CN111881426B - Urban management method, system and storage medium integrating earth-edge space and Internet of things technology - Google Patents

Urban management method, system and storage medium integrating earth-edge space and Internet of things technology Download PDF

Info

Publication number
CN111881426B
CN111881426B CN202010551394.5A CN202010551394A CN111881426B CN 111881426 B CN111881426 B CN 111881426B CN 202010551394 A CN202010551394 A CN 202010551394A CN 111881426 B CN111881426 B CN 111881426B
Authority
CN
China
Prior art keywords
password
city management
management system
user
staff
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010551394.5A
Other languages
Chinese (zh)
Other versions
CN111881426A (en
Inventor
孟君陶
刘先锋
陈祖炳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Tuyu Liaoyuan Information Technology Co ltd
Original Assignee
Fujian Tuyu Liaoyuan Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Tuyu Liaoyuan Information Technology Co ltd filed Critical Fujian Tuyu Liaoyuan Information Technology Co ltd
Priority to CN202010551394.5A priority Critical patent/CN111881426B/en
Publication of CN111881426A publication Critical patent/CN111881426A/en
Application granted granted Critical
Publication of CN111881426B publication Critical patent/CN111881426B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02ATECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE
    • Y02A30/00Adapting or protecting infrastructure or their operation
    • Y02A30/60Planning or developing urban green infrastructure

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Educational Administration (AREA)
  • General Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides a city management method, a system and a storage medium integrating a ground-edge space and an Internet of things technology, which solve the problem that once a worker of a city management system knows a fixed digital password set by the worker, the worker can log in the city management system to perform illegal operation or destruction operation, and the method comprises the following steps: step S100: acquiring a login account input by a user; step S200: judging whether the user logs in for the staff of the city management system based on the login account number input by the user; step S300: based on the digital password, the current date, the current time and the verification code information preset by the corresponding city management system staff, the actual correct password of the user login is adjusted in real time; step S400: the password input by the user is compared with the actual correct password, and the adjustment is performed based on the comparison condition. The application greatly avoids the possibility of outsider login by intelligently changing the password and adjusting the input mode of inputting the password.

Description

Urban management method, system and storage medium integrating earth-edge space and Internet of things technology
Technical Field
The application relates to a city management method, a city management system and a storage medium integrating a ground edge space and an Internet of things technology.
Background
With the high-speed development of politics and economy in China in the 21 st century, technological progress makes public service and social management of the government higher and higher requirements of masses, and requires the government to respond intelligently to various demands including social security, environmental pollution monitoring, urban traffic improvement, public emergency treatment and industrial and commercial activities, thereby creating better urban life for masses.
The three innovations of the internet of things, computers and the internet, which are called world information technology industry, are generally regarded as another revolution in the technical history of computer information processing, and are highly valued by academia, industry and government of various countries. The internet of things enables people to manage life and production in a more convenient and dynamic mode, manages future cities, achieves an intelligent state, improves resource utilization rate and productivity level, and improves the relationship between people and nature and society. From the government perspective, the internet of things is not a simple network concept, and is more similar to a ubiquitous huge social information system based on the integration of a perception technology and an advanced IT technology and related to various industries of national economy, various industries of society and various fields of life.
The digital smart city management system based on the GNSS system comprises a foreground data statistics system and a background data statistics system, wherein the foreground data statistics system and the background data statistics system are electrically connected in a bidirectional mode through a CAN bus system, the foreground data statistics system comprises a GNSS subsystem, a GI S subsystem, a monitoring data acquisition subsystem, an emergency processing subsystem and a digital supervision subsystem, the background data statistics system comprises a comprehensive scoring subsystem, a construction and maintenance subsystem, a basic data management subsystem and a data exchange subsystem, the real-time monitoring and management of urban events are realized, the data management and the real-time updating of urban geographic maps are realized, the efficient and perfect processing is performed for the problems occurring in cities, the life quality of people in the digital cities is changed, and the urban management level is improved.
The prior art solutions described above have the following drawbacks: the login passwords of the conventional city management system are all fixed digital passwords, and once the fixed digital passwords set by the city management system staff are known by outsiders, the outsiders can log in the city management system to perform illegal operation or destructive operation, so that related information such as data of the city management system is lost.
Disclosure of Invention
The application aims to provide an urban management method integrating a ground edge space and an Internet of things technology, which greatly avoids the possibility of foreign logging by intelligently changing passwords and adjusting the input mode of input passwords.
In order to achieve the above object, the present application provides a city management method integrating a geospatial space and an internet of things technology, comprising: step S100: acquiring a login account input by a user; step S200: judging whether the user logs in for the staff of the city management system based on the login account number input by the user; step S300: based on the digital password, the current date, the current time and the verification code information preset by the corresponding city management system staff, the actual correct password of the user login is adjusted in real time; step S400: the password input by the user is compared with the actual correct password, and the adjustment is performed based on the comparison condition.
Optionally, step S200 includes the steps of:
step S210: the method comprises the steps that a login account input by a user is used as a query object, a preset digital password corresponding to a corresponding login account is queried in a first database, the first database is a preset database, a login account of a city management system staff, a digital password preset by the login account of the corresponding city management system staff and a mobile phone number of the corresponding city management system staff are stored, and the preset digital password is at least 2 digits;
step S220: if the main control terminal inquires a preset digital password, the main control terminal synchronously acquires the mobile phone number of the corresponding city management system staff and acquires the position of the current city management system staff through a mobile phone tracker;
if the position of the staff of the city management system is within the preset distance range of the login address of the city management software, the staff of the city management system is judged to be logged in.
Optionally, step S300 includes:
step S310: a plurality of text passwords are randomly sent to mobile phones of city management system staff through a verification code sender;
step S320: forming a first cipher code group based on specific text cipher content, text cipher sequence and number of text ciphers, wherein the first cipher code group is a digital cipher code;
step S330: setting a first password group after a digital password preset by a user as an initial change password I;
step S340: based on the initial password I, acquiring the digit parity on each digit, respectively calculating the number of digits which are even numbers and the number of digits which are odd numbers on the initial password, selecting the digit parity characteristic with more digits, screening all digits by the initial change password I based on the digit parity characteristic with more digits, and arranging the digits according to the corresponding digits in the initial change password I to form an initial change password II;
step S350: acquiring larger numbers in the current date and the current period as application number one;
step S360: taking the initial change password as a dividend, taking the application number I as a divisor, obtaining the remainder of the two as the application number II, and setting the application number II after the initial change password II to form an actual correct password.
Optionally, step S320 includes the steps of:
step S321: acquiring specific text password content, text password sequence and number of text passwords;
step S322: the corresponding characters are replaced by the sum of the stroke number of each character and the total number of the characters in the character password content, and the characters are arranged according to the initial character password sequence to form a first password group.
Optionally, step S400 includes the steps of:
step S410: the main control terminal compares the password input by the user with the actual correct password;
step S420: if the comparison is successful once, the main control terminal directly starts city management software;
if multiple comparison is needed and the comparison times are not more than 3 times, the master control terminal automatically clears the password input by the user and returns to the step S300;
if the number of comparison exceeds 3, step S3A0 is performed.
Optionally, step S3A0 includes the steps of:
step S3A1: a plurality of digital passwords are randomly sent to mobile phones of city management system staff through a verification code sender;
step S3A2: analyzing whether the number of the current date is a prime number, if so, taking the current date as a divisor, taking the number password as a divisor, taking the calculated remainder as an application number III, and setting the application number III in the number password to be taken as an actual correct password; otherwise, putting the smaller number in the current date and the current period after the number password as the actual correct password;
step S3A3: and searching the mobile phone number of the city management total responsible person from a preset database storing the city management total responsible person and the mobile phone number of the city management total responsible person, and sending information of abnormal login to the city management system.
Optionally, the information of sending the abnormal login city management system in step S3A3 is sent through a voice prompt device.
Optionally, the voice prompt device is a voice prompt.
The application also provides a city management system integrating the earth-edge space and the Internet of things technology, which comprises a memory, a processor and a program stored on the memory and capable of running on the processor, wherein the program can be loaded and executed by the processor to realize the city management method integrating the earth-edge space and the Internet of things technology as claimed in the above claims.
The present application also provides a computer storage medium comprising a program capable of implementing, when loaded and executed by a processor, a city management method integrating geospatial and internet of things as claimed in any of the preceding claims.
According to the technical scheme, a set of dynamically changing passwords is formed by combining the random verification code, the passwords set by the user and the date and time period information, so that outsiders are prevented from logging in, the password generation rule is dynamically changed when someone tries to crack, outsiders are prevented from cracking, and the safety of the urban management system is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, and it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to the structures shown in these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram showing the overall steps of a city management method of the present application integrating the earth-bound space and the Internet of things technology.
Fig. 2 is a schematic diagram showing specific steps of step S200 in fig. 1.
Fig. 3 is a schematic diagram illustrating a specific step of step S300 in fig. 1.
Fig. 4 is a schematic diagram showing a specific step of step S320 in fig. 3.
Fig. 5 is a schematic diagram showing specific steps of step S400 in fig. 1.
Fig. 6 is a specific step diagram of step S3A0.
The achievement of the objects, functional features and advantages of the present application will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It should be noted that all directional indicators (such as up, down, left, right, front, and rear … …) in the embodiments of the present application are merely used to explain the relative positional relationship, movement, etc. between the components in a particular posture (as shown in the drawings), and if the particular posture is changed, the directional indicator is changed accordingly.
Furthermore, the description of "first," "second," etc. in this disclosure is for descriptive purposes only and is not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "first", "second" may include the feature explicitly or implicitly. In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be considered to be absent and not within the scope of protection claimed in the present application.
In the present application, unless specifically stated and limited otherwise, the terms "connected," "affixed," and the like are to be construed broadly, and for example, "affixed" may be a fixed connection, a removable connection, or an integral body; can be mechanically or electrically connected; either directly or indirectly, through intermediaries, or both, may be in communication with each other or in interaction with each other, unless expressly defined otherwise. The specific meaning of the above terms in the present application can be understood by those of ordinary skill in the art according to the specific circumstances.
The present application will be described in further detail with reference to the accompanying drawings.
Referring to fig. 1, a city management method integrating the earth-edge space and the internet of things technology disclosed in the present application includes steps S100 to S400.
In step S100, a login account input by a user is acquired.
The input mode of the login account can be voice input, typing input and the like, and the mode of acquiring the login account input by the user is mainly obtained by grabbing the main control terminal in an input box of the login account in the city management system.
In step S200, it is determined whether the city management system worker is logged in based on the login account input by the user.
The method for judging whether the system is logged in by the staff of the city management system can be physical sign detection, such as fingerprint identification, iris identification, face recognition and the like, and can judge the identity information of the personnel logging in the account, or can be an indirect judgment method, such as the scheme.
The step S200 may be divided into steps S210 to S220, referring to fig. 2.
In step S210, the login account input by the user is used as a query object, and the preset digital password corresponding to the corresponding login account is queried in the first database, where the first database is a preset database, and the login account of the staff of the city management system, the digital password preset by the login account of the staff of the corresponding city management system, and the mobile phone number of the staff of the corresponding city management system are stored, and the preset digital password is at least 2 digits.
In step S220, if the master control terminal inquires the preset digital password, the master control terminal synchronously obtains the mobile phone number of the corresponding city management system staff and obtains the current position of the city management system staff through the mobile phone tracker.
If the position of the staff of the city management system is within the preset distance range of the login address of the city management software, the staff of the city management system is judged to be logged in.
The mobile phone number of the city management personnel is input into the mobile phone tracker, so that the position of the mobile phone of the city management personnel can be quickly queried, and the position of the city management system personnel can be indirectly acquired, wherein the preset distance range of the login address of the city management software is less than 0.3m.
In step S300, the actual correct password logged in by the user is adjusted in real time based on the digital password preset by the corresponding city management system staff, the current date, the current time and the verification code information.
In step S300, step S300 may be divided into steps S310 to S360, referring to fig. 3.
In step S310, a plurality of text passwords are randomly transmitted to the mobile phone of the city management system worker through the verification code transmitter.
In step S320, a first cipher set is formed based on the specific text cipher content, text cipher sequence, and number of text ciphers, and the first cipher set is a digital cipher.
Step S320 may be divided into steps S321 to S322, referring to fig. 4.
Step S321: and acquiring specific text password content, text password sequence and number of text passwords.
Step S322: the corresponding characters are replaced by the sum of the stroke number of each character and the total number of the characters in the character password content, and the characters are arranged according to the initial character password sequence to form a first password group.
For example, assuming that the specific text content transmitted is i'm's going to read, the number of strokes is 7, 9, 5, 9, 4 in this order, and a total of 5, in the order of "i'm's going to read", the first cipher suite is 121410149.
In step S330, the first password set is set after the digital password preset by the user as the initial change password one.
Continuing with the example above, assuming the user preset number password is 1783, the initial change password one is 1783121410149.
In step S340, based on the initial password one, the number of digits and parity of each digit are obtained, the number of digits which are even numbers and the number of digits which are odd numbers on the initial password are calculated respectively, the number parity characteristic of digits which are more numbers is selected, all digits are screened out by the initial change password one based on the number parity characteristic of digits which are more numbers, and the initial change password two is formed according to the corresponding digit arrangement in the initial change password one.
Continuing with the example of step S330, initial change password one 1783121410149 has an odd number of 8 and an even number of 5 per digit, and initial change password two is 17311119.
In step S350, the larger number in the current date and current period is acquired as the application number one.
Assuming that the current date is number 3 and the current period is 10, then the application number one is 10.
In step S360, the initial variation password is used as the dividend, the application number one is used as the divisor, the remainder of the two is obtained as the application number two, and the application number two is set after the initial variation password two to form the actual correct password.
The initial change password II is 17311119, the application number I is 10, the application number II is 9, and the actual correct password is 173111199.
In step S400, the password input by the user is compared with the actual correct password, and the adjustment is performed based on the comparison.
The step S400 may be divided into steps S410 to S420, referring to fig. 5.
In step S410, the master terminal compares the password input by the user with the actual correct password.
In step S420, if the comparison is successful, the main control terminal directly opens the city management software; if multiple comparison is needed and the comparison times are not more than 3 times, the master control terminal automatically clears the password input by the user and returns to the step S300; if the number of comparison exceeds 3, step S3A0 is performed.
The step S3A0 may be divided into steps S3A1 to S3A3, referring to fig. 6.
In step S3A1, a plurality of digital passwords are randomly transmitted to the mobile phone of the city management system worker through the verification code transmitter.
In step S3A2, whether the number on the current date is prime number is analyzed, if yes, the current date is taken as divisor, the number password is taken as divisor, the calculated remainder is taken as application number three, and the application number three is set after the number password is taken as the actual correct password; otherwise, the smaller number in the current date and the current period is placed after the number password to be used as the actual correct password.
For example, assume that the transmitted digital code is 12345, assume that the current date is number 3, and when the current period is 10, the current date is a prime number, the remainder is 0, i.e., the actual correct code is 123450.
In step S3A3, the mobile phone number of the city management total responsible person is found from a preset database storing the city management total responsible person and the mobile phone number of the city management total responsible person, and information of abnormally logging in the city management system is sent.
In step S3A3, the information of the abnormal login to the city management system is sent through a voice prompt device, and the voice prompt device is a voice prompt device.
Embodiments of the present application provide a computer readable storage medium comprising a program capable of implementing a method as any of fig. 1-6 when loaded and executed by a processor.
The computer-readable storage medium includes, for example: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Based on the same inventive concept, the embodiment of the application provides a city management system integrating the earth-edge space and the internet of things technology, which comprises a memory and a processor, wherein a program capable of realizing any one of the methods shown in fig. 1 to 6 is stored in the memory.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional modules is illustrated, and in practical application, the above-described functional allocation may be performed by different functional modules according to needs, i.e. the internal structure of the apparatus is divided into different functional modules to perform all or part of the functions described above. The specific working processes of the above-described systems, devices and units may refer to the corresponding processes in the foregoing method embodiments, which are not described herein.
In the several embodiments provided in the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of modules or units is merely a logical functional division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor (processor) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a mobile hard disk, a read-only memory, a random access memory, a magnetic disk or an optical disk.
The embodiments of the present application are all preferred embodiments of the present application, and are not intended to limit the scope of the present application in this way, therefore: all equivalent changes in structure, shape and principle of the application should be covered in the scope of protection of the application.
The embodiments of the present application are all preferred embodiments of the present application, and are not intended to limit the scope of the present application in this way, therefore: all equivalent changes in structure, shape and principle of the application should be covered in the scope of protection of the application.

Claims (8)

1. A city management method integrating a ground-edge space and an Internet of things technology is characterized by comprising the following steps:
step S100: acquiring a login account input by a user;
step S200: judging whether the user logs in for the staff of the city management system based on the login account number input by the user;
step S300: based on the digital password, the current date, the current time and the verification code information preset by the corresponding city management system staff, the actual correct password of the user login is adjusted in real time;
step S400: comparing the password input by the user with the actual correct password, and adjusting based on the comparison condition;
step S300 includes:
step S310: a plurality of text passwords are randomly sent to mobile phones of city management system staff through a verification code sender; step S320: forming a first cipher code group based on specific text cipher content, text cipher sequence and number of text ciphers, wherein the first cipher code group is a digital cipher code;
step S330: setting a first password group after a digital password preset by a user as an initial change password I;
step S340: based on the initial password I, acquiring the digit parity on each digit, respectively calculating the number of digits which are even numbers and the number of digits which are odd numbers on the initial password, selecting the digit parity characteristic with more digits, screening all digits by the initial change password I based on the digit parity characteristic with more digits, and arranging the digits according to the corresponding digits in the initial change password I to form an initial change password II;
step S350: acquiring larger numbers in the current date and the current period as application number one;
step S360: taking the initial change password as a dividend, taking the application number I as a divisor, obtaining the remainder of the two as the application number II, and setting the application number II after the initial change password II to form an actual correct password;
step S320 includes the steps of:
step S321: acquiring specific text password content, text password sequence and number of text passwords;
step S322: the corresponding characters are replaced by the sum of the stroke number of each character and the total number of the characters in the character password content, and the characters are arranged according to the initial character password sequence to form a first password group.
2. The method for urban management integrating geospatial and internet of things according to claim 1, wherein step S200 comprises the steps of:
step S210: the method comprises the steps that a login account input by a user is used as a query object, a preset digital password corresponding to a corresponding login account is queried in a first database, the first database is a preset database, a login account of a city management system staff, a digital password preset by the login account of the corresponding city management system staff and a mobile phone number of the corresponding city management system staff are stored, and the preset digital password is at least 2 digits;
step S220: if the main control terminal inquires a preset digital password, the main control terminal synchronously acquires the mobile phone number of the corresponding city management system staff and acquires the position of the current city management system staff through a mobile phone tracker;
if the position of the staff of the city management system is within the preset distance range of the login address of the city management software, the staff of the city management system is judged to be logged in.
3. The city management method of claim 1, wherein the step S400 comprises the steps of:
step S410: the main control terminal compares the password input by the user with the actual correct password;
step S420: if the comparison is successful once, the main control terminal directly starts city management software;
if multiple comparison is needed and the comparison times are not more than 3 times, the master control terminal automatically clears the password input by the user and returns to the step S300;
if the number of comparison exceeds 3, step S3A0 is performed.
4. The urban management method integrating the earth-boring space and the internet of things according to claim 3, wherein the step S3A0 comprises the steps of:
step S3A1: a plurality of digital passwords are randomly sent to mobile phones of city management system staff through a verification code sender; step S3A2: analyzing whether the number of the current date is a prime number, if so, taking the current date as a divisor, taking the number password as a divisor, taking the calculated remainder as an application number III, and setting the application number III in the number password to be taken as an actual correct password; otherwise, putting the smaller number in the current date and the current period after the number password as the actual correct password;
step S3A3: and searching the mobile phone number of the city management total responsible person from a preset database storing the city management total responsible person and the mobile phone number of the city management total responsible person, and sending information of abnormal login to the city management system.
5. The urban management method integrating the earth-boring space and the internet of things according to claim 4, wherein the information of transmitting the abnormal login to the urban management system in step S3A3 is transmitted through a voice prompt device.
6. The method for urban management integrating geospatial and internet of things according to claim 5, wherein the voice prompt means is a voice prompt.
7. A city management system integrating a ground-edge space and an Internet of things technology is characterized in that: comprising a memory, a processor and a program stored on said memory and executable on said processor, which program is capable of realizing the urban management method of integrated earth-boring space and internet of things technology according to any one of claims 1 to 6 when loaded and executed by the processor.
8. A computer storage medium, characterized by: a program comprising a city management method capable of implementing the integrated earth-boring space and internet of things technology of any one of claims 1 to 6 when loaded and executed by a processor.
CN202010551394.5A 2020-06-17 2020-06-17 Urban management method, system and storage medium integrating earth-edge space and Internet of things technology Active CN111881426B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010551394.5A CN111881426B (en) 2020-06-17 2020-06-17 Urban management method, system and storage medium integrating earth-edge space and Internet of things technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010551394.5A CN111881426B (en) 2020-06-17 2020-06-17 Urban management method, system and storage medium integrating earth-edge space and Internet of things technology

Publications (2)

Publication Number Publication Date
CN111881426A CN111881426A (en) 2020-11-03
CN111881426B true CN111881426B (en) 2023-09-01

Family

ID=73156821

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010551394.5A Active CN111881426B (en) 2020-06-17 2020-06-17 Urban management method, system and storage medium integrating earth-edge space and Internet of things technology

Country Status (1)

Country Link
CN (1) CN111881426B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113066215B (en) * 2021-03-15 2022-09-13 长沙广缘物业管理有限公司 Two-dimensional code access control management method, system and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102638447A (en) * 2012-02-10 2012-08-15 宗祥后 Method and device for system login based on autonomously generated password of user
CN105678159A (en) * 2016-01-29 2016-06-15 宇龙计算机通信科技(深圳)有限公司 Unlocking method and device
CN107770053A (en) * 2017-10-30 2018-03-06 商客通尚景科技江苏有限公司 Instant messages reminding method under a kind of off-line state
CN108763885A (en) * 2018-05-15 2018-11-06 Oppo(重庆)智能科技有限公司 unlocking method, device, storage medium and electronic equipment
CN109830023A (en) * 2019-03-02 2019-05-31 浙江弘电智能科技有限公司 A kind of intelligent building access control system
CN110765427A (en) * 2019-09-23 2020-02-07 秦滢珺 Accounting document processing method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102638447A (en) * 2012-02-10 2012-08-15 宗祥后 Method and device for system login based on autonomously generated password of user
CN105678159A (en) * 2016-01-29 2016-06-15 宇龙计算机通信科技(深圳)有限公司 Unlocking method and device
CN107770053A (en) * 2017-10-30 2018-03-06 商客通尚景科技江苏有限公司 Instant messages reminding method under a kind of off-line state
CN108763885A (en) * 2018-05-15 2018-11-06 Oppo(重庆)智能科技有限公司 unlocking method, device, storage medium and electronic equipment
CN109830023A (en) * 2019-03-02 2019-05-31 浙江弘电智能科技有限公司 A kind of intelligent building access control system
CN110765427A (en) * 2019-09-23 2020-02-07 秦滢珺 Accounting document processing method

Also Published As

Publication number Publication date
CN111881426A (en) 2020-11-03

Similar Documents

Publication Publication Date Title
CN105590055B (en) Method and device for identifying user credible behaviors in network interaction system
US10181168B2 (en) Personal safety verification system and similarity search method for data encrypted for confidentiality
US20190260777A1 (en) Systems and methods for detecting and thwarting attacks on an it environment
CN111278014A (en) Fraud prevention system, method, server and storage medium
CN105827594A (en) Suspicion detection method based on domain name readability and domain name analysis behavior
CN110493181B (en) User behavior detection method and device, computer equipment and storage medium
CA3106936A1 (en) Centralized threat intelligence
CN111740868B (en) Alarm data processing method and device and storage medium
CN106650350A (en) Identity authentication method and system
CN104811506A (en) Grease storage remote supervision system and method based on wireless sensor network
CN112804348A (en) Method for judging repeatability of reported data of edge computing node by cloud monitoring center
CN116644825B (en) Big data-based outpatient information inquiry reservation management system
CN111881426B (en) Urban management method, system and storage medium integrating earth-edge space and Internet of things technology
US20220239668A1 (en) Blockchain-based message processing method and apparatus, device, and storage medium
CN113904821A (en) Identity authentication method and device and readable storage medium
CN110191097A (en) Detection method, system, equipment and the storage medium of login page safety
CN112445873B (en) List display processing method, related device, equipment and medium
CN116305294B (en) Data leakage tracing method and device, electronic equipment and storage medium
CN106294375B (en) Data request real-time processing method and device
CN113271591B (en) Two-standard four-real data encryption interaction method and device based on 5G slice network
CN110417744B (en) Security determination method and device for network access
CN113626857A (en) Meteorological information sharing service system based on visual plug-in and use method
CN113010865A (en) Big data basic component safety management method and system of intelligent education platform
CN112532512A (en) Session message processing method, related device, equipment and medium
CN112785739B (en) Sign-in processing method, computer equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant