CN116383859B - Detection report generation method and device, electronic equipment and storage medium - Google Patents

Detection report generation method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN116383859B
CN116383859B CN202310658587.4A CN202310658587A CN116383859B CN 116383859 B CN116383859 B CN 116383859B CN 202310658587 A CN202310658587 A CN 202310658587A CN 116383859 B CN116383859 B CN 116383859B
Authority
CN
China
Prior art keywords
detection
report
data
inspection
parameter value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310658587.4A
Other languages
Chinese (zh)
Other versions
CN116383859A (en
Inventor
马杰
吴柏廷
张剑峰
魏莹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Construction Engineering Quality Testing Center Co ltd
Sichuan Institute of Building Research
Original Assignee
Sichuan Construction Engineering Quality Testing Center Co ltd
Sichuan Institute of Building Research
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Construction Engineering Quality Testing Center Co ltd, Sichuan Institute of Building Research filed Critical Sichuan Construction Engineering Quality Testing Center Co ltd
Priority to CN202310658587.4A priority Critical patent/CN116383859B/en
Publication of CN116383859A publication Critical patent/CN116383859A/en
Application granted granted Critical
Publication of CN116383859B publication Critical patent/CN116383859B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S10/00Systems supporting electrical power generation, transmission or distribution
    • Y04S10/50Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a detection report generation method, a device, electronic equipment and a storage medium, wherein the method comprises the following steps: preprocessing the inspection and detection data to obtain a first data packet, adding marking information to the first data packet, encrypting to obtain an inspection and detection parameter value block, storing the inspection and detection parameter value block in a first data block pool after verification, decrypting the inspection and detection parameter value block in response to a call request aiming at the inspection and detection parameter value block, editing an inspection and detection report of a second data packet based on a report template to obtain a report to be checked, and generating a report text corresponding to the report to be checked after the approval of the report to be checked is passed. The application can effectively realize the preservation mark on the data line in the whole process of engineering quality inspection and detection, can realize the tamper-proof function of related data, is beneficial to the reverse tracing of authorities and related units, and ensures the true integrity of inspection and detection data and the reliability of archiving and storage.

Description

Detection report generation method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a method and apparatus for generating a detection report, an electronic device, and a storage medium.
Background
Currently, there are three general approaches to reporting by inspection and detection institutions: one is to collect the original data of the test purely manually, obtain the relevant parameter index of the detected sample after certain data operation processing, then report; the other is that parameter indexes of the detected sample are automatically collected through automatic collecting equipment, and then reports are sent by depending on a laboratory information management system (also called as lims system); the third is to report with the lims system after manually collecting test data.
Since the process of inspection and detection involves the transfer and processing of a large amount of data, the accuracy and authenticity of the data plays a vital role in reporting quality. The first method can realize accurate report basically by means of personnel capability and quality, and the latter two methods introduce a lims system, so that the accuracy of the data is guaranteed to a certain extent. However, in either method, the authenticity of the data cannot be completely guaranteed, malicious tampering of the data cannot be avoided, and effective supervision is difficult for the authorities. Therefore, new technical means are needed to be introduced, and the problems of true and accurate report data of engineering quality inspection and detection and anti-counterfeiting inspection of reports are overcome.
Disclosure of Invention
In view of the above, embodiments of the present application provide a method, an apparatus, an electronic device, and a storage medium for generating a detection report, which can effectively implement a trace on a data line in the whole process of engineering quality inspection and detection, and can implement a tamper-proof function of related data, thereby being beneficial to backtracking of authorities and related units, and ensuring the true integrity and archival storage reliability of inspection and detection data.
The technical scheme of the embodiment of the application is realized as follows:
in a first aspect, an embodiment of the present application provides a detection report generating method, including the following steps:
acquiring inspection and detection data acquired by inspection and detection equipment, and preprocessing the inspection and detection data to obtain a first data packet;
adding marking information to the first data packet, and carrying out encryption processing on the first data packet added with the marking information to obtain a detection parameter value block, and storing the detection parameter value block in a first data block pool after verification, wherein the first data block pool is positioned on a block chain;
responding to a call request aiming at a detection parameter value block, decrypting the detection parameter value block, and storing a second data packet obtained after decryption into a database to be referenced;
Editing the inspection and detection report of the second data packet based on a report template to obtain a report to be checked, and generating a report text corresponding to the report to be checked after the report to be checked passes the approval.
In one possible implementation manner, the inspection and detection device has an automatic acquisition function, the inspection and detection data are obtained by converting characteristic information of a sample to be detected by the inspection and detection device, and the converted inspection and detection data are data which can be processed by an electronic system;
the preprocessing the inspection and detection data to obtain a first data packet includes:
and calculating the inspection and detection data according to a preset operation rule to obtain a corresponding parameter value, and integrating and storing the inspection and detection data and the parameter value according to a preset data format to obtain the first data packet.
In one possible implementation manner, the adding tag information to the first data packet includes:
adding at least one of the following basic information to the first data packet: timestamp, equipment identification, operator, detection site and corresponding sample;
The encrypting the first data packet to which the tag information is added includes:
one of the first data packets is encrypted by the following encryption method: one-way encryption, symmetric encryption, asymmetric encryption, wherein the one-way encryption comprises hash encryption.
In one possible implementation, the blockchain has stored thereon a set of permissions parameters for verifying the parameter ranges of the block of inspection detection parameter values, the set of permissions parameters being stored in a second pool of data blocks located on the blockchain;
the verifying and storing the verification and detection parameter value block in a first data block pool comprises the following steps:
verifying the parameter range of the detection parameter value block based on the permission parameter set, and storing the detection parameter value block into the first data block pool when the parameter range of the detection parameter value block is in the permission range; and when the parameter range of the detection parameter value block exceeds the allowable range, displaying corresponding early warning information, and prohibiting calling when a calling request is initiated to the detection parameter value block.
In one possible implementation, the report template is stored in a third pool of data blocks located on a blockchain, the report template including at least one editing item;
The editing the inspection and detection report of the second data packet based on the report template comprises the following steps:
and responding to the editing operation aiming at the at least one editing item, verifying the mark information corresponding to the edited editing item, and if the verification result does not meet the target requirement, displaying the corresponding prompt information and prohibiting storage.
In one possible implementation manner, the report to be checked is stored in a fourth data block pool located on a block chain, after each time the check detection report of the second data packet is edited, the legal editing time, editing position, editing content and operation user of each time are recorded, and the report to be checked of the corresponding version is generated.
In one possible implementation manner, after the approval of the pending report passes, generating a report text corresponding to the pending report includes:
recording approval information in response to approval operation aiming at the report to be approved, and storing the recorded approval information in a fifth data block pool positioned on a block chain;
when the approval passes, adding specific tamper-proof signature information to the approved report to obtain the report text;
And uploading the report text to a sixth data block pool located on the blockchain.
In a second aspect, an embodiment of the present application further provides a detection report generating apparatus, where the apparatus includes:
the acquisition module is used for acquiring the inspection detection data acquired by the inspection detection equipment and preprocessing the inspection detection data to obtain a first data packet;
the storage module is used for adding marking information to the first data packet, encrypting the first data packet added with the marking information to obtain a detection parameter value block, and storing the detection parameter value block in a first data block pool after verification, wherein the first data block pool is positioned on a block chain;
the calling module is used for responding to a calling request aiming at the detection parameter value block, decrypting the detection parameter value block, and storing a second data packet obtained after decryption into a database to be referred;
the generation module is used for editing the inspection and detection report of the second data packet based on the report template to obtain a report to be checked, and generating a report text corresponding to the report to be checked after the report to be checked passes the approval.
In a third aspect, an embodiment of the present application further provides an electronic device, including: a processor, a storage medium storing machine-readable instructions executable by the processor, the processor in communication with the storage medium via a bus when the electronic device is running, the processor executing the machine-readable instructions to perform the detection report generating method of any of the first aspects.
In a fourth aspect, embodiments of the present application also provide a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the detection report generating method of any one of the first aspects.
The embodiment of the application has the following beneficial effects:
by introducing a blockchain technology, processes of automatic acquisition of inspection and detection data, calculation processing of original data, data encryption and uploading of blockchains, request of data by report personnel, verification of data authority keys, data decryption and downlink, formation of report text information of each version, generation of report anti-counterfeiting number identification, formation of a final version, encryption and uplink storage of report information and the like are carried out, so that the trace is effectively saved on a data line in the whole process of engineering quality inspection and detection, the tamper-proof function of related data can be realized, the reverse tracing of authorities and related units is facilitated, and the true integrity of inspection and detection data and the reliability of archiving and storage are ensured.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic flow chart of steps S101-S104 provided in an embodiment of the present application;
FIG. 2 is a schematic flow chart of steps S201-S203 provided in an embodiment of the present application;
FIG. 3 is a schematic diagram of detection report generation provided by an embodiment of the present application;
fig. 4 is a schematic structural diagram of a detection report generating device according to an embodiment of the present application;
fig. 5 is a schematic diagram of a composition structure of an electronic device according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described with reference to the accompanying drawings in the embodiments of the present application, and it should be understood that the drawings in the present application are for the purpose of illustration and description only and are not intended to limit the scope of the present application. In addition, it should be understood that the schematic drawings are not drawn to scale. A flowchart, as used in this disclosure, illustrates operations implemented according to some embodiments of the present application. It should be understood that the operations of the flow diagrams may be implemented out of order and that steps without logical context may be performed in reverse order or concurrently. Moreover, one or more other operations may be added to or removed from the flow diagrams by those skilled in the art under the direction of the present disclosure.
In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is to be understood that "some embodiments" can be the same subset or different subsets of all possible embodiments and can be combined with one another without conflict.
In addition, the described embodiments are only some, but not all, embodiments of the application. The components of the embodiments of the present application generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the application, as presented in the figures, is not intended to limit the scope of the application, as claimed, but is merely representative of selected embodiments of the application. All other embodiments, which can be made by a person skilled in the art without making any inventive effort, are intended to be within the scope of the present application.
In the following description, the terms "first", "second", "third" and the like are merely used to distinguish similar objects and do not represent a particular ordering of the objects, it being understood that the "first", "second", "third" may be interchanged with a particular order or sequence, as permitted, to enable embodiments of the application described herein to be practiced otherwise than as illustrated or described herein.
It should be noted that the term "comprising" will be used in embodiments of the application to indicate the presence of the features stated hereafter, but not to exclude the addition of other features.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein is for the purpose of describing embodiments of the application and is not intended to be limiting of the application.
Referring to fig. 1, fig. 1 is a schematic flow chart of steps S101 to S104 of a detection report generating method according to an embodiment of the present application, and will be described with reference to steps S101 to S104 shown in fig. 1.
Step S101, acquiring inspection and detection data acquired by inspection and detection equipment, and preprocessing the inspection and detection data to obtain a first data packet;
step S102, adding marking information to the first data packet, and carrying out encryption processing on the first data packet added with the marking information to obtain a detection parameter value block, and storing the detection parameter value block in a first data block pool after verification, wherein the first data block pool is positioned on a block chain;
Step S103, in response to a call request for the block of inspection and detection parameter values, decrypting the block of inspection and detection parameter values, and storing a second data packet obtained after decryption in a database to be referenced;
step S104, editing the inspection and detection report of the second data packet based on a report template to obtain a report to be checked, and generating a report text corresponding to the report to be checked after the approval of the report to be checked is passed.
According to the detection report generation method, the blockchain technology is introduced, and based on the processes of automatic acquisition of detection data, calculation processing of original data, encryption and uploading of the data, request of data by report personnel, verification of a data authority key, decryption of the data, formation of report text information of each version, generation and formation of a final version of report anti-counterfeiting number identification, encryption and uplink storage of report information and the like, the storage trace on a data line in the whole process of engineering quality detection is effectively realized, the tamper-proof function of related data can be realized, the reverse tracing of authorities and related units is facilitated, and the true integrity and archiving storage reliability of the detection data are ensured.
The above-described exemplary steps of the embodiments of the present application are described below, respectively.
In step S101, inspection data collected by an inspection apparatus is obtained, and the inspection data is preprocessed to obtain a first data packet.
In some embodiments, the inspection and detection device has an automatic acquisition function, the inspection and detection data is obtained by converting characteristic information of a sample to be inspected by the inspection and detection device, and the converted inspection and detection data is data which can be processed by an electronic system;
for example, referring to fig. 3, fig. 3 is a schematic diagram of generation of a detection report according to an embodiment of the present application, and as shown in fig. 3, in a stage of acquisition of detection data, detection raw data is acquired by a device with an automatic acquisition function, and feature information of a sample to be detected is spontaneously converted into data information that can be processed by an electronic system. The inspection and detection device may be an associated sensor, and the inspection and detection raw data collected by the sensor, such as electrical signals, may be converted to digital signals for processing by the electronic system.
The preprocessing the inspection and detection data to obtain a first data packet includes:
And calculating the inspection and detection data according to a preset operation rule to obtain a corresponding parameter value, and integrating and storing the inspection and detection data and the parameter value according to a preset data format to obtain the first data packet.
Here, with continued reference to fig. 3, the device processor calculates the collected raw data according to a preset operation rule, and outputs a corresponding parameter value. Meanwhile, the data storage effectively stores and integrates the measured data and the finally output parameter value information according to a certain data format, and the processed parameter values are summarized to form a data packet which is transmitted to a data platform (block chain) through a unified data interface.
In step S102, tag information is added to the first data packet, and encryption processing is performed on the first data packet to which the tag information is added, so as to obtain a block of inspection detection parameter values, and the block of inspection detection parameter values is verified and stored in a first pool of data blocks, where the first pool of data blocks is located on a blockchain.
In some embodiments, the adding the tag information to the first data packet includes:
Adding at least one of the following basic information to the first data packet: timestamp, equipment identification, operator, detection site and corresponding sample;
in the encryption and uplink process, after the data platform receives the data packet, the data packet is encrypted to form a detection parameter value block after being subjected to time stamping and corresponding basic information such as equipment, operators, detection places and corresponding samples, and distributed storage is performed on each node of the block chain.
The platform block chain divides a plurality of data block pools according to the difference of data types, and is used for storing different types of encrypted data, including parameter value data (i.e. checking a parameter value block, and storing the parameter value block in a first data block pool), a permission parameter set (stored in a second data block pool), a report template (stored in a third data block pool), report version data (i.e. different versions of pending reports, and storing the report in a fourth data block pool), approval information (stored in a fifth data block pool), formal text data (i.e. report text, and storing the report text in a sixth data block pool), and the like.
The encrypting the first data packet to which the tag information is added includes:
One of the first data packets is encrypted by the following encryption method: one-way encryption, symmetric encryption and asymmetric encryption, wherein the one-way encryption comprises hash encryption, as shown in fig. 3, in the embodiment of the application, encryption is performed by adopting a hash function by default.
In some embodiments, the blockchain has stored thereon a set of permissions parameters for verifying a parameter range of the block of inspection detection parameter values, the set of permissions parameters being stored in a second pool of data blocks located on the blockchain;
the verifying and storing the verification and detection parameter value block in a first data block pool comprises the following steps:
verifying the parameter range of the detection parameter value block based on the permission parameter set, and storing the detection parameter value block into the first data block pool when the parameter range of the detection parameter value block is in the permission range; and when the parameter range of the detection parameter value block exceeds the allowable range, displaying corresponding early warning information, and prohibiting calling when a calling request is initiated to the detection parameter value block.
Here, according to the service requirement, the engineering quality inspection and detection mechanism can only engage in inspection and detection service within the allowable parameter range, so that the authority administrator with authority records the parameters related to the inspection service which can be carried out by the mechanism, namely, the allowable parameter set in advance in the allowable parameter block of the blockchain. The license parameter set is designed in a key form on the blockchain to control the parameter value range of the uploaded blockchain. When the parameter value data packet is uploaded to the blockchain through the data channel, the license parameter set intervenes in key matching, if the parameter value corresponds to the license parameter, the key matching is completed, and the parameter value is encrypted and uploaded to the blockchain for storage; if the parameter values do not match, the blockchain sends out early warning, and prompts that the parameter values are not in the allowable range and cannot be called in the process of issuing the subsequent report.
In step S103, in response to the call request for the block of inspection detection parameter values, the block of inspection detection parameter values is decrypted, and the second data packet obtained after decryption is stored in the database to be referenced.
With continued reference to fig. 3, the inspection report editing phase, the data platform distributes digital signature certificates and keys to editors in accordance with user rights. After personnel send a data calling request to the platform blockchain, the blockchain data channel utilizes a consensus mechanism to check a key provided by a user, after the verification is passed, the data blocks on the chain are decrypted to form corresponding data packets, the corresponding data packets are transmitted to a database to be referenced through the data channel for use by authorized personnel, and report editors can select specific report templates and parameter value information to be called.
In step S104, the inspection and detection report of the second data packet is edited based on the report template to obtain a report to be checked, and after the approval of the report to be checked passes, a report text corresponding to the report to be checked is generated.
In some embodiments, the report template is stored in a third pool of data chunks located on a blockchain, the report template including at least one editing item;
The editing the inspection and detection report of the second data packet based on the report template comprises the following steps:
and responding to the editing operation aiming at the at least one editing item, verifying the mark information corresponding to the edited editing item, and if the verification result does not meet the target requirement, displaying the corresponding prompt information and prohibiting storage.
Here, the report templates corresponding to each inspection detection parameter are attached with an inspection mechanism at all data editing positions. When the parameter data is filled, time information, equipment information, sample information and the like associated with the data packet are compared, and if the related information is inconsistent with the data validity source, the preset supervision requirement, the project basic information and the like, the blockchain prompts illegal entry and prohibits the storage operation of the corresponding position data.
In some embodiments, the pending report is stored in a fourth data block pool located on a block chain, after each editing of the inspection report of the second data packet, each legal editing time, editing position, editing content, and operation user are recorded, and the pending report of the corresponding version is generated.
Here, in the edit report process, each legal edit time, edit position, edit content, operation user, and the like are recorded in combination as one version and form an encrypted block for distributed storage. Each version can be called and checked by a person with corresponding authority at any subsequent stage, and reverse tracing is realized. After reporting the finalization, the report text, which will be marked as the final version, is submitted for approval.
In some embodiments, referring to fig. 2, fig. 2 is a schematic flow chart of steps S201 to S203 provided in the embodiment of the present application, and after approval of the to-be-approved report is passed, generating a report text corresponding to the to-be-approved report may be implemented through steps S201 to S203, which will be described in connection with each step.
In step S201, in response to the approval operation for the report to be approved, approval information is recorded, and the recorded approval information is stored in a fifth data block pool located on a blockchain.
In step S202, when the approval passes, specific tamper-proof signature information is added to the approved report, and the report text is obtained.
In step S203, the report text is uploaded to a sixth pool of data chunks located on the blockchain.
For example, in the inspection detection report approval stage, all approval operation information including the name of the approver, approval time, approval action and the like is completely recorded and stored in an encrypted uplink by each level of signatory. After the report approval is finished, the specific tamper-proof signature information which is authenticated by signature is added on the inspection and detection report, and the report text with the signature information is used as a final version to be stored in a uplink after being encrypted.
All process data blocks in the process are reported, and are connected on a blockchain through specific association marks to be used as a complete data record for checking and detecting items. The later stage of the record can not be modified, and the related information of any stage of report can be called through characteristic values such as project numbers.
In summary, the embodiment of the application has the following beneficial effects:
by introducing a blockchain technology, processes of automatic acquisition of inspection and detection data, calculation processing of original data, data encryption and uploading of blockchains, request of data by report personnel, verification of data authority keys, data decryption and downlink, formation of report text information of each version, generation of report anti-counterfeiting number identification, formation of a final version, encryption and uplink storage of report information and the like are carried out, so that the trace is effectively saved on a data line in the whole process of engineering quality inspection and detection, the tamper-proof function of related data can be realized, the reverse tracing of authorities and related units is facilitated, and the true integrity of inspection and detection data and the reliability of archiving and storage are ensured.
Based on the same inventive concept, the embodiment of the present application further provides a detection report generating device corresponding to the detection report generating method in the first embodiment, and since the principle of solving the problem of the device in the embodiment of the present application is similar to that of the detection report generating method described above, the implementation of the device may refer to the implementation of the method, and the repetition is omitted.
As shown in fig. 4, fig. 4 is a schematic structural diagram of a detection report generating apparatus 400 according to an embodiment of the present application. The detection report generation apparatus 400 includes:
the acquisition module 401 is configured to acquire inspection data acquired by an inspection and detection device, and perform preprocessing on the inspection and detection data to obtain a first data packet;
the storage module 402 is configured to add tag information to the first data packet, and encrypt the first data packet to which the tag information is added, so as to obtain a block of inspection parameter values, and store the block of inspection parameter values in a first data block pool after the block of inspection parameter values is verified, where the first data block pool is located on a block chain;
a calling module 403, configured to decrypt the block of inspection and detection parameter values in response to a calling request for the block of inspection and detection parameter values, and store a second data packet obtained after decryption in a database to be referred;
the generating module 404 is configured to edit the inspection and detection report of the second data packet based on a report template, obtain a report to be checked, and generate a report text corresponding to the report to be checked after the approval of the report to be checked passes.
It will be appreciated by those skilled in the art that the implementation functions of the units in the detection report generating apparatus 400 shown in fig. 4 can be understood with reference to the foregoing description of the detection report generating method. The functions of the respective units in the detection report generating apparatus 400 shown in fig. 4 may be realized by a program running on a processor, or may be realized by a specific logic circuit.
In one possible implementation manner, the inspection and detection device has an automatic acquisition function, the inspection and detection data are obtained by converting characteristic information of a sample to be detected by the inspection and detection device, and the converted inspection and detection data are data which can be processed by an electronic system;
the obtaining module 401 performs preprocessing on the inspection detection data to obtain a first data packet, including:
and calculating the inspection and detection data according to a preset operation rule to obtain a corresponding parameter value, and integrating and storing the inspection and detection data and the parameter value according to a preset data format to obtain the first data packet.
In one possible implementation, the storing module 402 adds tag information to the first data packet, including:
Adding at least one of the following basic information to the first data packet: timestamp, equipment identification, operator, detection site and corresponding sample;
encrypting the first data packet to which the tag information is added, including:
one of the first data packets is encrypted by the following encryption method: one-way encryption, symmetric encryption, asymmetric encryption, wherein the one-way encryption comprises hash encryption.
In one possible implementation, the blockchain has stored thereon a set of permissions parameters for verifying the parameter ranges of the block of inspection detection parameter values, the set of permissions parameters being stored in a second pool of data blocks located on the blockchain;
the storage module 402 stores the verified block of the inspection parameter values in the first pool of data blocks, including:
verifying the parameter range of the detection parameter value block based on the permission parameter set, and storing the detection parameter value block into the first data block pool when the parameter range of the detection parameter value block is in the permission range; and when the parameter range of the detection parameter value block exceeds the allowable range, displaying corresponding early warning information, and prohibiting calling when a calling request is initiated to the detection parameter value block.
In one possible implementation, a report template is stored in a third pool of data blocks located on the blockchain, the report template including at least one editing item;
the generating module 404 edits the inspection detection report of the second data packet based on the report template, including:
and responding to the editing operation aiming at the at least one editing item, verifying the mark information corresponding to the edited editing item, and if the verification result does not meet the target requirement, displaying the corresponding prompt information and prohibiting storage.
In one possible implementation, the report to be checked is stored in a fourth data block pool located on a block chain, and after each time the generation module 404 edits the inspection report of the second data packet, records the legal editing time, editing location, editing content, and operation user, and generates a corresponding version of the report to be checked.
In one possible implementation manner, the generating module 404 generates a report text corresponding to the pending report after the approval of the pending report passes, including:
recording approval information in response to approval operation aiming at the report to be approved, and storing the recorded approval information in a fifth data block pool positioned on a block chain;
When the approval passes, adding specific tamper-proof signature information to the approved report to obtain the report text;
and uploading the report text to a sixth data block pool located on the blockchain.
The detection report generating device is based on the processes of automatic acquisition of detection data, calculation processing of original data, encryption and uploading of the data, request of report personnel for data, verification of a data authority key, decryption of the data, formation of report text information of each version, generation and formation of a final version of report anti-counterfeiting number identification, encryption and uplink storage of report information and the like by introducing a blockchain technology, effectively realizes the trace preservation on a data line in the whole process of engineering quality detection, can realize the tamper-proof function of related data, is beneficial to the reverse tracing of authorities and related units, and ensures the true integrity and archiving storage reliability of the detection data.
As shown in fig. 5, fig. 5 is a schematic diagram of a composition structure of an electronic device 500 according to an embodiment of the present application, where the electronic device 500 includes:
the device comprises a processor 501, a storage medium 502 and a bus 503, wherein the storage medium 502 stores machine-readable instructions executable by the processor 501, and when the electronic device 500 is operated, the processor 501 communicates with the storage medium 502 through the bus 503, and the processor 501 executes the machine-readable instructions to execute the steps of the detection report generating method according to the embodiment of the application.
In practice, the various components of the electronic device 500 are coupled together via a bus 503. It is understood that the bus 503 is used to enable connected communication between these components. The bus 503 includes a power bus, a control bus, and a status signal bus in addition to a data bus. But for clarity of illustration the various buses are labeled as bus 503 in fig. 5.
The electronic equipment effectively realizes the preservation mark on the data line in the whole process of engineering quality inspection and detection, can realize the tamper-proof function of related data, is beneficial to the reverse tracing of authorities and related units, and ensures the true integrity and the archiving storage reliability of inspection and detection data by introducing a blockchain technology based on the processes of inspection and detection data automatic acquisition, original data calculation processing, data encryption and uploading blockchain, report personnel request data, data authority key verification, data decryption downlink, formation of report text information of each version, report anti-counterfeiting number identification generation and formation of a final version, report information encryption uplink storage and the like.
The embodiment of the present application further provides a computer readable storage medium, where executable instructions are stored, and when the executable instructions are executed by at least one processor 501, the method for generating a detection report according to the embodiment of the present application is implemented.
In some embodiments, the storage medium may be a magnetic random Access Memory (FRAM, ferromagneticRandom Access Memory), read Only Memory (ROM), programmable Read Only Memory (PROM, programmable Read-Only Memory), erasable programmable Read Only Memory (EPROM, erasableProgrammable Read-Only Memory), electrically erasable programmable Read Only Memory (EEPROM, electricallyErasable Programmable Read-Only Memory), flash Memory (Flash Memory), magnetic surface Memory, optical disk, or compact disk Read Only Memory (CD-ROM, compact Disc Read-Only Memory), or the like; but may be a variety of devices including one or any combination of the above memories.
In some embodiments, the executable instructions may be in the form of programs, software modules, scripts, or code, written in any form of programming language (including compiled or interpreted languages, or declarative or procedural languages), and they may be deployed in any form, including as stand-alone programs or as modules, components, subroutines, or other units suitable for use in a computing environment.
As an example, the executable instructions may, but need not, correspond to files in a file system, may be stored as part of a file that holds other programs or data, for example, in one or more scripts in a hypertext markup Language (HTML, hyperTextMarkup Language) document, in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub-programs, or portions of code).
As an example, executable instructions may be deployed to be executed on one computing device or on multiple computing devices located at one site or, alternatively, distributed across multiple sites and interconnected by a communication network.
The computer readable storage medium is based on the processes of automatic acquisition of inspection and detection data, calculation processing of original data, encryption and uploading of the data, request of data by report constructors, verification of data authority keys, decryption of the data, formation of report text information of each version, generation and formation of final version of report anti-counterfeiting number identification, encryption and uplink storage of report information and the like by introducing a blockchain technology, effectively realizes the storage trace on a data line in the whole process of engineering quality inspection and detection, can realize the tamper-proof function of related data, is beneficial to the reverse tracing of authorities and related units, and ensures the authenticity integrity of inspection and detection data and the storage reliability of archiving.
In the several embodiments provided in the present application, it should be understood that the disclosed method and electronic device may be implemented in other manners. The above described device embodiments are only illustrative, e.g. the division of the units is only one logical function division, and there may be other divisions in practice, such as: multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. In addition, the various components shown or discussed may be coupled or directly coupled or communicatively coupled to each other via some interface, whether indirectly coupled or communicatively coupled to devices or units, whether electrically, mechanically, or otherwise.
The modules described as separate components may or may not be physically separate, and components shown as modules may or may not be physical units, may be located in one place, or may be distributed over multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer readable storage medium executable by a processor. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a platform server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk, etc.
The foregoing is merely illustrative of the present application, and the present application is not limited thereto, and any person skilled in the art will readily appreciate variations or alternatives within the scope of the present application. Therefore, the protection scope of the application is subject to the protection scope of the claims.

Claims (9)

1. A method for generating a detection report, comprising the steps of:
acquiring inspection and detection data acquired by inspection and detection equipment, and preprocessing the inspection and detection data to obtain a first data packet;
adding marking information to the first data packet, and carrying out encryption processing on the first data packet added with the marking information to obtain a detection parameter value block, and storing the detection parameter value block in a first data block pool after verification, wherein the first data block pool is positioned on a block chain;
responding to a call request aiming at a detection parameter value block, decrypting the detection parameter value block, and storing a second data packet obtained after decryption into a database to be referenced;
editing the inspection and detection report of the second data packet based on a report template to obtain a report to be checked, and generating a report text corresponding to the report to be checked after the report to be checked passes the approval of the report to be checked;
A permission parameter set for verifying the parameter range of the check detection parameter value block is stored on the blockchain, and the permission parameter set is stored in a second data block pool positioned on the blockchain;
the verifying and storing the verification and detection parameter value block in a first data block pool comprises the following steps:
verifying the parameter range of the detection parameter value block based on the permission parameter set, and storing the detection parameter value block into the first data block pool when the parameter range of the detection parameter value block is in the permission range; and when the parameter range of the detection parameter value block exceeds the allowable range, displaying corresponding early warning information, and prohibiting calling when a calling request is initiated to the detection parameter value block.
2. The method according to claim 1, wherein the inspection and detection device has an automatic acquisition function, the inspection and detection data is obtained by converting characteristic information of a sample to be inspected by the inspection and detection device, and the converted inspection and detection data is data which can be processed by an electronic system;
the preprocessing the inspection and detection data to obtain a first data packet includes:
And calculating the inspection and detection data according to a preset operation rule to obtain a corresponding parameter value, and integrating and storing the inspection and detection data and the parameter value according to a preset data format to obtain the first data packet.
3. The method of claim 1, wherein adding tag information to the first data packet comprises:
adding at least one of the following basic information to the first data packet: timestamp, equipment identification, operator, detection site and corresponding sample;
the encrypting the first data packet to which the tag information is added includes:
one of the first data packets is encrypted by the following encryption method: one-way encryption, symmetric encryption, asymmetric encryption, wherein the one-way encryption comprises hash encryption.
4. The method of claim 1, wherein the report template is stored in a third pool of data chunks located in a blockchain, the report template including at least one editing item;
the editing the inspection and detection report of the second data packet based on the report template comprises the following steps:
and responding to the editing operation aiming at the at least one editing item, verifying the mark information corresponding to the edited editing item, and if the verification result does not meet the target requirement, displaying the corresponding prompt information and prohibiting storage.
5. The method of claim 1, wherein the pending report is stored in a fourth data block pool located on a blockchain, and each legal edit time, edit location, edit content, operation user is recorded after each edit of the inspection report of the second data packet, and a corresponding version of the pending report is generated.
6. The method according to claim 1, wherein the generating report text corresponding to the pending report after the approval of the pending report is passed includes:
recording approval information in response to approval operation aiming at the report to be approved, and storing the recorded approval information in a fifth data block pool positioned on a block chain;
when the approval passes, adding specific tamper-proof signature information to the approved report to obtain the report text;
and uploading the report text to a sixth data block pool located on the blockchain.
7. A detection report generating apparatus, the apparatus comprising:
the acquisition module is used for acquiring the inspection detection data acquired by the inspection detection equipment and preprocessing the inspection detection data to obtain a first data packet;
The storage module is used for adding marking information to the first data packet, encrypting the first data packet added with the marking information to obtain a detection parameter value block, and storing the detection parameter value block in a first data block pool after verification, wherein the first data block pool is positioned on a block chain;
a permission parameter set for verifying the parameter range of the check detection parameter value block is stored on the blockchain, and the permission parameter set is stored in a second data block pool positioned on the blockchain;
the verifying and storing the verification and detection parameter value block in a first data block pool comprises the following steps:
verifying the parameter range of the detection parameter value block based on the permission parameter set, and storing the detection parameter value block into the first data block pool when the parameter range of the detection parameter value block is in the permission range; when the parameter range of the detection parameter value block exceeds the allowable range, displaying corresponding early warning information, and prohibiting calling when a calling request is initiated to the detection parameter value block;
The calling module is used for responding to a calling request aiming at the detection parameter value block, decrypting the detection parameter value block, and storing a second data packet obtained after decryption into a database to be referred;
the generation module is used for editing the inspection and detection report of the second data packet based on the report template to obtain a report to be checked, and generating a report text corresponding to the report to be checked after the report to be checked passes the approval.
8. An electronic device, comprising: a processor, a storage medium, and a bus, the storage medium storing machine-readable instructions executable by the processor, the processor and the storage medium in communication over the bus when the electronic device is running, the processor executing the machine-readable instructions to perform the detection report generating method of any one of claims 1 to 6.
9. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a computer program which, when executed by a processor, performs the detection report generation method according to any one of claims 1 to 6.
CN202310658587.4A 2023-06-06 2023-06-06 Detection report generation method and device, electronic equipment and storage medium Active CN116383859B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310658587.4A CN116383859B (en) 2023-06-06 2023-06-06 Detection report generation method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310658587.4A CN116383859B (en) 2023-06-06 2023-06-06 Detection report generation method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN116383859A CN116383859A (en) 2023-07-04
CN116383859B true CN116383859B (en) 2023-08-22

Family

ID=86961931

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310658587.4A Active CN116383859B (en) 2023-06-06 2023-06-06 Detection report generation method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116383859B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116541392A (en) * 2023-07-06 2023-08-04 四川省建筑科学研究院有限公司 Verification and adjustment method, device, equipment and medium for verification and adjustment of detection data
CN116862321A (en) * 2023-09-05 2023-10-10 广东华标检测中心有限公司 Engineering quality intelligent detection system and method based on big data analysis

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108805585A (en) * 2018-05-28 2018-11-13 广州中国科学院软件应用技术研究所 Distributed commodity data storage system, circulation and source tracing method based on block chain
CN110825776A (en) * 2019-11-07 2020-02-21 腾讯云计算(北京)有限责任公司 Air quality detection report processing method and device, computing equipment and storage medium
CN112115453A (en) * 2020-06-29 2020-12-22 中国电力科学研究院有限公司 Electronic report management system based on block chain
CN112184066A (en) * 2020-10-27 2021-01-05 广州粤建三和软件股份有限公司 Block chain system for construction engineering quality detection supervision
CN112200496A (en) * 2020-11-12 2021-01-08 北京三维天地科技股份有限公司 Laboratory detection report management system based on block chain
CN112257117A (en) * 2020-10-16 2021-01-22 深圳市国佳高鑫科技有限公司 Intelligent detection device based on block chain technology
CN112948894A (en) * 2019-12-10 2021-06-11 中远海运科技股份有限公司 Block chain-based anti-counterfeiting method, device, equipment and medium for tally inspection report
CN113158207A (en) * 2021-04-15 2021-07-23 平安国际智慧城市科技股份有限公司 Block chain based report generation method and device, electronic equipment and storage medium
CN113487275A (en) * 2021-06-29 2021-10-08 北京三维天地科技股份有限公司 Laboratory detection report management system based on block chain
CN114200866A (en) * 2021-12-09 2022-03-18 江苏中路信息科技有限公司 Road engineering Internet of things test detection method and system based on block chain
CN115392810A (en) * 2022-10-31 2022-11-25 江苏衡正区块链科技有限公司 Block chain-based full-process environment detection system and method thereof
CN116049901A (en) * 2023-01-28 2023-05-02 北京中认环宇信息安全技术有限公司 Detection task traceable management system based on timestamp encryption

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220358185A1 (en) * 2015-12-02 2022-11-10 Wells Fargo Bank, N.A. Traversing data structures for compliance
JP7325318B2 (en) * 2019-12-17 2023-08-14 株式会社日立製作所 Trail recording system and data verification method

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108805585A (en) * 2018-05-28 2018-11-13 广州中国科学院软件应用技术研究所 Distributed commodity data storage system, circulation and source tracing method based on block chain
CN110825776A (en) * 2019-11-07 2020-02-21 腾讯云计算(北京)有限责任公司 Air quality detection report processing method and device, computing equipment and storage medium
CN112948894A (en) * 2019-12-10 2021-06-11 中远海运科技股份有限公司 Block chain-based anti-counterfeiting method, device, equipment and medium for tally inspection report
CN112115453A (en) * 2020-06-29 2020-12-22 中国电力科学研究院有限公司 Electronic report management system based on block chain
CN112257117A (en) * 2020-10-16 2021-01-22 深圳市国佳高鑫科技有限公司 Intelligent detection device based on block chain technology
CN112184066A (en) * 2020-10-27 2021-01-05 广州粤建三和软件股份有限公司 Block chain system for construction engineering quality detection supervision
CN112200496A (en) * 2020-11-12 2021-01-08 北京三维天地科技股份有限公司 Laboratory detection report management system based on block chain
CN113158207A (en) * 2021-04-15 2021-07-23 平安国际智慧城市科技股份有限公司 Block chain based report generation method and device, electronic equipment and storage medium
CN113487275A (en) * 2021-06-29 2021-10-08 北京三维天地科技股份有限公司 Laboratory detection report management system based on block chain
CN114200866A (en) * 2021-12-09 2022-03-18 江苏中路信息科技有限公司 Road engineering Internet of things test detection method and system based on block chain
CN115392810A (en) * 2022-10-31 2022-11-25 江苏衡正区块链科技有限公司 Block chain-based full-process environment detection system and method thereof
CN116049901A (en) * 2023-01-28 2023-05-02 北京中认环宇信息安全技术有限公司 Detection task traceable management system based on timestamp encryption

Also Published As

Publication number Publication date
CN116383859A (en) 2023-07-04

Similar Documents

Publication Publication Date Title
CN116383859B (en) Detection report generation method and device, electronic equipment and storage medium
CN108363929B (en) System and method for generating information elimination report of storage device and preventing tampering
US20210067536A1 (en) Blockchain cybersecurity audit platform
Casey et al. Digital transformation risk management in forensic science laboratories
CN111475570A (en) Concrete quality supervision method, device, equipment and storage medium
CN111324517B (en) Application service supervision method, supervision server and storage medium
CN110825776B (en) Air quality detection report processing method and device, computing equipment and storage medium
WO2023023196A2 (en) Method for certification, validation and correlation of bills of materials in a software supply chain
CN109086621B (en) Electric energy meter verification report data tamper-proof method and system and storage medium
CN117150576B (en) Intelligent verification system and method for block chain electronic seal
CN117056899A (en) Electronic certificate generation method and device
CN116226939B (en) Detection laboratory data tamper-proof method and system based on Internet of things and blockchain
Johnson et al. On the digital forensics of heavy truck electronic control modules
Kuntze et al. On the creation of reliable digital evidence
CN115001700B (en) Ecological environment supervision method and system based on blockchain
CN113297632B (en) System and method for managing traceable and field-verified paper report certificates based on blockchain
CN111274579B (en) Enterprise document encryption protection system based on computer
CN112910883B (en) Data transmission method and device and electronic equipment
CN112507355A (en) Individual health data storage system based on block chain
CN113806783B (en) Big data-oriented safety house data protection method and system
Davtyan et al. Taking total control of voting systems: Firmware manipulations on an optical scan voting terminal
CN113723913A (en) Nuclear power plant file management method, device, equipment and storage medium
CN117439767A (en) Communication authorization service system based on block chain
CN118051946A (en) Carbon footprint data management platform, method, electronic device and storage medium
CN113378537A (en) Block chain-based electronic seal generation method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant