CN113703345A - Control method, system, computing device and medium for security device - Google Patents

Control method, system, computing device and medium for security device Download PDF

Info

Publication number
CN113703345A
CN113703345A CN202010434275.1A CN202010434275A CN113703345A CN 113703345 A CN113703345 A CN 113703345A CN 202010434275 A CN202010434275 A CN 202010434275A CN 113703345 A CN113703345 A CN 113703345A
Authority
CN
China
Prior art keywords
mobile device
target
state
mobile
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010434275.1A
Other languages
Chinese (zh)
Other versions
CN113703345B (en
Inventor
段玉辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Xinning Public Bonded Warehouse Co ltd
Beijing Jingdong Qianshi Technology Co Ltd
Original Assignee
Suzhou Xinning Public Bonded Warehouse Co ltd
Beijing Jingdong Qianshi Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Xinning Public Bonded Warehouse Co ltd, Beijing Jingdong Qianshi Technology Co Ltd filed Critical Suzhou Xinning Public Bonded Warehouse Co ltd
Priority to CN202010434275.1A priority Critical patent/CN113703345B/en
Publication of CN113703345A publication Critical patent/CN113703345A/en
Application granted granted Critical
Publication of CN113703345B publication Critical patent/CN113703345B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/042Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
    • G05B19/0428Safety, monitoring
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Alarm Systems (AREA)

Abstract

The present disclosure provides a control method of a safety device, including: receiving an opening request aiming at a target safety device, wherein a target area where the target safety device is located comprises at least one mobile device, each mobile device in the at least one mobile device is provided with state data, and the state data represents a current motion state of the mobile device corresponding to the state data; in response to the turn-on request, obtaining status data of each of the at least one mobile device; determining a current motion state of each of the at least one mobile device based on the at least one state data; and in response to determining that the current motion state of each of the at least one mobile device is a stopped motion state, controlling the target security appliance to turn on to allow access to the target area. The present disclosure also provides a control system of a security device, a computing apparatus, and a computer-readable storage medium.

Description

Control method, system, computing device and medium for security device
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method for controlling a security device, a system for controlling a security device, a computing device, and a computer-readable storage medium.
Background
Warehouses often have multiple areas for storing goods, each of which is isolated, for example, by a security device, which may be, for example, a security gate. By opening the safety device, the operator can enter the corresponding area. After an operator enters a corresponding area, if mobile equipment in the area is still running, potential safety hazards can be caused to the operator. Therefore, in order to secure the safety of the operator who enters the area, the related art generally turns on the safety device to allow the operator to enter the area by stopping power supply to the functional device, which may include, for example, a device that supplies power to a mobile device.
In implementing the disclosed concept, the inventors found that there are at least the following problems in the related art: when an operator needs to enter an area, power supply to the functional device is usually directly stopped. A sudden power failure of a functional device will result in a loss or failure of the functional device. Further, in an example in which the functional device is a charging device, in the event of sudden power failure of the charging device, the charged mobile device is still generally in an operating state, which is likely to cause a safety accident.
Disclosure of Invention
In view of the above, the present disclosure provides an optimized control method of a security device, a control system of a security device, a computing apparatus, and a computer-readable storage medium.
One aspect of the present disclosure provides a control method of a safety device, including: the method comprises the steps of receiving a starting request aiming at a target safety device, wherein a target area where the target safety device is located comprises at least one mobile device, each mobile device in the at least one mobile device is provided with state data, the state data represent the current motion state of the mobile device corresponding to the state data, obtaining the state data of each mobile device in the at least one mobile device in response to the starting request, determining the current motion state of each mobile device in the at least one mobile device based on at least one state data, and controlling the target safety device to be started to allow access to the target area in response to determining that the current motion state of each mobile device in the at least one mobile device is a stop motion state.
According to an embodiment of the present disclosure, the opening request includes identification information of the target security device. Wherein the obtaining of the status data of each of the at least one mobile device in response to the turn-on request comprises: and obtaining a first corresponding relation and a second corresponding relation in response to the opening request, and obtaining the at least one state data based on the identification information of the target security device, the first corresponding relation and the second corresponding relation, wherein the first corresponding relation comprises the corresponding relation between the identification information of the plurality of security devices and the areas where the plurality of security devices are located, and the second corresponding relation comprises the corresponding relation between the identification information of the plurality of mobile devices and the areas where the plurality of mobile devices are located.
According to an embodiment of the present disclosure, the obtaining the at least one status datum based on the identification information of the target security device, the first corresponding relationship, and the second corresponding relationship includes: the method comprises the steps of determining a target area based on identification information of the target security device and the first corresponding relation, determining identification information of at least one mobile device in the target area based on the target area and the second corresponding relation, and acquiring state data of the at least one mobile device based on the identification information of the at least one mobile device.
According to an embodiment of the present disclosure, the method further includes: sending the starting state of the target safety device to the at least one mobile device, receiving first feedback information generated by the at least one mobile device in response to the starting state of the target safety device, wherein the first feedback information comprises state data of the at least one mobile device, and storing identification information of the at least one mobile device and the state data of the at least one mobile device in an associated manner to obtain a storage result. Wherein the obtaining of the status data of the at least one mobile device based on the identification information of the at least one mobile device comprises: and acquiring the state data of the at least one mobile device from the storage result based on the identification information of the at least one mobile device.
According to an embodiment of the present disclosure, the determining the current motion state of each of the at least one mobile device based on the at least one state data includes: the method comprises the steps of determining whether the at least one mobile device comprises a target mobile device with a current motion state being a continuous motion state or not based on the at least one state data, sending a starting state of the target safety device to the target mobile device in response to determining that the at least one mobile device comprises the target mobile device with the current motion state being the continuous motion state, receiving second feedback information generated by the target mobile device in response to the starting state of the target safety device, wherein the second feedback information comprises the state data of the target mobile device, and updating the state data of the target mobile device in the storage result based on the second feedback information.
According to an embodiment of the present disclosure, the method further includes: and updating the second corresponding relation. Wherein the updating the second correspondence comprises: receiving location information of the plurality of mobile devices, wherein the location information characterizes current locations of the plurality of mobile devices, and updating areas where the plurality of mobile devices are located in the second corresponding relationship based on the location information.
According to an embodiment of the present disclosure, the above controlling the target security apparatus to be turned on to allow access to the target area in response to determining that the current motion state of each of the at least one mobile device is a stopped motion state includes: in response to determining that the current motion state of each of the at least one mobile device is a stopped motion state, sending a start instruction to the target security apparatus, wherein the start instruction is used for instructing the target security apparatus to send notification information to a function device and instructing the target security apparatus to start to form an opening so as to access the target area through the opening, wherein the function device is configured to provide motion energy to the at least one mobile device, and the notification information is used for instructing the function device to stop providing the motion energy to the at least one mobile device.
Another aspect of the present disclosure provides a control system of a safety device, including: the device comprises a first receiving module, an obtaining module, a determining module and a control module. The first receiving module receives an opening request aiming at a target safety device, wherein a target area where the target safety device is located comprises at least one mobile device, each mobile device in the at least one mobile device is provided with state data, and the state data represents a current motion state of the mobile device corresponding to the state data. An obtaining module, configured to obtain status data of each of the at least one mobile device in response to the start request. A determination module that determines a current motion state of each of the at least one mobile device based on at least one state data. And the control module is used for controlling the target safety device to be started to allow the target area to be accessed in response to the fact that the current motion state of each mobile device in the at least one mobile device is determined to be the motion stop state.
According to an embodiment of the present disclosure, the opening request includes identification information of the target security device. Wherein the obtaining of the status data of each of the at least one mobile device in response to the turn-on request comprises: and obtaining a first corresponding relation and a second corresponding relation in response to the opening request, and obtaining the at least one state data based on the identification information of the target security device, the first corresponding relation and the second corresponding relation, wherein the first corresponding relation comprises the corresponding relation between the identification information of the plurality of security devices and the areas where the plurality of security devices are located, and the second corresponding relation comprises the corresponding relation between the identification information of the plurality of mobile devices and the areas where the plurality of mobile devices are located.
According to an embodiment of the present disclosure, the obtaining module includes: the device comprises a first determining submodule, a second determining submodule and an obtaining submodule. The first determining submodule determines the target area based on the identification information of the target safety device and the first corresponding relation. And the second determining submodule determines the identification information of at least one mobile device in the target area based on the target area and the second corresponding relation. And the obtaining sub-module is used for obtaining the state data of the at least one mobile device based on the identification information of the at least one mobile device.
According to the embodiment of the present disclosure, the apparatus further includes: the device comprises a sending module, a second receiving module and a storage module. The sending module sends the starting state of the target safety device to the at least one mobile device. A second receiving module, configured to receive first feedback information generated by the at least one mobile device in response to the activation status of the target security apparatus, where the first feedback information includes status data of the at least one mobile device. And the storage module is used for storing the identification information of the at least one mobile device and the state data of the at least one mobile device in an associated manner to obtain a storage result. Wherein the obtaining of the status data of the at least one mobile device based on the identification information of the at least one mobile device comprises: and acquiring the state data of the at least one mobile device from the storage result based on the identification information of the at least one mobile device.
According to an embodiment of the present disclosure, the determining the current motion state of each of the at least one mobile device based on the at least one state data includes: the method comprises the steps of determining whether the at least one mobile device comprises a target mobile device with a current motion state being a continuous motion state or not based on the at least one state data, sending a starting state of the target safety device to the target mobile device in response to determining that the at least one mobile device comprises the target mobile device with the current motion state being the continuous motion state, receiving second feedback information generated by the target mobile device in response to the starting state of the target safety device, wherein the second feedback information comprises the state data of the target mobile device, and updating the state data of the target mobile device in the storage result based on the second feedback information.
According to the embodiment of the present disclosure, the apparatus further includes: and the updating module updates the second corresponding relation. Wherein the updating the second correspondence comprises: receiving location information of the plurality of mobile devices, wherein the location information characterizes current locations of the plurality of mobile devices, and updating areas where the plurality of mobile devices are located in the second corresponding relationship based on the location information.
According to an embodiment of the present disclosure, the above controlling the target security apparatus to be turned on to allow access to the target area in response to determining that the current motion state of each of the at least one mobile device is a stopped motion state includes: in response to determining that the current motion state of each of the at least one mobile device is a stopped motion state, sending a start instruction to the target security apparatus, wherein the start instruction is used for instructing the target security apparatus to send notification information to a function device and instructing the target security apparatus to start to form an opening so as to access the target area through the opening, wherein the function device is configured to provide motion energy to the at least one mobile device, and the notification information is used for instructing the function device to stop providing the motion energy to the at least one mobile device.
Another aspect of the present disclosure provides a computer-readable storage medium storing computer-executable instructions for implementing the method as described above when executed.
Another aspect of the disclosure provides a computer program comprising computer executable instructions for implementing the method as described above when executed.
According to the embodiment of the disclosure, by using the control method as described above, the problem that when an operator needs to enter an area, power supply to the functional device is usually directly stopped, the functional device is lost or fails due to sudden power failure of the functional device, and a safety accident is easily caused when the charged mobile device is in a running state can be at least partially solved. Therefore, when the target safety device needs to be started, the control system can control the mobile equipment to stop moving, safety accidents caused by the fact that the operator enters a target area when the mobile equipment is moving are avoided, and the safety of the operator is guaranteed.
Drawings
The above and other objects, features and advantages of the present disclosure will become more apparent from the following description of embodiments of the present disclosure with reference to the accompanying drawings, in which:
fig. 1A to 1B schematically illustrate an application scenario of a control method of a safety device and a control system of the safety device according to an embodiment of the present disclosure;
fig. 2 schematically illustrates a flow chart of a control method of a safety device according to an embodiment of the present disclosure;
FIG. 3 schematically illustrates a flow chart for obtaining status data according to an embodiment of the disclosure;
fig. 4 schematically shows a flow chart of a control method of a safety device according to another embodiment of the present disclosure;
FIG. 5 schematically illustrates a block diagram of a control system of a safety device according to an embodiment of the disclosure;
FIG. 6 schematically shows a block diagram of an acquisition module according to an embodiment of the disclosure;
FIG. 7 schematically illustrates a block diagram of a control system of a safety device according to another embodiment of the present disclosure; and
FIG. 8 schematically illustrates a block diagram of a computer system suitable for controlling a security device, in accordance with an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a convention analogous to "A, B or at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
The embodiment of the present disclosure provides a control method of a safety device, including: receiving an opening request aiming at a target safety device, wherein the target safety device is located in a target area and comprises at least one mobile device, each mobile device in the at least one mobile device is provided with state data, and the state data represents the current motion state of the mobile device corresponding to the state data. Then, in response to the turn-on request, state data of each of the at least one mobile device is obtained, and a current motion state of each of the at least one mobile device is determined based on the at least one state data. Next, in response to determining that the current motion state of each of the at least one mobile device is a stopped motion state, controlling the target security appliance to turn on to allow access to the target area.
Fig. 1A to 1B schematically show an application scenario of a control method of a safety device and a control system of a safety device according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of an application scenario in which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, but does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1A and 1B, an application scenario 100 according to this embodiment may include, for example, a target area 110, a plurality of mobile devices 111, 112, 113, a target security apparatus 120 and a control system 130.
According to an embodiment of the present disclosure, the target area 110 may be, for example, a warehouse or may be a portion of a storage area in a warehouse. In particular, the target area 110 may be a certain floor or roadway or the like in a warehouse. The target area 110 may be used to store goods.
According to the embodiment of the present disclosure, the plurality of moving devices 111, 112, 113 may be devices such as a shuttle car, a forklift, or a hoist. The plurality of mobile devices 111, 112, 113 are, for example, in the target area 110 for handling goods.
In the disclosed embodiment, the target security device 120 may be, for example, a security gate. By closing the target safety device 120, the situation that an operator or a plurality of mobile devices 111, 112, 113 cannot enter or exit the target area 110 at will can be realized, so that a safety accident caused by collision of the plurality of mobile devices 111, 112, 113 in motion with the operator due to the fact that the operator enters the target area 110 at will can be avoided.
According to an embodiment of the present disclosure, the Control System 130 may be, for example, a Warehouse Control System (WCS), and the Control System 130 may include, for example, a computer, a server, and the like. The control system 130 may be in data communication with the plurality of mobile devices 111, 112, 113 and the security apparatus 120, for example.
As shown in fig. 1A, before the operator enters the target area 110, the target security apparatus 120 is, for example, in a closed state, and the plurality of mobile devices 111, 112, 113 are, for example, in a moving state. When the operator needs to enter the target area 110, the control system 130 may transmit an indication signal indicating that the target security apparatus 120 is about to be turned on to the plurality of mobile devices 111, 112, 113, for example, by communicating data with the plurality of mobile devices 111, 112, 113. The plurality of mobile devices 111, 112, 113 stop moving after receiving the indication signal.
As shown in fig. 1B, after the plurality of mobile devices 111, 112, 113 stop moving, the control system 130 may control the target security apparatus 120 to be turned on so that the operator can enter the target area 110.
It will be appreciated that a plurality of mobile devices within the target area may be controlled to stop moving when the target security apparatus needs to be turned on. After the plurality of mobile devices stop moving, the target safety device is controlled to be started to allow the operator to enter the target area, so that safety accidents caused by collision of the mobile devices with the operator can be avoided, and the safety of the operator is guaranteed.
Fig. 2 schematically shows a flow chart of a control method of a safety device according to an embodiment of the present disclosure.
As shown in fig. 2, the method may include, for example, the following operations S210 to S240. This method can be applied to, for example, the control systems shown in fig. 1A to 1B.
In operation S210, an opening request for a target security apparatus is received, where the target security apparatus is located in a target area including at least one mobile device, and each of the at least one mobile device has state data, and the state data represents a current motion state of the mobile device corresponding to the state data.
According to an embodiment of the present disclosure, the target security device may be, for example, a security gate, which may include, for example, an opening button thereon. The target safety device is normally in a closed position to prevent operator access to the target area. When an operator needs to enter a target area, the operator can request to start the target safety device by pressing the start button, and the target safety device generates a start request after receiving the operation of pressing the start button and sends the start request to the control system.
According to an embodiment of the present disclosure, the state data of the mobile device characterizes, for example, a current motion state of the mobile device. The current motion state may include, for example, a stopped motion state, which may indicate, for example, that the mobile device is in a stopped state, or a continued motion state, which may indicate, for example, that the mobile device is in a motion state.
In operation S220, status data of each of at least one mobile device is acquired in response to the turn-on request.
According to the embodiment of the disclosure, after the control system receives the start request, the control system may acquire the status data of each mobile device. For example, the control system may be in data communication with the at least one mobile device, and the at least one mobile device may send its status data to the control system in real time, so that the control system can obtain the status data of the at least one mobile device in real time.
In operation S230, a current motion state of each of the at least one mobile device is determined based on the at least one state data.
In the embodiment of the present disclosure, the control system may obtain at least one status data by acquiring the status data of each mobile device, and then the control system may determine the current motion state of each mobile device of the at least one mobile device based on the at least one status data.
Next, in operation S240, in response to determining that the current motion state of each of the at least one mobile device is a stopped motion state, the target security apparatus is controlled to be turned on to allow access to the target area.
According to the embodiment of the present disclosure, if the control system determines that each of the at least one mobile device is in the stopped state based on the at least one status data, the target safety device may be controlled to be turned on so that the operator enters the target area.
In the embodiment of the disclosure, when the target security apparatus needs to be turned on, the control system may obtain the state data of the mobile device based on the turn-on request, and determine the state of the mobile device through the state data. When the mobile equipment is in a motion stop state, the target safety device can be controlled to be started to allow the operator to enter the target area, so that the safety accident caused by the fact that the operator enters the target area when the mobile equipment is moving is avoided, and the safety of the operator is guaranteed.
According to the embodiment of the disclosure, the opening request may include, for example, identification information of the target security device. The operation S220 may include, for example: and responding to the starting request, acquiring the first corresponding relation and the second corresponding relation, and then acquiring at least one state data based on the identification information of the target safety device, the first corresponding relation and the second corresponding relation.
According to the embodiment of the disclosure, the control system may control the opening of a plurality of safety devices, for example, and the target safety device may be any one of the plurality of safety devices, for example. In the embodiment of the present disclosure, the first correspondence relationship includes, for example, a correspondence relationship between identification information of the plurality of security apparatuses and areas where the plurality of security apparatuses are located, and the second correspondence relationship includes, for example, a correspondence relationship between identification information of the plurality of mobile devices and areas where the plurality of mobile devices are located.
For example, a warehouse may include multiple security devices, each of which may be located in a different area, for example. For example, the plurality of security devices include the security device 1 and the security device 2, and the identification information of the security device may be, for example, a number of the security device for uniquely representing the corresponding security device. The safety device 1 is located in a region 1, for example, and the safety device 2 is located in a region 2, for example. Thus, the first correspondence includes, for example: the identification information of the security device 1 corresponds to the area 1, and the identification information of the security device 2 corresponds to the area 2.
According to an embodiment of the present disclosure, the plurality of mobile devices may be, for example, mobile devices in a warehouse. Multiple mobile devices may be in different areas of the warehouse. For example, the plurality of mobile devices includes mobile device 1, mobile device 2, mobile device 3, mobile device 4, and mobile device 5. Each mobile device for example comprises identification information, which for example may be the number of the mobile device for uniquely representing the corresponding mobile device. Wherein mobile device 1, mobile device 2 and mobile device 3 are for example in area 1 and mobile device 4 and mobile device 5 are for example in area 2. Therefore, the second correspondence relationship includes, for example: the identification information of the mobile device 1 corresponds to the area 1, the identification information of the mobile device 2 corresponds to the area 1, the identification information of the mobile device 3 corresponds to the area 1, the identification information of the mobile device 4 corresponds to the area 2, and the identification information of the mobile device 5 corresponds to the area 2.
FIG. 3 schematically shows a flow chart for obtaining status data according to an embodiment of the disclosure.
As shown in fig. 3, the above-described operation S220 may include, for example, the following operations S221 to S223.
In operation S221, a target area is determined based on the identification information of the target security device and the first correspondence. For example, the target security device is the security device 1, since there is a correspondence relationship between the identification information of the plurality of security devices and the areas where the plurality of security devices are located in the first correspondence relationship. Therefore, the area 1 corresponding to the identification information of the security device 1 can be determined from the first correspondence relationship, and the area 1 is, for example, a target area.
In operation S222, identification information of at least one mobile device in the target area is determined based on the target area and the second correspondence. For example, the second correspondence relationship includes a correspondence relationship between identification information of the plurality of mobile devices and an area in which the plurality of mobile devices are located. Therefore, when the target area is area 1, the identification information of at least one mobile device in area 1 may be determined from the second correspondence. For example, the at least one mobile device in area 1 includes mobile device 1, mobile device 2, and mobile device 3.
Next, in operation S223, status data of the at least one mobile device is acquired based on the identification information of the at least one mobile device.
According to the embodiment of the disclosure, each mobile device may send its state data to the control system in real time, for example, and the control system may store the identification information of the mobile device and the state data of the mobile device after receiving the state data of each mobile device to obtain a storage result. When the state data of the mobile device needs to be acquired, the state data corresponding to the identification information of the mobile device can be acquired from the storage result according to the identification information of the mobile device.
According to an embodiment of the present disclosure, the method may further include, for example: and updating the second corresponding relation. Wherein, updating the second corresponding relationship may include, for example: and receiving position information of the plurality of mobile devices, wherein the position information represents the current positions of the plurality of mobile devices, and updating the areas where the plurality of mobile devices are located in the second corresponding relationship based on the position information.
According to the embodiment of the present disclosure, since the position of the mobile device may change at any time, for example, after the mobile device 1 moves from the area 1 to the area 2, the position of the mobile device 1 changes. Therefore, each mobile device of the embodiment of the present disclosure may send its location information to the control system in real time, and after the control system receives the location information of each mobile device, the area where the mobile device is located in the second corresponding relationship may be updated.
For example, the second correspondence includes: the identification information of the mobile device 1 corresponds to the area 1, the identification information of the mobile device 2 corresponds to the area 1, the identification information of the mobile device 3 corresponds to the area 1, the identification information of the mobile device 4 corresponds to the area 2, and the identification information of the mobile device 5 corresponds to the area 2. When the mobile device 1 moves from area 1 to area 2, the control system may for example update the second correspondence with respect to the area in which the mobile device 1 is located. The updated second correspondence relationship is, for example: the identification information of the mobile device 1 corresponds to the area 2, the identification information of the mobile device 2 corresponds to the area 1, the identification information of the mobile device 3 corresponds to the area 1, the identification information of the mobile device 4 corresponds to the area 2, and the identification information of the mobile device 5 corresponds to the area 2.
Fig. 4 schematically shows a flow chart of a control method of a safety device according to another embodiment of the present disclosure.
As shown in fig. 4, the method may include, for example, the above-described operations S210 to S240 and the following operations S410 to S430. Operations S210 to S240 are, for example, the same as or similar to the operations described in fig. 2, and are not described again here.
In operation S410, the activation status of the target security apparatus is transmitted to at least one mobile device.
According to an embodiment of the present disclosure, for example, when the target security apparatus needs to be started, the control system may transmit a start state of the target security apparatus to at least one mobile device within the target area, wherein the start state of the target security apparatus may include a preparation for starting the target security apparatus.
In operation S420, first feedback information generated by the at least one mobile device in response to the activation state of the target security apparatus is received, wherein the first feedback information includes state data of the at least one mobile device. The state data may represent, for example, a current motion state of the mobile device, which may include, for example, a stopped motion state or a sustained motion state, among others.
For example, after the mobile device receives the start state sent by the control system about the target safety apparatus, the mobile device stops moving for example, and sends first feedback information to the control system, wherein the first feedback information for example indicates that the current moving state of the mobile device is the stop moving state.
In operation S430, the identification information of the at least one mobile device and the status data of the at least one mobile device are stored in association, resulting in a storage result.
Wherein, the operation S223 may include, for example: based on the identification information of the at least one mobile device, status data of the at least one mobile device is obtained from the stored results.
According to the embodiment of the disclosure, at least one mobile device can also send its status data to the control system in real time, so that the control system can update the stored result in real time after the status data of the mobile device is changed. The frequency with which at least one mobile device transmits its status data to the control system may be, for example, once every fixed period of time, which may be 1 second, 10 seconds, etc.
According to the embodiment of the present disclosure, the storage result may include, for example, identification information of the plurality of mobile devices and status data of the plurality of mobile devices. The plurality of mobile devices includes, for example, mobile devices in a plurality of areas, e.g., the plurality of mobile devices includes mobile devices in area 1 and area 2. The control system may for example send the activation status of the respective safety device to the mobile equipment in the different areas. For example, the control system may send the activation status of security apparatus 1 to mobile devices in zone 1 and the activation status of security apparatus 2 to mobile devices in zone 2.
According to an embodiment of the present disclosure, the operation S230 includes, for example: based on the at least one state data, it is determined whether the at least one mobile device includes a target mobile device whose current motion state is a continuous motion state.
Then, in response to determining that the at least one mobile device includes a target mobile device whose current motion state is a continuous motion state, an activation state of the target security appliance is transmitted to the target mobile device.
For example, when the target security apparatus is the security apparatus 1 in the area 1, the area 1 includes, for example, the mobile device 1, the mobile device 2, and the mobile device 3. When the security apparatus 1 needs to be turned on, the current motion state of each mobile device is determined according to the state data of the mobile device 1, the mobile device 2, and the mobile device 3, and when the current motion states of the mobile device 1 and the mobile device 2 are the stop motion state and the current motion state of the mobile device 3 is the continuous motion state, for example, it may be determined that the mobile device 3 is the target mobile device, and the start state of the security apparatus 1 is sent to the target mobile device (the mobile device 3).
Next, second feedback information generated by the target mobile device (mobile device 3) in response to the activation state of the target security apparatus (security apparatus 1) is received, wherein the second feedback information may include, for example, state data of the target mobile device (mobile device 3). That is, when the mobile device 3 receives the information that the security apparatus 1 is to be turned on, the mobile device 3 stops moving, for example, and the second feedback information generated by the mobile device 3 includes, for example, status data indicating that the mobile device 3 is in a state of stopping moving.
Next, based on the second feedback information, the state data of the target mobile device (mobile device 3) in the storage result is updated, so that when the control system acquires the respective state data of the mobile device 1, the mobile device 2, and the mobile device 3 again through the storage result, the acquired respective state data of the mobile device 1, the mobile device 2, and the mobile device 3 represents that the mobile device 1, the mobile device 2, and the mobile device 3 are all in a motion stop state, and the control system is convenient to control the target security apparatus (security apparatus 1) to be turned on.
According to an embodiment of the present disclosure, the operation S240 may include, for example: and in response to determining that the current motion state of each of the at least one mobile device is a stopped motion state, sending a start instruction to the target security appliance. The opening instruction is used for instructing the target security apparatus to send notification information to the functional device and instructing the target security apparatus to open to form an opening so as to access the target area through the opening, for example. The operator may access the target area through the opening.
According to an embodiment of the disclosure, the function device is configured to provide motion energy to the at least one mobile device, and the notification information is used to instruct the function device to stop providing the motion energy to the at least one mobile device. For example, the functional device may be a master switch within the target area that may be used to control powered devices within the target area. The functional device may also be a charging post in the target area, which may, for example, charge the mobile device. The functional device may be instructed to stop providing motion energy to the at least one mobile device when the target security apparatus is turned on, e.g., the functional device may be turned off to effect a stop providing power to the at least one mobile device.
It can be understood that, in the embodiment of the present disclosure, before the target security device is turned on, it is first determined that all mobile devices in the target area stop moving, and the functional devices are turned off, so that dual guarantees are achieved. If the mobile device is a rechargeable device, the rechargeable device is still in a running state after the functional device is closed. That is, it is difficult to guarantee that all mobile devices stop operating if only the functional devices are turned off. Therefore, the mobile device is controlled to stop moving through the data communication between the control system and the mobile device, and the mobile device can be guaranteed to stop moving in time even if the mobile device is a rechargeable device.
In one embodiment, the operator triggers the security device to send an unlock request to the control system, for example by pressing an unlock button on the security device, when it is desired to unlock the security device. After receiving the opening request, the control system may search for the first corresponding relationship according to the identification information of the security device to obtain the area where the security device is located. And then searching the second corresponding relation to obtain the mobile equipment in the area of the safety device. Next, the identification information of the security device to be currently activated and the identification information of the mobile device in the area of the security device are put into a scheduling thread of the control system as a set of tasks.
For example, the security apparatuses to be currently activated are the security apparatus 1 and the security apparatus 2, the area 1 in which the security apparatus 1 is located includes, for example, the mobile device 1, the mobile device 2, and the mobile device 3, and the area 2 in which the security apparatus 2 is located includes, for example, the mobile device 4 and the mobile device 5. The identification information of the secure apparatus 1, the identification information of the mobile device 2, and the identification information of the mobile device 3 are put into a scheduling thread as a first group of tasks, and the identification information of the secure apparatus 2, the identification information of the mobile device 4, and the identification information of the mobile device 5 are put into a scheduling thread as a second group of tasks.
According to the embodiment of the disclosure, when the thread is scheduled to start executing, for example, the first group of tasks and the second group of tasks may be executed in order. For example, a counter may be set for a first set of tasks, and if the security apparatus 1 needs to be started, the state data of the mobile device 1, the mobile device 2, and the mobile device 3 in the area 1 where the security apparatus 1 is located may be sequentially queried and the counter may be updated.
For example, the state of the mobile device may be a state of a security apparatus, which includes, for example, an on state and an off state. For example, when the security apparatus 1 needs to be started, the state of the installation apparatus 1 is, for example, an on state, then the states of the mobile device 1, the mobile device 2, and the mobile device 3 are compared with the state of the security apparatus 1, respectively, and if the states of the respective mobile devices coincide with the state of the security apparatus, the counter +1 is counted. If the state of the mobile equipment is inconsistent with the state of the safety device 1, a message is sent to the mobile equipment to inform the mobile equipment that the safety device 1 needs to be started. After the mobile device successfully receives the message, the mobile device may change its own state to an open state.
For example, if the state of the mobile device 1 (in the on state) and the state of the security apparatus 1 (in the on state) are identical (both in the on state), the counter +1 (in this case, the value of the counter is, for example, 1). Then, if the state of the mobile device 2 (in the off state) is not consistent with the state of the security apparatus 1 (in the on state), the counter is not changed (the value of the counter is, for example, 1), and the mobile device 2 is notified that the security apparatus 1 needs to be turned on, so that the mobile device 2 changes the state to the on state. Then, if it is continuously determined that the state (on state) of the mobile device 3 matches the state (on state) of the secure device 1, the counter +1 (the value of the counter is, for example, 2). At this time, the value of the counter is inconsistent with the number of the mobile devices, indicating that the first set of tasks is still completed and the security device 1 is not turned on.
Then, the execution of the second set of tasks is continued, and a counter is reset for the second set of tasks. The execution process of the second group of tasks is similar to the execution process of the first group of tasks, and is not described herein again. Here, for example, the counter of the second group of tasks corresponds to the number of mobile devices, indicating that the execution of the second group of tasks is complete, and the security device 2 may be turned on.
After polling each task in the scheduling thread, each task in the scheduling thread may be polled and executed again after a fixed period of time. The fixed time period may be, for example, 1 second, 10 seconds, or the like. At this point, the dispatch thread may include, for example, the first set of tasks that are not performed for completion and other newly added tasks.
When the dispatch thread is executed again, the first set of tasks may be re-executed. For example, if the states of the mobile device 1, the mobile device 2, and the mobile device 3 are determined to be consistent with the state of the security apparatus 1 in sequence, and the value of the counter of the first group of tasks is consistent with the number of the mobile devices in the first group of tasks, this indicates that all the mobile devices in the first group of tasks have received the start information of the security apparatus 1 and are in the stop motion state, and at this time, a start instruction may be sent to the security apparatus 1. The security device 1 may be turned on after receiving the activation command.
According to the embodiment of the disclosure, if the mobile device fails (for example, suddenly cuts off power) and does not report the status data to the control system in real time, at this time, although the control system does not have the status data of the mobile device, the failed mobile device is generally in a stop motion state in an actual production process. Thus, the control system may default to the mobile device being in a stopped motion state, and the counter may be +1 when determining the state of the failed mobile device. When the mobile device resumes (e.g., charging), the control system may send the real-time status of the safety device to the mobile device, ensuring that the mobile device stops moving in time.
According to the embodiment of the disclosure, after the target security device is turned off, the target security device may send a door-closing signal to the control system, and the control system may synchronize door-closing information to each mobile device, so that the mobile device may move again.
According to an embodiment of the present disclosure, the safety device may also have, for example, an emergency stop button. When the mobile equipment needs to be controlled to stop suddenly in the production process, an operator can trigger the sudden stop button to send a sudden stop request to the control system by the safety device, and the control system can control the mobile equipment to be in a sudden stop state, so that the production safety is ensured.
Fig. 5 schematically illustrates a block diagram of a control system of a safety device according to an embodiment of the present disclosure.
As shown in fig. 5, the control system 400 of the safety device may include, for example, a first receiving module 510, an obtaining module 520, a determining module 530, and a control module 540.
The first receiving module 510 may be configured to receive an opening request for a target security apparatus, where the target security apparatus is located in a target area including at least one mobile device, and each of the at least one mobile device has state data, and the state data represents a current motion state of the mobile device corresponding to the state data. According to the embodiment of the present disclosure, the first receiving module 510 may perform, for example, the operation S210 described above with reference to fig. 2, which is not described herein again.
The obtaining module 520 may be configured to obtain status data of each of the at least one mobile device in response to the turn-on request. According to the embodiment of the present disclosure, the obtaining module 520 may perform, for example, the operation S220 described above with reference to fig. 2, which is not described herein again.
The determining module 530 may be configured to determine a current motion state of each of the at least one mobile device based on the at least one state data. According to the embodiment of the present disclosure, the determining module 530 may, for example, perform operation S230 described above with reference to fig. 2, which is not described herein again.
The control module 540 may be configured to control the target security apparatus to turn on to allow access to the target area in response to determining that the current motion state of each of the at least one mobile device is a stopped motion state. According to an embodiment of the present disclosure, the control module 540 may, for example, perform operation S240 described above with reference to fig. 2, which is not described herein again.
According to an embodiment of the present disclosure, the opening request includes identification information of the target security device. Wherein, in response to the turn-on request, obtaining the status data of each of the at least one mobile device comprises: and acquiring at least one piece of state data based on the identification information of the target security device, the first corresponding relationship and the second corresponding relationship in response to the opening request, wherein the first corresponding relationship comprises the corresponding relationship between the identification information of the plurality of security devices and the areas where the plurality of security devices are located, and the second corresponding relationship comprises the corresponding relationship between the identification information of the plurality of mobile devices and the areas where the plurality of mobile devices are located.
Fig. 6 schematically illustrates a block diagram of an acquisition module according to an embodiment of the disclosure.
As shown in fig. 6, the obtaining module 520 may include, for example, a first determining submodule 521, a second determining submodule 522, and an obtaining submodule 523.
The first determining submodule 521 may be configured to determine the target area based on the identification information of the target security device and the first corresponding relationship. According to the embodiment of the present disclosure, the first determining submodule 521 may perform, for example, the operation S221 described above with reference to fig. 3, which is not described herein again.
The second determining sub-module 522 may be configured to determine identification information of at least one mobile device located in the target area based on the target area and the second correspondence. According to the embodiment of the present disclosure, the second determining sub-module 522 may, for example, perform operation S222 described above with reference to fig. 3, which is not described herein again.
The obtaining sub-module 523 may be configured to obtain status data of the at least one mobile device based on the identification information of the at least one mobile device. According to the embodiment of the present disclosure, the obtaining submodule 523 may perform the operation S223 described above with reference to fig. 3, for example, and is not described herein again.
Fig. 7 schematically illustrates a block diagram of a control system of a safety device according to another embodiment of the present disclosure.
As shown in fig. 7, the control system 700 of the safety device may include, for example, a first receiving module 510, an obtaining module 520, a determining module 530, a control module 540, a transmitting module 710, a second receiving module 720, and a storage module 730. The first receiving module 510, the obtaining module 520, the determining module 530, and the controlling module 540 are, for example, the same as or similar to the modules described in fig. 5, and are not repeated herein.
The sending module 710 may be configured to send the activation status of the target security apparatus to the at least one mobile device. According to the embodiment of the present disclosure, the sending module 710 may, for example, perform operation S410 described above with reference to fig. 4, which is not described herein again.
The second receiving module 720 may be configured to receive first feedback information generated by the at least one mobile device in response to the activation status of the target security apparatus, wherein the first feedback information includes status data of the at least one mobile device. According to the embodiment of the present disclosure, the second receiving module 720 may, for example, perform operation S420 described above with reference to fig. 4, which is not described herein again.
The storage module 730 may be configured to store the identification information of the at least one mobile device and the status data of the at least one mobile device in association with each other, so as to obtain a storage result. According to the embodiment of the present disclosure, the storage module 730 may perform, for example, the operation S430 described above with reference to fig. 4, which is not described herein again.
According to an embodiment of the present disclosure, acquiring the status data of the at least one mobile device based on the identification information of the at least one mobile device includes: based on the identification information of the at least one mobile device, status data of the at least one mobile device is obtained from the stored results.
According to an embodiment of the present disclosure, determining the current motion state of each of the at least one mobile device based on the at least one state data comprises: the method comprises the steps of determining whether at least one mobile device comprises a target mobile device of which the current motion state is a continuous motion state or not based on at least one state data, sending the starting state of a target safety device to the target mobile device in response to determining that the at least one mobile device comprises the target mobile device of which the current motion state is the continuous motion state, receiving second feedback information generated by the target mobile device in response to the starting state of the target safety device, wherein the second feedback information comprises the state data of the target mobile device, and updating the state data of the target mobile device in a stored result based on the second feedback information.
According to an embodiment of the present disclosure, the apparatus 500 or the apparatus 700 may further include, for example: and the updating module updates the second corresponding relation. Wherein updating the second correspondence includes: and receiving position information of the plurality of mobile devices, wherein the position information represents the current positions of the plurality of mobile devices, and updating the areas where the plurality of mobile devices are located in the second corresponding relationship based on the position information.
According to an embodiment of the present disclosure, in response to determining that the current motion state of each of the at least one mobile device is a stopped motion state, controlling the target security apparatus to turn on to allow access to the target area includes: in response to determining that the current motion state of each of the at least one mobile device is a stopped motion state, sending an open instruction to the target security apparatus, wherein the open instruction is used for instructing the target security apparatus to send notification information to the function device and instructing the target security apparatus to open to form an opening so as to access the target area through the opening, wherein the function device is configured to provide motion energy to the at least one mobile device, and the notification information is used for instructing the function device to stop providing the motion energy to the at least one mobile device.
Any number of modules, sub-modules, units, sub-units, or at least part of the functionality of any number thereof according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, and sub-units according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in any other reasonable manner of hardware or firmware by integrating or packaging a circuit, or in any one of or a suitable combination of software, hardware, and firmware implementations. Alternatively, one or more of the modules, sub-modules, units, sub-units according to embodiments of the disclosure may be at least partially implemented as a computer program module, which when executed may perform the corresponding functions.
For example, any plurality of the first receiving module 510, the obtaining module 520, the first determining submodule 521, the second determining submodule 522, the obtaining submodule 523, the determining module 530, the controlling module 540, the sending module 710, the second receiving module 720 and the storing module 730 may be combined and implemented in one module, or any one of the modules may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to the embodiment of the present disclosure, at least one of the first receiving module 510, the obtaining module 520, the first determining submodule 521, the second determining submodule 522, the obtaining submodule 523, the determining module 530, the controlling module 540, the sending module 710, the second receiving module 720 and the storing module 730 may be implemented at least partially as a hardware circuit, for example, a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented by hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or implemented by any one of three manners of software, hardware and firmware, or implemented by a suitable combination of any of them. Alternatively, at least one of the first receiving module 510, the obtaining module 520, the first determining sub-module 521, the second determining sub-module 522, the obtaining sub-module 523, the determining module 530, the controlling module 540, the sending module 710, the second receiving module 720 and the storing module 730 may be at least partially implemented as a computer program module, which when executed, may perform a corresponding function.
FIG. 8 schematically illustrates a block diagram of a computer system suitable for controlling a security device, in accordance with an embodiment of the present disclosure. The computer system illustrated in FIG. 8 is only one example and should not impose any limitations on the scope of use or functionality of embodiments of the disclosure.
As shown in fig. 8, a computer system 800 according to an embodiment of the present disclosure includes a processor 801 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)802 or a program loaded from a storage section 806 into a Random Access Memory (RAM) 803. The processor 801 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 801 may also include onboard memory for caching purposes. The processor 801 may include a single processing unit or multiple processing units for performing different actions of the method flows according to embodiments of the present disclosure.
In the RAM803, various programs and data necessary for the operation of the system 800 are stored. The processor 801, the ROM 802, and the RAM803 are connected to each other by a bus 804. The processor 801 performs various operations of the method flows according to the embodiments of the present disclosure by executing programs in the ROM 802 and/or RAM 803. Note that the programs may also be stored in one or more memories other than the ROM 802 and RAM 803. The processor 801 may also perform various operations of method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.
System 800 may also include an input/output (I/O) interface 805, also connected to bus 804, according to an embodiment of the disclosure. The system 800 may also include one or more of the following components connected to the I/O interface 805: an input portion 806 including a keyboard, a mouse, and the like; an output section 807 including a signal such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 808 including a hard disk and the like; and a communication section 809 including a network interface card such as a LAN card, a modem, or the like. The communication section 809 performs communication processing via a network such as the internet. A drive 810 is also connected to the I/O interface 805 as necessary. A removable medium 811 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 810 as necessary, so that a computer program read out therefrom is mounted on the storage section 808 as necessary.
According to embodiments of the present disclosure, method flows according to embodiments of the present disclosure may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable storage medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program can be downloaded and installed from a network through the communication section 809 and/or installed from the removable medium 811. The computer program, when executed by the processor 801, performs the above-described functions defined in the system of the embodiments of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a computer-non-volatile computer-readable storage medium, which may include, for example and without limitation: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
For example, according to embodiments of the present disclosure, a computer-readable storage medium may include the ROM 802 and/or RAM803 described above and/or one or more memories other than the ROM 802 and RAM 803.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.

Claims (10)

1. A control method of a safety device, comprising:
receiving an opening request aiming at a target safety device, wherein a target area where the target safety device is located comprises at least one mobile device, each mobile device in the at least one mobile device is provided with state data, and the state data represents the current motion state of the mobile device corresponding to the state data;
in response to the turn-on request, obtaining status data for each of the at least one mobile device;
determining a current motion state of each of the at least one mobile device based on at least one state data; and
controlling the target security appliance to turn on to allow access to the target area in response to determining that the current motion state of each of the at least one mobile device is a stopped motion state.
2. The method of claim 1, wherein the open request includes identification information of the target security device;
wherein the obtaining of the status data of each of the at least one mobile device in response to the turn-on request comprises:
responding to the starting request, and acquiring a first corresponding relation and a second corresponding relation; and
obtaining the at least one status data based on the identification information of the target security device, the first correspondence and the second correspondence,
the first corresponding relation comprises corresponding relations between identification information of a plurality of safety devices and areas where the plurality of safety devices are located, and the second corresponding relation comprises corresponding relations between identification information of a plurality of mobile devices and areas where the plurality of mobile devices are located.
3. The method of claim 2, wherein the obtaining the at least one status data based on the identification information of the target security device, the first correspondence, and the second correspondence comprises:
determining the target area based on the identification information of the target security device and the first corresponding relationship;
determining identification information of at least one mobile device in the target area based on the target area and the second corresponding relation; and
and acquiring the state data of the at least one mobile device based on the identification information of the at least one mobile device.
4. The method of claim 3, wherein:
the method further comprises the following steps:
transmitting the activation status of the target security appliance to the at least one mobile device;
receiving first feedback information generated by the at least one mobile device in response to the starting state of the target security apparatus, wherein the first feedback information comprises state data of the at least one mobile device; and
storing the identification information of the at least one mobile device and the state data of the at least one mobile device in an associated manner to obtain a storage result;
wherein the obtaining of the status data of the at least one mobile device based on the identification information of the at least one mobile device comprises: and acquiring the state data of the at least one mobile device from the storage result based on the identification information of the at least one mobile device.
5. The method of claim 4, wherein the determining a current motion state of each of the at least one mobile device based on at least one state data comprises:
determining, based on the at least one state data, whether the at least one mobile device includes a target mobile device whose current motion state is a continuous motion state;
in response to determining that the at least one mobile device includes a target mobile device having a current motion state that is a continuous motion state, sending an activation state of the target security apparatus to the target mobile device;
receiving second feedback information generated by the target mobile equipment in response to the starting state of the target safety device, wherein the second feedback information comprises state data of the target mobile equipment; and
and updating the state data of the target mobile equipment in the storage result based on the second feedback information.
6. The method of claim 2 or 3, further comprising: updating the second corresponding relation; wherein the updating the second correspondence comprises:
receiving location information of the plurality of mobile devices, wherein the location information characterizes current locations of the plurality of mobile devices; and
updating the area in the second corresponding relationship where the plurality of mobile devices are located based on the location information.
7. The method of claim 1, wherein the controlling the target security appliance to turn on to allow access to the target area in response to determining that the current motion state of each of the at least one mobile device is a stopped motion state comprises:
in response to determining that the current motion state of each of the at least one mobile device is a stopped motion state, sending a start instruction to the target security appliance,
wherein the opening instruction is used for instructing the target security device to send notification information to a functional device and instructing the target security device to open to form an opening so as to access the target area through the opening,
wherein the function device is configured to provide motion energy to the at least one mobile device, and the notification information is used for instructing the function device to stop providing motion energy to the at least one mobile device.
8. A control system for a safety device, comprising:
the device comprises a first receiving module, a second receiving module and a third receiving module, wherein the first receiving module receives an opening request aiming at a target safety device, the target safety device is located in a target area and comprises at least one mobile device, each mobile device in the at least one mobile device is provided with state data, and the state data represents the current motion state of the mobile device corresponding to the state data;
an obtaining module, configured to obtain status data of each mobile device of the at least one mobile device in response to the start request;
a determination module that determines a current motion state of each of the at least one mobile device based on at least one state data; and
and the control module is used for controlling the target safety device to be started to allow the target area to be accessed in response to the fact that the current motion state of each mobile device in the at least one mobile device is determined to be the motion stop state.
9. A computing device, comprising:
one or more processors;
a memory for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-7.
10. A computer-readable storage medium storing computer-executable instructions for implementing the method of any one of claims 1 to 7 when executed.
CN202010434275.1A 2020-05-21 2020-05-21 Control method, system, computing device and medium for safety device Active CN113703345B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010434275.1A CN113703345B (en) 2020-05-21 2020-05-21 Control method, system, computing device and medium for safety device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010434275.1A CN113703345B (en) 2020-05-21 2020-05-21 Control method, system, computing device and medium for safety device

Publications (2)

Publication Number Publication Date
CN113703345A true CN113703345A (en) 2021-11-26
CN113703345B CN113703345B (en) 2023-06-02

Family

ID=78645760

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010434275.1A Active CN113703345B (en) 2020-05-21 2020-05-21 Control method, system, computing device and medium for safety device

Country Status (1)

Country Link
CN (1) CN113703345B (en)

Citations (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH02132009U (en) * 1989-04-05 1990-11-02
JPH0725408A (en) * 1993-07-09 1995-01-27 Mazda Motor Corp Automatic warehouse
JPH09315517A (en) * 1996-06-04 1997-12-09 Daifuku Co Ltd Automated warehouse
JP2003146408A (en) * 2001-11-15 2003-05-21 Kito Corp Operation control method and operation control system for stacker crane in automated storage and retrieval warehouse
JP2004046465A (en) * 2002-07-11 2004-02-12 Daifuku Co Ltd Facility for article conveyance
JP2004133530A (en) * 2002-10-08 2004-04-30 Omron Corp Gate system, information acquisition method using the same, and information provision system and method for providing information by use of the same
JP2004265163A (en) * 2003-03-03 2004-09-24 Renesas Technology Corp Safety system for automatic production facilities
JP2006043042A (en) * 2004-08-03 2006-02-16 Kagashiya:Kk Home delivery package receiving method
CN103302658A (en) * 2012-03-16 2013-09-18 株式会社安川电机 Robot system
CN204347464U (en) * 2014-11-28 2015-05-20 天奇自动化工程股份有限公司 Pipeline safety control system
US20160016313A1 (en) * 2014-07-17 2016-01-21 Fanuc Corporation Robot control system having stop function
CN205294096U (en) * 2016-01-22 2016-06-08 安徽江淮汽车股份有限公司 Conveying device
CN106204187A (en) * 2016-04-26 2016-12-07 龙璠 A kind of non-fixation lease operation management method based on technology of Internet of things and system
US20170057088A1 (en) * 2015-08-31 2017-03-02 Fanuc Corporation Robot system using a vision sensor
US20170100838A1 (en) * 2015-10-12 2017-04-13 The Boeing Company Dynamic Automation Work Zone Safety System
US20170157783A1 (en) * 2015-10-28 2017-06-08 Denso Wave Incorporated Method and system for controlling robot
CN108027617A (en) * 2016-02-02 2018-05-11 株式会社日立制作所 Handling system
CN108319152A (en) * 2018-02-11 2018-07-24 上海奥宜电子科技有限公司 A kind of smart machine control method and system based on LBS location-based services
CN108351068A (en) * 2015-10-13 2018-07-31 法比奥·泼尼股份公司 For controlling the control system close to process unit
CN108389455A (en) * 2018-01-31 2018-08-10 南京理工大学 A kind of machine security protection virtual reality tutoring system
CN108453790A (en) * 2018-03-27 2018-08-28 成都锐升科技有限责任公司 A kind of Automation workstation and the method for controlling the Automation workstation
WO2019080996A1 (en) * 2017-10-24 2019-05-02 Abb Schweiz Ag Method for supervising a working area, robot system and control system
US20190172284A1 (en) * 2017-12-05 2019-06-06 Savioke Inc. Apparatus, System, and Method for Secure Robot Access
CN110065910A (en) * 2019-03-15 2019-07-30 北京旷视机器人技术有限公司 Dispatch the method, apparatus and warehousing system of transporting equipment in warehouse

Patent Citations (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH02132009U (en) * 1989-04-05 1990-11-02
JPH0725408A (en) * 1993-07-09 1995-01-27 Mazda Motor Corp Automatic warehouse
JPH09315517A (en) * 1996-06-04 1997-12-09 Daifuku Co Ltd Automated warehouse
JP2003146408A (en) * 2001-11-15 2003-05-21 Kito Corp Operation control method and operation control system for stacker crane in automated storage and retrieval warehouse
JP2004046465A (en) * 2002-07-11 2004-02-12 Daifuku Co Ltd Facility for article conveyance
JP2004133530A (en) * 2002-10-08 2004-04-30 Omron Corp Gate system, information acquisition method using the same, and information provision system and method for providing information by use of the same
JP2004265163A (en) * 2003-03-03 2004-09-24 Renesas Technology Corp Safety system for automatic production facilities
JP2006043042A (en) * 2004-08-03 2006-02-16 Kagashiya:Kk Home delivery package receiving method
CN103302658A (en) * 2012-03-16 2013-09-18 株式会社安川电机 Robot system
US20160016313A1 (en) * 2014-07-17 2016-01-21 Fanuc Corporation Robot control system having stop function
CN204347464U (en) * 2014-11-28 2015-05-20 天奇自动化工程股份有限公司 Pipeline safety control system
US20170057088A1 (en) * 2015-08-31 2017-03-02 Fanuc Corporation Robot system using a vision sensor
US20170100838A1 (en) * 2015-10-12 2017-04-13 The Boeing Company Dynamic Automation Work Zone Safety System
CN108351068A (en) * 2015-10-13 2018-07-31 法比奥·泼尼股份公司 For controlling the control system close to process unit
US20170157783A1 (en) * 2015-10-28 2017-06-08 Denso Wave Incorporated Method and system for controlling robot
CN205294096U (en) * 2016-01-22 2016-06-08 安徽江淮汽车股份有限公司 Conveying device
CN108027617A (en) * 2016-02-02 2018-05-11 株式会社日立制作所 Handling system
CN106204187A (en) * 2016-04-26 2016-12-07 龙璠 A kind of non-fixation lease operation management method based on technology of Internet of things and system
WO2019080996A1 (en) * 2017-10-24 2019-05-02 Abb Schweiz Ag Method for supervising a working area, robot system and control system
US20190172284A1 (en) * 2017-12-05 2019-06-06 Savioke Inc. Apparatus, System, and Method for Secure Robot Access
CN108389455A (en) * 2018-01-31 2018-08-10 南京理工大学 A kind of machine security protection virtual reality tutoring system
CN108319152A (en) * 2018-02-11 2018-07-24 上海奥宜电子科技有限公司 A kind of smart machine control method and system based on LBS location-based services
CN108453790A (en) * 2018-03-27 2018-08-28 成都锐升科技有限责任公司 A kind of Automation workstation and the method for controlling the Automation workstation
CN110065910A (en) * 2019-03-15 2019-07-30 北京旷视机器人技术有限公司 Dispatch the method, apparatus and warehousing system of transporting equipment in warehouse

Also Published As

Publication number Publication date
CN113703345B (en) 2023-06-02

Similar Documents

Publication Publication Date Title
US20230011677A1 (en) Autonomous driving control system and control method and device
US20220315021A1 (en) Autonomous driving control system and control method and device
US11708072B2 (en) System, method and device for planning driving path for vehicle
CN112577510A (en) Method, device, equipment and storage medium for displaying information applied to vehicle
CN110580020A (en) AGV (automatic guided vehicle) scheduling method and device, computer equipment and storage medium
US20210039917A1 (en) Elevator control
CN112071110A (en) Autonomous parking method, apparatus, system, computer device and storage medium
WO2020210933A1 (en) Alarm control method and device for self-driving vehicle, and self-driving vehicle
US20240070578A1 (en) Engineering facility scheduling method and system, and engineering facility
US20060271918A1 (en) Software process monitor
EP3865360A1 (en) Parking control method and apparatus, and vehicle
US20230081787A1 (en) Method for a Supercomputer to Mitigate Traffic Collisions with 5G or 6G
CN113703345A (en) Control method, system, computing device and medium for security device
CN114228791A (en) Method and device for upgrading remote RM after remote restart of full-automatic operation train
KR102298309B1 (en) Worker Safety Monitoring System in Shadow Area and Method thereof
CN116663829A (en) Robot operation control method, device and equipment
CN111290872A (en) Application program and exception handling method for application program
KR102544350B1 (en) System and method for managing cargo storing and rehandling processes using artificial intellegience
US11853153B2 (en) Multi-thread exit method and mobile terminal
JP2008546077A (en) Software process monitor
CN114261338A (en) Vehicle detection method and device and automatic driving vehicle
CN113611045A (en) Helmet use control method of electric bicycle and electric bicycle
JP2021111144A (en) Information processing device
CN112801600A (en) Method and device for generating route track, readable storage medium and electronic equipment
CN117278596B (en) Vehicle station locking interaction method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant