CN111768073A - Pipeline protection method based on intelligent identification - Google Patents

Pipeline protection method based on intelligent identification Download PDF

Info

Publication number
CN111768073A
CN111768073A CN202010432158.1A CN202010432158A CN111768073A CN 111768073 A CN111768073 A CN 111768073A CN 202010432158 A CN202010432158 A CN 202010432158A CN 111768073 A CN111768073 A CN 111768073A
Authority
CN
China
Prior art keywords
construction
information
degree
pipeline
hazard
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010432158.1A
Other languages
Chinese (zh)
Other versions
CN111768073B (en
Inventor
乔亮
王晨
巩忠领
陈飞
宋家才
易彪
张殊丽
罗永华
唐荣
范峻铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Deep Combustion Gas Technology Research Institute
Shenzhen Gas Corp Ltd
Original Assignee
Shenzhen Deep Combustion Gas Technology Research Institute
Shenzhen Gas Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Deep Combustion Gas Technology Research Institute, Shenzhen Gas Corp Ltd filed Critical Shenzhen Deep Combustion Gas Technology Research Institute
Priority to CN202010432158.1A priority Critical patent/CN111768073B/en
Publication of CN111768073A publication Critical patent/CN111768073A/en
Application granted granted Critical
Publication of CN111768073B publication Critical patent/CN111768073B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Educational Administration (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Game Theory and Decision Science (AREA)
  • Development Economics (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a pipeline protection method based on an intelligent identifier, which comprises the steps of establishing connection with a constructor based on a preset intelligent identifier, and receiving construction information sent by the constructor, wherein the construction information comprises a construction position and a construction type; determining the degree of damage to the gas pipeline by construction corresponding to the construction information based on the construction information; and protecting the gas pipeline according to the hazard degree. The intelligent identification is connected with the construction party, the construction information sent by construction is used for determining the harm degree of the gas pipeline generated by construction, and construction analysis is really carried out based on the harm degree, so that the construction party can acquire construction risks, harm is avoided, resource and fund waste is reduced, and technical support and safety guarantee are provided for safe operation management of the high-pressure gas pipeline in the cities and towns.

Description

Pipeline protection method based on intelligent identification
Technical Field
The application relates to the technical field of gas, in particular to a pipeline protection method based on intelligent identification.
Background
At present, intelligent management and control early warning is not adopted for a gas pipeline, and harm which may occur due to the fact that the gas pipeline is weak in construction form, service life, pipeline material, environment change and safety consciousness of a construction unit is analyzed. Therefore, in case of a leakage accident, it may cause damage to surrounding people and adversely affect the environment. Furthermore, pipeline accidents typically result in significant economic losses.
Thus, the prior art has yet to be improved and enhanced.
Disclosure of Invention
The technical problem to be solved by the application is to provide a pipeline protection method based on intelligent identification aiming at the defects of the prior art.
In order to solve the above technical problem, a first aspect of an embodiment of the present application provides a method for protecting a pipeline based on an intelligent identifier, where the method includes:
establishing connection with a constructor based on a preset intelligent identifier, and receiving construction information sent by the constructor, wherein the construction information comprises a construction position and a construction type;
determining the degree of damage to the gas pipeline by construction corresponding to the construction information based on the construction information;
and protecting the gas pipeline according to the hazard degree.
The pipeline protection method based on the intelligent identification, wherein the connection establishment with the construction party based on the preset intelligent identification specifically comprises the following steps:
receiving a connection request formed by a constructor based on the intelligent identification, wherein the connection request carries user information corresponding to the constructor;
and if the user information is new user information, distributing a user identifier for the user information, and connecting with the construction party based on the user identifier.
The intelligent identification-based pipeline protection method comprises the following steps of after the user identification is distributed to the user information:
receiving identity authentication information sent by the construction party, wherein the identity authentication information comprises one or more of fingerprint information, face identification information, voiceprint information and an identity card image;
and associating the identity authentication information with the user identification so as to authenticate the user information through the identity authentication information.
The pipeline protection method based on the intelligent identification, wherein the step of determining the damage degree of the construction corresponding to the construction information to the gas pipeline based on the construction information specifically comprises the following steps:
determining the position of a gas pipeline in the area where the construction position is located, and determining the position relation based on the position of the gas pipeline and the construction position;
and determining the damage degree of construction corresponding to the construction information to the gas pipeline based on the construction type and the position relation.
The intelligent identification-based pipeline protection method comprises the following specific steps of:
and sending a hazard notice to a construction party corresponding to the construction information according to the hazard degree, so that the construction party determines a construction scheme based on the hazard degree to protect the gas pipeline.
The pipeline protection method based on the intelligent identification, wherein the hazard notification comprises:
when the hazard degree is smaller than the preset hazard degree, the hazard notice comprises prompt information for prompting a constructor to obtain construction procedures;
and when the hazard degree is greater than the preset hazard degree, the hazard informing book comprises prompt information for prompting that a gas pipeline management party needs to confirm on site.
The pipeline protection method based on the intelligent identification, wherein the protection of the gas pipeline according to the hazard degree comprises the following steps:
and determining a pipeline responsible person corresponding to the gas pipeline, and sending construction information and the degree of harm of the construction information to the gas management to the pipeline responsible person.
The pipeline protection method based on the intelligent identification is characterized by further comprising the following steps:
when the hazard degree is greater than the preset hazard degree, early warning information is provided for the gas side so that the gas side can know construction information.
A second aspect of the present embodiment provides a computer-readable storage medium, which is characterized by storing one or more programs, where the one or more programs are executable by one or more processors to implement the steps in the intelligent identification-based pipeline protection method as described in any one of the above.
A third aspect of the present embodiment provides a terminal device, which includes: a processor, a memory, and a communication bus; the memory has stored thereon a computer readable program executable by the processor;
the communication bus realizes connection communication between the processor and the memory;
the processor, when executing the computer readable program, implements the steps in the intelligent identification based pipeline protection method as described in any one of the above.
Has the advantages that: compared with the prior art, the method for protecting the pipeline based on the intelligent identification comprises the steps of establishing connection with a constructor based on a preset intelligent identification, and receiving construction information sent by the constructor, wherein the construction information comprises a construction position and a construction type; determining the degree of damage to the gas pipeline by construction corresponding to the construction information based on the construction information; and protecting the gas pipeline according to the hazard degree. The intelligent identification is connected with the construction party, the construction information sent by construction is used for determining the harm degree of the gas pipeline generated by construction, and construction analysis is really carried out based on the harm degree, so that the construction party can acquire construction risks, harm is avoided, resource and fund waste is reduced, and technical support and safety guarantee are provided for safe operation management of the high-pressure gas pipeline in the cities and towns.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without any inventive work.
Fig. 1 is a flowchart of a pipeline protection method based on intelligent identification provided in the present application.
Fig. 2 is a schematic structural diagram of a terminal device provided in the present application.
Detailed Description
The present application provides a pipeline protection method based on intelligent identification, and in order to make the purpose, technical scheme, and effect of the present application clearer and clearer, the present application is further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
It will be understood by those within the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
In particular implementations, the terminal devices described in embodiments of the present application include, but are not limited to, other portable devices such as mobile phones, laptops, or tablet computers with touch sensitive surfaces (e.g., touch displays and/or touch pads). It should also be understood that in some embodiments, the device is not a portable communication device, but is a desktop computer having a touch-sensitive surface (e.g., a touch-sensitive display screen and/or touchpad).
In the discussion that follows, a terminal device that includes a display and a touch-sensitive surface is described. However, it should be understood that the terminal device may also include one or more other physical user interface devices such as a physical keyboard, mouse, and/or joystick.
The terminal device supports various applications, such as one or more of the following: a drawing application, a presentation application, a word processing application, a video conferencing application, a disc burning application, a spreadsheet application, a gaming application, a telephone application, a video conferencing application, an email application, an instant messaging application, an exercise support application, a photo management application, a data camera application, a digital video camera application, a web browsing application, a digital music player application, and/or a digital video playing application, etc.
Various applications that may be executed on the terminal device may use at least one common physical user interface device, such as a touch-sensitive surface. The first or more functions of the touch-sensitive surface and the corresponding information displayed on the terminal may be adjusted and/or changed between applications and/or within respective applications. In this way, a common physical framework (e.g., touch-sensitive surface) of the terminal can support various applications with user interfaces that are intuitive and transparent to the user.
It should be understood that, the sequence numbers and sizes of the steps in this embodiment do not mean the execution sequence, and the execution sequence of each process is determined by its function and inherent logic, and should not constitute any limitation on the implementation process of this embodiment.
The following further describes the content of the application by describing the embodiments with reference to the attached drawings.
The implementation provides a pipeline protection method based on intelligent identification, as shown in fig. 1, the method includes:
and S10, establishing connection with the constructor based on the preset intelligent identification, and receiving construction information sent by the constructor.
Specifically, the intelligent identifier is used for connecting a protection device executing the pipeline protection method, and the intelligent identifier may carry an access address of the protection device, and may also carry a download address of the protection device, and the like; the construction side can be connected to the protection device executing the pipeline protection method through the intelligent identification. In a concrete implementation of this embodiment, protection device can regard as an APP to remove the end, the download address of this APP removal end is distinguished to the intelligence, and the constructor passes through the intelligence sign and downloads APP removal end. In addition, the intelligent identification can be a two-dimensional code, an applet code and the like; the constructor scans the two-dimensional code to read the download address carried in the two-dimensional code, acquires the APP used for executing the pipeline protection method through the download address, and records the APP as the intelligent APP of the integrity of the gas pipeline.
Further, the intelligence sign can set up on the warning sign of gas pipeline, also can set up on being used for publicizing the publicity column that the gas management contained, also can present in short video and news etc.. It is understood that the smart identification may be presented in the form of a text advertisement, such as a newspaper, a theoretical article, a brochure, a bus bulletin board, a leaflet, a brochure, or the like; and may also be presented in the form of audio-visual promotions such as short videos, television news, television literature, television reviews, etc. In addition, the method can also be used for providing a user with a plurality of different types of advertisements through oral propaganda forms, such as lectures, case analysis and the like; physical propaganda forms, such as developing propaganda activities, various field meetings and the like; and collective activities such as organizing celebrations, staff reading activities, developing propaganda weeks, and the like, and displaying the function of the intelligent identification so that the public can know the function of the intelligent identification.
Further, in an implementation manner of this embodiment, the establishing of the connection with the construction party based on the preset intelligent identifier specifically includes:
receiving a connection request formed by a constructor based on the intelligent identification, wherein the connection request carries user information corresponding to the constructor;
and if the user information is new user information, distributing a user identifier for the user information, and connecting with the construction party based on the user identifier.
Specifically, the connection request may be a registration request sent by the constructor through the smart identifier, or may be an access request sent in the case of registration. The connection request carries user information, and the user information can be account information for logging in; when the account information exists, prompt information can be sent to the constructor to prompt the constructor to register. And the user identification is a login certificate of the user information, and after the user information is configured with the login certificate, the construction party sending the user information is connected when receiving a connection request carrying the user information. The user information may include an identity number, a contact address, a name, and the like, and certainly, when the user information is registered user information, the connection request carrying the user information may be a user identifier corresponding to the user information.
Further, in order to improve the security of pipeline protection, after receiving new user information, the new user information needs to be authenticated. Correspondingly, in an implementation manner of this embodiment, after allocating the user identifier to the user information, the method includes:
receiving identity authentication information sent by the construction party;
and associating the identity authentication information with the user identification so as to authenticate the user information through the identity authentication information.
Specifically, the identity authentication information includes one or more of fingerprint information, face recognition information, voiceprint information, and an identity card image, for example, the identity authentication information includes fingerprint information and an identity card image, or the identity authentication information includes face recognition information and an identity card image, and the like. In an implementation manner of this embodiment, the identity authentication information at least includes face recognition information and an identity card image; after the identity authentication information is obtained, the identity card image carrying identity card number can be obtained, the obtained identity card number is matched with the user information carrying identity card number, if the identity card number is inconsistent with the user information carrying identity card number, the user information can be marked as an abnormal user, and the unqualified identity authentication information is prompted; if the identity card information is consistent with the face identification information, the face image information carried by the identity card image can be acquired, the acquired face image information is compared with the face identification information, and if the identity card information is consistent with the face identification information, the identity authentication information is determined to be qualified and is stored, so that the user corresponding to the user information can be authenticated based on the identity authentication information subsequently; if not, marking the user information as an abnormal user and prompting that the identity authentication information is unqualified.
And S20, determining the damage degree of construction corresponding to the construction information to the gas pipeline based on the construction information.
Specifically, the construction information includes a construction position and a construction type, wherein the construction position is used for representing a geographical position where construction is performed, and the construction type is used for representing a construction implementation manner. The construction types can include mechanical excavation, manual excavation, shield construction, blasting, directional drilling, exploration and the like, and the construction positions can be longitude and latitude addresses of construction, road names of construction, administrative region addresses of construction sites and the like. For example, the construction method is mechanical excavation construction, and the construction address is qianxiang road auxiliary road green belt and the like.
In an implementation manner of this embodiment, the determining, based on the construction information, a degree of damage to the gas pipeline caused by the construction corresponding to the construction information specifically includes:
determining the position of a gas pipeline in the area where the construction position is located, and determining the position relation based on the position of the gas pipeline and the construction position;
and determining the damage degree of construction corresponding to the construction information to the gas pipeline based on the construction type and the position relation.
In particular, the gas pipe location refers to a geographical location where the gas pipe is located, which may be determined based on the construction location. It can be understood that after the construction position is acquired, a gas management circuit diagram corresponding to the construction position is acquired, and the position relationship between the construction position and the gas pipeline position is determined based on the gas management circuit diagram. For example, the construction position is located within a distance of 50 meters from the position where the gas pipeline is located, the construction position partially overlaps with the gas pipeline position, or the construction position covers the gas pipeline position, and the like.
Further, after the construction type and the position relationship are obtained, the degree of damage of the construction to the gas pipeline can be determined according to the construction type and the position relationship, wherein the corresponding relationship between the degree of damage of the construction to the gas pipeline and the construction type and the position relationship can be pre-stored, and after the construction type and the position relationship are obtained, the degree of damage corresponding to the construction type and the position relationship can be found. For example, the construction type is mechanical excavation construction, the construction position is a green belt of an auxiliary road of the Chinese fragrant road, and the position relation between the construction position and the gas pipeline is that the construction position is right above the gas pipeline; the construction type and the position relationship correspond to forbidden construction, that is, the damage degree corresponding to the construction type and the position relationship is serious. Wherein, the construction hazard degree can be determined according to the regulations of local government on town gas protection and the regulations of gas company pipeline protection, etc.
Further, in an implementation manner of this embodiment, the protecting the gas pipeline according to the hazard level specifically includes:
and sending a hazard notice to a construction party corresponding to the construction information according to the hazard degree, so that the construction party determines a construction scheme based on the hazard degree to protect the gas pipeline.
Specifically, the hazard informing book is used for informing the hazard of construction to the gas pipeline, and the hazard informing book can carry related hazard accident cases and the contact way of the gas side responsible person in the area where the construction position is located, so that the construction can really know the hazard brought by the construction through the related hazard accident cases, and the gas side responsible person can be contacted with the contact way of the gas side responsible person in the area where the construction position is located to determine a subsequent construction scheme.
Further, the hazard degree can be divided into a plurality of hazard levels by adopting a grading mode, after the position relation and the construction type are obtained, the construction mode corresponding to the position relation and the construction type can be determined, the construction mode is subjected to hazard grading, and finally the hazard level is determined based on the hazard grading. For example, the degree of damage is divided into two levels of damage, which are denoted as a first level of damage and a second level of damage, and the degree of damage corresponding to the first level of damage is higher than the degree of damage corresponding to the second level of damage, e.g., the degree of damage corresponding to the first level of damage is 50-100, and the degree of damage corresponding to the second level of damage is 0-50.
For example, the following steps are carried out: the position relation is that the construction position is outside the range of 50 meters from the gas pipeline, the construction type is mechanical excavation operation, the hazard grade corresponding to the position relation and the construction type is 45 points, and the hazard grade corresponding to the position relation and the construction type is a second hazard grade, namely the construction is low-risk construction; the position relation construction position is above the gas pipeline, the construction type is mechanical excavation operation, the damage score corresponding to the position relation and the construction type is 90 points, the damage grade corresponding to the position relation and the construction type is a first damage grade, and the construction is high-risk construction.
In addition, when the damage degrees corresponding to the construction information are different, the damage informing books corresponding to the construction information are also different. For example, in one implementation of this embodiment, the hazard notification includes:
when the hazard degree is smaller than the preset hazard degree, the hazard notice comprises prompt information for prompting a constructor to obtain construction procedures;
and when the hazard degree is greater than the preset hazard degree, the hazard informing book comprises prompt information for prompting that a gas pipeline management party needs to confirm on site.
Specifically, the construction party is prompted to obtain prompt information of construction procedures for informing the construction party that construction can be performed, and the construction procedures are required before construction, for example, the contact way of a gas tablet zone responsible person, the signing of relevant agreements, the providing of relevant data and the like. The prompt information that the prompt requires the gas pipeline management party to confirm on site is used for telling the construction party that construction cannot be carried out temporarily, so that the construction party can obtain the damage, and the protection of the pipeline at the construction position is realized. In addition, when the degree of harm is greater than the preset degree of harm, provide early warning information to the gas side so that the gas side learns construction information. Therefore, the gas side can assign the field confirmation of the working personnel in the district, formulate the related emergency disposal scheme, reduce the management and control measures of the hazard risk and then carry out construction.
In addition, after the construction hazard degree is determined based on the construction information sent by the constructor, prompt information can be sent to the gas worker corresponding to the construction position. Correspondingly, the protection of the gas pipeline according to the hazard degree comprises the following steps:
and determining a pipeline responsible person corresponding to the gas pipeline, and sending construction information and the degree of harm of the construction information to the gas management to the pipeline responsible person.
Specifically, through to pipeline responsible person send construction information and construction information right the harm degree that gas management formed can indicate that pipeline responsible person this construction position has the third party construction, can strengthen the on-the-spot supervision of gas staff to this construction position like this, further provide the effect of gas pipeline protection. In addition, after the construction party sends the construction information, when the construction party filing information sent by the pipeline responsible person is not received, patrol personnel in the district corresponding to the construction position are prompted, the construction position is taken as a key patrol focus to carry out follow-up patrol, the construction unit is prevented from carrying out private construction, the gas pipeline is prevented from being damaged, and the effect of protecting the gas pipeline is improved.
In summary, the present embodiment provides a pipeline protection method based on an intelligent identifier, where the method includes establishing a connection with a constructor based on a preset intelligent identifier, and receiving construction information sent by the constructor, where the construction information includes a construction location and a construction type; determining the degree of damage to the gas pipeline by construction corresponding to the construction information based on the construction information; and protecting the gas pipeline according to the hazard degree. The intelligent identification is connected with the construction party, the construction information sent by construction is used for determining the harm degree of the gas pipeline generated by construction, and construction analysis is really carried out based on the harm degree, so that the construction party can acquire construction risks, harm is avoided, resource and fund waste is reduced, and technical support and safety guarantee are provided for safe operation management of the high-pressure gas pipeline in the cities and towns.
Based on the above-mentioned intelligent tag-based pipeline protection method, the present embodiment provides a computer-readable storage medium, where one or more programs are stored, and the one or more programs are executable by one or more processors to implement the steps in the intelligent tag-based pipeline protection method according to the above-mentioned embodiment.
Based on the above pipeline protection method based on intelligent identification, the present application further provides a terminal device, as shown in fig. 2, which includes at least one processor (processor) 20; a display screen 21; and a memory (memory)22, and may further include a communication Interface (Communications Interface)23 and a bus 24. The processor 20, the display 21, the memory 22 and the communication interface 23 can communicate with each other through the bus 24. The display screen 21 is configured to display a user guidance interface preset in the initial setting mode. The communication interface 23 may transmit information. The processor 20 may call logic instructions in the memory 22 to perform the methods in the embodiments described above.
Furthermore, the logic instructions in the memory 22 may be implemented in software functional units and stored in a computer readable storage medium when sold or used as a stand-alone product.
The memory 22, which is a computer-readable storage medium, may be configured to store a software program, a computer-executable program, such as program instructions or modules corresponding to the methods in the embodiments of the present disclosure. The processor 20 executes the functional application and data processing, i.e. implements the method in the above-described embodiments, by executing the software program, instructions or modules stored in the memory 22.
The memory 22 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal device, and the like. Further, the memory 22 may include a high speed random access memory and may also include a non-volatile memory. For example, a variety of media that can store program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk, may also be transient storage media.
In addition, the specific processes loaded and executed by the storage medium and the instruction processors in the mobile terminal are described in detail in the method, and are not stated herein.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (10)

1. A pipeline protection method based on intelligent identification is characterized by comprising the following steps:
establishing connection with a constructor based on a preset intelligent identifier, and receiving construction information sent by the constructor, wherein the construction information comprises a construction position and a construction type;
determining the degree of damage to the gas pipeline by construction corresponding to the construction information based on the construction information;
and protecting the gas pipeline according to the hazard degree.
2. The intelligent-identifier-based pipeline protection method according to claim 1, wherein the establishing of the connection with the construction party based on the preset intelligent identifier specifically comprises:
receiving a connection request formed by a constructor based on the intelligent identification, wherein the connection request carries user information corresponding to the constructor;
and if the user information is new user information, distributing a user identifier for the user information, and connecting with the construction party based on the user identifier.
3. The intelligent identification-based pipeline protection method according to claim 2, wherein the allocating the user identification to the user information comprises:
receiving identity authentication information sent by the construction party, wherein the identity authentication information comprises one or more of fingerprint information, face identification information, voiceprint information and an identity card image;
and associating the identity authentication information with the user identification so as to authenticate the user information through the identity authentication information.
4. The intelligent-identification-based pipeline protection method according to claim 1, wherein the determining, based on the construction information, the degree of damage to the gas pipeline caused by the construction corresponding to the construction information specifically comprises:
determining the position of a gas pipeline in the area where the construction position is located, and determining the position relation based on the position of the gas pipeline and the construction position;
and determining the damage degree of construction corresponding to the construction information to the gas pipeline based on the construction type and the position relation.
5. The intelligent identification-based pipeline protection method according to claim 1 or 4, wherein the protection of the gas pipeline according to the degree of harm specifically comprises:
and sending a hazard notice to a construction party corresponding to the construction information according to the hazard degree, so that the construction party determines a construction scheme based on the hazard degree to protect the gas pipeline.
6. The intelligent-identification-based pipeline protection method according to claim 5, wherein the hazard notification comprises:
when the hazard degree is smaller than the preset hazard degree, the hazard notice comprises prompt information for prompting a constructor to obtain construction procedures;
and when the hazard degree is greater than the preset hazard degree, the hazard informing book comprises prompt information for prompting that a gas pipeline management party needs to confirm on site.
7. The intelligent-identification-based pipeline protection method according to claim 1, wherein the protection of the gas pipeline according to the hazard level comprises:
and determining a pipeline responsible person corresponding to the gas pipeline, and sending construction information and the degree of harm of the construction information to the gas management to the pipeline responsible person.
8. The intelligent identification-based pipeline protection method according to claim 7, further comprising:
when the hazard degree is greater than the preset hazard degree, early warning information is provided for the gas side so that the gas side can know construction information.
9. A computer readable storage medium, storing one or more programs, which are executable by one or more processors to implement the steps of the intelligent identification based pipeline protection method according to any one of claims 1-8.
10. A terminal device, comprising: a processor, a memory, and a communication bus; the memory has stored thereon a computer readable program executable by the processor;
the communication bus realizes connection communication between the processor and the memory;
the processor, when executing the computer readable program, implements the steps in the intelligent identification based pipeline protection method of any of claims 1-8.
CN202010432158.1A 2020-05-20 2020-05-20 Pipeline protection method based on intelligent identification Active CN111768073B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010432158.1A CN111768073B (en) 2020-05-20 2020-05-20 Pipeline protection method based on intelligent identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010432158.1A CN111768073B (en) 2020-05-20 2020-05-20 Pipeline protection method based on intelligent identification

Publications (2)

Publication Number Publication Date
CN111768073A true CN111768073A (en) 2020-10-13
CN111768073B CN111768073B (en) 2024-03-22

Family

ID=72719503

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010432158.1A Active CN111768073B (en) 2020-05-20 2020-05-20 Pipeline protection method based on intelligent identification

Country Status (1)

Country Link
CN (1) CN111768073B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113159803A (en) * 2021-04-25 2021-07-23 呼和浩特中燃城市燃气发展有限公司 Gas reinstallation system and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2003123550A (en) * 2003-07-24 2005-01-27 Общество с ограниченной ответственностью "Севергазпром" (RU) METHOD FOR DETECTING DISTURBANCES OF INSULATION COATING OF UNDERGROUND PIPELINE
KR101173592B1 (en) * 2011-08-29 2012-12-24 주식회사 코위드원 System of detecting damaged position with protecting damage for underground pipes and operating method thereof
CN104700161A (en) * 2015-03-06 2015-06-10 深圳市燃气集团股份有限公司 Risk factor identification-based construction site patrol optimization method and system
CN109102149A (en) * 2018-06-06 2018-12-28 北京市燃气集团有限责任公司 A kind of prediction technique of city gas buried pipeline third party breakage in installation risk
CN110232520A (en) * 2019-06-12 2019-09-13 深圳市燃气集团股份有限公司 A kind of method for early warning and system based on pipeline integrity

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2003123550A (en) * 2003-07-24 2005-01-27 Общество с ограниченной ответственностью "Севергазпром" (RU) METHOD FOR DETECTING DISTURBANCES OF INSULATION COATING OF UNDERGROUND PIPELINE
KR101173592B1 (en) * 2011-08-29 2012-12-24 주식회사 코위드원 System of detecting damaged position with protecting damage for underground pipes and operating method thereof
CN104700161A (en) * 2015-03-06 2015-06-10 深圳市燃气集团股份有限公司 Risk factor identification-based construction site patrol optimization method and system
CN109102149A (en) * 2018-06-06 2018-12-28 北京市燃气集团有限责任公司 A kind of prediction technique of city gas buried pipeline third party breakage in installation risk
CN110232520A (en) * 2019-06-12 2019-09-13 深圳市燃气集团股份有限公司 A kind of method for early warning and system based on pipeline integrity

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
周欣帅;马雨廷;: "基于B/S结构的管道智能巡检管理系统设计与开发", 河南科技, no. 19 *
彭知军;: "预防第三方施工对燃气管道及设施破坏的措施", 煤气与热力, no. 06 *
曹义四;谢高新;夏卫国;: "第三方施工中燃气管道设施的保护", 煤气与热力, no. 05 *
谢娜娜;郑显丰;袁昕;: "浅谈燃气管道完整性管理中第三方施工破坏管理措施", 科技创新导报, no. 36 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113159803A (en) * 2021-04-25 2021-07-23 呼和浩特中燃城市燃气发展有限公司 Gas reinstallation system and method

Also Published As

Publication number Publication date
CN111768073B (en) 2024-03-22

Similar Documents

Publication Publication Date Title
US11640498B2 (en) Method and system for selective document redaction
US9083701B2 (en) Method for providing active security authentication, and terminal and system supporting same
CN108648132B (en) Method, system, terminal and medium for generating watermark according to image
EP3598336A1 (en) Information processing device and information processing method
CN106921799A (en) A kind of mobile terminal safety means of defence and mobile terminal
CN105453102A (en) Systems and methods for identifying private keys that have been compromised
CN103577761A (en) Method and device for processing privacy data in mobile equipment
EP3176719B1 (en) Methods and devices for acquiring certification document
WO2017157104A1 (en) Information copying system, method and electronic device, and machine-readable storage medium
US10552132B2 (en) Binary merging device, method, and computer program
US7975309B2 (en) Systems and methods for securing data in an electronic apparatus
CN111768073B (en) Pipeline protection method based on intelligent identification
CN110634095B (en) Watermark adding method, watermark identifying device and electronic equipment
CN107342931B (en) Secure messaging method using personalized template and device using the same
CN106685945B (en) Service request processing method, service handling number verification method and terminal thereof
US8677503B2 (en) Mechanism for embedding device identification information into graphical user interface objects
US20050289353A1 (en) Non-intrusive trusted user interface
CN107368735B (en) Application installation method, mobile terminal and computer readable storage medium
CN112417406A (en) Data desensitization method and device, readable storage medium and electronic equipment
CN105681246A (en) Verification code implementation method
CN109324843B (en) Fingerprint processing system and method and fingerprint equipment
Rai et al. Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices
WO2021012502A1 (en) Screenshot information control method, device, computer apparatus, and storage medium
Paulson Assessing data phishing risks associated with unencrypted apps on smartphones with non-parametric test and random forest model: Insights from Kuwait phishing scam calls
KR102383050B1 (en) Device for changing caller indentification using encryption algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant