CN112419535A - Patrol management and control method, system, device, computer equipment and storage medium - Google Patents

Patrol management and control method, system, device, computer equipment and storage medium Download PDF

Info

Publication number
CN112419535A
CN112419535A CN202011357506.XA CN202011357506A CN112419535A CN 112419535 A CN112419535 A CN 112419535A CN 202011357506 A CN202011357506 A CN 202011357506A CN 112419535 A CN112419535 A CN 112419535A
Authority
CN
China
Prior art keywords
patrol
graphic code
card punching
historical
graphic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011357506.XA
Other languages
Chinese (zh)
Inventor
刘顺平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zooy Technology Development Co ltd
Original Assignee
Shenzhen Zooy Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zooy Technology Development Co ltd filed Critical Shenzhen Zooy Technology Development Co ltd
Priority to CN202011357506.XA priority Critical patent/CN112419535A/en
Publication of CN112419535A publication Critical patent/CN112419535A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/20Checking timed patrols, e.g. of watchman
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present application relates to the field of personal management and control technologies, and in particular, to a method, a system, an apparatus, a computer device, and a storage medium for night patrol management and control. The patrol management and control method comprises the following steps: receiving and analyzing card punching information generated by regularly refreshing the presented graphic code within preset interval time by patrol point display equipment scanned by a patrol personnel end; and judging whether the patrol personnel side has the illegal card punching triggering behavior or not based on the card punching data acquired after the card punching information is analyzed, and generating patrol records when the illegal card punching behavior is not triggered. The present application has the following effects: 1. the problem of loopholes of night watching records generated by remote card punching is solved; 2. the power consumption is reduced; 3. effectively prevent data leakage.

Description

Patrol management and control method, system, device, computer equipment and storage medium
Technical Field
The present application relates to the field of night patrol management technologies, and in particular, to a night patrol management and control method, system, device, computer device, and storage medium.
Background
At present, with the progress of society, the requirement of people on safety is higher and higher. Among various safety precautionary measures, patrol is a relatively effective safety precautionary measure.
The traditional patrol refers to patrol personnel according to a specified patrol route, so that safety precaution is realized. In order to manage and supervise the night patrol staffs, night patrol points are usually placed on a night patrol route, graphic codes are fixed on the night patrol points, the graphic codes refer to graphics obtained by encoding characters or character strings with specific meanings, and night patrol records of the night patrol staffs can be generated by enabling the night patrol staffs to scan the graphic codes. However, the patrol personnel in this way is easy to make fake, for example, the patrol personnel can take a picture of the graphic code in advance and then scan the code in different places at a specified time to generate a patrol record, and a leak of the patrol record generated by punching the card in different places exists.
With respect to the related art in the above, the applicant believes that there is a vulnerability to off-site card punching to generate a patrol record.
Disclosure of Invention
In order to solve the loophole of patrol record generated by remote card punching, the application provides a patrol control method, a system, a device, computer equipment and a storage medium.
In a first aspect, the present application provides a night patrol management and control method, which adopts the following technical scheme:
a patrol management and control method comprises the following steps:
receiving and analyzing card punching information generated by regularly refreshing the presented graphic code within preset interval time by patrol point display equipment scanned by a patrol personnel end;
and judging whether the patrol personnel side has the illegal card punching triggering behavior or not based on the card punching data acquired after the card punching information is analyzed, and generating patrol records when the illegal card punching behavior is not triggered.
By adopting the technical scheme, the graphic codes displayed by the display equipment at the night patrol point can be regularly refreshed, so that the graphic codes scanned by the night patrol personnel at the same night patrol point by adopting the night patrol personnel end can be different at different time periods, the night patrol records are not generated when the illegal card-punching behavior is triggered by the card-punching data generated by the graphic codes scanned by the night patrol personnel end, the card-punching records can be generated only when the illegal card-punching behavior is not triggered by the card-punching data acquired after the night patrol personnel end scans the graphic codes and analyzes the graphic codes, and the night patrol personnel can hardly scan the graphic codes repeatedly in a mode of shooting and storing the graphic codes to acquire the night patrol records, so that the problem of the loopholes of the night patrol records generated by shooting and storing the graphic codes in different places is solved.
Optionally, the card punching data includes graphic code data associated with a graphic code scanned by the night patrol personnel, and the illegal card punching behavior includes repeated card punching;
whether the patrol personnel end has the violation of triggering card punching behavior or not is judged based on the card punching data acquired after the analysis of the card punching information, and a patrol record is generated when the violation card punching behavior is not triggered, including:
matching the graphic code data associated with the graphic code scanned by the patrol personnel with a plurality of historical graphic code data in a historical graphic code database;
and when the historical graphic code data which can be matched with the graphic code data associated with the graphic code scanned by the patrol personnel do not exist in the historical graphic code database, storing the graphic code data associated with the graphic code scanned by the patrol personnel into the historical graphic code database and generating a patrol record.
By adopting the technical scheme, when the graphic code data associated with the graphic code scanned by the patrol officer end cannot be matched with the historical graphic code data in the historical graphic code database, the graphic code scanned by the patrol officer end at this time is described to be never scanned before, so that the situation that the patrol officer end shoots, stores and repeatedly scans the graphic code is described to be avoided, and at the moment, the patrol record is generated. Therefore, the condition that the patrol personnel takes the picture of the graphic code in advance and then scans the code in different places at the appointed time is effectively avoided, and the loophole of patrol record caused by card punching in different places is solved.
Optionally, the graphic code data includes a check code and a patrol point code, and based on the card punching data acquired after the card punching information is analyzed, whether the patrol personnel side has an illegal card punching triggering behavior is judged, and a patrol record is generated when the illegal card punching behavior is not triggered, including:
matching check codes and patrol point codes in the graphic code data associated with the graphic codes scanned by the patrol personnel with check codes and patrol point codes of a plurality of historical graphic code data in a historical graphic code database;
and when the historical graphic code data which can be associated with the graphic codes scanned by the patrol personnel side and the historical graphic code data which are identical to the check codes and the patrol point codes in the graphic code data do not exist in the historical graphic code database, storing the acquired graphic code data in the historical graphic code database and generating a patrol record.
By adopting the technical scheme, only the check code and the patrol point code in the graphic code data need to be judged, when the check code and the patrol point code in the graphic code data corresponding to the graphic code scanned by the patrol personnel end are the same, the patrol personnel end is indicated to scan the same graphic code at the same patrol point, namely the possibility of checking the card at different places exists, and at the moment, the patrol record is not generated. When historical graphic code data which can be associated with the graphic codes scanned by the patrol personnel end and are identical to the check codes and the patrol point codes in the graphic code data do not exist in the historical graphic code database, the fact that the graphic code data corresponding to the graphic codes scanned by the patrol personnel end never appear in historical conditions at the moment is shown, and the fact that the code scanning is effective in generating patrol records is shown. Therefore, whether the patrol personnel scans the same graphic code or not can be conveniently judged by judging the check code and the patrol point code in the graphic code data.
Optionally, the card punching data further includes a card punching time, and the illegal card punching behavior further includes that the card punching time does not belong to a valid card punching time period;
whether the patrol personnel end has the violation of triggering card punching behavior or not is judged based on the card punching data acquired after the analysis of the card punching information, and a patrol record is generated when the violation card punching behavior is not triggered, including:
judging whether the card punching time is in an effective card punching time period or not, and matching the graphic code data associated with the graphic codes scanned by the patrol personnel with a plurality of historical graphic code data in a historical graphic code database;
and when the card punching time belongs to the effective card punching time period and the graphic code data associated with the graphic code scanned by the patrol personnel end cannot be matched with a plurality of historical graphic code data in the historical graphic code database, storing the acquired graphic code data in the historical graphic code database and generating a patrol record.
By adopting the technical scheme, in practical application, the condition that the patrol is required to be performed on the same patrol route for a plurality of times in a time period exists, and at the moment, whether the patrol personnel generates patrol records for corresponding times at patrol points on the same patrol route or not needs to be judged. By judging whether the current card punching time is the effective card punching time or not, and simultaneously judging whether the graphic code data associated with the graphic code scanned by the patrol personnel side can be matched with a plurality of historical graphic code data in a historical graphic code database or not, the patrol record can be generated only when the card punching time belongs to the effective card punching time period and the graphic code data associated with the graphic code scanned by the patrol personnel side cannot be matched with the plurality of historical graphic code data in the historical graphic code database, and finally whether the patrol personnel patrol the same patrol preset times in the preset time period or not can be known by checking the times of the patrol record, so that the patrol personnel can be effectively controlled.
Optionally, the graphic code is a bar code.
By adopting the technical scheme, the bar code is the most economical and practical automatic identification technology so far, and has the advantages of wide application, mature technology and easy use.
Optionally, the graphic code is a two-dimensional code.
By adopting the technical scheme, the two-dimensional code has larger data capacity than a bar code, and has better confidentiality and anti-counterfeiting performance.
In a second aspect, the present application provides a patrol management and control device, which adopts the following technical scheme:
a patrol management and control device comprises a plurality of control units,
the receiving module is used for receiving and analyzing the card punching information generated by regularly refreshing the presented graphic code within the preset interval time by the patrol point display equipment scanned by the patrol personnel terminal;
and the judgment generation module is used for judging whether the patrol personnel side has the illegal card punching triggering behavior or not based on the card punching data acquired after the card punching information is analyzed, and generating the patrol record when the illegal card punching behavior is not triggered.
By adopting the technical scheme, the graphic codes displayed by the patrol point display equipment can be refreshed at regular time, so that the card punching information generated by regularly refreshing the displayed graphic codes in the preset interval time by the patrol point display equipment scanned by the patrol personnel terminal and received by the receiving module at different time periods is possibly different, and meanwhile, the judging and generating module can judge whether the patrol personnel terminal carries out illegal card punching behavior or not, so that the patrol personnel is difficult to repeatedly scan the graphic codes in a mode of shooting and storing the graphic codes to obtain the patrol records, and the problem of loopholes generated by card punching in different places to the patrol records is solved.
In a third aspect, the present application provides a computer device, which adopts the following technical solution:
a computer device comprising a memory and a processor, the memory having stored thereon a computer program that can be loaded by the processor and that implements any of the patrol management methods described above.
In a fourth aspect, the present application provides a computer-readable storage medium, which adopts the following technical solutions:
a computer-readable storage medium storing a computer program that can be loaded by a processor and that can perform any of the patrol management methods described above.
In a fifth aspect, the present application provides an patrol management and control system, including:
a computer device as described above;
the patrol personnel end: the device is used for scanning and sending the graphic code by the patrol personnel;
patrol point display device: and the graphic code is used for displaying the timing refreshing.
In summary, the present application includes at least one of the following beneficial technical effects:
1. the patrol personnel are effectively supervised, the patrol records are difficult to counterfeit, and the safety risk of the patrol personnel on the counterfeit of the patrol records is reduced;
2. the power consumption is reduced;
3. effectively prevent data leakage.
Drawings
Fig. 1 is a schematic flowchart of a patrol management method according to an embodiment of the present application.
Fig. 2 is a schematic flow chart of a patrol management method according to another embodiment of the present application.
Fig. 3 is a schematic flowchart of a patrol management method according to another embodiment of the present application.
Fig. 4 is a schematic flowchart of a patrol management method according to another embodiment of the present application.
Fig. 5 is a schematic flowchart of a patrol management method according to another embodiment of the present application.
Fig. 6 is a block diagram of a patrol management device according to an embodiment of the present application.
Fig. 7 is a block diagram of a patrol management device according to another embodiment of the present application.
Fig. 8 is a block diagram of a patrol management device according to another embodiment of the present application.
Fig. 9 is a schematic structural diagram of a computer device according to an embodiment of the present application.
In the figure, 1, a receiving module; 2. a generation module; 21. a matching sub-module; 22. generating a submodule; 3. A key acquisition module; 4. a decryption module; 5. and setting a module.
Detailed Description
The present application is described in further detail below with reference to figures 1-9.
In one embodiment, an implementation environment related to the patrol management and control method is provided, and the implementation environment comprises a patrol personnel terminal and a server, and also comprises patrol point display equipment which is arranged at a patrol point and used for displaying a graphic code, wherein the patrol point display equipment can be an ink screen, a liquid crystal display screen and the like. The terminal for scanning the graphic codes is used by the patrol personnel, the terminal comprises a desktop computer, a mobile terminal and a wearable terminal, the mobile terminal comprises a mobile phone, a tablet computer and the like, and the wearable terminal comprises a smart watch and the like. The server includes one or more physical servers. The patrol personnel terminal and the server can communicate through the Internet.
In an embodiment, a patrol management and control method is provided, and referring to fig. 1, the embodiment is exemplified by applying the method to the foregoing implementation environment, and the method specifically includes the following steps:
and S1, receiving and analyzing the card punching information generated by regularly refreshing the presented graphic code by the patrol point display equipment scanned by the patrol personnel end within the preset interval time.
Wherein, patrol personnel's end and be used for sweeping terminal of getting the figure sign indicating number for patrolling personnel uses, the terminal includes desktop computer, mobile terminal and wearable terminal, and mobile terminal includes cell-phone, panel computer etc. and wearable terminal includes intelligent wrist-watch etc..
The graphic code is a graphic obtained by encoding a character or a character string having a specific meaning, and includes a two-dimensional code, a barcode, and the like.
In one embodiment, the graphic code is a bar code, and the bar code is a graphic identifier which arranges a plurality of black bars and blanks with different widths according to a certain coding rule and is used for expressing a group of information. Common bar codes are a pattern of parallel lines of dark bars (simply bars) and white bars (simply spaces) of widely differing reflectivity. Meanwhile, the bar code is the most economical and practical automatic identification technology so far, and has the advantages of wide application, mature technology and easy use.
In one embodiment, the graphic code is a two-dimensional code, and the two-dimensional code is a bar code for recording data symbol information by black and white graphics distributed in a planar two-dimensional direction according to a certain rule by using a specific geometric figure. The two-dimensional Code can be divided into a stacked type or row-by-row type and a matrix type two-dimensional Code, wherein the stacked type or row-by-row type two-dimensional Code coding principle is based on a one-dimensional bar Code and is stacked into two or more rows according to requirements, and representative two-dimensional codes comprise Code 16K, Code 49, PDF417 and the like. The matrix type two-dimensional code is coded in a rectangular space through different distribution of black and white pixels in a matrix. On the corresponding element positions of the matrix, representing binary '1' by the appearance of points (square points, round points or other shapes), representing binary '0' by the absence of the points, and determining the meaning represented by the matrix type two-dimensional code by the arrangement and combination of the points; the representative matrix type two-dimensional code is as follows: code One, MaxiCode, QR Code, etc. Meanwhile, the two-dimensional code has larger data capacity than a bar code, and has better confidentiality and anti-counterfeiting performance.
The patrol point is provided with patrol point display equipment for displaying graphic codes, and the patrol point display equipment can be a wash ink screen, a liquid crystal display screen and the like.
In one embodiment, a graphic code library composed of a plurality of graphic codes is prestored in the patrol point display device, for example, the patrol point display device may change the presented graphic codes at regular time according to a refresh frequency preset by the system, so that the graphic codes scanned by a patrol person who goes to the same patrol point in different time periods may be different, and thus it is difficult for the patrol person to repeatedly scan the graphic codes in a manner of shooting and storing the graphic codes to obtain patrol records.
In one embodiment, the night patrol display device may not be networked with the server, thereby reducing power consumption.
In a practical situation, the patrol point display device is specifically an ink screen, the patrol personnel terminal is specifically a mobile phone, and the graphic code is specifically a two-dimensional code. Patrol and be provided with on the route and patrol and change the point, patrol and change the point and be provided with the ink and wash screen that is used for showing graphic code, the two-dimensional code of a plurality of differences has been prestored in the ink and wash screen, has set up the refresh frequency of a plurality of two-dimensional codes in the CPU of ink and wash screen simultaneously to the ink and wash screen need not to communicate with the server. When the night patrol personnel patrol according to a night patrol route and arrive at a night patrol point, the night patrol personnel take the mobile phone to sweep the two-dimensional code on the ink screen so as to realize the night patrol record.
And S2, judging whether the patrol officer side has the illegal card punching behavior triggered or not based on the card punching data acquired after the card punching information is analyzed, and generating patrol records when the illegal card punching behavior is not triggered.
The card punching data can comprise graphic code data and the like, and the graphic code is a graphic obtained by encoding the graphic code data, so that after the graphic code is obtained, the graphic code data corresponding to the graphic code can be obtained only by decoding the graphic code.
The illegal card punching behavior is an illegal operation which can cause the remote card punching to acquire the night patrol record.
In one embodiment, referring to fig. 2, the illegal card punching behavior comprises repeated card punching, and the card punching data comprises graphic code data associated with a graphic code scanned by the night patrol personnel. At this time, step S2, based on the card punching data obtained after analyzing the card punching information, determining whether the patrol officer side has an illegal card punching behavior triggered, and generating a patrol record when the illegal card punching behavior is not triggered, including the following specific steps:
s201, matching the graphic code data associated with the graphic code scanned by the patrol personnel with a plurality of historical graphic code data in a historical graphic code database.
The repeated card punching is that for the same graphic code, the number of code scanning times of the patrol personnel end is larger than one.
In one embodiment, the graphical code data includes a dynamic check code for distinguishing between different graphical codes.
The dynamic check codes in the graphic code data corresponding to different graphic codes are different, so that when the scanned graphic codes are analyzed to obtain the graphic code data, whether the scanned graphic code data is the repeated code scanning can be known by judging whether the obtained graphic code data is the same as the dynamic check code data in the historical graphic code data.
The patrol route usually has different patrol points, so the graphic code data can also comprise patrol point codes, and in the case of consistent check codes, if the patrol point codes are different, the patrol personnel can scan the codes of the different patrol points.
S202, when the historical graphic code data which can be matched with the graphic code data associated with the graphic code scanned by the patrol personnel do not exist in the historical graphic code database, storing the graphic code data associated with the graphic code scanned by the patrol personnel into the historical graphic code database and generating a patrol record.
In addition, the obtained graphic code data can be stored in the historical graphic code database while the patrol record is generated, and when the graphic code data is obtained by scanning the graphic code of the current time again, the graphic code data can be matched with the historical graphic code data in the historical graphic code database, so that the patrol record can not be generated, and the situation that the patrol personnel repeatedly scan the same graphic code by adopting a patrol personnel end is effectively avoided.
When the graphic code data corresponding to the graphic code scanned by the night patrol staff end can be matched with the historical graphic code data in the historical graphic code database, the situation that the scanned code at the night patrol staff end is repeatedly scanned before is explained, the situation that the night patrol staff end possibly shoots, stores and repeatedly scans the graphic code is probably caused, and the night patrol record is not generated at the moment. Therefore, the condition that the patrol personnel terminal shoots the picture of the graphic code in advance and then scans the code in different places at the appointed time is effectively avoided, and the loophole of patrol record caused by the fact that the patrol personnel terminal punches the card in different places is solved.
In one embodiment, referring to fig. 3, the graphic code data includes a check code and a patrol point code, and the card punching data is acquired after the card punching information is analyzed. Based on this, step S2, determining whether the patrol officer has an illegal card punching behavior triggered based on the card punching data acquired after analyzing the card punching information, and generating a patrol record when the illegal card punching behavior is not triggered, includes the following specific steps:
s211, matching check codes and patrol point codes in the graphic code data associated with the graphic codes scanned by the patrol personnel with check codes and patrol point codes of a plurality of historical graphic code data in the historical graphic code database.
The check code of the same patrol point display device can be changed at regular time, the patrol point code represents different patrol points, and the check code and the patrol point code in the graphic code data associated with the graphic code scanned by the patrol personnel end represent the patrol personnel end at which patrol point to scan which code. Even if the check codes are consistent, if the patrol point codes are different, the patrol personnel is indicated to scan the codes and punch the cards at different patrol points, so that the patrol personnel cannot be judged to scan the same graphic code. By matching the check code and the patrol point code in the graphic code data associated with the graphic code scanned by the patrol personnel with the check code and the patrol point code of a plurality of historical graphic code data in the historical graphic code database, the patrol personnel can know whether the same graphic code is scanned at the patrol point.
S212, when the historical graphic code data which can be associated with the graphic codes scanned by the patrol personnel side and the historical graphic code data which are identical to the check codes and the patrol point codes in the graphic code data do not exist in the historical graphic code database, storing the acquired graphic code data in the historical graphic code database and generating a patrol record.
When the historical graphic code data which can be associated with the graphic codes scanned by the patrol officer side and the check codes in the graphic code data are identical to the patrol point codes do not exist in the historical graphic code database, the fact that the patrol officer does not scan the identical graphic codes in the historical time is shown, so that the fact that the patrol officer clicks the card effectively is proved, and the problem that the patrol records are generated due to the fact that the graphic codes are shot and stored in a shooting mode in different places does not exist.
In one embodiment, referring to fig. 4, the punch-through data further includes a punch-through time, and the violating punch-through behavior further includes that the punch-through time does not belong to a valid punch-through time period. Based on this, step S2, determining whether the patrol officer has an illegal card punching behavior triggered based on the card punching data acquired after analyzing the card punching information, and generating a patrol record when the illegal card punching behavior is not triggered, includes the following specific steps:
s221, judging whether the card punching time is in the effective card punching time period or not, and matching the graphic code data associated with the graphic codes scanned by the patrol personnel with a plurality of historical graphic code data in a historical graphic code database.
In practical application, the same patrol route needs to be patrolled for multiple times in a time period, and at the moment, whether the patrol personnel generates corresponding patrol records at patrol points on the same patrol route needs to be judged.
The effective time period of the card punching is the time required by the preset number of rounds of patrol, for example, each round of patrol requires half an hour, and the patrol requires four times, at this time, the effective time period of the card punching can be set to two hours from several points to several points, and meanwhile, the refreshing time of the graphic code can be set to half an hour, that is, in the effective time period of the card punching of two hours, the graphic code can be refreshed only three times, that is, four different graphic codes can appear in total.
S222, when the card punching time belongs to the effective card punching time period and the graphic code data associated with the graphic codes scanned by the patrol personnel end cannot be matched with a plurality of historical graphic code data in the historical graphic code database, storing the acquired graphic code data in the historical graphic code database and generating a patrol record.
When the graphic code data associated with the graphic code scanned by the patrol personnel end cannot be matched with a plurality of historical graphic code data in the historical graphic code database, the patrol personnel end is not scanned before the scanned graphic code, and meanwhile, when the card punching time for scanning the graphic code is within the effective card punching time period, the patrol personnel adopt the patrol personnel end to scan the graphic code meeting the requirement within the specified effective card punching time period, and the card punching effectively generates a card punching record. At last the accessible is looked over the number of times of going rounds as a night watchman and is told whether to have gone round more the preset number of times to the same route of going round more in the time quantum of predetermineeing, has effectively carried out the management and control to the person who goes round more.
In one embodiment, the graphical code data includes a dealer ID for distinguishing between different dealers.
The dealer refers to an enterprise which realizes supervision of patrol personnel by using the patrol management and control method, and the dealer ID refers to a data code for representing each enterprise. For a manufacturer providing the patrol management and control method for a plurality of enterprises, in order to ensure the data privacy of different enterprises applying the patrol management and control method, the pattern code data is provided with a distributor ID, and for different patrol personnel supervised by different distributors, the patrol personnel cannot scan the pattern codes displayed by different distributors at patrol points through the same patrol personnel end, so that the data privacy among different distributors is effectively ensured.
In one embodiment, referring to fig. 5, the patrol supervision method further includes the steps of:
s3, the dealer selected according to the order acquires the dealer root key file formed by encrypting the corresponding dealer ID.
The dealer ordered for selection refers to an enterprise purchasing the patrol control method from a manufacturer providing the patrol control method, the manufacturer sets different dealer IDs in own systems for different dealers, and encrypts the dealer IDs to form a dealer root key file in order to prevent competitors from acquiring own manufacturer data, so that even if other people maliciously steal the dealer root key file, the correct dealer ID cannot be known, and data theft is effectively prevented.
And S4, decrypting the distributor root key file to obtain the distributor key.
The key is a parameter input in an algorithm for converting a plaintext into a ciphertext or converting the ciphertext into the plaintext, is mostly used in a network, is used for protecting personal privacy and the like, and maintains the use safety of the network.
In general, there are three types of key encryption methods: symmetric encryption, asymmetric encryption, and Hash encryption.
The symmetric encryption refers to encryption and decryption by using only one key, and can also be called single-key encryption. The method has no special requirement on the key, two communication parties only need to have the same key, one user encrypts data required to be sent into chaotic information through the key, and a receiver uses the same key to restore the received information into original data. But if the key is intercepted during transmission, the subsequent encryption process behaves as a dummy. The advantage of this method is that the use of the same key saves time required for encryption and decryption, but does not guarantee the security of the key.
The asymmetric encryption is that a pair of keys is used in encryption and decryption, one is a public key which is publicly issued to the outside, and the other is a private key which is stored by the user himself. Theoretically, the encrypted information between the users cannot be cracked as long as the private keys of the users are not lost or stolen. But its disadvantage is also very significant, namely that the encryption speed is very slow. Since a large number of mathematical operations are performed, it takes a lot of time to encrypt even a small amount of information.
The Hash encryption is to convert the information with different lengths into 128-bit codes through mathematical operation to form Hash values, and to determine the legality of both communication parties by comparing whether the values are correct. After data transmission, the Hash value is compared to judge whether the information is intercepted and modified in the way, whether the information is sent by a legal sender or received by a legal receiver, and the like. In this way, the problem of key loss can be prevented, and the method has non-repudiation and is very suitable for the transmission of commercial information.
And S5, forming the distributor key and the dynamic check code into a graphic code database and setting the graphic code database to a graphic code patrol point.
The device for displaying the graphic code at the graphic code patrol point is pre-stored with a graphic code database for regular refreshing and displaying, so that the device for displaying the graphic code is not required to be used in a networking manner, and the power consumption is reduced. Meanwhile, as the distributor ID is encrypted, the code scanning device which does not obtain the distributor key cannot obtain correct graphic code data with the distributor ID through scanning the graphic code, thereby playing a role in preventing data leakage.
In addition, the patrol personnel end can also acquire the corresponding dealer key from the server exclusive to the patrol management and control method when scanning the graphic code, so that the patrol personnel end can decode and acquire the dealer ID when scanning the graphic code.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the present application.
The embodiment of the present application further discloses an patrol management and control device, and referring to fig. 6, the patrol management and control device corresponds to the patrol management and control method in the above embodiment one to one, and the patrol management and control device includes a receiving module 1 and a judgment generating module 2.
The receiving module 1 is used for receiving and analyzing the card punching information generated by regularly refreshing the presented graphic code within the preset interval time by the patrol point display device scanned by the patrol personnel terminal.
And the judgment generation module 2 is used for judging whether the patrol personnel side has the illegal card punching triggering behavior based on the card punching data acquired after the card punching information is analyzed, and generating the patrol record when the illegal card punching behavior is not triggered.
The graphic codes displayed by the patrol point display equipment can be refreshed at regular time, so that the card punching information generated by regularly refreshing the displayed graphic codes by the patrol point display equipment scanned by the patrol personnel terminal and received by the receiving module at different time periods is possibly different, and meanwhile, the judging and generating module can judge whether the patrol personnel terminal carries out illegal card punching action, so that the patrol personnel is difficult to repeatedly scan the graphic codes in a mode of shooting and storing the graphic codes to obtain patrol records, and the problem of vulnerability of patrol records generated by card punching in different places is solved.
In one embodiment, referring to fig. 7, the punch-through data includes graphic code data associated with a graphic code scanned by the night watchman, and the illegal punch-through behavior includes repeated punch-through. Based on this condition: the judgment generation module 2 further includes a matching sub-module 21 and a generation sub-module 22.
And the matching sub-module 21 is used for matching the graphic code data associated with the graphic code scanned by the patrol personnel with a plurality of historical graphic code data in the historical graphic code database.
And the generation sub-module 22 is used for storing the graphic code data associated with the graphic code scanned by the night patrol personnel end into the historical graphic code database and generating a night patrol record when the historical graphic code data which can be matched with the graphic code data associated with the graphic code scanned by the night patrol personnel end does not exist in the historical graphic code database.
In one embodiment, this embodiment differs from the above-described embodiments in that the graphic code data includes a check code and a patrol point code.
The matching sub-module 21 is further configured to match a check code and a patrol point code in the graphic code data associated with the graphic code scanned by the patrol personnel with check codes and patrol point codes of a plurality of historical graphic code data in the historical graphic code database.
The generating sub-module 22 is further configured to, when historical graphic code data, which can be associated with the graphic code scanned by the patrol personnel, in the graphic code data does not exist in the historical graphic code database, have the same check code and patrol point code, store the acquired graphic code data in the historical graphic code database, and generate a patrol record.
In one embodiment, this embodiment differs from the above-described embodiments in that the punch-out data further includes a punch-out time, and the violating punch-out behavior further includes that the punch-out time does not belong to a valid punch-out time period.
The matching sub-module 21 is further configured to determine whether the card punching time is within the valid card punching time period and match the graphic code data associated with the graphic code scanned by the patrol personnel with the plurality of historical graphic code data in the historical graphic code database.
The generating sub-module 22 is further configured to, when the card punching time belongs to the valid card punching time period and the graphic code data associated with the graphic code scanned by the patrol personnel end cannot be matched with the plurality of historical graphic code data in the historical graphic code database, store the acquired graphic code data in the historical graphic code database and generate a patrol record.
In one embodiment, referring to fig. 8, the embodiment is different from the above embodiment in that the embodiment further includes a key obtaining module 3, a decryption module 4, and a setting module 5.
And the key acquiring module 3 is used for acquiring a distributor root key file formed by encrypting the ID of the corresponding distributor according to the distributor selected by the order.
And the decryption module 4 is used for decrypting the distributor root key file to obtain the distributor key.
And the setting module 5 is used for setting the distributor key and the dynamic check code into the graphic code database to the graphic code patrol point.
Referring to fig. 9, an embodiment of the present application further discloses a computer device.
The computer device is a server comprising a processor, a memory and a computer program stored on the memory and running on the processor connected by a system bus.
The computer program is executed by a processor to implement the steps of any of the above embodiments with respect to the patrol management method.
The computer device also includes a network interface and a database. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database, and the internal memory provides an environment for the operating system and the computer program in the non-volatile storage medium to run. The database of the computer device is used for storing information such as graphic code data. The network interface of the computer device is used for communicating with an external terminal through a network connection.
The embodiment of the present application further discloses a computer-readable storage medium, which stores a computer program, and the computer program is executed by a processor to implement the steps related to the patrol management and control method in any of the above embodiments.
It will be understood by those skilled in the art that all or part of the processes of the foregoing method for managing night patrol may be implemented by a computer program, which may be stored in a non-volatile computer-readable storage medium, and the computer program may include the processes of the foregoing method embodiments when executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The computer-readable storage medium includes, for example: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The embodiment of the application further discloses a patrol management and control system which comprises the computer equipment, the patrol personnel end and the patrol point display equipment mentioned in the embodiment.
The patrol personnel end: and the pattern code is used for scanning and sending the pattern code by the night patrol personnel. The terminal for scanning the graphic codes is used by the patrol personnel, the terminal comprises a desktop computer, a mobile terminal and a wearable terminal, the mobile terminal comprises a mobile phone, a tablet computer and the like, and the wearable terminal comprises a smart watch and the like. The server includes one or more physical servers. The patrol personnel terminal and the server can communicate through the Internet.
Patrol point display device: and the graphic code is used for displaying the timing refreshing. The night watching point display device can be an ink screen, a liquid crystal display screen and the like.
The present embodiment is only for explaining the present application, and it is not limited to the present application, and those skilled in the art can make modifications of the present embodiment without inventive contribution as needed after reading the present specification, but all of them are protected by patent law within the scope of the claims of the present application.

Claims (10)

1. A patrol management and control method is characterized by comprising the following steps:
receiving and analyzing card punching information generated by regularly refreshing the presented graphic code within preset interval time by patrol point display equipment scanned by a patrol personnel end;
and judging whether the patrol personnel side has the illegal card punching triggering behavior or not based on the card punching data acquired after the card punching information is analyzed, and generating patrol records when the illegal card punching behavior is not triggered.
2. The patrol management and control method according to claim 1, wherein the card punching data includes graphic code data associated with a graphic code scanned by a patrol officer, and the illegal card punching behavior includes repeated card punching;
whether the patrol personnel end has the violation of triggering card punching behavior or not is judged based on the card punching data acquired after the analysis of the card punching information, and a patrol record is generated when the violation card punching behavior is not triggered, including:
matching the graphic code data associated with the graphic code scanned by the patrol personnel with a plurality of historical graphic code data in a historical graphic code database;
and when the historical graphic code data which can be matched with the graphic code data associated with the graphic code scanned by the patrol personnel do not exist in the historical graphic code database, storing the graphic code data associated with the graphic code scanned by the patrol personnel into the historical graphic code database and generating a patrol record.
3. The patrol management and control method according to claim 2, wherein the graphic code data includes a check code and a patrol point code, and the judging whether the patrol personnel side has an illegal card-punching behavior triggered based on the card-punching data acquired after the card-punching information is analyzed, and generating a patrol record when the illegal card-punching behavior is not triggered comprises:
matching check codes and patrol point codes in the graphic code data associated with the graphic codes scanned by the patrol personnel with check codes and patrol point codes of a plurality of historical graphic code data in a historical graphic code database;
and when the historical graphic code data which can be associated with the graphic codes scanned by the patrol personnel side and the historical graphic code data which are identical to the check codes and the patrol point codes in the graphic code data do not exist in the historical graphic code database, storing the acquired graphic code data in the historical graphic code database and generating a patrol record.
4. The patrol management and control method according to claim 2 or 3, wherein the card punching data further comprises a card punching time, and the illegal card punching behavior further comprises that the card punching time does not belong to a valid card punching time period;
whether the patrol personnel end has the violation of triggering card punching behavior or not is judged based on the card punching data acquired after the analysis of the card punching information, and a patrol record is generated when the violation card punching behavior is not triggered, including:
judging whether the card punching time is in an effective card punching time period or not, and matching the graphic code data associated with the graphic codes scanned by the patrol personnel with a plurality of historical graphic code data in a historical graphic code database;
and when the card punching time belongs to the effective card punching time period and the graphic code data associated with the graphic code scanned by the patrol personnel end cannot be matched with a plurality of historical graphic code data in the historical graphic code database, storing the acquired graphic code data in the historical graphic code database and generating a patrol record.
5. The patrol management method according to any one of claims 1 to 3, wherein the graphic code is a barcode.
6. The patrol management and control method according to any one of claims 1 to 3, wherein the graphic code is a two-dimensional code.
7. A patrol management and control device is characterized by comprising,
the system comprises a receiving module (1) and a processing module, wherein the receiving module is used for receiving and analyzing the card punching information generated by regularly refreshing the presented graphic codes within the preset interval time by the patrol point display equipment scanned by a patrol personnel end;
and the judgment generation module (2) is used for judging whether the patrol personnel side has the illegal card punching triggering behavior based on the card punching data acquired after the card punching information is analyzed, and generating patrol records when the illegal card punching behavior is not triggered.
8. A computer device comprising a memory and a processor, the memory having stored thereon a computer program that can be loaded by the processor and that executes a method of night patrol management according to any one of claims 1 to 6.
9. A computer-readable storage medium, characterized in that a computer program is stored which can be loaded by a processor and which executes the patrol management method according to any one of claims 1 to 6.
10. A patrol management and control system, comprising:
the computer device of claim 8;
the patrol personnel end: the device is used for scanning and sending the graphic code by the patrol personnel;
patrol point display device: and the graphic code is used for displaying the timing refreshing.
CN202011357506.XA 2020-11-26 2020-11-26 Patrol management and control method, system, device, computer equipment and storage medium Pending CN112419535A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011357506.XA CN112419535A (en) 2020-11-26 2020-11-26 Patrol management and control method, system, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011357506.XA CN112419535A (en) 2020-11-26 2020-11-26 Patrol management and control method, system, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112419535A true CN112419535A (en) 2021-02-26

Family

ID=74843210

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011357506.XA Pending CN112419535A (en) 2020-11-26 2020-11-26 Patrol management and control method, system, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112419535A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117456629A (en) * 2023-12-22 2024-01-26 江苏天合储能有限公司 Inspection method, system, device, storage medium and computer program product

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104581726A (en) * 2015-01-15 2015-04-29 天地融科技股份有限公司 Authentication method and system
US20170294053A1 (en) * 2016-04-07 2017-10-12 Yeon Technologies Co., Ltd. Method, system and communication terminal for patrol with scanning tags
CN110287750A (en) * 2019-04-10 2019-09-27 珠海梅西互动技术有限公司 A kind of automatic detection system two dimensional code repeated code detection device and system
CN209729466U (en) * 2019-02-27 2019-12-03 成都阳辰物联天下科技有限公司 A kind of dynamic LED array screen for night watching
CN111311777A (en) * 2020-02-14 2020-06-19 北京明略软件系统有限公司 Dynamic inspection method, server, terminal, storage medium and equipment
CN211827348U (en) * 2020-04-10 2020-10-30 中科台达(湖州)信息技术有限公司 Offline working dynamic two-dimensional code generator
CN211857559U (en) * 2020-04-30 2020-11-03 郑州众惠通信技术有限公司 Intelligent dynamic patrol system with on-site decision

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104581726A (en) * 2015-01-15 2015-04-29 天地融科技股份有限公司 Authentication method and system
US20170294053A1 (en) * 2016-04-07 2017-10-12 Yeon Technologies Co., Ltd. Method, system and communication terminal for patrol with scanning tags
CN209729466U (en) * 2019-02-27 2019-12-03 成都阳辰物联天下科技有限公司 A kind of dynamic LED array screen for night watching
CN110287750A (en) * 2019-04-10 2019-09-27 珠海梅西互动技术有限公司 A kind of automatic detection system two dimensional code repeated code detection device and system
CN111311777A (en) * 2020-02-14 2020-06-19 北京明略软件系统有限公司 Dynamic inspection method, server, terminal, storage medium and equipment
CN211827348U (en) * 2020-04-10 2020-10-30 中科台达(湖州)信息技术有限公司 Offline working dynamic two-dimensional code generator
CN211857559U (en) * 2020-04-30 2020-11-03 郑州众惠通信技术有限公司 Intelligent dynamic patrol system with on-site decision

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117456629A (en) * 2023-12-22 2024-01-26 江苏天合储能有限公司 Inspection method, system, device, storage medium and computer program product
CN117456629B (en) * 2023-12-22 2024-04-19 江苏天合储能有限公司 Inspection method, system, device, storage medium and computer program product

Similar Documents

Publication Publication Date Title
US11216627B2 (en) Method and device for providing and verifying two-dimensional code
US11361397B2 (en) Method and apparatus for watermark embedding and extracting
Espejel-Trujillo et al. Identity document authentication based on VSS and QR codes
Hu et al. An improved piecewise linear chaotic map based image encryption algorithm
CN105323064A (en) System and method for on-line adding of instant file dynamic label and on-line encryption
CN108416223B (en) Information label encryption method and system based on chaos theory
CN1523809A (en) Password variable identification verification technique
CN105849739B (en) Authentication system and authentication method
Yang et al. Image encryption using the chaotic Josephus matrix
KR20050117552A (en) Method and system for enabling remote message composition
Cao et al. Secure QR code scheme based on visual cryptography
CN202870898U (en) Radio frequency-based commodity information identification system
Dong et al. Self‐Adaptive Image Encryption Algorithm Based on Quantum Logistic Map
Majhi et al. Secure content‐based image retrieval using modified Euclidean distance for encrypted features
CN112419535A (en) Patrol management and control method, system, device, computer equipment and storage medium
CN111062456A (en) Two-dimensional code encryption algorithm
Prabha et al. A review of cyber security in cryptography: Services, attacks, and key approach
CN102255728A (en) Identity recognition method for computer system
CN108830364B (en) Dynamic two-dimensional code generation method and system
US20140027515A1 (en) Grayscale Incremental Information Object
CN116091087A (en) Quantum encryption anti-counterfeiting tracing method and terminal based on blockchain and NFC
CN115511030A (en) Anti-counterfeiting verification method and device and electronic equipment
US20140042228A1 (en) Dual Deterent Incremental Information Object
CN113660657A (en) Secret-related carrier management method, device and equipment
Huang et al. Development of a Novel Hyperchaos‐Based Image Encryption Algorithm Consisting of Two Scrambling‐Diffusion Operations

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210226