the managing security tools and instruments identity that cell phone application auto-associating computer end censorship unit is sent Coding, and automatically confirm that whether be the batch managing security tools and instruments, after confirmation is errorless, censorship personnel are received.
Testing crew starts testing inspection.During experiment, testing crew is special by managing security tools and instruments intelligent checking system APP records test data, and is uploaded to the computer terminal of detection unit.Finally, electronic report is in detection unit Computer terminal generates.
A kind of optional managing security tools and instruments intelligent measurement flow is as shown in Figure 3.The censorship stage:Censorship side passes through PC client End special-purpose software or cell phone application place an order, and single planted agent includes the related letter such as species, model, coding of managing security tools and instruments to be checked Breath;Detection side receives detection side's order placement information in pc client or cell phone application end, arranges detection plan, while pass through PC client End or the cell phone application end notice specific censored time in censorship side;Censorship side carries out censorship by the censored time of agreement;Testing crew Managing security tools and instruments bar code is scanned using cell phone application, while the account with placing an order carries out verification and compares automatically, confirms safe work device Tool corresponds.Detection-phase:After the completion of scanning, testing crew carries out testing inspection to Work tool, while test data is led to Cross cell phone application and directly enter system;PC ends receive the test data that cell phone application uploads, and print qualified label, while automatically will examination Result Import Reports masterplate is tested, generates test report.Get the stage:After detection is fully completed, censorship unit is notified by PC ends Get the time, while the electronic edition test report for being stamped seal is sent to censorship unit;Censorship unit is got according to agreement Time gets the managing security tools and instruments of completed experiment.
The technical solution of the embodiment of the present invention improves efficiency and essence that managing security tools and instruments detects work by procedure below True property, saves manpower and materials.
(1) censorship side is placed an order by computer end or cell phone application end and sends species, model, coding of managing security tools and instruments etc. Relevant information, lower list mode is flexible, and reliability is high, not error-prone.
(2) testing crew realizes the scanning of coding using cell phone application, and the account sent automatically with censorship unit carries out pair Than ensureing that managing security tools and instruments corresponds.
(3) result of the test is directly carried out typing by testing crew after the completion of experiment by cell phone application, and direct at PC ends The examining report of E-seal is stamped in generation, simple and convenient.
(4) examining report for being stamped E-seal is directly sent to by censorship unit by intelligent measurement platform, avoided The paper waste that papery examining report is brought, it is convenient and efficient, reduce cost.
Practice test of the technical solution of the embodiment of the present invention through Electric Power Research Institute of State Grid Beijing Electric Power Company, examination With working well.
It should be noted that step shown in the flowchart of the accompanying drawings can be in such as a group of computer-executable instructions Performed in computer system, although also, show logical order in flow charts, in some cases, can be with not The order being same as herein performs shown or described step.
An embodiment of the present invention provides a kind of device for managing security tools and instruments detection, this is used for managing security tools and instruments detection Device can be used for the method for being used for managing security tools and instruments detection for performing the embodiment of the present invention.
Fig. 4 is the schematic diagram of the device for being used for managing security tools and instruments detection according to embodiments of the present invention, as shown in figure 4, should Device includes:
Receiving unit 10, the censorship request sent for receiving default terminal, wherein, carried in censorship request and need censorship Managing security tools and instruments identification information;
Generation unit 20, for requesting to generate censorship receive information according to censorship, wherein, carried in censorship receive information The censored time of managing security tools and instruments;
Transmitting element 30, for censorship receive information to be sent to default terminal.
Alternatively, which further includes:Acquiring unit, for after censorship receive information is sent to default terminal, The identification information for obtaining the managing security tools and instruments of current censorship by presetting APP barcode scannings in censored time;Judging unit, for judging Whether the identification information of managing security tools and instruments of the identification information of the managing security tools and instruments of current censorship with treating censorship matches;Output is single Member, in the case of successful match, exporting prompt message, wherein, prompt message is used for the safe work for prompting current censorship Utensil is the managing security tools and instruments for treating censorship.
Alternatively, which further includes:Detection unit, for after prompt message is exported, to the safety of current censorship Work tool is detected, and obtains detection data;Uploading unit, for being uploaded to default terminal by data are detected by default APP.
The embodiment uses receiving unit 10, the censorship request sent for receiving default terminal, wherein, in censorship request Carry the identification information for the managing security tools and instruments for needing censorship;Generation unit 20, letter is received for requesting to generate censorship according to censorship Breath, wherein, the censored time of managing security tools and instruments is carried in censorship receive information;Transmitting element 30, believes for censorship to be received Breath is sent to default terminal, solves the problems, such as that managing security tools and instruments censorship process is complicated, and then the safe work of reduction The effect of utensil censorship process operation complexity.
The managing security tools and instruments detection device that is used for includes processor and memory, above-mentioned receiving unit, generation unit, etc. As program unit storage in memory, above procedure unit stored in memory is performed by processor to realize phase The function of answering.
Kernel is included in processor, is gone in memory to transfer corresponding program unit by kernel.Kernel can set one Or more, reduce managing security tools and instruments censorship process operation complexity by adjusting kernel parameter.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/ Or the form such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM), memory includes at least one deposit Store up chip.
An embodiment of the present invention provides a kind of storage medium, program is stored thereon with, it is real when which is executed by processor The existing method for managing security tools and instruments detection.
An embodiment of the present invention provides a kind of processor, the processor is used for operation program, wherein, described program operation It is used for the method for managing security tools and instruments detection described in Shi Zhihang.
An embodiment of the present invention provides a kind of equipment, equipment includes processor, memory and storage on a memory and can The program run on a processor, when processor executive program, realize following steps:The censorship request that default terminal is sent is received, Wherein, the identification information for the managing security tools and instruments for needing censorship is carried in censorship request;Censorship is requested to generate according to censorship and receives letter Breath, wherein, the censored time of managing security tools and instruments is carried in censorship receive information;Censorship receive information is sent to default whole End.Equipment herein can be server, PC, PAD, mobile phone etc..
Present invention also provides a kind of computer program product, when being performed on data processing equipment, is adapted for carrying out just The program of beginningization there are as below methods step:The censorship request that default terminal is sent is received, wherein, carried in censorship request and need to be sent The identification information of the managing security tools and instruments of inspection;Censorship receive information is requested to generate according to censorship, wherein, carried in censorship receive information There is the censored time of managing security tools and instruments;Censorship receive information is sent to default terminal.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program Product.Therefore, the application can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the application can use the computer for wherein including computer usable program code in one or more The computer program production that usable storage medium is implemented on (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The application is with reference to the flow according to the method for the embodiment of the present application, equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that it can be realized by computer program instructions every first-class in flowchart and/or the block diagram The combination of flow and/or square frame in journey and/or square frame and flowchart and/or the block diagram.These computer programs can be provided The processors of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that the instruction performed by computer or the processor of other programmable data processing devices, which produces, to be used in fact The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or The instruction performed on other programmable devices is provided and is used for realization in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in a square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/ Or the form such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Memory is computer-readable Jie The example of matter.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability Comprising so that process, method, commodity or equipment including a series of elements not only include those key elements, but also wrapping Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment it is intrinsic will Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including key element Also there are other identical element in process, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product. Therefore, the application can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Form.Deposited moreover, the application can use to can use in one or more computers for wherein including computer usable program code The shape for the computer program product that storage media is implemented on (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
It these are only embodiments herein, be not limited to the application.To those skilled in the art, The application can have various modifications and variations.All any modifications made within spirit herein and principle, equivalent substitution, Improve etc., it should be included within the scope of claims hereof.

Claims (10)

  1. A kind of 1. method for managing security tools and instruments detection, it is characterised in that including:
    The censorship request that default terminal is sent is received, wherein, the managing security tools and instruments that needs censorship is carried in the censorship request Identification information;
    Censorship receive information is requested to generate according to the censorship, wherein, the safe work is carried in the censorship receive information The censored time of utensil;
    The censorship receive information is sent to the default terminal.
  2. 2. according to the method described in claim 1, it is characterized in that, the censorship receive information is being sent to the default end After end, the method further includes:
    The identification information for obtaining the managing security tools and instruments of current censorship by presetting APP barcode scannings in the censored time;
    Judge the identification information of the managing security tools and instruments of current censorship and the managing security tools and instruments for treating censorship identification information whether Matching;
    In the case of successful match, prompt message is exported, wherein, the prompt message is used for the safe work for prompting current censorship Utensil is the managing security tools and instruments for treating censorship.
  3. 3. according to the method described in claim 2, it is characterized in that, after prompt message is exported, the method further includes:
    The managing security tools and instruments of the current censorship is detected, obtains detection data;
    The detection data are uploaded to by the default terminal by the default APP.
  4. 4. according to the method described in claim 3, it is characterized in that, after detection data are obtained, the method further includes:
    The detection data are imported into report template, generate test report;
    Affix one's seal the test report;
    The test report after affixing one's seal is sent to the default terminal.
  5. 5. according to the method described in claim 1, it is characterized in that, the identification information of the managing security tools and instruments for treating censorship at least Including:
    Treat the species, model, coding of the managing security tools and instruments of censorship.
  6. A kind of 6. device for managing security tools and instruments detection, it is characterised in that including:
    Receiving unit, the censorship request sent for receiving default terminal, wherein, carried in the censorship request and need censorship The identification information of managing security tools and instruments;
    Generation unit, for requesting to generate censorship receive information according to the censorship, wherein, carried in the censorship receive information There is the censored time of the managing security tools and instruments;
    Transmitting element, for the censorship receive information to be sent to the default terminal.
  7. 7. device according to claim 6, it is characterised in that described device further includes:
    Acquiring unit, for after the censorship receive information is sent to the default terminal, leading in the censored time Cross the identification information that default APP barcode scannings obtain the managing security tools and instruments of current censorship;
    Judging unit, identification information and the managing security tools and instruments for treating censorship of the managing security tools and instruments for judging current censorship Whether identification information matches;
    Output unit, in the case of successful match, exporting prompt message, wherein, the prompt message is used to prompt to work as The managing security tools and instruments of preceding censorship is the managing security tools and instruments for treating censorship.
  8. 8. device according to claim 7, it is characterised in that described device further includes:
    Detection unit, for after prompt message is exported, being detected, being examined to the managing security tools and instruments of the current censorship Survey data;
    Uploading unit, for the detection data to be uploaded to the default terminal by the default APP.
  9. A kind of 9. storage medium, it is characterised in that the storage medium includes the program of storage, wherein, run in described program When control the storage medium where the managing security tools and instruments that is used in equipment perform claim requirement 1 to 5 described in any one detect Method.
  10. A kind of 10. processor, it is characterised in that the processor is used for operation program, wherein, right of execution when described program is run Profit requires the method for being used for managing security tools and instruments detection described in any one in 1 to 5.
CN201711193098.7A 2017-11-24 2017-11-24 Method and apparatus for managing security tools and instruments detection Pending CN108009789A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711193098.7A CN108009789A (en) 2017-11-24 2017-11-24 Method and apparatus for managing security tools and instruments detection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711193098.7A CN108009789A (en) 2017-11-24 2017-11-24 Method and apparatus for managing security tools and instruments detection

Publications (1)

Publication Number Publication Date
CN108009789A true CN108009789A (en) 2018-05-08

Family

ID=62053511

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711193098.7A Pending CN108009789A (en) 2017-11-24 2017-11-24 Method and apparatus for managing security tools and instruments detection

Country Status (1)

Country Link
CN (1) CN108009789A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109560771A (en) * 2018-11-20 2019-04-02 青海黄河上游水电开发有限责任公司光伏产业技术分公司 Method, computer readable storage medium and the computer equipment of test sample
CN112100685A (en) * 2020-08-10 2020-12-18 广东省特种设备检测研究院珠海检测院 Encryption and tamper-proof processing method for checking and detecting electronic report
CN113392283A (en) * 2021-06-22 2021-09-14 南方电网电力科技股份有限公司 Safety tool detection data processing method and device
CN114298063A (en) * 2021-11-30 2022-04-08 国网北京市电力公司 Information update processing method and device for safety tool, storage medium and equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106532954A (en) * 2016-12-09 2017-03-22 国网山东省电力公司微山县供电公司 Grounding state monitoring method and system
CN106874974A (en) * 2017-02-28 2017-06-20 国网安徽省电力公司合肥供电公司 A kind of Work tool Mobile solution implementation method based on technology of Internet of things

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106532954A (en) * 2016-12-09 2017-03-22 国网山东省电力公司微山县供电公司 Grounding state monitoring method and system
CN106874974A (en) * 2017-02-28 2017-06-20 国网安徽省电力公司合肥供电公司 A kind of Work tool Mobile solution implementation method based on technology of Internet of things

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109560771A (en) * 2018-11-20 2019-04-02 青海黄河上游水电开发有限责任公司光伏产业技术分公司 Method, computer readable storage medium and the computer equipment of test sample
CN112100685A (en) * 2020-08-10 2020-12-18 广东省特种设备检测研究院珠海检测院 Encryption and tamper-proof processing method for checking and detecting electronic report
CN113392283A (en) * 2021-06-22 2021-09-14 南方电网电力科技股份有限公司 Safety tool detection data processing method and device
CN114298063A (en) * 2021-11-30 2022-04-08 国网北京市电力公司 Information update processing method and device for safety tool, storage medium and equipment
CN114298063B (en) * 2021-11-30 2024-01-23 国网北京市电力公司 Information updating processing method and device for safety tool, storage medium and equipment

Similar Documents

Publication Publication Date Title
CN108009789A (en) Method and apparatus for managing security tools and instruments detection
WO2022094934A1 (en) Site location-based system and method for management of engineering quality acceptance
CN107797919A (en) The method and computing device of a kind of automatic test
CN108628748B (en) Automatic test management method and automatic test management system
CN101620697A (en) Integrated detection system and method of management and control
CN107423181A (en) The automated testing method and device of a kind of uniform storage device
CN109684847A (en) Self-repairing method, device, equipment and the storage medium of script loophole
CN111444692A (en) Intelligent environment experiment comprehensive control method, system, computer and storage medium
CN205193846U (en) Automatic recorder that circulates of laboratory sample based on only identification code
CN106991483A (en) It is a kind of that the implementation detected is examined applied to special equipment
CN112380255A (en) Service processing method, device, equipment and storage medium
CN110058998A (en) Method for testing software and device
CN108269059B (en) Data management system
CN110490472A (en) A kind of GROUP OF HYDROPOWER STATIONS technical supervision intelligent service system, method, terminal and storage medium based on Internet of Things
CN111444051A (en) Complete machine production testing method and system for product
CN112185497A (en) Occupational health supervision method and system
CN109471791A (en) A kind of demand response communication consistency testing system and method
CN111210535A (en) Intelligent inspection system for scheduling master station system equipment
CN109299016A (en) Assessment document structure tree method, system and terminal device
CN109767092A (en) Monitoring method, device, storage medium and processor
CN111125066B (en) Method and device for detecting functions of database auditing equipment
CN210955189U (en) Sample entrusted detection logistics and information management system based on block chain
CN113408749A (en) Operation and maintenance data generation method, device, equipment and storage medium
CN107341645A (en) Demand of human resources information processing method, device, computer equipment and storage medium
CN116383061A (en) Method and related device for testing basic platform interface of substation control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180508

RJ01 Rejection of invention patent application after publication