CN104537467A - Monitoring method and device used for safety monitoring system - Google Patents

Monitoring method and device used for safety monitoring system Download PDF

Info

Publication number
CN104537467A
CN104537467A CN201410770648.7A CN201410770648A CN104537467A CN 104537467 A CN104537467 A CN 104537467A CN 201410770648 A CN201410770648 A CN 201410770648A CN 104537467 A CN104537467 A CN 104537467A
Authority
CN
China
Prior art keywords
security tool
information
tool
state
label
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410770648.7A
Other languages
Chinese (zh)
Inventor
罗立东
张文
王广林
王波
张志刚
赵俊生
王颢
李旭
吴刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Beijing Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Beijing Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Beijing Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201410770648.7A priority Critical patent/CN104537467A/en
Publication of CN104537467A publication Critical patent/CN104537467A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Educational Administration (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Game Theory and Decision Science (AREA)
  • Development Economics (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The invention discloses a monitoring method and device used for a safety monitoring system. The method includes the steps of identifying a label on a safety tool, and reading identity identifying information, carried in the label, of the safety tool; determining tool information of the safety tool according to the identity identifying information; judging the safety detection state and the use state of the safety tool according to the tool information of the safety tool; generating prompting information corresponding to the safety detection state and the use state according to the safety detection state and the use state. By means of the monitoring method and device, the problem that as in the prior art, a monitoring management means for the safety tool lacks real-time monitoring on the safety tool, the potential safety hazards of the safety tool in electric production can not be found in time is solved.

Description

For method for supervising and the device of safety monitoring system
Technical field
The present invention relates to electric power safety management domain, in particular to a kind of method for supervising for safety monitoring system and device.
Background technology
At present, electric power safety instrument supervision and management, mainly based on labor management, is aided with preliminary computer information management, thus can not potential safety hazard in Timeliness coverage electrical production.The requirement based on prevention and monitoring in real time in electric power safety supervision and management can not have been met in modern enterprise with manual oversight and the electric power safety supervision and management that is summarized as basic means afterwards.
Current security tool ladder of management, mainly relies on instrument is delivered to control laboratory testing of artificial cycle.On instrument, stick the conformity certification of adhesive sticker material after inspection, the instrument after sticking conformity certification is returned and uses again.
Existing adhesive sticker instrument conformity certification label does not possess uniqueness, easily comes off, and alters, and loses.Even if some instrument is defective like this, also conformity certification label may be posted.Make whether the conformity certification cannot determining instrument when routine use is legal conjunction rule like this, thus bring certain potential safety hazard to safety in production.
Lack the Real-Time Monitoring to security tool in prior art to the monitoring management means of security tool, what cause can not the problem of the potential safety hazard of security tool in Timeliness coverage electrical production, not yet proposes effective solution at present.
Summary of the invention
Fundamental purpose of the present invention is to provide a kind of method for supervising for safety monitoring system and device, lack the Real-Time Monitoring to security tool to solve in prior art to the monitoring management means of security tool, what cause can not the problem of the potential safety hazard of security tool in Timeliness coverage electrical production.
To achieve these goals, according to an aspect of the embodiment of the present invention, a kind of method for supervising for safety monitoring system is provided.The method comprises: identify the label on security tool, the identity identification information of the security tool carried in reading tag; According to identity identification information, determine the tool information of security tool; According to the tool information of security tool, judge safety verification state and the using state of security tool; According to safety verification state and using state, generate the information corresponding with using state to safety verification state.
To achieve these goals, according to the another aspect of the embodiment of the present invention, provide a kind of supervising device for safety monitoring system, this device comprises: read module, for identifying the label on security tool, the identity identification information of the security tool carried in reading tag; First determination module, for according to identity identification information, determines the tool information of security tool; Judge module, for the tool information according to security tool, judges safety verification state and the using state of security tool; First generation module, for according to safety verification state and using state, generates the information corresponding with using state to safety verification state.
According to inventive embodiments, by identifying the label on security tool, the identity identification information of the security tool carried in reading tag; According to identity identification information, determine the tool information of security tool; According to the tool information of security tool, judge safety verification state and the using state of security tool; According to safety verification state and using state, generate the information corresponding with using state to safety verification state, solve prior art and lack Real-Time Monitoring to security tool to the monitoring management means of security tool, what cause can not the problem of the potential safety hazard of security tool in Timeliness coverage electrical production.Achieve the safety verification state to security tool and the unified effect of carrying out Real-Time Monitoring of using state.
Accompanying drawing explanation
The accompanying drawing forming a application's part is used to provide a further understanding of the present invention, and schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the process flow diagram of the method for supervising for safety monitoring system according to the embodiment of the present invention one;
Fig. 2 is the structural representation of the supervising device for safety monitoring system according to the embodiment of the present invention two;
Fig. 3 is preferably for the structural representation of the supervising device of safety monitoring system according to the embodiment of the present invention two;
Fig. 4 is preferably for the structural representation of the supervising device of safety monitoring system according to the embodiment of the present invention two; And
Fig. 5 is preferably for the structural representation of the supervising device of safety monitoring system according to the embodiment of the present invention two.
Embodiment
It should be noted that, when not conflicting, the embodiment in the application and the feature in embodiment can combine mutually.Below with reference to the accompanying drawings and describe the present invention in detail in conjunction with the embodiments.
The present invention program is understood better in order to make those skilled in the art person, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the embodiment of a part of the present invention, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, should belong to the scope of protection of the invention.
It should be noted that, term " first ", " second " etc. in instructions of the present invention and claims and above-mentioned accompanying drawing are for distinguishing similar object, and need not be used for describing specific order or precedence.Should be appreciated that the data used like this can be exchanged, in the appropriate case so that embodiments of the invention described herein.In addition, term " comprises " and " having " and their any distortion, intention is to cover not exclusive comprising, such as, contain those steps or unit that the process of series of steps or unit, method, system, product or equipment is not necessarily limited to clearly list, but can comprise clearly do not list or for intrinsic other step of these processes, method, product or equipment or unit.
Embodiment 1
Embodiments provide a kind of method for supervising for safety monitoring system.
Fig. 1 is the process flow diagram of the method for supervising for safety monitoring system according to the embodiment of the present invention.As shown in Figure 1, it is as follows that the method comprising the steps of:
Step S11, identifies the label on security tool, the identity identification information of the security tool carried in reading tag.
Concrete, above-mentioned steps S11, by identifying the label be pasted on security tool, thus obtains the identity identification information corresponding with security tool.
In actual applications, label can have a variety of, such as: two-dimension code label, and RFID label tag, graphical label etc.Label for indicating security tool, thus by unique identity identification information of label determination security tool.
Step S13, according to identity identification information, determines the tool information of security tool.
Concrete, by above-mentioned steps S13, using identity identification information as querying condition, determine the tool information corresponding with the identity identification information of security tool.In tool information, at least can embody safety verification information, equipment uses this two large category information of information.Wherein safety verification information comprises: last proving time, next time proving time, access times, maximum access times, safe service life, first service time.And the equipment information of using can comprise: finally receive the time, finally use duration, borrower's information.
Step S15, according to the tool information of security tool, judges safety verification state and the using state of security tool.
Concrete, above-mentioned steps S15, by the safety verification information recorded in the tool information of security tool, the safety verification state of security tool is judged, meanwhile, use information by the equipment in the tool information of security tool, the using state of security tool is judged.Wherein, described safety verification state at least comprises: scrap, etc. to be tested, normal, described using state at least comprises: idle, lend, exceed the time limit not give back.
Step S17, according to safety verification state and using state, generates the information corresponding with using state to safety verification state.
Concrete, by above-mentioned steps S17, the safety verification state current to security tool and using state identify, according to various state, send the information corresponding to state.
In the middle of practical application, when the using state recorded in security tool is for time idle, if detect safety verification state for scrap or etc. to be tested time, directly can generate warning prompt information, thus safety instruction is carried out to managerial personnel.
Above-mentioned steps S11, to step S17, security tool arranges label, by identifying label, obtains the tool information of security tool.By the monitor and managment to the various status informations in tool information, realize the applying to purchase of security tool, receive, preserve, test, use, give back, until scrap this complete life cycle to carry out intelligentized standardized administration.Wherein, safety monitoring system comprises and is fixed on the label on security tool and the application terminal for identification label.
In summary, the invention solves in prior art and the Real-Time Monitoring to security tool is lacked to the monitoring management means of security tool, what cause can not the problem of the potential safety hazard of security tool in Timeliness coverage electrical production, achieves the safety verification state to security tool and the unified effect of carrying out Real-Time Monitoring of using state.
Preferably, in the above embodiments of the present application, when label is RFID label tag, identify the label on security tool in step S11, in the identity identification information of the security tool carried in reading tag, step can comprise:
Step S111, is scanned the RFID label tag be positioned on security tool, obtains the electronic code of RFID label tag by radio-frequency antenna.
Step S113, according to the electronic code of RFID label tag, coupling obtains the identity identification information of security tool.
Concrete, when label is RFID label tag, above-mentioned steps S111, to step S113, by scanning the RFID label tag on security tool for the application terminal of identification label, thus obtains the electronic code of RFID label tag.By the electronic code of RFID label tag, inquire about the identity identification information of the security tool corresponding with this electronic code.Wherein, the electronic code of each RFID label tag is unique, and, each RFID label tag and security tool one_to_one corresponding.Application terminal for identification label can be hand-held mobile intelligent terminal, also can be desktop computer.
Preferably, in the above embodiments of the present application, identify the label on security tool in step S11, before the identity identification information of the security tool carried in reading tag, method also comprises:
Step S101, is input to information database by electronic code corresponding with security tool for the instrument product category information of security tool.
Step S103, according to the instrument product category information of security tool, is that the security tool corresponding with RFID label tag adds tool information in information database.
Concrete, by above-mentioned steps S101 to step S103, in information database, typing is carried out to the electronic code of the product category information of security tool and RFID label tag fixing on security tool.And according to the instrument product category information of security tool, for security tool corresponding with this RFID label tag in information database adds tool information.
In the middle of practical application, different instrument categories correspond to the tool informations such as different maintenance periods and maximum service life.By being the tool information that security tool adds when typing, thus determine safety verification state and the using state of security tool.
Further, deposit position information can also be added in tool information, by deposit position information, record be carried out to the deposit position of the security tool of each middle instrument category, thus make the position of managerial personnel's quick position security tool, improve the high efficiency of asset management.
Preferably, in the above embodiments of the present application, in step 17 according to safety verification state and using state, after generating the information corresponding with using state to safety verification state, method can also comprise:
Step S181, by the instrument product category information of security tool, determines the quantity of the security tool that often kind of instrument category is corresponding.
Step S183, compares with the amount threshold preset respectively by the quantity of security tool corresponding for often kind of instrument category.
Step S185, when the quantity of security tool corresponding to any one instrument category is less than or equal to amount threshold, generates the instrument category shopping list that this instrument category is corresponding.
Concrete, by above-mentioned steps S181 to step S185, in information database, in each instrument category, remaining number of tools calculates.In real time the quantity of security tool corresponding to often kind of instrument category is monitored.When the quantity of security tool corresponding to any one instrument category is less than or equal to the amount threshold pre-set, system is determined to need the security tool corresponding to this instrument category to purchase, therefore system will generate instrument category shopping list corresponding to the security tool corresponding with this instrument category automatically.
Preferably, in the above embodiments of the present application, in step S17 according to safety verification state and using state, after generating the information corresponding with using state to safety verification state, method can also comprise:
Step S19, is sent to subscriber equipment by information, wherein, send mode at least comprise following any one: Email transmission, short message sending, call voice report.
Concrete, by above-mentioned steps S19, by the information generated according to safety verification state and using state, be sent in the middle of subscriber equipment.
In the middle of practical application, according to the difference of information kind, can be sent in the middle of corresponding subscriber equipment.When be aimed in safety verification state scrap or etc. the information of generation to be tested time, in the middle of the equipment that information can be sent to managerial personnel; When be aimed in using state exceed the time limit the information of not giving back generation time, in the middle of the equipment that information can be sent to respectively managerial personnel and security tool user.
Preferably, in the above embodiments of the present application, RFID label tag by: link, RFID label tag layer and printed layers are formed.
Concrete, RFID label tag layer is soft RFIDnt ultra-high frequency label, is embedded into link inside, and when link damages, RFID label tag layer also can damage simultaneously, causes RFID label tag to lose efficacy, thus the object reaching false proof and indicate.And printed layers can be surperficial treated rough surface, directly word content is printed on this surface.Printed layers also can be paste the adhesive sticker paster in just face.To be firmly attached on surface by pasting adhesive sticker, but in daily use, to pay particular attention to and preventing adhesive sticker chronological aging and come off or passively due to frequent contact to come off in life cycle.Solve the false proof of label, slip-off preventing, original label Problems existing such as side's correction.
Preferably, in the above embodiments of the present application, link is adhesive linkage and/or band.
Concrete, the surface that link can be fixed as required and select different links.Link can be adhesive linkage, also can be band, jointly can also be made up of adhesive linkage and band.
Wherein, tack coat be use a kind of can the binding material of sticking rubber and silica gel, thus making label when being bonded on insulating glove, effectively can adhere to and can not naturally come off.Simultaneously for RFID label tag layer is played a supporting role, make RFID label tag once can resist low intensive craft and deliberately tear.
Band is toothed banded structure, and one end of band is furnished with the bundle hole of mating with the band other end, pricks hole and can only make band but want to pass through.When band is through when pricking hole, band can be normal through, thus be fastened on by label on the shaft-like Work tool such as test pencil, facilitates easy-to-use.And indicate once be fixed by band, except non-demolition label band, otherwise label cannot be taken off, thus prevent label repeatedly to use.
Above-mentioned RFID label tag is not easily forged because of pole, and the cost forging label is much higher than the benefit of forging gained.So, while convenient management, also serve false proof effect.
In the middle of practical application, said method adopts RFID smart electronics identification technology, the advanced technologies such as all right combined with intelligent management platform, data, services, infrared induction, realize the monitor and managment to electric power safety instrument Life cycle, specific to the applying to purchase of Work tool, receive, preserve, test, use, give back, until scrap whole life cycle to carry out intelligentized standardized administration, with these product platforms for relying on, build perfect intelligent management system.
Safety monitoring system merges multiple industrial information product and technical management method, fully realizes the rational allocation of tissue, management, technology three individual system, conscientiously can meet electric power safety tool crib for industry requirements such as security, high efficiency and reliabilities.Native system is a kind of major transformation for conventional electric power storehouse management mode, and it will disperse in diverse location, different assets and the tool information of magnanimity carries out normal form, gathers, filters and association analysis, forms the intelligent management based on assets, and audits.
Said method, while at utmost avoiding artificial participation, improves the use safety coefficient of managing security tools and instruments, saves cost of human resources.
Said method can be reminded the safety verification of security tool and the access times of programming count Work tool and service time automatically.
Said method can also generate procurement plan, employee's Operation Log automatically, management performance, automatically registers out warehouse-in record.
Said method can use recall to security tool, avoids losing, and further by entrance guard management, ensures the standardization of employee's operation.And audio alert prompting is carried out to risky operation.
Embodiment 2
The embodiment of the present invention additionally provides a kind of supervising device for safety monitoring system, and as shown in Figure 2, this device can comprise: read module 21, first determination module 23, judge module 25 and the first generation module 27.
Wherein, read module 21, for identifying the label on security tool, the identity identification information of the security tool carried in reading tag.
Concrete, above-mentioned read module 21, by identifying the label be pasted on security tool, thus obtains the identity identification information corresponding with security tool.
In actual applications, label can have a variety of, such as: two-dimension code label, and RFID label tag, graphical label etc.Label for indicating security tool, thus by unique identity identification information of label determination security tool.
First determination module 23, for according to identity identification information, determines the tool information of security tool.
Concrete, by above-mentioned first determination module 23, using identity identification information as querying condition, determine the tool information corresponding with the identity identification information of security tool.In tool information, at least can embody safety verification information, equipment uses this two large category information of information.Wherein safety verification information comprises: last proving time, next time proving time, access times, maximum access times, safe service life, first service time.And the equipment information of using can comprise: finally receive the time, finally use duration, borrower's information.
Judge module 25, for the tool information according to security tool, judges safety verification state and the using state of security tool.
Concrete, above-mentioned judge module 25, by the safety verification information recorded in the tool information of security tool, the safety verification state of security tool is judged, meanwhile, use information by the equipment in the tool information of security tool, the using state of security tool is judged.Wherein, described safety verification state at least comprises: scrap, etc. to be tested, normal, described using state at least comprises: idle, lend, exceed the time limit not give back.
First generation module 27, for according to safety verification state and using state, generates the information corresponding with using state to safety verification state.
Concrete, by above-mentioned first generation module 27, the safety verification state current to security tool and using state identify, according to various state, send the information corresponding to state.
In the middle of practical application, when the using state recorded in security tool is for time idle, if detect safety verification state for scrap or etc. to be tested time, directly can generate warning prompt information, thus safety instruction is carried out to managerial personnel.
Above-mentioned read module 21, first determination module 23, judge module 25 and the first generation module 27, security tool arranges label, by identifying label, obtains the tool information of security tool.By the monitor and managment to the various status informations in tool information, realize the applying to purchase of security tool, receive, preserve, test, use, give back, until scrap this complete life cycle to carry out intelligentized standardized administration.Wherein, safety monitoring system comprises and is fixed on the label on security tool and the application terminal for identification label.
In summary, the invention solves in prior art and the Real-Time Monitoring to security tool is lacked to the monitoring management means of security tool, what cause can not the problem of the potential safety hazard of security tool in Timeliness coverage electrical production, achieves the safety verification state to security tool and the unified effect of carrying out Real-Time Monitoring of using state.
Preferably, in the above embodiments of the present application, when label is RFID label tag, read module comprises 21: sub-scan module 211 and sub-matching module 213.
Wherein, sub-scan module 211, for being scanned the RFID label tag be positioned on security tool by radio-frequency antenna, obtains the electronic code of RFID label tag.
Sub-matching module 213, for the electronic code according to RFID label tag, coupling obtains the identity identification information of security tool.
Concrete, when label is RFID label tag, above-mentioned sub-scan module 211 and sub-matching module 213, by scanning the RFID label tag on security tool for the application terminal of identification label, thus obtain the electronic code of RFID label tag.By the electronic code of RFID label tag, inquire about the identity identification information of the security tool corresponding with this electronic code.Wherein, the electronic code of each RFID label tag is unique, and, each RFID label tag and security tool one_to_one corresponding.Application terminal for identification label can be hand-held mobile intelligent terminal, also can be desktop computer.
Preferably, in the above embodiments of the present application, as shown in Figure 3, device also comprises: typing module 201 and interpolation module 203.
Wherein, typing module 201, the electronic code corresponding with security tool for the instrument product category information by security tool is input to information database.
Add module 203, for the instrument product category information according to security tool, be that the security tool corresponding with RFID label tag adds tool information in information database.
Concrete, by above-mentioned typing module 201 and interpolation module 203, in information database, typing is carried out to the electronic code of the product category information of security tool and RFID label tag fixing on security tool.And according to the instrument product category information of security tool, for security tool corresponding with this RFID label tag in information database adds tool information.
In the middle of practical application, different instrument categories correspond to the tool informations such as different maintenance periods and maximum service life.By being the tool information that security tool adds when typing, thus determine safety verification state and the using state of security tool.
Further, deposit position information can also be added in tool information, by deposit position information, record be carried out to the deposit position of the security tool of each middle instrument category, thus make the position of managerial personnel's quick position security tool, improve the high efficiency of asset management.
Preferably, in the above embodiments of the present application, as shown in Figure 4, device also comprises: the second determination module 281, processing module 283 and the second generation module 285.
Wherein, the second determination module 281, for by the instrument product category information of security tool, determines the quantity of the security tool that often kind of instrument category is corresponding.
Processing module 283, for comparing the quantity of security tool corresponding for often kind of instrument category with the amount threshold preset respectively.
Second generation module 285, for when the quantity of security tool corresponding to any one instrument category is less than or equal to amount threshold, generates the instrument category shopping list that this instrument category is corresponding.
Concrete, by above-mentioned second determination module 281, processing module 283 and the second generation module 285, in information database, in each instrument category, remaining number of tools calculates.In real time the quantity of security tool corresponding to often kind of instrument category is monitored.When the quantity of security tool corresponding to any one instrument category is less than or equal to the amount threshold pre-set, system is determined to need the security tool corresponding to this instrument category to purchase, therefore system will generate instrument category shopping list corresponding to the security tool corresponding with this instrument category automatically.
Preferably, in the above embodiments of the present application, as shown in Figure 5, device also comprises: sending module 29.
Wherein, sending module 29, for information is sent to subscriber equipment, wherein, send mode at least comprise following any one: Email transmission, short message sending, call voice report.
Concrete, by above-mentioned sending module 29, by the information generated according to safety verification state and using state, be sent in the middle of subscriber equipment.
In the middle of practical application, according to the difference of information kind, can be sent in the middle of corresponding subscriber equipment.When be aimed in safety verification state scrap or etc. the information of generation to be tested time, in the middle of the equipment that information can be sent to managerial personnel; When be aimed in using state exceed the time limit the information of not giving back generation time, in the middle of the equipment that information can be sent to respectively managerial personnel and security tool user.
It should be noted that, for aforesaid each embodiment of the method, in order to simple description, therefore it is all expressed as a series of combination of actions, but those skilled in the art should know, the present invention is not by the restriction of described sequence of movement, because according to the present invention, some step can adopt other orders or carry out simultaneously.Secondly, those skilled in the art also should know, the embodiment described in instructions all belongs to preferred embodiment, and involved action and module might not be that the present invention is necessary.
In the above-described embodiments, the description of each embodiment is all emphasized particularly on different fields, in certain embodiment, there is no the part described in detail, can see the associated description of other embodiments.
In several embodiments that the application provides, should be understood that, disclosed device, the mode by other realizes.Such as, device embodiment described above is only schematic, the such as division of described unit, be only a kind of logic function to divide, actual can have other dividing mode when realizing, such as multiple unit or assembly can in conjunction with or another system can be integrated into, or some features can be ignored, or do not perform.Another point, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces, and the indirect coupling of device or unit or communication connection can be electrical or other form.
The described unit illustrated as separating component or can may not be and physically separates, and the parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of unit wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, also can be that the independent physics of unit exists, also can two or more unit in a unit integrated.Above-mentioned integrated unit both can adopt the form of hardware to realize, and the form of SFU software functional unit also can be adopted to realize.
If described integrated unit using the form of SFU software functional unit realize and as independently production marketing or use time, can be stored in a computer read/write memory medium.Based on such understanding, the part that technical scheme of the present invention contributes to prior art in essence in other words or all or part of of this technical scheme can embody with the form of software product, this computer software product is stored in a storage medium, comprises all or part of step of some instructions in order to make a computer equipment (can be personal computer, mobile terminal, server or the network equipment etc.) perform method described in each embodiment of the present invention.And aforesaid storage medium comprises: USB flash disk, ROM (read-only memory) (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), portable hard drive, magnetic disc or CD etc. various can be program code stored medium.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (12)

1. for a method for supervising for safety monitoring system, it is characterized in that, described safety monitoring system comprises and is fixed on the label on security tool and the application terminal for identifying described label, and wherein, described method comprises:
Identify the label on described security tool, read in described label the identity identification information of the described security tool carried;
According to described identity identification information, determine the tool information of described security tool;
According to the tool information of described security tool, judge safety verification state and the using state of described security tool;
According to described safety verification state and described using state, generate the information corresponding with described using state to described safety verification state.
2. method according to claim 1, is characterized in that, when described label is RFID label tag, and the label on the described security tool of described identification, the step reading in described label the identity identification information of the described security tool carried comprises:
Scanned the described RFID label tag be positioned on described security tool by radio-frequency antenna, obtain the electronic code of described RFID label tag;
According to the electronic code of described RFID label tag, coupling obtains the identity identification information of described security tool.
3. method according to claim 2, is characterized in that, the label on the described security tool of described identification, and before reading in described label the identity identification information of the described security tool carried, described method also comprises:
Electronic code corresponding with described security tool for the instrument product category information of described security tool is input to information database;
According to the instrument product category information of described security tool, be that the security tool corresponding with described RFID label tag adds tool information in described information database.
4. method according to claim 3, is characterized in that, according to described safety verification state and described using state, after generating the information corresponding with described using state to described safety verification state, described method also comprises:
By the instrument product category information of described security tool, determine the quantity of the security tool that often kind of instrument category is corresponding;
The quantity of security tool corresponding for described often kind of instrument category is compared with the amount threshold preset respectively;
When the quantity of described security tool corresponding to any one instrument category is less than or equal to described amount threshold, generate the instrument category shopping list that this instrument category is corresponding.
5. method according to claim 4, is characterized in that, described according to described safety verification state and described using state, after generating the information corresponding with described using state to described safety verification state, described method also comprises:
Described information is sent to subscriber equipment, wherein, send mode at least comprise following any one: Email transmission, short message sending, call voice report.
6. method as claimed in any of claims 2 to 5, is characterized in that, described RFID label tag by: link, RFID label tag layer and printed layers are formed.
7. method according to claim 6, is characterized in that, described link is adhesive linkage and/or band.
8. for a supervising device for safety monitoring system, it is characterized in that, described safety monitoring system comprises and is fixed on the label on security tool and the application terminal for identifying described label, and wherein, described device comprises:
Read module, for identifying the label on described security tool, reads in described label the identity identification information of the described security tool carried;
First determination module, for according to described identity identification information, determines the tool information of described security tool;
Judge module, for the tool information according to described security tool, judges safety verification state and the using state of described security tool;
First generation module, for according to described safety verification state and described using state, generates the information corresponding with described using state to described safety verification state.
9. device according to claim 8, is characterized in that, when described label is RFID label tag, described read module comprises:
Sub-scan module, for being scanned the described RFID label tag be positioned on described security tool by radio-frequency antenna, obtains the electronic code of described RFID label tag;
Sub-matching module, for the electronic code according to described RFID label tag, coupling obtains the identity identification information of described security tool.
10. device according to claim 9, is characterized in that, described device also comprises:
Typing module, the electronic code corresponding with described security tool for the instrument product category information by described security tool is input to information database;
Add module, for the instrument product category information according to described security tool, be that the security tool corresponding with described RFID label tag adds tool information in described information database.
11. devices according to claim 10, is characterized in that, described device also comprises:
Second determination module, for by the instrument product category information of described security tool, determines the quantity of the security tool that often kind of instrument category is corresponding;
Processing module, for comparing the quantity of security tool corresponding for described often kind of instrument category with the amount threshold preset respectively;
Second generation module, for when the quantity of described security tool corresponding to any one instrument category is less than or equal to described amount threshold, generates the instrument category shopping list that this instrument category is corresponding.
12. devices according to claim 11, is characterized in that, described device also comprises:
Sending module, for described information is sent to subscriber equipment, wherein, send mode at least comprise following any one: Email transmission, short message sending, call voice report.
CN201410770648.7A 2014-12-11 2014-12-11 Monitoring method and device used for safety monitoring system Pending CN104537467A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410770648.7A CN104537467A (en) 2014-12-11 2014-12-11 Monitoring method and device used for safety monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410770648.7A CN104537467A (en) 2014-12-11 2014-12-11 Monitoring method and device used for safety monitoring system

Publications (1)

Publication Number Publication Date
CN104537467A true CN104537467A (en) 2015-04-22

Family

ID=52852986

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410770648.7A Pending CN104537467A (en) 2014-12-11 2014-12-11 Monitoring method and device used for safety monitoring system

Country Status (1)

Country Link
CN (1) CN104537467A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108924208A (en) * 2018-06-27 2018-11-30 中山安信通机器人制造有限公司 On-vehicle safety tool monitoring system and monitoring method
CN110135538A (en) * 2019-05-20 2019-08-16 云南电网有限责任公司带电作业分公司 The full life store management method of live working tools and its system based on RFID

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101692587A (en) * 2009-09-09 2010-04-07 重庆大学 System and method thereof for online monitoring and managing security tools and instruments of transformer substation
CN102201088A (en) * 2011-05-25 2011-09-28 重庆市电力公司永川供电局 Method and system for managing dynamic information of power grid asset
CN104166891A (en) * 2014-06-06 2014-11-26 国家电网公司 Double-RFID label-controlled power grid information asset management system and implementation method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101692587A (en) * 2009-09-09 2010-04-07 重庆大学 System and method thereof for online monitoring and managing security tools and instruments of transformer substation
CN102201088A (en) * 2011-05-25 2011-09-28 重庆市电力公司永川供电局 Method and system for managing dynamic information of power grid asset
CN104166891A (en) * 2014-06-06 2014-11-26 国家电网公司 Double-RFID label-controlled power grid information asset management system and implementation method thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108924208A (en) * 2018-06-27 2018-11-30 中山安信通机器人制造有限公司 On-vehicle safety tool monitoring system and monitoring method
CN110135538A (en) * 2019-05-20 2019-08-16 云南电网有限责任公司带电作业分公司 The full life store management method of live working tools and its system based on RFID

Similar Documents

Publication Publication Date Title
CN104125062B (en) Login method and device, login authentication device, server, terminal and system
CN107797919A (en) The method and computing device of a kind of automatic test
CN103533392B (en) A kind of account login method, electronic equipment and system
CN107516510A (en) A kind of smart machine automated voice method of testing and device
AU2003292527A1 (en) Quality of service monitoring architecture, related method, network and computer program product
CN108182479A (en) Equipment point-detecting method, device and server
CN108133332A (en) The method, apparatus and server that a kind of expert extracts
CN104184763A (en) Feedback information processing method and system and service apparatus
CN104184705A (en) Verification method, apparatus, server, user data center and system
CN107341384A (en) A kind of service verification method and system
DE602008003668D1 (en) Dynamic error analysis for a centrally managed network element in a telecommunication system
CN109918279A (en) Electronic device, method and storage medium based on daily record data identification user's abnormal operation
CN106529359A (en) Radio frequency identification label quality detection method and device
CN109462517A (en) A kind of method, system and the equipment of the data monitoring towards digital electric network business
CN104123496A (en) Rogue software interception method, device and terminal
CN112686678A (en) Method, device, equipment and storage medium for determining false order
CN109064104A (en) Material equipment management method, system and terminal device
CN104346410A (en) Method and equipment for monitoring terminal equipment
CN104537467A (en) Monitoring method and device used for safety monitoring system
CN108132454A (en) Electricity consumption monitoring method and device
CN110377502A (en) Function test method, device and terminal device based on script
CN107526580A (en) Terminal applies recognition methods and device
CN113780497A (en) Intelligent identification management system for safety tools
CN108343315A (en) Key management method and terminal device
CN107291514A (en) Method and device for unloading application program and terminal equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150422

RJ01 Rejection of invention patent application after publication