[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN113593073A - NFC intelligent inspection method based on background management system and inspection system - Google Patents

NFC intelligent inspection method based on background management system and inspection system Download PDF

Info

Publication number
CN113593073A
CN113593073A CN202110868077.0A CN202110868077A CN113593073A CN 113593073 A CN113593073 A CN 113593073A CN 202110868077 A CN202110868077 A CN 202110868077A CN 113593073 A CN113593073 A CN 113593073A
Authority
CN
China
Prior art keywords
inspection
task
information
current
management system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110868077.0A
Other languages
Chinese (zh)
Other versions
CN113593073B (en
Inventor
王俊坚
朱斌
杨贺贺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou New Window Information Technology Co ltd
Original Assignee
Hangzhou New Window Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou New Window Information Technology Co ltd filed Critical Hangzhou New Window Information Technology Co ltd
Priority to CN202110868077.0A priority Critical patent/CN113593073B/en
Publication of CN113593073A publication Critical patent/CN113593073A/en
Application granted granted Critical
Publication of CN113593073B publication Critical patent/CN113593073B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/20Checking timed patrols, e.g. of watchman
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B5/00Near-field transmission systems, e.g. inductive or capacitive transmission systems
    • H04B5/70Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes
    • H04B5/77Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes for interrogation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an NFC intelligent inspection method based on a background management system and an inspection system, which comprises the following steps: step 1.1, a background management system acquires a polling task sequence of a current polling operator, wherein any polling task in the polling task sequence points to polling task information and a first public key; step 1.2, encrypting the inspection task information pointed by the next inspection task by using a first public key pointed by any inspection task, and constructing an inspection task chain under an inspection task sequence; step 2.1, the inspection system accesses the current inspection task information and identifies the corresponding NFC electronic tag, acquires a stored first private key and decrypts the next inspection task encrypted information, and manually executes inspection operation based on the current inspection task information; and 2.2, using the decrypted next routing inspection task encrypted information as the current routing inspection task information, and returning to the step 2.1 until the routing inspection task chain is visited. The inspection personnel can sequentially inspect the inspection tasks according to a fixed sequence through the inspection task chain, and the omission of the inspection tasks can not be caused.

Description

NFC intelligent inspection method based on background management system and inspection system
Technical Field
The invention belongs to the technical field of intelligent inspection, and particularly relates to an NFC intelligent inspection method based on a background management system and an inspection system.
Background
The inspection work is the specified business work of the property service, mainly comprises 3 large inspection works of equipment inspection, safety patrol and quality inspection, and covers the professional directions of safety, customer service, order, cleaning, greening, fire fighting, equipment and the like. In recent years, with the approval of business to property service value and the improvement of cost of industry personnel, property enterprises show greater interest and attention to the adoption of advanced equipment to assist internal management; on the other hand, due to the rise of smart phones, mobile internet and internet of things, the attention of property enterprise managers to the aspect is promoted.
In the aspect of inspection work, the traditional inspection mode of the property industry mainly takes manual inspection as a main mode, namely manual form filling and manual statistics as main modes, but the traditional inspection mode usually has the defects of synchronous and lagging inspection results, difficult implementation of inspection standard guidance, difficult in-place quality supervision and difficult process tracking; with the development of electronic information technology, part of property enterprises position the inspection point location in a two-dimensional code mode, the mobile terminal scans the two-dimensional code for inspection, the inspection point to be executed which does not execute inspection work can be reminded to the inspection personnel through the mobile terminal, but the inspection point location of the two-dimensional code is marked to be the same as the nominal location due to the reproducibility of the two-dimensional code, so that the cheating prevention effect cannot be achieved; a few property companies adopt the inspection stick, the inspection stick identifies the RFID tag to realize positioning inspection, but the mode cannot realize field input and remote real-time data uploading of inspection data, and in the inspection process, part of inspection work of inspection point positions may be omitted.
Disclosure of Invention
The invention aims to provide an NFC intelligent inspection method based on a background management system and an inspection system, and aims to solve the problems in the background art.
In order to achieve the purpose, the invention provides the following technical scheme:
the NFC intelligent inspection method based on the background management system and the inspection system comprises the background management system and a plurality of inspection systems in data interaction with the background management system, wherein an inspection system is correspondingly provided with an inspector, and the NFC intelligent inspection method comprises the following steps:
step 1, the background management system sends a polling task chain to a polling system of a current-value polling person, and the method comprises the following steps of
Step 1.1, acquiring a polling task sequence of a current polling operator, wherein any polling task in the polling task sequence points to polling task information and a first public key;
step 1.2, encrypting the patrol task information pointed by the next patrol task by using a first public key pointed by any patrol task to obtain patrol task encrypted information, and constructing a patrol task chain under a patrol task sequence;
step 2, the polling system traverses the received polling task chain and completes polling operation in sequence, including
Step 2.1, accessing the current inspection task information and identifying a corresponding NFC electronic tag, acquiring a stored first private key and decrypting next inspection task encryption information, and manually executing inspection operation based on the current inspection task information;
and 2.2, using the decrypted next routing inspection task encrypted information as the current routing inspection task information, and returning to the step 2.1 until the routing inspection task chain is visited.
Preferably, any one of the patrol task information includes a patrol point number, a patrol point name, a patrol point type, patrol point position information, patrol frequency, a patrol standard and contents.
Preferably, the step 1.1 of acquiring the inspection task sequence of the current inspector comprises
Acquiring a current-day inspection plan based on all preset inspection task information;
seeking an optimal routing inspection path for the current day routing inspection plan based on a preset routing inspection task path length matrix;
and acquiring the inspection task sequence of the current inspector based on the preset on-duty information and the optimal inspection path.
Preferably, the current-day patrol inspection plan is generated regularly through a quartz timer based on the patrol inspection frequency in each patrol inspection task information.
Preferably, the shortest routing inspection path is searched for all routing inspection tasks in the current routing inspection plan through the ant colony algorithm.
Preferably, the acquiring of the patrol task sequence of the current patrol inspector based on the preset on-duty information and the optimal patrol path comprises
Calculating the workload of any inspection task in the inspection plan of the day, wherein the workload of any inspection task is the weighted sum of the workload of the inspection task and the amount of motion reaching the inspection task under the shortest inspection path;
and dividing the inspection task under the shortest inspection path for each current inspector on the principle of maximizing balanced workload.
Preferably, the background management system dispatches the patrol inspection task chain to the patrol inspection system of the current value patrol inspector and also dispatches the public key of the background management system.
Preferably, the obtaining of the stored first private key in step 3 includes
Step 3.1, identifying the NFC electronic tag information of the current inspection task information, and decrypting the NFC electronic tag information by using a public key of a background management system to obtain decrypted text information;
and 3.2, eliminating the routing inspection point number from the decrypted text information to obtain a first private key.
Preferably, when a value inspection worker executes inspection operation of current inspection task information, the inspection data is recorded, the inspection system synchronizes the inspection data and decryption time of next inspection task encrypted information to the background management system, the background management system judges whether the decryption time of the next inspection task encrypted information is within a preset time period of the current time and whether the inspection data is not empty, if the decryption time of the next inspection task encrypted information is met, the inspection data can be recorded when next inspection operation is executed, and otherwise, the inspection data cannot be recorded when next inspection operation is executed.
Preferably, the background management system comprises
The information input module is used for inputting the inspection task information;
the inspection task module is used for acquiring an inspection task sequence of a current inspector;
the inspection encryption module is used for encrypting the inspection task information pointed by the next inspection task by using the first public key pointed by any inspection task to obtain an inspection task chain;
the inspection system comprises
The NFC identification module is used for identifying the NFC electronic tag and acquiring NFC electronic tag information;
the inspection data input module is used for manually inputting inspection data and synchronizing the inspection data to the background management system;
and the routing inspection decryption module is used for decrypting the encrypted information of any routing inspection task in the routing inspection task chain.
Compared with the prior art, the invention has the beneficial effects that
1) According to the sequence of the inspection task sequence of the current inspection task, the current inspection task information is read in a traversing manner, and the next inspection task information is encrypted by using the public key corresponding to the current inspection task information, so that an inspection task chain is obtained;
2) through the background management system and the plurality of inspection systems, when an inspection task is executed by a value inspector, an inspection result is synchronized to the background management system, so that real-time synchronization of inspection data is realized, and the background management system can acquire the inspection progress of the value inspector through the synchronized inspection data, so that effective supervision is realized;
3) the NFC electronic tag cannot be copied, and the anti-cheating effect can be achieved.
Drawings
Fig. 1 is a schematic view of an application scenario of the background management system and the inspection system of the present invention.
Fig. 2 is a schematic diagram of a generation scene of the inspection system of the present invention.
Fig. 3 is a flowchart of the NFC intelligent inspection method according to the present invention.
Fig. 4 is a schematic diagram of an embodiment of an NFC smart inspection method according to the present invention.
Fig. 5 is a schematic diagram of one embodiment of the inspection task sequence of the present invention for acquiring the inspection task sequence of the current inspector.
Fig. 6 is a schematic diagram of the frame structures of the background management system and the inspection system of the present invention.
Detailed Description
Exemplary embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments of the invention may be embodied in many specific forms, and should not be construed as limited to the embodiments set forth herein. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the invention to those skilled in the art.
The structures, properties, effects or other characteristics described in a certain embodiment may be combined in any suitable manner in one or more other embodiments, while still complying with the technical idea of the invention.
In describing particular embodiments, specific details of structures, properties, effects, or other features are set forth in order to provide a thorough understanding of the embodiments by one skilled in the art. However, it is not excluded that a person skilled in the art may implement the invention in a specific case without the above-described structures, performances, effects or other features.
Fig. 1 is a scene schematic diagram of an NFC intelligent inspection method based on a background management system and an inspection system according to the present invention. As shown in fig. 1, the background management system performs data interaction with the inspection system through a network. The network is used for providing a communication link medium between the background management system and the patrol inspection system, and the network can be a wired communication link, a wireless communication link and the like.
The background management system can be a server providing various services, for example, a polling task chain is generated at regular time and is distributed to a corresponding polling system, the background management system can analyze and process polling data synchronized by the polling system, and the processed polling data is stored so that the polling system can call and query operations.
And each NFC electronic tag is respectively arranged at the position of the inspection point, and the inspection equipment identifies each NFC electronic tag. Each NFC electronic tag is correspondingly provided with an inspection task, and an inspector needs to identify the NFC electronic tag to execute the corresponding inspection task; each NFC electronic tag is provided with a key pair, the key pair is an asymmetric key pair and comprises a public key and a private key, the public key and the private key are obtained through an algorithm, one of the public key and the private key is published to the outside and is called a public key, and the other one of the public key and the private key is reserved and is called a private key; the key pair obtained by the algorithm is unique worldwide, so that the key pair is different for different NFC electronic tags. In the invention, the corresponding first public key and the first private key are used as a key pair of the NFC electronic tag, the first private key is stored in the NFC electronic tag, and the first public key is stored in a background management system.
NFC electronic tag information in all NFC electronic tags is written in by an NFC reader-writer, the NFC reader-writer is used for reading and writing in the NFC electronic tag information, and the NFC reader-writer performs NFC electronic tag information writing in on the NFC electronic tags and then places the NFC electronic tag information in the corresponding inspection point position. The NFC electronic tag information stored in the NFC electronic tag comprises a character string, the character string is a result obtained by encrypting a routing inspection point number and a private key of a routing inspection point through a private key of a background management system, the character string is generated by the background manager, a secret key pair consisting of a first public key and a first private key is generated by the background management system, and a reader-writer is connected with the background management system to obtain the character string and write the character string into the NFC electronic tag.
Fig. 2 is a schematic diagram of a generation scene of the inspection system of the present invention. As shown in fig. 2, the inspection system is obtained after an inspector uses the inspection equipment to perform online registration on a background management system, so that any inspector is correspondingly provided with an inspection system, the inspection system is installed on the inspection equipment, only one inspection system can be installed on the inspection equipment, the background management system and the inspection system can perform information interaction, and the inspection operation is realized by the inspection equipment. The inspection equipment is electronic equipment with a man-machine interaction function and an NFC (near field communication) identification function, and comprises but is not limited to mobile terminal equipment such as a mobile phone and a tablet personal computer.
Fig. 3 is a schematic flow diagram of the NFC intelligent inspection method based on the background management system and the inspection system according to the present invention. As shown in fig. 3, the intelligent inspection method of the present invention has the following steps:
and S1, the background management system sends the patrol inspection task chain and the public key of the background management system to the patrol inspection system of the current patrol inspector.
In step S1, when the inspector registers with the background management system through the inspection device to obtain the inspection system, the background management system stores the associated information of the inspector and the inspection system; when the background management system generates the routing inspection task chain of the current patrol inspector, the corresponding routing inspection system can be found based on the stored correlation information of the current patrol inspector and the routing inspection system, so that the routing inspection task chain is sent to the routing inspection system of the current patrol inspector, and the current patrol inspector performs routing inspection operation through the routing inspection task chain in the routing inspection system. In the invention, it should be noted that the routing inspection task chain comprises routing inspection task information and a plurality of routing inspection task encrypted information, wherein the routing inspection task information is a first node in the routing inspection task chain, and the plurality of routing inspection task encrypted information are sequentially arranged from a second node downwards to form a routing inspection task chain.
In step S1, the process of generating the inspection task chain that the background management system sends to the inspection system of the current inspection inspector includes the following steps:
s1.1, acquiring the inspection task sequence of the current inspection inspector based on preset inspection task information, wherein any inspection task in the inspection task sequence points to inspection task information and a first public key.
A sequence is an object or event that is arranged in a column such that each element is either before or after the other elements; here, the order between elements is very important. In the invention, the patrol task sequence is used for expressing the execution sequence of a plurality of patrol tasks to be executed by a current patrol inspector on the current day, each patrol task to be executed on the current day is an element of the patrol task sequence, the total number of the patrol tasks to be executed by the current patrol inspector on the current day is the total number of the elements of the patrol task sequence, and the total number of the patrol tasks to be executed by different current inspectors on the current day is not always the same, so the total number of the elements of different patrol task sequences is not always the same.
In the invention, each inspection task is represented by inspection task information; any element in the patrol task sequence points to specific patrol task information, and any two elements in the patrol task sequence are different, so that the two patrol task information pointed by the two different elements are different. The specific inspection task information is inspection task information corresponding to an inspection task to be executed by a current inspector, and each inspection task information records the basic information of an inspection point, the information to be executed and other contents. And the first public key pointed by the inspection task is matched with the first private key stored in the NFC electronic tag corresponding to the inspection task to be used as a key pair of the NFC electronic tag.
And any inspection task information comprises an inspection point number, an inspection point name, an inspection point type, an inspection point position, inspection frequency, inspection standard and content. It should be noted that the inspection task information in the present invention includes, but is not limited to, inspection point number, inspection point name, inspection point type, inspection point position, inspection frequency, inspection standard and content.
S1.2, encrypting the patrol task information pointed by the next patrol task by using the first public key pointed by any patrol task to obtain patrol task encrypted information, and constructing a patrol task chain under a patrol task sequence.
In step S1.2, as one embodiment of the present invention, the inspection tasks in the inspection task sequence may be sequentially accessed, the first inspection task in the inspection task sequence is accessed first, the accessed first inspection task is used as the current inspection task, the inspection task information pointed by the next inspection task of the current inspection task is encrypted by using the first public key pointed by the current inspection task to obtain an inspection task encrypted information, then the inspection task is continuously accessed downwards, the second inspection task is used as the current inspection task, the inspection task information pointed by the third inspection task is encrypted by using the first public key pointed by the current inspection task to obtain an inspection task encrypted information, the penultimate element of the inspection task sequence is finally accessed, and the task information pointed by the last inspection task in the inspection task sequence is encrypted by using the first public key pointed by the penultimate inspection task to obtain the last inspection task encrypted information And sequentially arranging all the obtained routing inspection task encrypted information from front to back according to the generation time of the routing inspection task encrypted information, adding routing inspection task information pointed by the first routing inspection task in the routing inspection task sequence before the arranged routing inspection task encrypted information queue to obtain a routing inspection task chain, wherein the total number of the routing inspection task information and the routing inspection task encrypted information in the routing inspection task chain is consistent with the number of elements of the routing inspection task sequence, and the arrangement sequence of the routing inspection task chain corresponds to the sequence of the routing inspection task sequence.
In summary, in the present invention, the patrol task information pointed by the first element in the patrol task sequence does not need to be encrypted, and the patrol task information pointed by other elements except the first element in the patrol task sequence needs to be encrypted, so as to obtain the corresponding patrol task chain.
And S2, the polling system traverses the received polling task chain and completes polling operation in sequence.
In the invention, because the first node of the polling task chain is polling task information, the polling task information to be executed can be directly obtained when the first node of the polling task chain is visited, and the polling task information is analyzed to carry out polling operation; the second node, the third node and the last node in the routing inspection task chain are encrypted routing inspection task information, namely routing inspection task encryption information, and when the routing inspection system accesses the routing inspection task information of the current node, the routing inspection task encryption information of the next node is decrypted to obtain the routing inspection task information of the next node, so that when the next node is accessed to the next node and serves as the current node, the routing inspection task information can be directly obtained, and the routing inspection task information is analyzed to perform routing inspection operation.
The inspection system in the S2 traverses the received inspection task chain and completes the inspection operation in sequence, which specifically includes the following 2 steps.
S2.1, accessing the current inspection task information and identifying the corresponding NFC electronic tag, acquiring the stored first private key and decrypting the next inspection task encrypted information, and manually executing inspection operation based on the current inspection task information.
In the invention S2.1, because the inspection task information comprises the inspection point position, the inspection system can analyze the current inspection task information to obtain the corresponding inspection point position, and can perform shortest route navigation for the current inspection inspector based on the current position and the inspection point position of the current inspection inspector, when the current inspection inspector reaches the inspection point position, the current inspection inspector can identify the NFC electronic tag of the inspection point through the inspection system, the NFC electronic tag information stored in the NFC electronic tag is used for storing the first private key and decrypting the next node of the inspection task chain based on the first private key, and then the current inspection inspector performs the inspection operation and inputs the inspection data of the inspection point on the inspection system.
And S2.2, the decrypted next routing inspection task encrypted information is used as the current routing inspection task information, and the step 2.1 is returned until the routing inspection task chain is visited.
In the invention S2.2, after a routing inspection task is executed according to routing inspection task information, a next node of a routing inspection task chain is accessed downwards, the node is taken as a current node, routing inspection task encryption information of the node is decrypted, so that routing inspection task information corresponding to the current node can be directly obtained, the routing inspection task information is analyzed, contents such as a current routing inspection point position to be executed, routing inspection standards and contents, routing inspection point numbers and the like are obtained, a routing inspection system can carry out shortest route navigation, and when a routing inspection point reaches the routing inspection point position to be executed, the decryption operation of the routing inspection task encryption information of the next node in the routing inspection task chain and the routing inspection operation of the current routing inspection point can be carried out. When the value inspector visits to the last node of the inspection task chain, the next node is not needed, so that the inspection task encryption information is not needed to be decrypted, only the inspection operation is needed, and after the last inspection operation is completed, the current inspection task of the value inspector is finished.
Further, the step of acquiring the first private key stored in the NFC electronic tag in S2.1 includes 2 specific steps:
s2.1.1, identifying the NFC electronic tag information of the current inspection task information, and decrypting the NFC electronic tag information by using a public key of the background management system to obtain decrypted text information;
s2.1.2, eliminating the routing inspection point number from the decrypted text information to obtain a first private key.
In the invention, the first private key of the NFC electronic tag and the routing inspection point number are encrypted by using the private key of the background management system to obtain the character string, the character string is stored in the NFC electronic tag, and only the routing inspection system corresponding to the background management system can decrypt the character string in the NFC electronic tag information, so that other third-party equipment is prevented from reading the NFC electronic tag information and tampering the NFC electronic tag information.
Furthermore, when a value inspection worker executes inspection operation of current inspection task information, inspection data is recorded, the inspection system synchronizes the inspection data and decryption time of next inspection task encrypted information to the background management system, the background management system judges whether the decryption time of the next inspection task encrypted information is within a preset time period of the current time and whether the inspection data is not empty, if the decryption time of the next inspection task encrypted information is met, the inspection data can be recorded when next inspection operation is executed, and otherwise, the inspection data cannot be recorded when next inspection operation is executed.
In the invention, the current value inspector can perform inspection operation according to the inspection standard and the content in the inspection task information, thereby improving the accuracy of inspection data and being friendly to the current value inspector at the initial working stage. When the patrol inspector performs patrol operation, the patrol inspection data is manually recorded in the corresponding patrol inspection system, and the upload key is clicked, the patrol inspection system synchronizes the patrol inspection data and the decryption time of the next patrol inspection encrypted task to the background management system, the decryption time of the patrol inspection data and the patrol inspection task encrypted information is taken as 2 pieces of characterization information for finishing the current patrol inspection task by the patrol inspector, only when the patrol inspection data is stored and the decryption time of the patrol inspection task encrypted information is within the preset range of the current time, the completion of the current patrol inspection task can be indicated, and when the inspection of the current patrol inspection task is finished, and executing the next inspection task and inputting inspection data after the inspection operation is finished, otherwise, sending an instruction for forbidding inputting the inspection data to the inspection system by the background management system, and then, the inspection personnel cannot input the inspection data corresponding to the next inspection task. The routing inspection data and the decryption time of the routing inspection task encryption information are used as the representation information, so that the situation that the routing inspection task is not subjected to routing inspection operation by a current routing inspection worker, namely, the routing inspection operation is performed on the next routing inspection task is prevented, and the situation that the routing inspection task is partially not subjected to routing inspection data due to cheating by the current routing inspection worker is further prevented.
In the invention, for example, the patrol data comprises patrol point environment information and patrol point detection information, and the patrol point environment information can have two forms: 1. inputting in an option form, including abnormal and normal; 2. entered in the form of data, which may include ambient temperature, ambient humidity, ambient pressure, etc., which may be customized by an administrator. When the environment information of the routing inspection points is input in a data form, the background management system is provided with a plurality of corresponding threshold values corresponding to the routing inspection points, and whether the routing inspection points are abnormal is judged according to the threshold values of the environment temperature, the environment humidity, the environment pressure and the like. The inspection point detection information includes the presence or absence of a defect, the type of the defect, the level of the defect, and the like. The inspection standard and the content in the inspection task information clearly explain the judgment of the defects of the inspection points, and the current inspector can input inspection point detection information according to the inspection standard and the content. After receiving the patrol data, the background management system assigns a maintainer to maintain according to the patrol data.
Fig. 4 is a schematic diagram of an embodiment of an NFC smart inspection method according to the present invention.
As shown in fig. 4, when the inspection task sequence of the inspection inspector 1 includes 3 elements, which sequentially includes 3 inspection tasks, namely, an inspection task B5, an inspection task B7 and an inspection task B12 from top to bottom, the inspection task sequence firstly accesses the inspection task B5, the inspection task B5 is taken as the current inspection task, the next inspection task is an inspection task B7, and then the information of the inspection task pointed by the next inspection task is encrypted by using the first public key pointed by the current inspection task B5, that is, the information of the inspection task B7 pointed by the inspection task B7 is encrypted by using the first public key pointed by the inspection task B5, so that the encrypted information of the inspection task B7 is obtained; then, the inspection task is accessed downwards, the inspection task B7 is taken as the current inspection task, the next inspection task is the inspection task B12, the first public key pointed by the current inspection task is used for encrypting the inspection task encryption information pointed by the next inspection task, namely the first public key pointed by the inspection task B7 is used for encrypting the inspection task information B12 pointed by the inspection task B12, and the inspection task encryption information B12 is obtained, and the inspection task encryption information B12 is behind the inspection task encryption information B7, so that queues are obtained according to the sequence of the generation time: the inspection task encryption information B7 and the inspection task encryption information B12 are added before the queue, and then the inspection task information B5 which is the first element of the inspection task sequence is added before the queue, so that an inspection task chain is obtained, wherein the inspection task chain consists of the inspection task information B5, the inspection task encryption information B7 and the inspection task encryption information B12. Obviously, the number of the nodes in the routing inspection task chain and the number of the elements in the routing inspection task sequence are both 3, and the sequence of the routing inspection tasks in the routing inspection task sequence is the same as the sequence of the nodes in the routing inspection task chain, which are all B5, B12 and B7.
For another example, when the patrol task sequence of the inspection operator 2 includes 4 elements, which sequentially includes, from top to bottom, a patrol task B1, a patrol task B8, a patrol task B22 and a patrol task B14, the patrol task B1 is accessed first, the patrol task B1 is used as the current patrol task, the next patrol task is a patrol task B8, the patrol task information pointed by the next patrol task is encrypted by using the first public key pointed by the current patrol task to the patrol task B1, the patrol task information B8 pointed by the patrol task B8 is encrypted by using the first public key pointed by the patrol task B1, the patrol task encrypted information B8 is obtained, the patrol task B8 is accessed next, the patrol task B8 is used as the current patrol task, the next patrol task B22 is encrypted by using the first public key pointed by the current patrol task to the patrol task B8, and the patrol task information B22 pointed by the next patrol task B22 is encrypted by using the first public key pointed by the current patrol task B8, obtaining routing inspection task encryption information B22; continuously accessing the inspection task B22, taking the inspection task B22 as the current inspection task, determining that the next inspection task is the inspection task B14, and encrypting the inspection task information pointed by the next inspection task by using the first public key pointed by the current inspection task, namely encrypting the inspection task information B14 pointed by the inspection task B14 by using the first public key pointed by the inspection task B22 to obtain inspection task encryption information B14; and finally, constructing an inspection task chain, wherein the inspection task chain consists of inspection task information B1, inspection task encryption information B8, inspection task encryption information B22 and inspection task encryption information B14.
The patrol task chain of the inspection personnel 3 consists of patrol task information B26, patrol task encryption information B13, patrol task encryption information B19 and patrol task encryption information B35.
Taking the inspection system of the current inspection inspector 1 as an example, when the inspection system 1 of the current inspection inspector 1 receives the public keys of the inspection task chain and the background management system, the inspection system can directly obtain and analyze the inspection task information B5 in the inspection task chain, but the inspection task encryption information B7 and the inspection encryption task information B12 enable the inspection system to obtain two strings of character strings due to encryption, and cannot directly analyze the two strings of character strings.
The inspection system takes the inspection task information B5 as the current inspection task information, analyzes the inspection task information B5 to obtain an inspection point number B5, the name of the inspection point B5, the type of the inspection point B5, the position information of the inspection point B5, the inspection frequency and the inspection standard and content of the inspection point B5; the inspection system can navigate the shortest route according to the current position information and the position information of the inspection point B5, guide the current inspector to reach the inspection point B5 by the fastest route, the current inspector 1 uses the inspection equipment to identify the NFC electronic tag A5 of the inspection point B5 to obtain the NFC electronic tag information, the inspection system can decrypt the NFC electronic tag information by using a public key of a background management system, then the inspection system eliminates the inspection point number from the decrypted result to obtain a first private key of the inspection point B5, the inspection system can automatically decrypt the inspection task encrypted information B7 by using the first private key of the inspection point B5 to obtain the inspection task information B7, meanwhile, the inspector can carry out the inspection operation on the current inspection point B5, if the current inspector 1 is not familiar with the standards and procedures, the inspection standards and contents can be browsed in the inspection system, executing inspection operation according to the inspection standard and content, manually acquiring inspection data, inputting the inspection data into an inspection system, uploading the inspection data, sending the inspection data of the current inspection point B5 and the decryption time of the inspection task encryption information B7 to a background management system, judging whether the inspection data is empty or whether the decryption time is within a preset range of the current time by the background management system, if the inspection data is empty, indicating that the inspection task of the inspection point B5 by a current inspector is not completed, if the decryption time of the inspection task encryption information B7 is not within the preset range of the current time, indicating that the inspection equipment privately stores the first private key of the inspection point B5, and if the inspection task is stolen during the inspection process by the inspector, sending an instruction for forbidding the inspection system to input data into the next inspection point B7 by the background management system under the two conditions, when the inspection inspector 1 needs to re-execute the inspection operation of the inspection point B5 until the two requirements are met, the inspection data can not be recorded into the next inspection point B7.
The specific setting of the preset range of the current time can be, for example, within 30 minutes or 1 hour before the corresponding routing inspection data is received, or between the decryption time of the encrypted information of the previous routing inspection task and the routing inspection data of the current routing inspection task; the specific setting of "within the preset range of the current time" may be set by the technician on his own, depending on the actual situation.
Further, the step of acquiring the inspection task sequence of the current inspector in the step S1.1 includes the following steps.
And S1.1.1, acquiring the current-day inspection plan based on all preset inspection task information.
The background management system stores the inspection task information of all inspection points, and the inspection plan on the same day refers to a plurality of inspection task information to be executed on the same day. The maintenance of patrolling and examining of all kinds of public equipment facilities of property enterprise need reference the trade to stipulate to patrol and examine the frequency and go on, and the equipment of different grade type is provided with the different frequency of patrolling and examining, for example: the high-voltage ring main unit regulates 1 time/day of inspection, and the rainwater pump, the sewage pump and the control box regulates 1 time/month of inspection, so that the invention makes the current day inspection plan according to the inspection frequency.
As one specific implementation mode for obtaining the current-day inspection plan, the invention generates the current-day inspection plan at regular time through a quartz timer based on the inspection frequency in each inspection task information.
Quartz is a task scheduling framework, and core elements of the Quartz task scheduling are schedule, trigger and joba, wherein trigger and joba are metadata of the task scheduling, and schedule is a controller for actually executing scheduling. All the inspection task information can be processed in batch according to the inspection frequency at fixed time by setting a quartz timer, so that the inspection plan of the day is obtained.
The process of constructing the current day patrol plan in the invention is as follows:
building a patrol plan in a management background, automatically building a JobDetail in quartz after the patrol plan is successfully built, generating a Cron expression according to data in patrol frequency, and binding the Cron expression with the 1 trigger, wherein the JobDetail is 8 points per day; here, since the polling frequency is generally 1 time/day or longer, 1 trigger is set here; when a specific time point is reached, quartz automatically executes to generate the current day patrol plan.
S1.1.2, searching the optimal patrol route for the current day patrol plan based on the preset patrol task path length matrix.
Mathematically, a matrix refers to a two-dimensional data table arranged in rows and columns. The routing inspection task path length matrix is formed by the shortest distance between any two routing inspection tasks in all routing inspection tasks, and the shortest distance between the two routing inspection tasks is the shortest passing length between the two routing inspection point positions corresponding to the two routing inspection tasks. For example, if 200 routing inspection points exist, a vertical list and a horizontal list are constructed by using the 200 routing inspection points to obtain 400 routing inspection tasks, namely, the routing inspection plan in the same day consists of a plurality of routing inspection tasks, but the routing inspection frequencies of different routing inspection tasks are different, so that the plurality of routing inspection tasks can be part of all routing inspection tasks; the routing inspection task path length matrix of the current-day routing inspection plan can be inquired and obtained through the preset routing inspection task path length matrix, the optimal routing inspection path is searched through the routing inspection task path length matrix of the current-day routing inspection plan, the optimal routing inspection path is the shortest routing inspection path, the shortest path is searched, a path with the shortest path required by the routing inspection task execution is planned for the current-value inspector, and therefore the routing inspection efficiency of the current-value inspector is improved.
As one specific implementation mode for seeking the shortest path, the shortest routing inspection path of all routing inspection tasks in the current routing inspection plan is obtained through an ant colony algorithm.
An Ant Colony Optimization (ACO), also called ant algorithm, is a probabilistic algorithm for finding an optimized path in a graph. Each ant starts to look for food without telling them in advance where the food is. When a person finds food, the ant can release a volatile secretion pheromone (called pheromone, the substance gradually volatilizes and disappears along with the time, and the magnitude of the concentration of the pheromone represents the distance of a path) to the environment, so that other ants are attracted to the ant, and more ants can find the food. Some ants do not always repeat the same path like other ants, and the ants can develop a new path, if the road which is opened up is shorter than the original other roads, more ants are gradually attracted to the shorter road. Finally, over time, it may appear that a shortest path is repeated by most ants.
The specific algorithm steps of the ant colony algorithm are as follows:
S2-A, initializing parameters including ant number
Figure 661784DEST_PATH_IMAGE001
Pheromone matrix
Figure 206904DEST_PATH_IMAGE002
Pheromone factor
Figure 381665DEST_PATH_IMAGE003
Factor of the heuristic function
Figure 421165DEST_PATH_IMAGE004
Pheromone volatilization factor
Figure 863516DEST_PATH_IMAGE005
Maximum number of iterations
Figure 330270DEST_PATH_IMAGE006
Etc.;
S2-B, randomly setting different polling tasks for each ant, taking the polling point position corresponding to the polling task as the starting point, and for each ant
Figure DEST_PATH_IMAGE007
Calculating the probability of the next inspection task to be accessed through a formula (1), selecting the inspection task corresponding to the probability closest to the generated random number as the inspection task to be accessed, and simultaneously recording an access path until all ants access all the inspection tasks;
Figure 631807DEST_PATH_IMAGE008
(1)
wherein
Figure 960151DEST_PATH_IMAGE009
Respectively as a starting point and an end point,
Figure 273321DEST_PATH_IMAGE010
for visibility, it is two-point
Figure 160243DEST_PATH_IMAGE009
The reciprocal of the path length between;
Figure 309596DEST_PATH_IMAGE011
is time of day
Figure 690899DEST_PATH_IMAGE006
Time by
Figure 107842DEST_PATH_IMAGE012
To
Figure 667131DEST_PATH_IMAGE013
The intensity of the pheromone of (a),
Figure 287468DEST_PATH_IMAGE014
is a collection of nodes that have not been visited.
S2-C, calculating the path length of each ant based on the recorded access path of each ant, and updating the pheromone concentration on the connection path of each inspection task through formulas (2) and (3);
Figure 10746DEST_PATH_IMAGE015
(2)
Figure 783661DEST_PATH_IMAGE016
(3)
Figure 28698DEST_PATH_IMAGE017
is as follows
Figure 713495DEST_PATH_IMAGE018
Only ants are on the way
Figure 187332DEST_PATH_IMAGE012
To
Figure 313289DEST_PATH_IMAGE013
The pheromone that is left behind,
Figure 994806DEST_PATH_IMAGE019
is as follows
Figure 340468DEST_PATH_IMAGE018
A medicated liquorThe total path length obtained after an ant has taken the entire path.
In the invention, how to seek the shortest routing inspection path of all routing inspection tasks in the routing inspection plan on the same day through the ant colony algorithm is common knowledge of ordinary technicians in the field, and the technicians in the field can set the shortest routing inspection path according to actual conditions.
And S2-D, judging whether the execution times are larger than the maximum iteration times, if so, outputting a global optimal result, and otherwise, returning to the step S2-B.
S1.1.3, acquiring the patrol task sequence of the current patrol inspector based on the preset on-duty information and the shortest patrol path.
The duty information in the invention comprises the basic information of all patrol personnel, such as names, identification numbers and the like, and the working states of all patrol personnel, wherein the working states are generally leave requests or work.
S1.1.3, acquiring the patrol task sequence of the current patrol inspector based on the preset on-duty information and the shortest patrol path, and specifically comprising the following steps:
and S3-A, calculating the workload of any inspection task in the inspection plan of the day, wherein the workload of any inspection task is the weighted sum of the workload of the inspection task and the amount of motion reaching the inspection task under the shortest inspection path.
In the invention, the polling task amount is determined based on the polling types of the polling tasks, each polling type is set with a corresponding check time length, the time spent by the polling tasks of different polling types is not completely the same, the polling tasks determine the check time lengths according to the polling types, each polling task has a corresponding check time length, the average check time length of all polling tasks is calculated, and the task amount of each polling task is the check time length of the polling task/the average check time length of all polling tasks.
In the invention, the sum of the element values of the routing inspection task path length matrix is calculated, and the average routing inspection task path length is taken as the sum of the element values of the routing inspection task path length matrix/the sum of the elements of the routing inspection task path length matrix, so that the amount of motion reaching the routing inspection task under the shortest routing inspection path is the path length reaching the routing inspection task under the shortest path/the average routing inspection task path length. The specific numerical values of the weight of the task quantity and the weight of the exercise amount can be set according to the actual situation, but the sum of the weight of the task quantity and the weight of the exercise amount is 1, as one embodiment of the invention, the weight of the task quantity is set to be 0.3, and the weight of the exercise amount is set to be 0.7.
And S3-B, dividing the inspection task under the shortest inspection path for each current inspector on the basis of maximizing the balance workload.
The maximum balanced workload is to ensure that the workload of each current inspection worker is the same as far as possible, and meanwhile, the inspection task sequence of each current inspection worker is a part of continuous inspection tasks under the optimal inspection path.
The specific implementation of the maximized balancing workload is as follows: constructing a workload line segment, marking all inspection tasks of the current inspection plan on the workload line segment according to the sequence of the shortest inspection path, calculating the total workload, obtaining the number of watchers through the watchers, determining the average workload distributed to each current inspector, and marking the total workload S' distributed to the second person on the workload line segment, wherein S is between 1 and S, and S is the total number of the watchers; and taking the inspection task mark point closest to the distance s' as a dividing point, and distributing all inspection tasks which are before the current dividing point and the current dividing point or before the next dividing point after the current dividing point but do not include the current dividing point to any current inspection personnel.
Fig. 5 is one embodiment of the present invention for obtaining inspection task sequence of current inspector.
As shown in fig. 5, the daily patrol plan includes a patrol task B1, a patrol task B5, a patrol task B7, a patrol task B8, a patrol task B12, a patrol task B13, a patrol task B14, a patrol task B19, a patrol task B22, a patrol task B26 and a patrol task B35, a patrol path length matrix of the daily patrol plan is obtained by a preset patrol path length matrix, a shortest patrol path of all patrol tasks in the daily patrol plan is obtained by combining an ant colony algorithm, the number of persons on duty is 3 persons, the number of persons is inspector 1, inspector 2 and inspector 3, respectively, and the workload of any one patrol task is calculated, since the patrol task B5 is the starting point of the optimal patrol path, the shortest path from the point on duty to the patrol task B5 is used as the amount of movement, the workload of the task B5 is calculated, here is 1, and the workload of the patrol task B7 is the shortest path amount between the amounts of the patrol task B5, the patrol task B7 and the amount of the patrol task B2 The weighted sum of the quantities of the tasks in (1) is 3, and thus the quantities of the patrol tasks B12, B1, B8, B22, B14, B126, B13, B19 and B35 are calculated from the following steps as 5, 1, 2, 5, 6, 2, 4 and 1, respectively, so that the total quantity of the patrol task sequence is 34, the total quantity of the patrol task sequence is allocated to each current patrol inspector is about 11.3, the total quantity of the patrol task is allocated to the first patrol inspector is 11.3, the total quantity of the patrol task sequence is allocated to the 2 nd patrol inspector is 22.6, the total quantity of the patrol task sequence is allocated to the third patrol inspectors is 33.9, and the boundary points are respectively the quantity mark point of the patrol task B12, the quantity mark point of the patrol task B14 and the quantity mark point of the patrol task B35, and are thus divided into 3 patrol task sequences as shown in fig. 4. And each current value inspector sends the current value inspector from a company card punching point and inspects according to the inspection task sequence.
Fig. 6 is a schematic diagram of the frame structures of the background management system and the inspection system of the present invention.
As shown in fig. 6, the background management system includes an information entry module, an inspection task module, and an inspection encryption module.
The information input module is used for inputting the inspection task information; it needs to be understood that the information entry module can not only enter inspection task information, but also enter other preset information, such as preset duty information, inspection task path length matrix and other contents.
And the inspection task module is used for acquiring an inspection task sequence of the current inspector. Each current inspection inspector has a corresponding inspection task sequence.
And the routing inspection encryption module is used for encrypting the routing inspection task information pointed by the next routing inspection task by using the first public key pointed by any routing inspection task to obtain a routing inspection task chain.
The inspection encryption module comprises a first public key storage unit and an encryption unit, the first public key storage unit is used for storing all first public keys, each first public key is provided with a matched first private key, and the first private keys are stored in the NFC electronic tags; the encryption unit is used for calling the first public key in the first public key storage module and encrypting the corresponding routing inspection task information through the first public key to obtain routing inspection task encryption information.
The inspection system comprises an NFC identification module, an inspection data entry module and an inspection decryption module.
The NFC identification module is used for identifying the NFC electronic tag and acquiring NFC electronic tag information;
the polling data input is used for manually inputting polling data and synchronizing the polling data to the background management system;
and the routing inspection decryption module is used for decrypting the encrypted information of any routing inspection task in the routing inspection task chain. The NFC identification module can deliver the acquired NFC electronic tag information to the patrol inspection decryption module, the patrol inspection decryption module decrypts the information by using the public key of the background management system to acquire a first private key, and then the patrol inspection decryption system decrypts the patrol inspection task encryption information by using the first private key to acquire the patrol inspection task information.
It should be understood that the modules, units, components, and the like included in the device of one embodiment of the present invention may be adaptively changed to be provided in a device different from that of the embodiment. The different modules, units or components comprised by the apparatus of an embodiment may be combined into one module, unit or component or they may be divided into a plurality of sub-modules, sub-units or sub-components. The modules, units or components in the embodiments of the present invention may be implemented in hardware, or may be implemented in software running on one or more processors, or a combination thereof.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention and are not intended to limit the present invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. The utility model provides a NFC intelligence inspection method based on backstage management system and inspection system, includes a backstage management system and a plurality of inspection systems with backstage management system data interaction, and an inspection system corresponds there is an inspector, its characterized in that, NFC intelligence inspection method includes:
step 1, the background management system sends a polling task chain to a polling system of a current-value polling person, and the method comprises the following steps of
Step 1.1, acquiring a polling task sequence of a current polling operator, wherein any polling task in the polling task sequence points to polling task information and a first public key;
step 1.2, encrypting the patrol task information pointed by the next patrol task by using a first public key pointed by any patrol task to obtain patrol task encrypted information, and constructing a patrol task chain under a patrol task sequence;
step 2, the polling system traverses the received polling task chain and completes polling operation in sequence, including
Step 2.1, accessing the current inspection task information and identifying a corresponding NFC electronic tag, acquiring a stored first private key and decrypting next inspection task encryption information, and manually executing inspection operation based on the current inspection task information;
and 2.2, using the decrypted next routing inspection task encrypted information as the current routing inspection task information, and returning to the step 2.1 until the routing inspection task chain is visited.
2. The NFC intelligent inspection method based on the background management system and the inspection system according to claim 1, wherein any inspection task information includes inspection point number, inspection point name, inspection point type, inspection point position information, inspection frequency, inspection standard and content.
3. The NFC intelligent inspection method based on the background management system and the inspection system according to claim 1 or 2, wherein the acquiring of the inspection task sequence of the current inspector in the step 1.1 includes
Acquiring a current-day inspection plan based on all preset inspection task information;
seeking an optimal routing inspection path for the current day routing inspection plan based on a preset routing inspection task path length matrix;
and acquiring the inspection task sequence of the current inspector based on the preset on-duty information and the optimal inspection path.
4. The NFC intelligent inspection method based on the background management system and the inspection system according to claim 3, wherein the daily inspection plan is generated regularly by a quartz timer based on the inspection frequency in each inspection task information.
5. The NFC intelligent inspection method based on the background management system and the inspection system according to claim 3, wherein the shortest inspection path is sought for all inspection tasks in the inspection plan of the day through an ant colony algorithm.
6. The NFC intelligent inspection method based on the background management system and the inspection system according to claim 3, wherein acquiring the inspection task sequence of the current inspector based on the preset on-duty information and the optimal inspection path comprises
Calculating the workload of any inspection task in the inspection plan of the day, wherein the workload of any inspection task is the weighted sum of the workload of the inspection task and the amount of motion reaching the inspection task under the shortest inspection path;
and dividing the inspection task under the shortest inspection path for each current inspector on the principle of maximizing balanced workload.
7. The NFC intelligent inspection method based on the background management system and the inspection system according to claim 1, wherein the background management system dispatches the inspection task chain to the inspection system of the current inspection inspector and also dispatches a public key of the background management system.
8. The NFC intelligent inspection method based on the background management system and the inspection system according to claim 7, wherein the obtaining of the stored first private key in the step 3 includes obtaining the stored first private key in the background management system and the inspection system
Step 3.1, identifying the NFC electronic tag information of the current inspection task information, and decrypting the NFC electronic tag information by using a public key of a background management system to obtain decrypted text information;
and 3.2, eliminating the routing inspection point number from the decrypted text information to obtain a first private key.
9. The NFC intelligent inspection method based on the background management system and the inspection system according to claim 1, wherein the inspection data is entered after the inspection operation of the current inspection task information is performed by an inspection technician, the inspection system synchronizes the inspection data and the decryption time of the next inspection task encrypted information to the background management system, the background management system judges whether the decryption time of the next inspection task encrypted information is within a preset time period of the current time and whether the inspection data is not empty, if the two are satisfied at the same time, the inspection data can be entered when the next inspection operation is performed, otherwise, the inspection data cannot be entered when the next inspection operation is performed.
10. The NFC intelligent inspection method based on the background management system and the inspection system according to claim 1, wherein the background management system comprises
The information input module is used for inputting the inspection task information;
the inspection task module is used for acquiring an inspection task sequence of a current inspector;
the inspection encryption module is used for encrypting the inspection task information pointed by the next inspection task by using the first public key pointed by any inspection task to obtain an inspection task chain;
the inspection system comprises
The NFC identification module is used for identifying the NFC electronic tag and acquiring NFC electronic tag information;
the inspection data input module is used for manually inputting inspection data and synchronizing the inspection data to the background management system;
and the routing inspection decryption module is used for decrypting the encrypted information of any routing inspection task in the routing inspection task chain.
CN202110868077.0A 2021-07-30 2021-07-30 NFC intelligent inspection method based on background management system and inspection system Active CN113593073B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110868077.0A CN113593073B (en) 2021-07-30 2021-07-30 NFC intelligent inspection method based on background management system and inspection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110868077.0A CN113593073B (en) 2021-07-30 2021-07-30 NFC intelligent inspection method based on background management system and inspection system

Publications (2)

Publication Number Publication Date
CN113593073A true CN113593073A (en) 2021-11-02
CN113593073B CN113593073B (en) 2023-08-15

Family

ID=78252176

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110868077.0A Active CN113593073B (en) 2021-07-30 2021-07-30 NFC intelligent inspection method based on background management system and inspection system

Country Status (1)

Country Link
CN (1) CN113593073B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114722417A (en) * 2022-06-09 2022-07-08 北京信锚网络有限公司 Method and system for protecting privacy of quotation file
CN117689187A (en) * 2024-02-04 2024-03-12 天津三号线轨道交通运营有限公司 Data supervision method and system for rail transit fault detection

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0912011A2 (en) * 1997-10-20 1999-04-28 Sun Microsystems, Inc. Method and apparatus for encoding and recovering keys
JP2006222951A (en) * 2005-02-01 2006-08-24 Microsoft Corp Flexible licensing architecture in content rights management system
CN101123495A (en) * 2007-09-07 2008-02-13 农革 A data encryption, decryption system and method
CN103580851A (en) * 2013-11-13 2014-02-12 福建省视通光电网络有限公司 Information encryption and decryption method
CN104660567A (en) * 2013-11-22 2015-05-27 中国联合网络通信集团有限公司 D2D terminal access authentication method as well as D2D terminal and server
CN106846530A (en) * 2016-12-25 2017-06-13 北京中海投资管理有限公司 A kind of property movement cruising inspection system and method based on NFC technique
CN106971288A (en) * 2017-05-31 2017-07-21 无锡井通网络科技有限公司 A kind of distributed material flow tracking method based on block chain
CN110138861A (en) * 2019-05-15 2019-08-16 北京中星微人工智能芯片技术有限公司 A kind of security protection Intelligentized method and device
CN110996318A (en) * 2019-12-23 2020-04-10 广西电网有限责任公司电力科学研究院 Safety communication access system of intelligent inspection robot of transformer substation
CN111311777A (en) * 2020-02-14 2020-06-19 北京明略软件系统有限公司 Dynamic inspection method, server, terminal, storage medium and equipment
CN111611948A (en) * 2020-05-25 2020-09-01 陈金山 Urban garbage can overflow detection method based on CIM and block chain
CN112102516A (en) * 2020-09-22 2020-12-18 国网山东省电力公司电力科学研究院 Intelligent robot inspection system for transformer substation and access operation method thereof

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0912011A2 (en) * 1997-10-20 1999-04-28 Sun Microsystems, Inc. Method and apparatus for encoding and recovering keys
JP2006222951A (en) * 2005-02-01 2006-08-24 Microsoft Corp Flexible licensing architecture in content rights management system
CN101123495A (en) * 2007-09-07 2008-02-13 农革 A data encryption, decryption system and method
CN103580851A (en) * 2013-11-13 2014-02-12 福建省视通光电网络有限公司 Information encryption and decryption method
CN104660567A (en) * 2013-11-22 2015-05-27 中国联合网络通信集团有限公司 D2D terminal access authentication method as well as D2D terminal and server
CN106846530A (en) * 2016-12-25 2017-06-13 北京中海投资管理有限公司 A kind of property movement cruising inspection system and method based on NFC technique
CN106971288A (en) * 2017-05-31 2017-07-21 无锡井通网络科技有限公司 A kind of distributed material flow tracking method based on block chain
CN110138861A (en) * 2019-05-15 2019-08-16 北京中星微人工智能芯片技术有限公司 A kind of security protection Intelligentized method and device
CN110996318A (en) * 2019-12-23 2020-04-10 广西电网有限责任公司电力科学研究院 Safety communication access system of intelligent inspection robot of transformer substation
CN111311777A (en) * 2020-02-14 2020-06-19 北京明略软件系统有限公司 Dynamic inspection method, server, terminal, storage medium and equipment
CN111611948A (en) * 2020-05-25 2020-09-01 陈金山 Urban garbage can overflow detection method based on CIM and block chain
CN112102516A (en) * 2020-09-22 2020-12-18 国网山东省电力公司电力科学研究院 Intelligent robot inspection system for transformer substation and access operation method thereof

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
刘兵;刘劲;: "Delphi实现对文档的加密解密", 电脑编程技巧与维护, no. 04 *
占永红等: "基于NFC的电力智能巡检系统", 《电子技术与软件工程》 *
占永红等: "基于NFC的电力智能巡检系统", 《电子技术与软件工程》, no. 02, 15 January 2017 (2017-01-15) *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114722417A (en) * 2022-06-09 2022-07-08 北京信锚网络有限公司 Method and system for protecting privacy of quotation file
CN117689187A (en) * 2024-02-04 2024-03-12 天津三号线轨道交通运营有限公司 Data supervision method and system for rail transit fault detection
CN117689187B (en) * 2024-02-04 2024-05-14 天津三号线轨道交通运营有限公司 Data supervision method and system for rail transit fault detection

Also Published As

Publication number Publication date
CN113593073B (en) 2023-08-15

Similar Documents

Publication Publication Date Title
CN109034660A (en) Based on the determination method and relevant apparatus of the risk control strategy of prediction model
CN105989443A (en) Intelligent-mobile-terminal-based communication line inspection system
CN105051719A (en) Dynamically invalidating crowd-sourced content
CN107196851A (en) There is the method and system of the suitability of the content-message of target for determination
CN105893537B (en) The determination method and apparatus of geography information point
US11870807B2 (en) System and method for phishing email training
US20150161555A1 (en) Scheduling tasks to operators
CN113593073B (en) NFC intelligent inspection method based on background management system and inspection system
CN100429652C (en) Search eqipment servicer, system and search method and calculator program
US20140222538A1 (en) Customer experience management for an organization
CN111698645A (en) Position information acquisition method and device, computer equipment and storage medium
Lorenzi et al. Utilizing social media to improve local government responsiveness
CN109710689A (en) Enterprise's monitoring and managing method, system, device, equipment and readable storage medium storing program for executing
US10762089B2 (en) Open ended question identification for investigations
CN112347457A (en) Abnormal account detection method and device, computer equipment and storage medium
CN109582406A (en) Use the safety survey based on drama of tabulating equipment frame
KR102453832B1 (en) Apparatus, method and program for providing advanced metering infrastructure construction management services
US11527066B2 (en) System and method for analyzing graffiti and tracking graffiti vandals
KR102417992B1 (en) A system providing analysis platform of commercial power using big data
CN116346448A (en) Group image drawing method and device based on federal learning
CN107623605A (en) The method and system of network traffics duplicate removal
Lennon et al. IT security metrics
Orozco et al. Use of new technologies for the 2020 population and housing census round
KR102676036B1 (en) System for providing internet of things based payment service using quick response code
JP2008059417A (en) Business education simulation system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant