CN112819998A - Control method and device for control tool, control tool and storage medium - Google Patents

Control method and device for control tool, control tool and storage medium Download PDF

Info

Publication number
CN112819998A
CN112819998A CN202011615306.XA CN202011615306A CN112819998A CN 112819998 A CN112819998 A CN 112819998A CN 202011615306 A CN202011615306 A CN 202011615306A CN 112819998 A CN112819998 A CN 112819998A
Authority
CN
China
Prior art keywords
control
control tool
tool
identification
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011615306.XA
Other languages
Chinese (zh)
Inventor
陈海波
程巍
吉文雅
盛沿桥
王帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenlan Shengshi Technology Suzhou Co ltd
Deep Blue Technology Shanghai Co Ltd
Original Assignee
Shenlan Shengshi Technology Suzhou Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenlan Shengshi Technology Suzhou Co ltd filed Critical Shenlan Shengshi Technology Suzhou Co ltd
Priority to CN202011615306.XA priority Critical patent/CN112819998A/en
Publication of CN112819998A publication Critical patent/CN112819998A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Auxiliary Devices For Machine Tools (AREA)

Abstract

The application provides a control method, a control device, a control tool and a storage medium of the control tool, which are applied to the control tool, wherein the control tool comprises an identity recognition device, a driving device and a limiting device, the limiting device is used for controlling whether the control tool can work or not, and the method comprises the following steps: receiving a first identification result sent by the identity identification device; when the first identification result is the authenticated user, controlling the driving device to open the limiting device so as to enable the control tool to be in a working state; acquiring the working time of the control tool; and when the working time length is longer than a first preset time length, controlling the driving device to close the limiting device so as to enable the control tool to be in an inoperable state. On one hand, the control tool is only used by an authorized user through authenticating the user, and on the other hand, the safe use of the control tool is ensured through controlling the working time of the control tool.

Description

Control method and device for control tool, control tool and storage medium
Technical Field
The present disclosure relates to the field of control technologies for control tools, and in particular, to a control method and apparatus for a control tool, and a storage medium.
Background
Individual combat weapons such as firearms and the like have serious lethality and belong to control tools. But in countries such as the united states, citizens are permitted to carry and use them personally. But accidents often occur due to poor management or lagging management techniques and equipment. People nearby can take the medicine randomly without permission, so that the malignant accident of casualty caused by no reason often happens. In addition, according to the related legal regulations of the gun management in China, the gun can be used only by authorized persons. Therefore, how to strengthen the supervision and management of the use of the firearms and control the safe use of the firearms is very important.
In the related art, the hand vein recognition technology is a new biometric feature recognition technology. The heme of the red blood cells in the veins of the human body is the reducing heme of oxygen, and the reducing heme can absorb near infrared rays, so that only the vein part can be slightly reflected when the near infrared rays are irradiated, and a vein line image is formed. Medical research proves that the shape of the hand pulse has uniqueness and stability.
Therefore, how to better apply the hand pulse recognition technology to the control technology of the control tool to realize strict management of the use of the control tool becomes a problem to be considered by technicians.
Disclosure of Invention
The application aims to provide a control method and device of a control tool, the control tool and a computer readable storage medium, so that identity binding of the control tool is realized, and only an authorized user can use the control tool.
The purpose of the application is realized by adopting the following technical scheme:
in a first aspect, the present application provides a control method for a control tool, which is applied to the control tool, where the control tool includes an identity recognition device, a driving device, and a position limiting device, where the position limiting device is used to control whether the control tool can operate, and the method includes: receiving a first identification result sent by the identity identification device; when the first identification result is the authenticated user, controlling the driving device to open the limiting device so as to enable the control tool to be in a working state; acquiring the working time of the control tool; and when the working time length is longer than a first preset time length, controlling the driving device to close the limiting device so as to enable the control tool to be in an inoperable state. The technical scheme has the advantages that on one hand, the control tool is only used by an authorized user through authentication of the user, and on the other hand, the safe use of the control tool is ensured through controlling the working time of the control tool.
In some optional embodiments, said controlling said driving device to close said limiting device when said working duration is greater than a first predetermined duration includes: when the working time length is longer than the first preset time length, receiving a second identification result sent by the identity identification device; and when the second identification result is not the authenticated user, controlling the driving device to close the limiting device. The technical scheme has the advantages that when the working length exceeds the first preset time length, the limiting device is closed after the user is authenticated again, so that the authenticated user can use legally.
In some optional embodiments, the method further comprises: and when the first identification result is not the authenticated user, controlling the driving device to close the limiting device. The technical scheme has the beneficial effects that the use of the control tool is limited at any time when a non-authentication user is found, so that the safety of the control tool in use is improved.
In some alternative embodiments, the identification device is a vein recognition device; the method further comprises the following steps: receiving authentication vein data sent by a management terminal and sending the authentication vein data to the identity recognition device so that the identity recognition device carries out identity recognition according to the authentication vein data, wherein the authentication vein data comprises vein information of an authenticated user corresponding to the control tool. The technical scheme has the beneficial effects that the identity recognition can be carried out more stably and accurately by authenticating the vein data.
In some optional embodiments, the method further comprises: receiving a first preset time length sent by user equipment. The technical scheme has the advantages that the method for controlling the control tool can be used more flexibly by setting different preset time lengths according to different types or different use conditions of the control tool.
In some optional embodiments, the method further comprises: acquiring identification information of the authenticated user; and sending the identification information to a cloud server and/or user equipment. The technical scheme has the beneficial effects that the current use condition and the use history of the control tool can be conveniently known by sending the identification information.
In some optional embodiments, the control tool further comprises a positioning device; the method further comprises the following steps: when the control tool is in a working state, sending a data request to the positioning device every second preset time; receiving the position information of the control tool sent by the positioning device; and sending the position information of the control tool to a cloud server and/or user equipment. The technical scheme has the beneficial effects that the position of the control tool can be known in time by sending the position information at regular time, so that the service condition of the control tool can be analyzed.
In some optional embodiments, the regulatory tool further comprises an image capture device; the method further comprises the following steps: when the control tool is in a working state, controlling the image acquisition device to shoot the surrounding environment every third preset time to obtain image information of the surrounding environment; receiving the image information of the surrounding environment sent by the image acquisition device; and sending the image information of the surrounding environment to a cloud server and/or user equipment. The technical scheme has the beneficial effects that the service condition of the control tool can be better known by regularly shooting the surrounding environment and sending the surrounding environment, and the use safety of the lifting pipe control tool is improved.
In a second aspect, the present application provides a control device for a control tool, applied to the control tool, the control tool includes an identity recognition device, a driving device and a limiting device, the limiting device is used for controlling whether the control tool can work, the control device includes: the first result receiving module is used for receiving a first identification result sent by the identity identification device; the first driving control module is used for controlling the driving device to open the limiting device when the first identification result is that the user is authenticated, so that the control tool is in a working state; the time length obtaining module is used for obtaining the working time length of the control tool; and the second driving control module is used for controlling the driving device to close the limiting device when the working time length is longer than a first preset time length so as to enable the control tool to be in an inoperable state.
In some optional embodiments, the second drive control module comprises: a second result receiving unit, configured to receive a second identification result sent by the identity recognition apparatus when the working duration is longer than the first predetermined duration; and the driving control unit is used for controlling the driving device to close the limiting device when the second identification result is not the authenticated user.
In some optional embodiments, the control device further comprises: and the third driving control module is used for controlling the driving device to close the limiting device when the first identification result is not the authenticated user.
In some alternative embodiments, the identification device is a vein recognition device; the control device further includes: and the data receiving module is used for receiving the authentication vein data sent by the management terminal and sending the authentication vein data to the identity recognition device so as to enable the identity recognition device to carry out identity recognition according to the authentication vein data, and the authentication vein data comprises the vein information of the authenticated user corresponding to the control tool.
In some optional embodiments, the control device further comprises: the time length receiving module is used for receiving a first preset time length sent by the user equipment.
In some optional embodiments, the control device further comprises: the identification acquisition module is used for acquiring the identification information of the authenticated user; and the identification sending module is used for sending the identification information to a cloud server and/or user equipment.
In some optional embodiments, the control tool further comprises a positioning device; the control device further includes: the data request module is used for sending data requests to the positioning device every second preset time when the control tool is in a working state; the position receiving module is used for receiving the position information of the control tool sent by the positioning device; and the position sending module is used for sending the position information of the control tool to a cloud server and/or user equipment.
In some optional embodiments, the regulatory tool further comprises an image capture device; the control device further includes: the image acquisition module is used for controlling the image acquisition device to shoot the surrounding environment every third preset time when the control tool is in a working state to obtain the image information of the surrounding environment; the image receiving module is used for receiving the image information of the surrounding environment sent by the image acquisition device; and the image sending module is used for sending the image information of the surrounding environment to a cloud server and/or user equipment.
In a third aspect, the present application provides a control tool, where the control tool includes an identity recognition device, a driving device, and a limiting device, where the limiting device is used to control whether the control tool can work; the regulation tool further comprises a memory storing a computer program and a processor implementing the steps of any of the above methods when the processor executes the computer program.
In some alternative embodiments, the identification device is a vein recognition device.
In some optional embodiments, the control tool further comprises a positioning device.
In some optional embodiments, the regulatory tool further comprises an image capture device.
In some alternative embodiments, the drive means is a servo motor and the spacing means is a spacing rod.
In some alternative embodiments, the output signal of the servo motor is a PWM waveform signal.
In some optional embodiments, the pipe making tool further comprises a transmission module, wherein the transmission module can transmit when the limiting rod is opened, and the transmission module cannot transmit when the limiting rod is closed.
In some optional embodiments, the transmission module comprises a transmission shaft, a transmission rod and an end part which are connected in sequence, wherein the end part can rotate around the transmission shaft when the limiting rod is opened, and the end part cannot rotate around the transmission shaft when the limiting rod is closed.
In some optional embodiments, the regulatory tool further comprises a rechargeable battery.
In a fourth aspect, the present application provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements the steps of any of the methods described above.
Drawings
The present application is further described below with reference to the drawings and examples.
Fig. 1 is a schematic flowchart of a control method provided in an embodiment of the present application;
FIG. 2 is a schematic flow chart illustrating a method for controlling a working period according to an embodiment of the present disclosure;
fig. 3 is a schematic flowchart of a control method provided in an embodiment of the present application;
fig. 4 is a schematic flowchart of a control method provided in an embodiment of the present application;
fig. 5 is a schematic flowchart of a control method provided in an embodiment of the present application;
fig. 6 is a schematic flowchart of a control method provided in an embodiment of the present application;
FIG. 7 is a schematic flow chart of a control method provided in an embodiment of the present application;
FIG. 8 is a flow chart of a control method provided by an embodiment of the present application;
fig. 9 is a schematic structural diagram of a control device according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of a second driving control module according to an embodiment of the present application;
fig. 11 is a schematic structural diagram of a control device according to an embodiment of the present application;
fig. 12 is a schematic structural diagram of a control device according to an embodiment of the present application;
fig. 13 is a schematic structural diagram of a control device according to an embodiment of the present application;
fig. 14 is a schematic structural diagram of a control device according to an embodiment of the present application;
fig. 15 is a schematic structural diagram of a control device according to an embodiment of the present application;
fig. 16 is a schematic structural diagram of a control device according to an embodiment of the present application;
FIG. 17 is a schematic structural diagram of a management tool according to an embodiment of the present disclosure;
FIG. 18 is a schematic structural diagram of a management tool according to an embodiment of the present disclosure;
fig. 19 is a schematic structural diagram of a program product for implementing the control method according to an embodiment of the present application.
Detailed Description
The present application is further described with reference to the accompanying drawings and the detailed description, and it should be noted that, in the present application, the embodiments or technical features described below may be arbitrarily combined to form a new embodiment without conflict.
Referring to fig. 1, an embodiment of the present application provides a control method for a control tool, which is applied to the control tool, where the control tool includes an identity recognition device, a driving device, and a limiting device, and the limiting device is used to control whether the control tool can operate, and the method includes steps S101 to S104.
Step S101: and receiving a first identification result sent by the identity identification device. In particular, the identification device may be a vein recognition device, and in a specific embodiment, the vein recognition device may be a finger vein recognition device or a palm vein recognition device.
Step S102: and when the first identification result is the authenticated user, controlling the driving device to open the limiting device so as to enable the control tool to be in a working state. Specifically, the identification data of the authenticated user may be stored, and whether the first identification result is the authenticated user may be confirmed by comparing the first identification result with the stored identification data. In addition, the driving device and the limiting device have a linkage relation, and the opening or closing of the limiting device can be directly controlled through the driving device. In a specific embodiment, the driving device is a servo motor, the limiting device is a limiting rod, the servo motor is connected with the limiting rod, and the limiting rod is moved by the servo motor so as to achieve the purpose of controlling whether the control tool can be normally used.
Step S103: and acquiring the working time of the control tool. Specifically, the timer may be started after the control tool enters the operating state.
Step S104: and when the working time length is longer than a first preset time length, controlling the driving device to close the limiting device so as to enable the control tool to be in an inoperable state. Specifically, the first predetermined time period may be set according to specific use cases. In one embodiment, the first predetermined period of time may be 1 minute or 1 hour.
In a specific implementation, referring to fig. 2, the step S104 may include S201 to S202.
Step S201: and when the working time length is longer than the first preset time length, receiving a second identification result sent by the identity identification device. Specifically, after the preset working time is reached and the identity authentication is passed again, the mobile terminal can be continuously used again, and the cyclic verification is performed according to the authentication. In addition, the identity verification can be actively carried out at any time during the normal use period of the control tool, and the working time is counted again after the identity authentication.
Step S202: and when the second identification result is not the authenticated user, controlling the driving device to close the limiting device. Specifically, when there is no timely authentication or an authentication error, the use of the control tool is limited.
According to the steps of the embodiment of the application, when the working length exceeds the first preset time length, the limiting device is closed after the user is authenticated again, so that the authenticated user can use legally.
According to the method, on one hand, the control tool is only used by an authorized user through authentication of the user, and on the other hand, the safe use of the control tool is ensured through controlling the working duration of the control tool.
Referring to fig. 3, an embodiment of the present application further provides a control method for a management tool, where the method includes steps S101 to S105.
Step S105: and when the first identification result is not the authenticated user, controlling the driving device to close the limiting device.
According to the method, when the non-authentication user is found, the use of the control tool is limited at any time, so that the safety of the control tool in use is improved.
Referring to fig. 4, an embodiment of the present application further provides a control method for a management tool, where the identification apparatus is a vein identification apparatus, and the method includes steps S101 to S104, S106.
Step S106: receiving authentication vein data sent by a management terminal and sending the authentication vein data to the identity recognition device so that the identity recognition device carries out identity recognition according to the authentication vein data, wherein the authentication vein data comprises vein information of an authenticated user corresponding to the control tool. Specifically, vein data of the authenticated user may be imported to the identification apparatus in a wired or wireless manner, so as to facilitate identification. Or when identity verification is carried out, the vein data needing to be identified is sent to the management terminal, and after identification is carried out through the management terminal, the authentication result is sent to the identity identification device.
According to the method, the identity recognition can be carried out more stably and accurately by authenticating the vein data.
Referring to fig. 5, an embodiment of the present application further provides a control method for a management tool, where the method includes steps S101 to S104, and S107.
Step S107: receiving a first preset time length sent by user equipment. Specifically, the first predetermined time period may be preset before the control tool is used, and in a specific embodiment, the first predetermined time period may be directly installed on a main board, or may be set in a wireless manner, so that the first predetermined time period may be changed according to specific needs.
According to the method, different preset time lengths are set according to different types or different use conditions of the control tool, and the method for controlling the control tool can be used more flexibly.
Referring to fig. 6, an embodiment of the present application further provides a control method for a management tool, where the method includes steps S101 to S104, and S108.
Step S108: and acquiring the identification information of the authenticated user, and sending the identification information to a cloud server and/or user equipment. Specifically, the information about the specific use time and the use duration of the control tool may be sent to the management terminal, or the information about which authenticated user used the control tool may be sent to the management terminal, so that the use information of the control tool can be comprehensively known.
According to the method, the current use condition and the use history of the control tool can be conveniently known by sending the identification information.
Referring to fig. 7, an embodiment of the present application further provides a control method for a control tool, where the control tool further includes a positioning device, and the method includes steps S101 to S104, and S109.
Step S109: when the control tool is in a working state, sending a data request to the positioning device every second preset time, receiving the position information of the control tool sent by the positioning device, and sending the position information of the control tool to a cloud server and/or user equipment. Specifically, the position information of the control tool may be determined by GPS satellite positioning or the like. And the second preset time length can be freely set according to the requirement.
According to the method, the position information is sent at regular time, so that the position of the control tool can be known in time, and the analysis of the service condition of the control tool is facilitated.
Referring to fig. 8, an embodiment of the present application further provides a control method for a control tool, where the control tool further includes an image capturing device, and the method includes steps S101 to S104, and S110.
Step S110: when the control tool is in a working state, controlling the image acquisition device to shoot the surrounding environment every third preset time to obtain the image information of the surrounding environment, receiving the image information of the surrounding environment sent by the image acquisition device, and sending the image information of the surrounding environment to the cloud server and/or the user equipment. Specifically, the surrounding environment may be photographed by a common camera or by infrared.
According to the method, the surrounding environment is shot at regular time and sent, so that the using condition of the control tool can be better known, and the using safety of the lifting pipe control tool is improved.
Referring to fig. 9, an embodiment of the present application further provides a control device for a control tool, and a specific implementation manner of the control device is consistent with the implementation manner and the achieved technical effect described in the embodiment of the control method for a control tool, and details of a part of the implementation manner are not repeated.
The control device of the control tool is applied to the control tool 100, the control tool 100 comprises an identity recognition device 120, a driving device 130 and a limiting device 140, the limiting device 140 is used for controlling whether the control tool 100 can work, and the control device comprises:
a first result receiving module 101, configured to receive a first identification result sent by the identity recognition apparatus;
the first driving control module 102 is configured to control the driving device to open the limiting device when the first identification result is that the user is authenticated, so that the control tool is in a working state;
a duration obtaining module 103, configured to obtain a working duration of the control tool;
and the second driving control module 104 is configured to control the driving device to close the limiting device when the working duration is longer than a first predetermined duration, so that the control tool is in an inoperable state.
Referring to fig. 10, in some alternative embodiments, the second drive control module 104 includes: a second result receiving unit 1041, configured to receive a second identification result sent by the identity recognition apparatus when the working duration is longer than the first predetermined duration; the driving control unit 1042 is configured to control the driving device to close the limiting device when the second identification result is not the authenticated user.
Referring to fig. 11, in some alternative embodiments, the control device further comprises: and a third driving control module 105, configured to control the driving device to close the limiting device when the first identification result is not an authenticated user.
Referring to fig. 12, in some alternative embodiments, identification device 120 is a vein recognition device; the control device further includes: and the data receiving module 106 is configured to receive authentication vein data sent by the management terminal and send the authentication vein data to the identity recognition device, so that the identity recognition device performs identity recognition according to the authentication vein data, where the authentication vein data includes vein information of an authenticated user corresponding to the control tool.
Referring to fig. 13, in some optional embodiments, the control device further comprises: the duration receiving module 107 is configured to receive a first predetermined duration sent by the user equipment.
Referring to fig. 14, in some optional embodiments, the control device further comprises: an identification obtaining module 108, configured to obtain identification information of the authenticated user; and the identifier sending module 109 is configured to send the identifier information to a cloud server and/or a user equipment.
Referring to fig. 15, in some alternative embodiments, the regulatory tool further comprises a positioning device 150; the control device further includes: a data request module 110, configured to send a data request to the positioning apparatus every second predetermined time period when the control tool is in a state in which the control tool can operate; a position receiving module 111, configured to receive the position information of the control tool sent by the positioning apparatus; a location sending module 112, configured to send location information of the regulatory tool to a cloud server and/or a user equipment.
Referring to fig. 16, in some alternative embodiments, the regulatory tool further comprises an image capture device 160; the control device further includes: the image acquisition module 113 is configured to control the image acquisition device to shoot the surrounding environment every third predetermined time period when the control tool is in a state in which the control tool can operate, so as to obtain image information of the surrounding environment; an image receiving module 114, configured to receive image information of the surrounding environment sent by the image capturing apparatus; an image sending module 115, configured to send the image information of the surrounding environment to a cloud server and/or a user equipment.
Referring to fig. 17 and 18, the embodiment of the present application further provides a control tool 200, where the control tool 200 includes an identification device 120, a driving device 130, and a position limiting device 140, where the position limiting device 140 is used to control whether the control tool 200 can operate, and the control tool 200 further includes at least one memory 210, at least one processor 220, and a bus 230 connecting different platform systems.
The memory 210 may include readable media in the form of volatile memory, such as random access memory (pram) 211 and/or cache memory 212, and may further include Read Only Memory (ROM) 213.
The memory 210 further stores a computer program, and the computer program can be executed by the processor 220, so that the processor 220 executes the steps of the model selection method in the embodiment of the present application, and a specific implementation manner of the method is consistent with the implementation manner and the achieved technical effect described in the embodiment of the control method of the control tool, and details of some contents are not repeated.
Memory 210 may also include a program/utility 214 having a set (at least one) of program modules 215, including but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Accordingly, processor 220 may execute the computer programs described above, as well as may execute programs/utilities 214.
Bus 230 may be a local bus representing one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or any other type of bus structure.
The regulatory tool 200 may also communicate with one or more external devices 240, such as a keyboard, pointing device, bluetooth device, etc., and may also communicate with one or more devices capable of interacting with the regulatory tool 200, and/or with any devices (e.g., routers, modems, etc.) that enable the regulatory tool 200 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 250. Also, the regulatory tool 200 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) via the network adapter 260. Network adapter 260 may communicate with other modules of regulation tool 200 via bus 230. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the policing tool 200, including but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, RAID systems, tape drives, and data backup storage platforms, to name a few.
Referring to fig. 18, in some alternative embodiments, the identification device is a vein recognition device.
Referring to fig. 18, in some alternative embodiments, the control tool further comprises a positioning device.
Referring to fig. 18, in some alternative embodiments, the regulatory tool further comprises an image capture device.
In some alternative embodiments, the drive means is a servo motor and the spacing means is a spacing rod.
Referring to fig. 18, in some alternative embodiments, the output signal of the servo motor is a PWM waveform signal.
Referring to fig. 18, in some alternative embodiments, the control tool further comprises a transmission module 150, wherein the transmission module can transmit when the limiting rod is opened, and the transmission module cannot transmit when the limiting rod is closed.
In some optional embodiments, the transmission module comprises a transmission shaft, a transmission rod and an end part which are connected in sequence, wherein the end part can rotate around the transmission shaft when the limiting rod is opened, and the end part cannot rotate around the transmission shaft when the limiting rod is closed.
Referring to fig. 18, in some alternative embodiments, the regulatory tool further comprises a rechargeable battery.
The embodiment of the present application further provides a computer-readable storage medium, where the computer-readable storage medium is used for storing a computer program, and when the computer program is executed, the steps of the model selection method in the embodiment of the present application are implemented, and a specific implementation manner of the computer program is consistent with the implementation manner and the achieved technical effect described in the embodiment of the control method of the foregoing control tool, and some contents are not described again.
Fig. 19 shows a program product 300 provided by the present embodiment for implementing the above method, which may employ a portable compact disc read only memory (CD-ROM) and include program codes, and may be run on a terminal device, such as a personal computer. However, the program product 300 of the present invention is not so limited, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. Program product 300 may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
A computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing. Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a wide area network (wan), or may be connected to AN external computing device (e.g., through the internet using AN internet service provider).
The foregoing description and drawings are only for purposes of illustrating the preferred embodiments of the present application and are not intended to limit the present application, which is, therefore, to the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present application.

Claims (26)

1. A control method of a control tool is applied to the control tool, the control tool comprises an identity recognition device, a driving device and a limiting device, and the limiting device is used for controlling whether the control tool can work or not, the method comprises the following steps:
receiving a first identification result sent by the identity identification device;
when the first identification result is the authenticated user, controlling the driving device to open the limiting device so as to enable the control tool to be in a working state;
acquiring the working time of the control tool;
and when the working time length is longer than a first preset time length, controlling the driving device to close the limiting device so as to enable the control tool to be in an inoperable state.
2. The control method according to claim 1, wherein the controlling the driving device to close the limiting device when the operating time period is longer than a first predetermined time period comprises:
when the working time length is longer than the first preset time length, receiving a second identification result sent by the identity identification device;
and when the second identification result is not the authenticated user, controlling the driving device to close the limiting device.
3. The control method according to claim 1, characterized in that the method further comprises:
and when the first identification result is not the authenticated user, controlling the driving device to close the limiting device.
4. The control method according to claim 1, wherein the identification device is a vein recognition device;
the method further comprises the following steps:
receiving authentication vein data sent by a management terminal and sending the authentication vein data to the identity recognition device so that the identity recognition device carries out identity recognition according to the authentication vein data, wherein the authentication vein data comprises vein information of an authenticated user corresponding to the control tool.
5. The control method according to claim 1, characterized in that the method further comprises:
receiving a first preset time length sent by user equipment.
6. The control method according to claim 1, characterized in that the method further comprises:
acquiring identification information of the authenticated user;
and sending the identification information to a cloud server and/or user equipment.
7. The control method of claim 1, wherein the control tool further comprises a positioning device;
the method further comprises the following steps:
when the control tool is in a working state, sending a data request to the positioning device every second preset time;
receiving the position information of the control tool sent by the positioning device;
and sending the position information of the control tool to a cloud server and/or user equipment.
8. The control method of claim 1, wherein the regulatory tool further comprises an image acquisition device;
the method further comprises the following steps:
when the control tool is in a working state, controlling the image acquisition device to shoot the surrounding environment every third preset time to obtain image information of the surrounding environment;
receiving the image information of the surrounding environment sent by the image acquisition device;
and sending the image information of the surrounding environment to a cloud server and/or user equipment.
9. A control device of a control tool is applied to the control tool, the control tool comprises an identity recognition device, a driving device and a limiting device, the limiting device is used for controlling whether the control tool can work or not, and the control device comprises:
the first result receiving module is used for receiving a first identification result sent by the identity identification device;
the first driving control module is used for controlling the driving device to open the limiting device when the first identification result is that the user is authenticated, so that the control tool is in a working state;
the time length obtaining module is used for obtaining the working time length of the control tool;
and the second driving control module is used for controlling the driving device to close the limiting device when the working time length is longer than a first preset time length so as to enable the control tool to be in an inoperable state.
10. The control device of claim 9, wherein the second drive control module comprises:
a second result receiving unit, configured to receive a second identification result sent by the identity recognition apparatus when the working duration is longer than the first predetermined duration;
and the driving control unit is used for controlling the driving device to close the limiting device when the second identification result is not the authenticated user.
11. The control device according to claim 9, characterized by further comprising:
and the third driving control module is used for controlling the driving device to close the limiting device when the first identification result is not the authenticated user.
12. The control device of claim 9, wherein the identification device is a vein recognition device;
the control device further includes:
and the data receiving module is used for receiving the authentication vein data sent by the management terminal and sending the authentication vein data to the identity recognition device so as to enable the identity recognition device to carry out identity recognition according to the authentication vein data, and the authentication vein data comprises the vein information of the authenticated user corresponding to the control tool.
13. The control device according to claim 9, characterized by further comprising:
the time length receiving module is used for receiving a first preset time length sent by the user equipment.
14. The control device according to claim 9, characterized by further comprising:
the identification acquisition module is used for acquiring the identification information of the authenticated user;
and the identification sending module is used for sending the identification information to a cloud server and/or user equipment.
15. The control device of claim 9, wherein the control means further comprises a positioning device;
the control device further includes:
the data request module is used for sending data requests to the positioning device every second preset time when the control tool is in a working state;
the position receiving module is used for receiving the position information of the control tool sent by the positioning device;
and the position sending module is used for sending the position information of the control tool to a cloud server and/or user equipment.
16. The control device of claim 9, wherein the regulatory tool further comprises an image acquisition device;
the control device further includes:
the image acquisition module is used for controlling the image acquisition device to shoot the surrounding environment every third preset time when the control tool is in a working state to obtain the image information of the surrounding environment;
the image receiving module is used for receiving the image information of the surrounding environment sent by the image acquisition device;
and the image sending module is used for sending the image information of the surrounding environment to a cloud server and/or user equipment.
17. A control tool is characterized by comprising an identity recognition device, a driving device and a limiting device, wherein the limiting device is used for controlling whether the control tool can work or not;
the policing tool further comprises a memory storing a computer program and a processor implementing the steps of the method of any one of claims 1 to 8 when the processor executes the computer program.
18. A control tool as claimed in claim 17, wherein said identification means is a vein recognition means.
19. The control tool of claim 17, further comprising a positioning device.
20. The regulatory tool of claim 17, further comprising an image capture device.
21. The tool of claim 17 wherein said drive means is a servo motor and said stop means is a stop rod.
22. The control tool of claim 21, wherein the output signal of the servo motor is a PWM waveform signal.
23. The vessel of claim 21, further comprising a transmission module that is capable of transmitting when the restraint bar is open and is incapable of transmitting when the restraint bar is closed.
24. The pipe production tool of claim 23, wherein said drive module comprises a drive shaft, and an end portion, connected in series, said end portion being capable of rotating about said drive shaft when said restraint lever is open and incapable of rotating about said drive shaft when said restraint lever is closed.
25. The control tool of claim 17, further comprising a rechargeable battery.
26. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 8.
CN202011615306.XA 2020-12-30 2020-12-30 Control method and device for control tool, control tool and storage medium Pending CN112819998A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011615306.XA CN112819998A (en) 2020-12-30 2020-12-30 Control method and device for control tool, control tool and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011615306.XA CN112819998A (en) 2020-12-30 2020-12-30 Control method and device for control tool, control tool and storage medium

Publications (1)

Publication Number Publication Date
CN112819998A true CN112819998A (en) 2021-05-18

Family

ID=75855532

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011615306.XA Pending CN112819998A (en) 2020-12-30 2020-12-30 Control method and device for control tool, control tool and storage medium

Country Status (1)

Country Link
CN (1) CN112819998A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201050967Y (en) * 2006-12-10 2008-04-23 马扬茗 Electronic aiming and image device used for weapon device
CN103259841A (en) * 2013-03-12 2013-08-21 中北大学 Revolver with intelligent recording system
CN105488480A (en) * 2015-12-04 2016-04-13 识益生物科技(北京)有限公司 Gun with finger vein identification function and gun management system
US20170053284A1 (en) * 2015-08-20 2017-02-23 Bank Of America Corporation Dual biometric automatic teller machine ("atm") session initialization having single in-line session maintenance
US9787656B1 (en) * 2013-06-29 2017-10-10 Securus Technologies, Inc. Intelligent facility device
CN107608224A (en) * 2017-09-18 2018-01-19 广东美的制冷设备有限公司 Control method, device and the computer-readable recording medium of household electrical appliances
CN110303465A (en) * 2019-07-31 2019-10-08 苏州池久节能电气有限公司 A kind of dangerous instruments intelligent control vehicle device and its control method
CN111639727A (en) * 2020-05-27 2020-09-08 北京中天锋安全防护技术有限公司 Gun real-time monitoring system and real-time monitoring method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201050967Y (en) * 2006-12-10 2008-04-23 马扬茗 Electronic aiming and image device used for weapon device
CN103259841A (en) * 2013-03-12 2013-08-21 中北大学 Revolver with intelligent recording system
US9787656B1 (en) * 2013-06-29 2017-10-10 Securus Technologies, Inc. Intelligent facility device
US20170053284A1 (en) * 2015-08-20 2017-02-23 Bank Of America Corporation Dual biometric automatic teller machine ("atm") session initialization having single in-line session maintenance
CN105488480A (en) * 2015-12-04 2016-04-13 识益生物科技(北京)有限公司 Gun with finger vein identification function and gun management system
CN107608224A (en) * 2017-09-18 2018-01-19 广东美的制冷设备有限公司 Control method, device and the computer-readable recording medium of household electrical appliances
CN110303465A (en) * 2019-07-31 2019-10-08 苏州池久节能电气有限公司 A kind of dangerous instruments intelligent control vehicle device and its control method
CN111639727A (en) * 2020-05-27 2020-09-08 北京中天锋安全防护技术有限公司 Gun real-time monitoring system and real-time monitoring method

Similar Documents

Publication Publication Date Title
EP1782019B1 (en) Blasting system and method of controlling a blasting operation
US9418277B2 (en) Electronic device and method for unlocking the electronic device
CN110910555A (en) Safety management method for intelligent operation ticket
CN110009776B (en) Identity authentication method and device
CN106462179A (en) Portable computing device access
CN108933668A (en) For providing the system and method for protected password and authentication mechanism that software or firmware are programmed and are updated
CN105577633B (en) A kind of verification method and terminal
CN103679001A (en) Method and device for controlling behaviors of application program in mobile communication terminal
CN102700502A (en) Vehicle access control method and vehicle access system
CN104835228A (en) Public rental housing management method and system based on facial recognition
CN103096171A (en) Application authorization method, application authorization system and intelligent television based on human face identification
CN105721460A (en) Voiceprint password vehicle control system and method
CN101859373A (en) Method for safely accessing mobile credible terminal
CN214670763U (en) Control tool
CN112819998A (en) Control method and device for control tool, control tool and storage medium
EP3062294B1 (en) Method and devices for upgrading an existing access control system
CN112581664A (en) Control method and device based on intelligent identification, electronic equipment and storage medium
CN112884966A (en) Access control method and device, electronic equipment and storage medium
CN107391987A (en) Application guard method, device and electronic equipment based on living things feature recognition
RU2691201C1 (en) System, method and device for continuous user authentication and protection of automated workstation resources from unauthorized access
Bhargava et al. Biometric access control implementation using 32 bit arm cortex processor
WO2017078682A1 (en) Password modifications
CN113886785B (en) Active safety auxiliary method, device and medium for petroleum drilling driller control system
CN109858583A (en) Electric power instrument borrows information processing method, borrowing method and device
CN104103106A (en) Access control system and control method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination