CN109726526B - Equipment authorization condition alarm management device and method for alarming based on equipment authorization condition - Google Patents

Equipment authorization condition alarm management device and method for alarming based on equipment authorization condition Download PDF

Info

Publication number
CN109726526B
CN109726526B CN201811591705.XA CN201811591705A CN109726526B CN 109726526 B CN109726526 B CN 109726526B CN 201811591705 A CN201811591705 A CN 201811591705A CN 109726526 B CN109726526 B CN 109726526B
Authority
CN
China
Prior art keywords
alarm
activation data
rule
information
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811591705.XA
Other languages
Chinese (zh)
Other versions
CN109726526A (en
Inventor
郭凯
徐茂森
侯锦雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sipic Technology Co Ltd
Original Assignee
AI Speech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AI Speech Ltd filed Critical AI Speech Ltd
Priority to CN201811591705.XA priority Critical patent/CN109726526B/en
Publication of CN109726526A publication Critical patent/CN109726526A/en
Application granted granted Critical
Publication of CN109726526B publication Critical patent/CN109726526B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Alarm Systems (AREA)

Abstract

The invention discloses a device for alarming based on the authorization condition of equipment, which comprises: the task execution module is used for acquiring equipment activation data and determining an alarm object according to the equipment activation data and a preset alarm rule; and the alarm module is used for generating alarm information according to the determined alarm object and outputting the alarm information. In addition, the invention also discloses a method for alarming based on the authorization condition of the equipment. According to the method and the device disclosed by the invention, the equipment can be monitored in various modes by setting the alarm rule, so that a salesman can perform early warning on the equipment managed by the salesman in time, the problems of failure and the like of the equipment of a client in the operation process are prevented, the manpower is saved by automatic monitoring and early warning, and the efficiency is greatly improved.

Description

Equipment authorization condition alarm management device and method for alarming based on equipment authorization condition
Technical Field
The invention relates to the technical field of equipment management, in particular to an equipment authorization condition alarm management device and an equipment authorization condition based alarm method.
Background
In the prior art, the intellectualization of equipment is particularly important in various industries with rapid development, generally, the intellectualization of the equipment realizes the functions of the equipment through service software installed on the equipment, and the authorized quantity of the service software is generally agreed through an authorized activation code during trading transaction, but when the activated quantity exceeds the authorized quantity, if the authorized quantity is not increased in time, the use of the service software cannot be increased, so that the activated quantity needs to be monitored in time so as to avoid influencing the service. At present, management of the activation condition of the service software is manually counted and monitored through an excel table, so that efficiency is low, when the number of clients using the service software is large, corresponding clients cannot be timely monitored and notified, and business of the clients is necessarily influenced. Particularly, when the service software is used in a one-to-one matching manner with the hardware device, the production of the client is affected, and production accidents and the like are caused.
Disclosure of Invention
In order to solve the problems, the inventor of the invention can send out warning of the authorized quantity to the service staff by monitoring the activated quantity of the monitoring equipment in real time, and send out early warning when the used authorized quantity exceeds the regulation in time, thereby ensuring that the production process of a client is carried out smoothly.
In a first aspect, an embodiment of the present invention provides an apparatus authorization condition alarm management device, including:
the task execution module is used for acquiring equipment activation data and determining an alarm object according to the equipment activation data and a preset alarm rule;
and the alarm module is used for generating alarm information according to the determined alarm object and outputting the alarm information.
In a second aspect, an embodiment of the present invention provides a method for performing an alarm based on an equipment authorization condition, including: acquiring activation data of equipment, and determining an alarm object according to the activation data and a preset alarm rule; and generating alarm information output according to the determined alarm object.
In a third aspect, an embodiment of the present invention provides an electronic device, including: the system comprises at least one processor and a memory communicatively connected with the at least one processor, wherein the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to perform the steps of the method.
In a fourth aspect, embodiments of the present invention provide a storage medium having a computer program stored thereon, where the computer program is executed by a processor to implement the steps of the above-mentioned method.
The embodiment of the invention has the beneficial effects that: the device authorization condition alarm management device and the device authorization condition alarm management method can monitor the devices in various modes by setting the alarm rules, thereby enabling a salesman to carry out early warning on the managed devices in time, preventing the problems of failure and the like of the devices of clients in the operation process, saving manpower and greatly improving efficiency due to the realization of automatic monitoring and early warning.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic block diagram of an apparatus for alarming based on device authorization in accordance with an embodiment of the present invention;
FIG. 2 is a flowchart of a method for performing an alarm based on a device authorization status according to an embodiment of the present invention;
FIG. 3 is a flowchart of a method for alerting based on device authorization in accordance with another embodiment of the present invention;
fig. 4 is a schematic structural diagram of an embodiment of an electronic device according to an embodiment of the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
As used in this disclosure, "module," "device," "system," and the like are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, or software in execution. In particular, for example, an element may be, but is not limited to being, a process running on a processor, an object, an executable, a thread of execution, a program, and/or a computer. Also, an application or script running on a server, or a server, may be an element. One or more elements may be in a process and/or thread of execution and an element may be localized on one computer and/or distributed between two or more computers and may be operated by various computer-readable media. The elements may also communicate by way of local and/or remote processes based on a signal having one or more data packets, e.g., from a data packet interacting with another element in a local system, distributed system, and/or across a network in the internet with other systems by way of the signal.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Fig. 1 schematically shows a schematic block diagram of an apparatus authorization situation alarm management device according to an embodiment of the present invention. As shown in fig. 1, the device authorization situation alarm management apparatus 1 includes: the system comprises a task execution module 2, an alarm module 3, an alarm rule configuration module 4 and an inquiry module 5.
The task execution module 2 is configured to obtain device activation data, and determine an alarm object according to the device activation data and a preset alarm rule. In practical application, the authorized device is issued with a corresponding activation code, which is unique and used for performing authorized activation on the service software on the device. After successful authorization, the device activation data is uploaded, the activated device may be uploaded through a network, or the activated device may be manually statistically registered in a corresponding database. The task execution module 2 of the embodiment of the present invention obtains the device activation data from the corresponding database or the slave device to determine the alarm object. The acquired device activation data includes certificate information, object type, alarm factor, and the like. The alarm rule is configured by an alarm rule configuration module 4, and the alarm rule configuration module 4 is configured to receive and store alarm rule information, where the alarm rule information includes a certificate name (implemented as a name corresponding to each device), a certificate code (implemented as an activation code corresponding to each device), a certificate type (implemented as an activation code type of each device), an alarm condition (implemented as an alarm number threshold and/or an alarm time threshold), and associated information (implemented as personal information of a service staff corresponding to each device, customer information, a mailbox, a telephone, and the like), and is not limited to the above alarm rule information in practical application. When the authorization condition of the equipment is monitored, the acquired activation data of the equipment and the current alarm rule are matched in the task execution module 2 in real time, if the equipment meeting the alarm rule is matched, a waiter is warned through the alarm module 3, and the implementation process of specifically matching and determining the alarm object is further described in the following method section.
Wherein, the warning rule is customizable, for example, when the warning condition is set to warn according to the warning quantity threshold, the warning condition is set to the warning quantity threshold according to the actual situation when the warning rule is set according to the actual situation, for example, 1000 devices are customized by a certain merchant, that is, 1000 activation codes are generated when each device is put into production, then the threshold range of the warning quantity can be set to 800-1000 devices (the specific value can be set according to the requirement, as long as the purpose of early warning can be achieved), at this time, the task execution module 2 will obtain the activation data of each device in operation, obtain the certificate information from the activation data to associate the current device with the warning rule, that is, when the certificate information matches the information such as the certificate name in the warning rule, and matching and early warning the current activation data to the corresponding warning rule. The matching comprises judging whether the alarm factors (namely the activated number) in the activation data reach a threshold range, checking whether other information of alarm rule information, such as the name of a certificate and the type of the certificate, accords with the threshold range, inquiring personal information of a salesman related to equipment beyond the threshold range according to the related information if the alarm factors and the type of the certificate accord with the threshold range, and sending the alarm information to the salesman in the forms of mails, short messages and the like through the alarm module 3, so that related personnel can be timely notified to manage the equipment beyond the authorization range, and the efficiency is improved. The alarm information may be set according to requirements, and may include certificate information, activated number, authorized number, corresponding clients, and the like.
When the alarm condition is set to alarm according to the alarm time threshold, the alarm condition is set to the alarm time threshold when the alarm rule is set, so that an alarm object is determined according to the equipment activation data and the alarm time threshold, wherein the specific value of the alarm time threshold is set according to the actual situation, for example, some equipment can release a trial code for a merchant to try, the effective trial time is determined by the time for the trial code, the service time of some equipment containing the trial code is 1 month, and at the moment, the alarm time threshold can be set to 28 days in the alarm rule configuration module 4, so that a salesman can be reminded that the trial equipment of the merchant is about to expire in advance, the equipment experience of the merchant is ensured, the labor is saved, and the equipment is monitored in real time.
The time for monitoring the devices may be set by a user, for example, set to start the apparatus 1 to monitor each running device every other week.
In a preferred embodiment, the system further comprises a query module 5, configured to receive a user instruction, obtain information of an alarm object meeting the condition according to the user instruction condition, and present the information to the user in a form of a list. When the operator wants to inquire about the operation of the related devices handled under the operator, he can directly log in the device 1, and automatically display the current operation of each device under the operator in a list form, and whether there are any devices beyond the authorized range. The query module 1 may also be configured to pop up the operation status and authorization status of the related device according to the self-input query condition, such as the information of the certificate number and the certificate type.
According to the embodiment, whether the authorization of each device exceeds the range can be effectively monitored automatically by a machine, the phenomenon that manual monitoring is time-consuming, labor-consuming and inaccurate is avoided, the condition that the business personnel is informed of the authorization range exceeding of the associated business device is extracted, and the normal operation of each device in the production process is ensured.
Fig. 2 schematically shows a method for alerting based on device authorization according to an embodiment of the present invention. As shown in fig. 2, the present embodiment includes the following steps:
step S201: the method comprises the steps of obtaining activation data of equipment, and determining an alarm object according to the activation data and a preset alarm rule, wherein the alarm condition comprises an alarm time threshold. The concrete implementation is as follows: acquiring activation data of the equipment, wherein the activation data comprises certificate information, object types (such as trial objects and non-trial objects) and alarm factors (such as activation time or the number of activated equipment), and determining that the alarm object is circularly and automatically executed based on the set timing duration according to the activation data and preset alarm rules. And for the establishment of the alarm rule, receiving an adding instruction of the alarm rule established by a manager and receiving a configured alarm rule storage. The alarm rule comprises certificate information and alarm conditions, activation data is associated with the alarm rule according to the certificate information of the equipment, namely the certificate information of the equipment which operates at present is matched with the certificate information with the same content set by the alarm rule (for example, the certificate information is matched through certificate types or certificate codes), and then the equipment object corresponding to the current activation data is judged to be an alarm object or not according to the matching of different activation data (activation number or activation date) of each equipment with the alarm rule.
The alarm factor includes an activation date, the alarm condition is an alarm time threshold in this embodiment, since some devices may push out a trial code for the merchant to try, the effective trial time is usually determined by time for the trial code, the usage time of a certain device containing the trial code is 1 month, at this time, the alarm time threshold may be set to 28 days, and when the object type is a trial object for testing, the alarm matching condition is determined as the activation date and the alarm time threshold of 28 days. When monitoring the type object, determining whether the object corresponding to the current activation data is an alarm object according to the activation data and the alarm time threshold value of 28 days in the alarm rule.
Step S202: and generating alarm information output according to the determined alarm object. The concrete implementation is as follows: the equipment determined as the alarm object is output and displayed to the relevant service personnel in a list form, and because the personal information and the contact way of the service personnel relevant to the equipment are also obtained when the activation data of the equipment are obtained, the alarm information can be directly sent to the service personnel for viewing in the modes of mails, short messages and the like.
The alarm monitoring time of the method can be customized by self, the customized alarm period needs to be stored, and the alarm period needs to be met when the alarm information is output. For example, if monitoring is set once every five days, the alarm information is sent to the service personnel every five days. Therefore, the authorization condition of each device can be monitored in real time, the alarm noise cannot be generated, and the efficiency is ensured.
Fig. 3 is a flow chart schematically illustrating a method for alerting based on device authorization in accordance with another embodiment of the present invention.
Step S301: the method comprises the steps of obtaining activation data of equipment, and determining an alarm object according to the activation data and a preset alarm rule, wherein an alarm factor is an activation number, and an alarm condition comprises an alarm number threshold value. The specific implementation manner of the method is basically the same as that in step S201, except that the object type is a non-trial object used formally, and when the object type is used formally, the alarm matching condition is determined as the activation number and the alarm number threshold, for example, 1000 devices are customized by a certain merchant, that is, 1000 activation codes are generated when each device is put into production, then the threshold range of the alarm number can be set to 800-1000 devices, the activation number is 1000 devices, the activation number of the device in operation is matched with the alarm number threshold in the alarm rule, and whether the object corresponding to the current user identifier is the alarm object is determined according to the matching information of the number.
Step S302: and generating alarm information output according to the determined alarm object. The implementation thereof may refer to step S202.
According to the embodiment, the problem that the use of service software cannot be increased continuously due to untimely increase of the authorization number caused by the fact that the activated number exceeds the authorization number when the equipment runs can be prevented, the activated number is monitored in time, and the production efficiency is improved.
In some embodiments, the present invention provides a non-transitory computer-readable storage medium, in which one or more programs including executable instructions are stored, where the executable instructions can be read and executed by an electronic device (including but not limited to a computer, a server, or a network device, etc.) to perform any one of the above methods for alerting based on a device authorization condition of the present invention.
In some embodiments, the present invention further provides a computer program product comprising a computer program stored on a non-volatile computer-readable storage medium, the computer program comprising program instructions that, when executed by a computer, cause the computer to perform any of the above methods for alerting based on device authorization.
In some embodiments, an embodiment of the present invention further provides an electronic device, which includes: the system comprises at least one processor and a memory communicatively coupled to the at least one processor, wherein the memory stores instructions executable by the at least one processor for execution by the at least one processor to enable the at least one processor to perform a method for alerting based on device authorization.
In some embodiments, the present invention further provides a storage medium having a computer program stored thereon, wherein the computer program is executed by a processor to perform a method for alerting based on a device authorization condition.
The device authorization condition alarm management apparatus according to the embodiment of the present invention may be used to execute the method for performing an alarm based on the device authorization condition according to the embodiment of the present invention, and accordingly achieve the technical effect achieved by the method for performing an alarm based on the device authorization condition according to the embodiment of the present invention, which is not described herein again. In the embodiment of the present invention, the relevant functional module may be implemented by a hardware processor (hardware processor).
Fig. 4 is a schematic hardware structure diagram of an electronic device for executing a method for alerting based on a device authorization status according to another embodiment of the present application, and as shown in fig. 4, the device includes:
one or more processors 410 and a memory 420, with one processor 410 being an example in fig. 4.
The device for executing the method for alarming based on the device authorization condition may further include: an input device 430 and an output device 440.
The processor 410, the memory 420, the input device 430, and the output device 440 may be connected by a bus or other means, such as the bus connection in fig. 4.
The memory 420, which is a non-volatile computer-readable storage medium, may be used to store non-volatile software programs, non-volatile computer-executable programs, and modules, such as program instructions/modules corresponding to the method for performing an alarm based on a device authorization in the embodiments of the present application. The processor 410 executes various functional applications and data processing of the server by executing the nonvolatile software programs, instructions and modules stored in the memory 420, namely, implementing the method for alarming based on the device authorization condition of the above method embodiment.
The memory 420 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the device authentication situation alarm management apparatus, and the like. Further, the memory 420 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, the memory 420 may optionally include memory located remotely from the processor 410, which may be connected to the device authorization management apparatus via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 430 may receive entered numeric or character information and generate signals related to user settings and function controls of the device authorization alert management device. The output device 440 may include a display device such as a display screen.
The one or more modules are stored in the memory 420 and, when executed by the one or more processors 410, perform a method for alerting based on device authorization in any of the method embodiments described above.
The product can execute the method provided by the embodiment of the application, and has the corresponding functional modules and beneficial effects of the execution method. For technical details that are not described in detail in this embodiment, reference may be made to the methods provided in the embodiments of the present application.
The electronic device of the embodiments of the present application exists in various forms, including but not limited to:
(1) mobile communication devices, which are characterized by mobile communication capabilities and are primarily targeted at providing voice and data communications. Such terminals include smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) The ultra-mobile personal computer equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include PDA, MID, and UMPC devices, such as ipads.
(3) The server is similar to a general computer architecture, but has higher requirements on processing capability, stability, reliability, safety, expandability, manageability and the like because of the need of providing highly reliable services.
(4) And other electronic devices with data interaction functions.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a general hardware platform, and certainly can also be implemented by hardware. Based on such understanding, the above technical solutions substantially or contributing to the related art may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (13)

1. The device authorization condition alarm management device comprises:
the task execution module is used for acquiring equipment activation data and determining an alarm object according to the equipment activation data and a preset alarm rule, wherein the activation data comprises certificate information, an object type and an alarm factor, the alarm rule comprises certificate information, an alarm condition and associated information, and the task execution module is configured to determine the alarm rule associated with the activation data according to the certificate information, match the current activation data with the associated alarm rule, and determine an equipment object corresponding to the matched activation data meeting the alarm rule as the alarm object;
and the alarm module is used for acquiring the associated information from a preset alarm rule according to the determined alarm object and outputting the alarm information to the personnel pointed by the associated information.
2. The apparatus of claim 1, further comprising:
and the alarm rule configuration module is used for receiving and storing alarm rule information, wherein the alarm rule information comprises a certificate name, a certificate code, a certificate type, an alarm condition and associated information.
3. The apparatus of claim 2, wherein the apparatus further comprises:
and the query module is used for receiving a user instruction, acquiring the information of the alarm object meeting the condition according to the user instruction condition, and presenting the information to the user in a list form.
4. The apparatus of any of claims 1 to 3, wherein the alarm condition comprises an alarm number threshold and/or an alarm time threshold.
5. A method for alarming based on device authorization condition is characterized by comprising the following steps:
acquiring activation data of equipment, determining an alarm object according to the activation data and a preset alarm rule, wherein the activation data comprises certificate information, an object type and an alarm factor, the alarm rule comprises certificate information, an alarm condition and association information, the alarm object is determined according to the activation data and the preset alarm rule to be an alarm rule associated with the activation data according to the certificate information, the current activation data is matched with the associated alarm rule, and the equipment object corresponding to the matched activation data meeting the alarm rule is determined to be the alarm object;
and acquiring associated information from a preset alarm rule according to the determined alarm object, and outputting alarm information to the personnel pointed by the associated information.
6. The method of claim 5, further comprising:
and acquiring activation data of the equipment, and determining that the alarm object is circularly and automatically executed based on the set timing duration according to the activation data and a preset alarm rule.
7. The method of claim 5, further comprising:
and receiving an adding instruction of the alarm rule, and receiving and storing the configured alarm rule.
8. The method according to claim 5, wherein the matching the current activation data to the associated alarm rule, and the determining the device object corresponding to the matched activation data satisfying the alarm rule as the alarm object comprises:
determining alarm matching conditions of the associated activation data and alarm rules according to the object type;
judging whether the object corresponding to the current activation data is an alarm object or not according to the determined alarm matching condition;
wherein, the determined alarm matching condition comprises the adapted alarm factor and the alarm condition matched with the adapted alarm factor.
9. The method of claim 8, wherein the alert factor comprises an activation date, wherein the alert condition comprises an alert time threshold,
the determining alarm matching conditions of the associated activation data and alarm rules according to the object type includes:
when the object type is a test, determining the alarm matching condition as an activation date and an alarm time threshold;
the judging whether the object corresponding to the current activation data is the alarm object according to the determined alarm matching condition comprises:
and determining whether the object corresponding to the current activation data is an alarm object according to the activation date in the associated activation data and the alarm time threshold in the alarm rule.
10. The method of claim 8, wherein the alert factor comprises a number of activations, wherein the alert rule further comprises an alert number threshold,
the determining alarm matching conditions of the associated activation data and alarm rules according to the object type includes:
when the object type is formal use, determining the alarm matching condition as an activation number and an alarm number threshold;
the judging whether the object corresponding to the current activation data is the alarm object according to the determined alarm matching condition comprises:
and determining whether the object corresponding to the current user identifier is an alarm object or not according to the activation number in the associated activation data and the alarm number threshold in the alarm rule.
11. The method of claim 8, further comprising:
receiving set alarm period storage;
the alarm information output generated according to the determined alarm object is realized by generating alarm information output for the determined alarm object when the alarm period is met.
12. An electronic device, comprising: at least one processor, and a memory communicatively coupled to the at least one processor, wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the steps of the method of any one of claims 5-11.
13. A storage medium on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of any one of claims 5 to 11.
CN201811591705.XA 2018-12-25 2018-12-25 Equipment authorization condition alarm management device and method for alarming based on equipment authorization condition Active CN109726526B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811591705.XA CN109726526B (en) 2018-12-25 2018-12-25 Equipment authorization condition alarm management device and method for alarming based on equipment authorization condition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811591705.XA CN109726526B (en) 2018-12-25 2018-12-25 Equipment authorization condition alarm management device and method for alarming based on equipment authorization condition

Publications (2)

Publication Number Publication Date
CN109726526A CN109726526A (en) 2019-05-07
CN109726526B true CN109726526B (en) 2021-03-05

Family

ID=66297230

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811591705.XA Active CN109726526B (en) 2018-12-25 2018-12-25 Equipment authorization condition alarm management device and method for alarming based on equipment authorization condition

Country Status (1)

Country Link
CN (1) CN109726526B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111552957B (en) * 2020-04-26 2023-06-06 亚信科技(成都)有限公司 Software overuse control method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580316A (en) * 2013-10-24 2015-04-29 深圳市国信互联科技有限公司 Software authorization management method and software authorization management system
CN106355052A (en) * 2016-11-03 2017-01-25 广东浪潮大数据研究有限公司 Authorization centralized management method, device and system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7962424B1 (en) * 2006-10-24 2011-06-14 Adobe Systems Incorporated Overdraft licenses and license distribution
CN101430749A (en) * 2008-10-31 2009-05-13 金蝶软件(中国)有限公司 Software permission monitoring method, system and electronic equipment
CN102882843B (en) * 2012-07-19 2015-03-04 无锡华御信息技术有限公司 Encryption-software based automated detection and maintenance methods
CN103279696A (en) * 2013-06-03 2013-09-04 中国科学院微电子研究所 License monitoring method and system for EDA (electronic design automation) software

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580316A (en) * 2013-10-24 2015-04-29 深圳市国信互联科技有限公司 Software authorization management method and software authorization management system
CN106355052A (en) * 2016-11-03 2017-01-25 广东浪潮大数据研究有限公司 Authorization centralized management method, device and system

Also Published As

Publication number Publication date
CN109726526A (en) 2019-05-07

Similar Documents

Publication Publication Date Title
CN103313216B (en) Message prompt method, system and device for communication account
CN103680083A (en) Event notification
CN109710425B (en) Message monitoring method and device
CN109669835B (en) MySQL database monitoring method, device, equipment and readable storage medium
CN110826965A (en) Intelligent warehouse management method and device, handheld device and storage medium
CN110347694B (en) Equipment monitoring method, device and system based on Internet of things
CN110933698A (en) Monitoring management method, device and equipment for Internet of things card
CN104581806A (en) Method and terminal for monitoring service system
CN111130867B (en) Intelligent household equipment alarm method and device based on Internet of things
CN113468025A (en) Data warning method, system, device and storage medium
CN109726526B (en) Equipment authorization condition alarm management device and method for alarming based on equipment authorization condition
CN110865921A (en) Data monitoring method and device, readable storage medium and electronic equipment
CN112270531B (en) Event notification method, device, server and storage medium
CN111262731B (en) Alarm method, alarm device, server equipment and storage medium
CN110930053A (en) Work order processing method and device
CN116055291A (en) Method and device for determining abnormal prompt information of node
CN108989298A (en) A kind of equipment safety monitoring method and device
CN109981338A (en) Alarm method, device and the storage medium that code pulls
CN114844772A (en) Management method and system based on Zabbix monitoring platform
CN112445597B (en) Timing task scheduling method and device
CN112686742A (en) Sales invoice risk early warning method and device, storage medium and electronic equipment
CN112837517A (en) Alarm message processing method and device, server, client and alarm system
CN110633165A (en) Fault processing method, device, system server and computer readable storage medium
CN111106956A (en) Sensor information adding method, device, equipment and storage medium of Internet of things
CN111124547A (en) Task processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 215123 building 14, Tengfei Innovation Park, 388 Xinping street, Suzhou Industrial Park, Suzhou City, Jiangsu Province

Patentee after: Sipic Technology Co.,Ltd.

Address before: 215123 building 14, Tengfei Innovation Park, 388 Xinping street, Suzhou Industrial Park, Suzhou City, Jiangsu Province

Patentee before: AI SPEECH Ltd.

CP01 Change in the name or title of a patent holder