CN114358799A - Hardware information management method and device, electronic equipment and storage medium - Google Patents

Hardware information management method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114358799A
CN114358799A CN202111600380.9A CN202111600380A CN114358799A CN 114358799 A CN114358799 A CN 114358799A CN 202111600380 A CN202111600380 A CN 202111600380A CN 114358799 A CN114358799 A CN 114358799A
Authority
CN
China
Prior art keywords
list
product
authentication
certificate
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111600380.9A
Other languages
Chinese (zh)
Other versions
CN114358799B (en
Inventor
刘相颖
胡夕伦
潘安
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202111600380.9A priority Critical patent/CN114358799B/en
Publication of CN114358799A publication Critical patent/CN114358799A/en
Application granted granted Critical
Publication of CN114358799B publication Critical patent/CN114358799B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a method for acquiring a current authentication demand list and corresponding current authentication information of a product; determining a reported key part list of the product according to the current certification information; determining a key part difference list according to a comparison result between the reported key part list and a preset key part list; determining a list of the key parts to be reported according to the key part difference list; and updating the authentication requirement list according to the key component list to be reported. According to the method provided by the scheme, the key part list to be reported is detected for the current authentication requirement list, a hardware authentication engineer is helped to master the product hardware authentication progress in time, and the authentication requirement list of the product is updated in a targeted manner according to the key part list to be reported, so that the efficiency of product hardware authentication is improved.

Description

Hardware information management method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of product authentication technologies, and in particular, to a hardware information management method and apparatus, an electronic device, and a storage medium.
Background
The hardware authentication service of products such as a server and the like is of great importance in trade transaction, and the products can meet the service requirements of clearance, sale and the like only through the mandatory authentication of corresponding areas and the acquisition of qualification certificates, and provide satisfactory and qualified products for consumers.
In the prior art, hardware certification information of a product is generally checked manually by a hardware certification engineer. However, the types of mandatory product authentication are various at present, and meanwhile, in order to ensure the compliance of product hardware authentication, continuous maintenance and key component preparation are required for the product, so that a hardware authentication engineer cannot systematically master the hardware authentication progress of the product, and the efficiency of product hardware authentication cannot be ensured.
Disclosure of Invention
The application provides a hardware information management method, a hardware information management device, an electronic device and a storage medium, which are used for overcoming the defects that the efficiency of product hardware authentication cannot be guaranteed in the prior art and the like.
A first aspect of the present application provides a hardware information management method, including:
acquiring a current authentication demand list of a product and corresponding current evidence obtaining information;
determining a reported key part list of the product according to the current certification information;
determining a key part difference list according to a comparison result between the reported key part list and a preset key part list;
determining a list of the key parts to be reported according to the key part difference list;
and updating the authentication requirement list according to the standby key part list to be reported.
Optionally, the determining a list of the standby key components according to the key component difference list includes:
determining a key part preparation list according to the key part preparation requirements represented by the current authentication requirement list;
and determining the key element list to be reported according to the key element reporting list and the key element difference list.
Optionally, the determining the reported key-component list of the product according to the current certification information includes:
determining the certified certificate of the product according to the current certified information;
extracting each certificate report of the obtained certificate from a preset certificate library;
and determining a reported key part list of the product according to the key part managed information recorded in each certificate report.
Optionally, the acquiring a current authentication requirement list of the product and corresponding current certification information includes:
determining the current authentication demand list according to the product model of the product and a preset product authentication schedule;
and determining the current certificate obtaining information corresponding to the authentication demand list according to the authentication demand list and the authentication certificate prestored in the current certificate library.
Optionally, the method further includes:
determining the certificate of the product and the certificate to be acquired according to the authentication demand list of the product and the corresponding current certificate acquiring information;
and calculating the certificate authentication cost generated by the obtained certificate and the certificate to be obtained of the product according to a preset certificate authentication charging standard.
Optionally, the method further includes:
determining the authentication time of each authenticated product according to the current authentication information;
and generating a hardware information management report of the product according to the current certificate obtaining information, the authentication time of each certificate obtained and the list of the standby key elements.
Optionally, before determining the key component difference list according to a comparison result between the reported key component list and a preset key component list, the method further includes:
and extracting the key part list from a part list planned in the initial stage of product development or a comprehensive BOM table planned in the final stage of product development.
A second aspect of the present application provides a hardware information management apparatus, including:
the acquisition module is used for acquiring a current authentication demand list of a product and corresponding current authentication information;
the first determining module is used for determining a reported key part list of the product according to the current evidence obtaining information;
the second determining module is used for determining a key part difference list according to a comparison result between the reported key part list and a preset key part list;
the management module is used for determining a list of the key parts to be reported according to the key part difference list;
and the updating module is used for updating the authentication requirement list according to the standby key part list.
Optionally, the management module is specifically configured to:
determining a key part preparation list according to the key part preparation requirements represented by the current authentication requirement list;
and determining the key element list to be reported according to the key element reporting list and the key element difference list.
Optionally, the first determining module is specifically configured to:
determining the certified certificate of the product according to the current certified information;
extracting each certificate report of the obtained certificate from a preset certificate library;
and determining a reported key part list of the product according to the key part managed information recorded in each certificate report.
Optionally, the obtaining module is specifically configured to:
determining the current authentication demand list according to the product model of the product and a preset product authentication schedule;
and determining the current certificate obtaining information corresponding to the authentication demand list according to the authentication demand list and the authentication certificate prestored in the current certificate library.
Optionally, the apparatus further comprises:
the expense management module is used for determining the certificate of the product and the certificate to be obtained according to the authentication demand list of the product and the corresponding current certificate obtaining information; and calculating the certificate authentication cost generated by the obtained certificate and the certificate to be obtained of the product according to a preset certificate authentication charging standard.
Optionally, the apparatus further comprises:
the report generation module is used for determining the certification time of each certified product according to the current certification information; and generating a hardware information management report of the product according to the current certificate obtaining information, the authentication time of each certificate obtained and the list of the standby key elements.
Optionally, the second determining module is further configured to:
and extracting the key part list from a part list planned in the initial stage of product development or a comprehensive BOM table planned in the final stage of product development.
A third aspect of the present application provides an electronic device, comprising: at least one processor and memory;
the memory stores computer-executable instructions;
the at least one processor executes computer-executable instructions stored by the memory to cause the at least one processor to perform the method as set forth in the first aspect above and in various possible designs of the first aspect.
A fourth aspect of the present application provides a computer-readable storage medium having stored thereon computer-executable instructions that, when executed by a processor, implement a method as set forth in the first aspect and various possible designs of the first aspect.
This application technical scheme has following advantage:
the application provides a hardware information management method, a device, an electronic device and a storage medium, wherein the method comprises the following steps: acquiring a current authentication demand list of a product and corresponding current evidence obtaining information; determining a reported key part list of the product according to the current certification information; determining a key part difference list according to a comparison result between the reported key part list and a preset key part list; determining a list of the key parts to be reported according to the key part difference list; and updating the authentication requirement list according to the key component list to be reported. According to the method provided by the scheme, the key part list to be reported is detected for the current authentication requirement list, a hardware authentication engineer is helped to master the product hardware authentication progress in time, and the authentication requirement list of the product is updated in a targeted manner according to the key part list to be reported, so that the efficiency of product hardware authentication is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained by those skilled in the art according to these drawings.
Fig. 1 is a schematic structural diagram of a hardware information management system based on an embodiment of the present application;
fig. 2 is a schematic flowchart of a hardware information management method according to an embodiment of the present application;
fig. 3 is a schematic overall flowchart of a hardware information management method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a hardware information management apparatus according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
With the above figures, there are shown specific embodiments of the present application, which will be described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Furthermore, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. In the description of the following examples, "plurality" means two or more unless specifically limited otherwise.
In the prior art, a hardware certification engineer manually checks hardware certification information of a product, and the manual checking mode has the problems of complicated steps, inconvenient operation, time consumption, labor consumption, low accuracy and low efficiency. Meanwhile, in order to ensure the compliance of product hardware authentication, the product needs to be continuously maintained and key pieces need to be reported, so that a hardware authentication engineer cannot systematically master the product hardware authentication progress, and the efficiency of product hardware authentication cannot be ensured.
In order to solve the above problems, in the hardware information management method, the apparatus, the electronic device, and the storage medium provided in the embodiments of the present application, a current authentication requirement list of a product and corresponding current certificate information are obtained; determining a reported key part list of the product according to the current certification information; determining a key part difference list according to a comparison result between the reported key part list and a preset key part list; determining a list of the key parts to be reported according to the key part difference list; and updating the authentication requirement list according to the key component list to be reported. The method comprises the steps of detecting a key part list to be reported for a current authentication requirement list, helping a hardware authentication engineer to master the product hardware authentication progress in time, and updating the authentication requirement list of the product in a targeted manner according to the key part list to be reported, so that the efficiency of product hardware authentication is improved.
The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
First, a configuration of a hardware information management system based on the present application will be described:
the hardware information management method and device, the electronic device and the storage medium provided by the embodiment of the application are suitable for managing hardware authentication information of a product in a product research and development process. As shown in fig. 1, the structure diagram of a hardware information management system according to an embodiment of the present application is mainly shown, and the hardware information management system mainly includes a product information base, a data acquisition device, and a hardware information management device for managing product hardware information. Specifically, the data acquisition device is used for acquiring an authentication demand list and corresponding current evidence-obtaining information of a product to be managed in a product information base, and transmitting the acquired data to the hardware information management device. The device determines a standby key part list of the product according to the received big information, and updates an authentication demand list for the product while sending the standby key part list to a product information base.
The embodiment of the application provides a hardware information management method, which is used for managing hardware authentication information of a product in a product research and development process. The execution subject of the embodiment of the present application is an electronic device, such as a server, a desktop computer, a notebook computer, a tablet computer, and other electronic devices that can be used for product hardware information management.
As shown in fig. 2, a schematic flow chart of a hardware information management method provided in an embodiment of the present application is shown, where the method includes:
step 201, obtaining a current authentication requirement list of a product and corresponding current certification information.
The certification requirement list can be initially set by a hardware certification engineer according to actual requirements of products, and can also be automatically generated according to product models.
Specifically, a corresponding display panel may be activated according to the product model and the authentication category in the authentication requirement list, where the display panel represents the authentication category required by the product, and each authentication category includes a plurality of authentication certificates of different versions. And then determining the current certificate obtaining information of the product according to the authentication certificate corresponding to the activated display plate in the certificate bank of the current product.
Step 202, determining a list of the reported key-elements of the product according to the current certification information.
It should be noted that the certificate repository is located in a file management system (PLM), and the certificate repository stores the certificate report of the certificate while storing the certificate, where the certificate report includes a plurality of key components controlled by the certificate.
Specifically, in an embodiment, the certified status of the product may be determined according to the current certified information; extracting certificate reports of each obtained certificate from a preset certificate library; and determining a reported key part list of the product according to the key part managed information recorded in each certificate report.
Specifically, the acquired certificate of the product may be located from the certificate repository according to the current acquired certificate information, and then the corresponding certificate report is extracted, and by analyzing each certificate report of the acquired certificate, the controlled information of the key component corresponding to each acquired certificate is determined, and then the controlled key component is determined as the reported standby key component, and the reported standby key component list of the product is generated in combination with the reported standby key component corresponding to each acquired certificate.
Step 203, determining a key element difference list according to a comparison result between the reported key element list and a preset key element list.
The key component list is key components planned to be deployed by research personnel and corresponding models in the product research and development process. The key component list can be extracted from a component list planned in the initial stage of product development or a comprehensive BOM planned in the final stage of product development. When the product is an electronic device such as a server, the key components may include a fan, a power module, a motherboard, a CPU, a GPU, and other components.
Specifically, the comparison result between the reported key part list and the preset key part list determines the difference key parts of the current reported key parts relative to the research and development plan, and summarizes the difference key parts as the key part difference list. The key parts are different mainly in terms of model and key part type.
And step 204, determining a list of the key parts to be reported according to the key part difference list.
Specifically, the deficiency of the product in the key component reporting aspect can be analyzed according to the currently obtained key component difference list, and then the corresponding key component list to be reported is determined.
Specifically, in an embodiment, the key component preparation list may be determined according to a key component preparation requirement represented by the current authentication requirement list; and determining a list of the key parts to be reported according to the key part reporting list and the key part difference list.
It should be noted that the key component preparation requirement is determined according to the certificate authentication requirement at the certificate authentication level, and the key component list is determined according to the product hardware deployment requirement at the product development level, so that there is a certain difference between the key component preparation requirement and the key component list. However, in the actual hardware authentication process, the key component preparation result of the product should satisfy both the key component preparation requirement and the key component list.
Specifically, the key component preparation list and the key component difference list can be subjected to merging operation, so that a to-be-prepared key component list which can simultaneously meet the key component preparation requirement and the key component list is obtained.
And step 204, updating the authentication requirement list according to the standby key part list.
Specifically, the authentication requirement list can be updated in a targeted manner according to the current key element preparation requirement represented by the key element list to be prepared, so as to meet the current key element preparation requirement.
On the basis of the above embodiment, as an implementable manner, the authentication certificate stored in the certificate repository is obtained by an electronic device manufacturer, and in an embodiment, the obtaining of the current authentication requirement list and the corresponding current certificate obtaining information of the product includes:
step 2011, determining a current authentication requirement list according to the product model of the product and a preset product authentication schedule;
step 2012, determining the current certificate obtaining information corresponding to the authentication requirement list according to the authentication requirement list and the authentication certificate pre-stored in the current certificate library.
The product certification schedule records certification certificates to be acquired when products enter each regional market.
Specifically, in one embodiment, the current forensic information may be a forensic code for the product, e.g., #: ABCDEFGHIJK. The character "#" is a variable representing the product model; the character is constant, and the product model and the code for obtaining the certificate are divided. A represents CCC authentication, if the product has a CCC certificate, A is 1, and if the product does not have the CCC certificate, A is 0; b represents energy-saving authentication, if yes, B is 1, and if no, B is 0; c represents environment authentication, if yes, C is 1, and if no, C is 0; d represents CB authentication, and if yes, D is 1, and if no, D is 0; e represents CE-LVD authentication, if any, E is 1, and if not, E is 0; f represents CE-EMC certification, if yes, F is 1, and if no, F is 0; g represents FCC certification, if any, F is 1, and if not, F is 0; h represents UL authentication, and if present, G is 1, and if not, G is 0; i represents KC authentication, if any, H is 1, and if not, H is 0; j represents energy efficiency certification, I is 1 if any, and I is 0 if none; k represents EAC authentication, if any, J is 1, and if not, J is 0; l represents information security authentication, and if yes, K is 1, and if no, K is 0; m represents BSMI authentication, if any, L ═ 1, if not, L ═ 0; if a product has CCC, CB, CE-LVD, CE-EMC, FCC and UL certificates, the certificate code is 1001111100000.
Accordingly, in an embodiment, for the reported key component list, the information of the key component list in different types of reports can be directionally obtained by scanning and reading the report content of the authentication certificate, looking up the key word, such as: fan, power module, mainboard, CPU, GPU and other model information. The intelligently read information is uniformly stored in the following reported key part list codes, and the naming conditions of the reported key part list of the product are as follows: #, abcdefghijkl. Wherein, the character "#" is a variable representing the model of the product; the character is constant, and the product model and the list of the certified key components are divided. a. b, c, d, e, f, g, h, i, j, k, l represent key component list information in CCC, energy saving, environment, CB, CE-LVD, CE-EMC, FCC, UL, KC, energy efficiency, EAC, information security, BSMI certification report, respectively.
Further, the key component list-the reported key component list (#: abcdefghijkl) ═ the key component difference list (#: a 'b' c'd' e 'f' g 'h' i 'j' k 'l'). The key element difference list (#: a ' b ' c'd ' e ' f ' g ' h ' i ' j ' k ' l ') and U key element reporting requirement ═ key element list to be reported (#: a ' b ' c'd ' e ' f ' g ' h ' i ' j ' k ' l).
Further, in an embodiment, in order to further enrich the hardware information management function, the obtained certificate and the certificate to be obtained of the product can be determined according to the authentication requirement list of the product and the corresponding current certificate obtaining information; and calculating the certificate authentication cost generated by the obtained certificate and the certificate to be obtained of the product according to a preset certificate authentication charging standard.
Specifically, the quotation (certificate authentication charging standard) can be uploaded to the certificate authentication fee module, so that classification can be automatically performed according to the product model and the authentication category on the quotation, and a total fee list is calculated and generated for project fee statistics.
Further, in an embodiment, the authentication time of each certified product can be determined according to the current certified information; and generating a hardware information management report of the product according to the current certificate information, the certification time of each certificate and the standby key part list to be reported.
Specifically, the generated hardware information management report may further include a certificate authentication cost of the acquired certificate and a certificate authentication cost of the to-be-acquired certificate.
Specifically, the hardware information management report may be pushed to a hardware certification management department to help a hardware certification engineer and other related technical personnel to manage and control the product hardware certification progress.
Exemplarily, as shown in fig. 3, an overall flowchart of a hardware information management method provided in the embodiment of the present application is schematically shown. The information display panel can be information display equipment of a hardware authentication management department, and can display an unreported key part list (a key part list to be backuped), a hardware information management report and the like. The method shown in fig. 3 is an exemplary implementation of the method shown in fig. 2, and the implementation principles of the two methods are the same and will not be described again.
According to the hardware information management method provided by the embodiment of the application, a current authentication requirement list and corresponding current certificate information of a product are acquired; determining a reported key part list of the product according to the current certification information; determining a key part difference list according to a comparison result between the reported key part list and a preset key part list; determining a list of the key parts to be reported according to the key part difference list; and updating the authentication requirement list according to the key component list to be reported. According to the method provided by the scheme, the key part list to be reported is detected for the current authentication requirement list, a hardware authentication engineer is helped to master the product hardware authentication progress in time, and the authentication requirement list of the product is updated in a targeted manner according to the key part list to be reported, so that the efficiency of product hardware authentication is improved. Moreover, hardware authentication engineers can conveniently know the conditions of evidence obtaining, key piece reporting and cost and the like of each product in real time, the time for manually arranging data is reduced, the working efficiency and the accuracy are improved, the standardized, rapid, systematic and visual presentation of hardware authentication service information is realized, and the hardware authentication management work is very convenient.
The embodiment of the application provides a hardware information management device, which is used for executing the hardware information management method provided by the embodiment.
Fig. 4 is a schematic structural diagram of a hardware information management apparatus according to an embodiment of the present application. The hardware information management apparatus 40 includes: an acquisition module 401, a first determination module 402, a second determination module 403, a management module 404, and an update module 405.
The system comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for acquiring a current authentication demand list of a product and corresponding current verification information; the first determining module is used for determining a reported key part list of the product according to the current evidence obtaining information; the second determining module is used for determining a key part difference list according to a comparison result between the reported key part list and a preset key part list; the management module is used for determining a list of the key parts to be reported according to the key part difference list; and the updating module is used for updating the authentication requirement list according to the standby key part list.
Specifically, in an embodiment, the management module is specifically configured to:
determining a key part preparation list according to the key part preparation requirements represented by the current authentication requirement list;
and determining a list of the key parts to be reported according to the key part reporting list and the key part difference list.
Specifically, in an embodiment, the first determining module is specifically configured to:
determining the certified certificate of the product according to the current certified information;
extracting certificate reports of each obtained certificate from a preset certificate library;
and determining a reported key part list of the product according to the key part managed information recorded in each certificate report.
Specifically, in an embodiment, the obtaining module is specifically configured to:
determining a current authentication demand list according to the product model of the product and a preset product authentication schedule;
and determining the current certificate obtaining information corresponding to the authentication demand list according to the authentication demand list and the authentication certificate prestored in the current certificate library.
Specifically, in one embodiment, the apparatus further comprises:
the expense management module is used for determining the obtained certificate and the certificate to be obtained of the product according to the authentication demand list of the product and the corresponding current certificate obtaining information; and calculating the certificate authentication cost generated by the obtained certificate and the certificate to be obtained of the product according to a preset certificate authentication charging standard.
Specifically, in one embodiment, the apparatus further comprises:
the report generation module is used for determining the certification time of each certified product according to the current certification information; and generating a hardware information management report of the product according to the current certificate information, the certification time of each certificate and the standby key part list to be reported.
Specifically, in an embodiment, the second determining module is further configured to:
and extracting a key part list from a part list planned in the initial stage of product development or a comprehensive BOM table planned in the final stage of product development.
With regard to the hardware information management apparatus in the present embodiment, the specific manner in which each module performs operations has been described in detail in the embodiment related to the method, and will not be elaborated here.
The hardware information management apparatus provided in the embodiment of the present application is configured to execute the hardware information management method provided in the foregoing embodiment, and an implementation manner and a principle of the hardware information management apparatus are the same and are not described again.
The embodiment of the application provides electronic equipment, which is used for executing the hardware information management method provided by the embodiment.
Fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application. The electronic device 50 includes: at least one processor 51 and memory 52;
the memory stores computer-executable instructions; the at least one processor executes the computer-executable instructions stored by the memory, causing the at least one processor to perform the hardware information management method provided by the above embodiments.
The electronic device provided in the embodiment of the present application is configured to execute the hardware information management method provided in the foregoing embodiment, and an implementation manner and a principle of the electronic device are the same and are not described again.
The embodiment of the present application provides a computer-readable storage medium, where a computer execution instruction is stored in the computer-readable storage medium, and when a processor executes the computer execution instruction, the hardware information management method provided in any of the above embodiments is implemented.
The storage medium containing the computer-executable instructions of the embodiment of the present application may be used to store the computer-executable instructions of the hardware information management method provided in the foregoing embodiment, and the implementation manner and the principle thereof are the same and are not described again.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the methods according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It is obvious to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to perform all or part of the above described functions. For the specific working process of the device described above, reference may be made to the corresponding process in the foregoing method embodiment, which is not described herein again.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. A hardware information management method is characterized by comprising the following steps:
acquiring a current authentication demand list of a product and corresponding current evidence obtaining information;
determining a reported key part list of the product according to the current certification information;
determining a key part difference list according to a comparison result between the reported key part list and a preset key part list;
determining a list of the key parts to be reported according to the key part difference list;
and updating the authentication requirement list according to the standby key part list to be reported.
2. The method of claim 1, wherein determining a candidate key-part list based on the key-part difference list comprises:
determining a key part preparation list according to the key part preparation requirements represented by the current authentication requirement list;
and determining the key element list to be reported according to the key element reporting list and the key element difference list.
3. The method of claim 1, wherein determining a list of reported keywords for the product based on the current forensic information comprises:
determining the certified certificate of the product according to the current certified information;
extracting each certificate report of the obtained certificate from a preset certificate library;
and determining a reported key part list of the product according to the key part managed information recorded in each certificate report.
4. The method of claim 1, wherein the obtaining a current certification requirement list of the product and corresponding current certification information comprises:
determining the current authentication demand list according to the product model of the product and a preset product authentication schedule;
and determining the current certificate obtaining information corresponding to the authentication demand list according to the authentication demand list and the authentication certificate prestored in the current certificate library.
5. The method of claim 1, further comprising:
determining the certificate of the product and the certificate to be acquired according to the authentication demand list of the product and the corresponding current certificate acquiring information;
and calculating the certificate authentication cost generated by the obtained certificate and the certificate to be obtained of the product according to a preset certificate authentication charging standard.
6. The method of claim 1, further comprising:
determining the authentication time of each authenticated product according to the current authentication information;
and generating a hardware information management report of the product according to the current certificate obtaining information, the authentication time of each certificate obtained and the list of the standby key elements.
7. The method of claim 1, wherein before determining the key component difference list according to the comparison result between the reported key component list and the preset key component list, the method further comprises:
and extracting the key part list from a part list planned in the initial stage of product development or a comprehensive BOM table planned in the final stage of product development.
8. A hardware information management apparatus, comprising:
the acquisition module is used for acquiring a current authentication demand list of a product and corresponding current authentication information;
the first determining module is used for determining a reported key part list of the product according to the current evidence obtaining information;
the second determining module is used for determining a key part difference list according to a comparison result between the reported key part list and a preset key part list;
the management module is used for determining a list of the key parts to be reported according to the key part difference list;
and the updating module is used for updating the authentication requirement list according to the standby key part list.
9. An electronic device, comprising: at least one processor and memory;
the memory stores computer-executable instructions;
the at least one processor executing the computer-executable instructions stored by the memory causes the at least one processor to perform the method of any of claims 1-7.
10. A computer-readable storage medium having computer-executable instructions stored thereon which, when executed by a processor, implement the method of any one of claims 1 to 7.
CN202111600380.9A 2021-12-24 2021-12-24 Hardware information management method and device, electronic equipment and storage medium Active CN114358799B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111600380.9A CN114358799B (en) 2021-12-24 2021-12-24 Hardware information management method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111600380.9A CN114358799B (en) 2021-12-24 2021-12-24 Hardware information management method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114358799A true CN114358799A (en) 2022-04-15
CN114358799B CN114358799B (en) 2024-01-19

Family

ID=81101653

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111600380.9A Active CN114358799B (en) 2021-12-24 2021-12-24 Hardware information management method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114358799B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115062924A (en) * 2022-05-27 2022-09-16 苏州浪潮智能科技有限公司 Method, system and storage medium for managing and controlling authentication sample sending piece

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109377055A (en) * 2018-10-25 2019-02-22 金蝶软件(中国)有限公司 A kind of method and device of business paper adjustment
CN112116288A (en) * 2020-08-21 2020-12-22 苏州浪潮智能科技有限公司 Method, system, equipment and medium for ensuring consistency of key parts
CN112632937A (en) * 2020-12-30 2021-04-09 远光软件股份有限公司 Scrap list generation method and device, storage medium and electronic equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109377055A (en) * 2018-10-25 2019-02-22 金蝶软件(中国)有限公司 A kind of method and device of business paper adjustment
CN112116288A (en) * 2020-08-21 2020-12-22 苏州浪潮智能科技有限公司 Method, system, equipment and medium for ensuring consistency of key parts
CN112632937A (en) * 2020-12-30 2021-04-09 远光软件股份有限公司 Scrap list generation method and device, storage medium and electronic equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115062924A (en) * 2022-05-27 2022-09-16 苏州浪潮智能科技有限公司 Method, system and storage medium for managing and controlling authentication sample sending piece
CN115062924B (en) * 2022-05-27 2024-01-12 苏州浪潮智能科技有限公司 Authentication sample feeding piece management and control method, system and storage medium

Also Published As

Publication number Publication date
CN114358799B (en) 2024-01-19

Similar Documents

Publication Publication Date Title
CN108984418B (en) Software test management method and device, electronic equipment and storage medium
CN102640156B (en) For analyzing the system and method for nonstandard facilities operation intracardiac in the data
JP6511120B2 (en) Product development management system and method
US8704821B2 (en) System and method for managing virtual world environments based upon existing physical environments
CN113626914A (en) Engineering project management method, device and system based on digital twins
CN110990927A (en) BIM-based whole process consultation method
CN111383130A (en) Full life cycle management and control platform, mobile operation and maintenance client and terminal
CN114358799A (en) Hardware information management method and device, electronic equipment and storage medium
CN115080019A (en) Aviation aircraft software EBOM structure construction method
CN109559085B (en) Approval method based on BIM lightweight model and terminal equipment
CN111008822A (en) BIM-based EPC project management platform
CN114722789B (en) Data report integrating method, device, electronic equipment and storage medium
WO2021032310A1 (en) Method and system for generating a digital representation of asset information in a cloud computing environment
CN112204527A (en) Method and system for processing engineering data in a multi-engineering system environment
JP2022180289A (en) Quality information output apparatus, quality information output method, and program
CN108921499A (en) A kind of exhibition room finishing workflow method and its system
CN114124977A (en) Cross-tenant data sharing method and device and electronic equipment
CN114119795A (en) Paperless auditing method, PLM system, tablet personal computer device and storage medium
CN113627692A (en) Complaint amount prediction method, complaint amount prediction device, complaint amount prediction apparatus, and storage medium
Brotherton Data center energy efficiency
CN112348403B (en) Wind control model construction method and device and electronic equipment
CN117135050B (en) Application deployment method and device
US20230351325A1 (en) Parts procurement support device, parts procurement support system, and parts procurement support method
WO2022264464A1 (en) Computer system and information presenting method
CN117194382A (en) Middle-stage data processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant