CN112835694A - Inspection task processing method and device, computer equipment and storage medium - Google Patents

Inspection task processing method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN112835694A
CN112835694A CN202110096114.0A CN202110096114A CN112835694A CN 112835694 A CN112835694 A CN 112835694A CN 202110096114 A CN202110096114 A CN 202110096114A CN 112835694 A CN112835694 A CN 112835694A
Authority
CN
China
Prior art keywords
inspection
task
verification information
result
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110096114.0A
Other languages
Chinese (zh)
Inventor
叶建辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGDONG JIANBANG COMPUTER SOFTWARE CO Ltd
Original Assignee
GUANGDONG JIANBANG COMPUTER SOFTWARE CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGDONG JIANBANG COMPUTER SOFTWARE CO Ltd filed Critical GUANGDONG JIANBANG COMPUTER SOFTWARE CO Ltd
Priority to CN202110096114.0A priority Critical patent/CN112835694A/en
Publication of CN112835694A publication Critical patent/CN112835694A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/4881Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues
    • G06F9/4887Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues involving deadlines, e.g. rate based, periodic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to a method and a device for processing a routing inspection task, computer equipment and a storage medium. The method comprises the following steps: receiving the polling task and displaying the polling task; responding to the operation on the polling task, and generating a polling result; acquiring at least two pieces of verification information corresponding to the inspection result; verifying the authenticity of the verification information, and verifying at least two pieces of verification information after the authenticity of the verification information passes verification; and when the verification of at least two pieces of verification information passes, reporting the inspection result to a background management system. Therefore, the steps from the receiving of the routing inspection task, the execution of the routing inspection task to the generation of the routing inspection result can be completed, at least two pieces of verification information corresponding to the routing inspection result are further verified, the routing inspection result is reported to the background management system, the execution and processing processes of the whole routing inspection task are completed, and the task processing efficiency is improved.

Description

Inspection task processing method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of intelligent task processing technologies, and in particular, to a method and an apparatus for processing a polling task, a computer device, and a storage medium.
Background
With the development of internet technology, the requirements of relevant task execution departments on professional business processing methods are more and more strong. In the conventional technology, aiming at the continuous business task processing requirement, a sensor or hardware equipment is adopted to be in butt joint with a software system, so that the purposes of remote supervision and task processing are achieved.
However, with the conventional technology, only data collection and transmission of related tasks can be completed, processing and execution of the tasks cannot be performed, and task processing efficiency is low.
Disclosure of Invention
In view of the above, it is necessary to provide a method and apparatus for processing a patrol task, a computer device, and a storage medium, which can perform task processing.
A method for processing a polling task, the method comprising:
receiving an inspection task and displaying the inspection task;
responding to the operation on the routing inspection task, and generating a routing inspection result;
acquiring at least two pieces of verification information corresponding to the inspection result;
verifying the authenticity of the verification information, and verifying the at least two pieces of verification information after the authenticity of the verification information passes verification;
and when the verification of the at least two verification information passes, reporting the inspection result to a background management system.
In one embodiment, the polling task is a task generated by polling enterprise data in a preset enterprise database by the background management system according to preset time to obtain target enterprise data and according to a target polling item corresponding to the target enterprise data and a task deadline.
In one embodiment, the receiving the inspection task and displaying the inspection task includes:
receiving the inspection task and a first identification code corresponding to the inspection task;
receiving first identity verification information corresponding to the first identification code;
and responding to a first verification result formed by verifying the first identity verification information, and displaying the inspection task when the first verification result is passed.
In one embodiment, before generating the inspection result in response to the operation on the inspection task, the method includes:
responding to the operation on the inspection assistance application of the display interface, and receiving a second identification code;
receiving second identity verification information corresponding to the second identification code;
and responding to a second verification result formed by verifying the second identity verification information, and displaying the inspection task when the second verification result is passed.
In one embodiment, the obtaining of the at least two verification information corresponding to the inspection result includes:
acquiring verification information corresponding to the second identification code;
and adding verification information corresponding to the second identification code to the at least two pieces of verification information.
In one embodiment, the method further comprises:
if the inspection result is unqualified, acquiring law enforcement application information;
sending the inspection result to the background management system;
receiving a law enforcement result generated by the background management system according to the law enforcement application information;
and executing a corresponding inspection task according to the law enforcement result.
In one embodiment, the law enforcement result is a result generated by the background management system configuring law enforcement resources according to preset law enforcement rules and according to the law enforcement application information.
An inspection task processing device, the device comprising:
the task receiving module is used for receiving the inspection task and displaying the inspection task;
the inspection result generating module is used for responding to the operation on the inspection task and generating an inspection result;
the verification information acquisition module is used for acquiring at least two pieces of verification information corresponding to the inspection result;
the verification module is used for verifying the authenticity of the verification information, and verifying the at least two pieces of verification information after the authenticity of the verification information passes verification;
and the data reporting module is used for reporting the inspection result to a background management system after the at least two pieces of verification information are verified.
A computer device comprising a memory storing a computer program and a processor implementing the steps of the method of any preceding claim when the processor executes the computer program.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of any of the above
The routing inspection task processing method, the routing inspection task processing device, the computer equipment and the storage medium receive the routing inspection task and display the routing inspection task; responding to the operation on the polling task, and generating a polling result; acquiring at least two pieces of verification information corresponding to the inspection result; verifying the authenticity of the verification information, and verifying at least two pieces of verification information after the authenticity of the verification information passes verification; and when the verification of at least two pieces of verification information passes, reporting the inspection result to a background management system. Therefore, the steps from the receiving of the routing inspection task, the execution of the routing inspection task to the generation of the routing inspection result can be completed, at least two pieces of verification information corresponding to the routing inspection result are further verified, the routing inspection result is reported to the background management system, the execution and processing processes of the whole routing inspection task are completed, and the task processing efficiency is improved.
Drawings
FIG. 1 is a flow diagram illustrating a method for routing inspection task processing according to an embodiment;
FIG. 2 is a schematic flow chart illustrating one possible implementation of step S100 in one embodiment;
FIG. 3 is a schematic flow chart of an embodiment before step S200;
FIG. 4 is a schematic flow chart of a law enforcement application in one embodiment;
FIG. 5 is a diagram illustrating a display interface on a terminal device in one embodiment;
FIG. 6 is a diagram illustrating a display interface on the backend management system, under an embodiment;
FIG. 7 is a schematic diagram illustrating the generation of a routing inspection work order according to an embodiment;
FIG. 8 is a schematic diagram of an emergency work order routing inspection according to one embodiment;
FIG. 9 is a schematic diagram of an example help patrol process;
FIG. 10 is a schematic diagram of an inspection process in one embodiment;
FIG. 11 is a schematic representation of a law enforcement flow in one embodiment;
fig. 12 is a block diagram showing the configuration of the inspection task processing apparatus in one embodiment;
FIG. 13 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
In an embodiment, as shown in fig. 1, a method for processing an inspection task is provided, and this embodiment is illustrated by applying the method to a terminal, it is to be understood that the method may also be applied to a server, and may also be applied to a system including a terminal and a server, and is implemented by interaction between the terminal and the server. In this embodiment, the method includes the steps of:
and S100, receiving the inspection task and displaying the inspection task.
And S200, responding to the operation on the inspection task, and generating an inspection result.
And step S300, acquiring at least two pieces of verification information corresponding to the inspection result.
And step S400, verifying the authenticity of the verification information, and verifying at least two pieces of verification information after the authenticity of the verification information passes verification.
And S500, reporting the inspection result to a background management system after the at least two pieces of verification information are verified.
The inspection task refers to an inspection task which needs to be processed by related workers, and the inspection task can be an inspection work order or an inspection list. The verification information refers to information that the related staff confirms the inspection result.
Specifically, after the terminal equipment receives the routing inspection task, the routing inspection task is displayed on a display interface of the terminal equipment. And (4) related workers perform inspection according to the inspection task displayed on the display interface, and operate on the display interface to finally obtain an inspection result. And confirming by at least two workers based on the inspection result to obtain at least two pieces of verification information. Verifying the authenticity of at least two pieces of verification information, exemplarily, after at least two workers confirm the inspection result and submit the inspection confirmed verification information through signing, face recognition, account authorization and other modes, the terminal device or the background management system verifies the signing, face recognition, account authorization and the like to verify whether the information is authentic and is matched with the corresponding workers. After the authenticity of the verification information is verified, the at least two pieces of verification information are verified under the condition that the at least two pieces of verification information are both true, whether the at least two pieces of verification information are generated for one inspection task is checked, if yes, the at least two pieces of verification information are verified to be passed, and the inspection result is reported to a background management system under the condition that the at least two pieces of verification information are both based on the inspection task, so that the whole process of executing and processing the inspection task is completed.
The routing inspection task processing method receives the routing inspection task and displays the routing inspection task; responding to the operation on the polling task, and generating a polling result; acquiring at least two pieces of verification information corresponding to the inspection result; verifying the authenticity of the verification information, and verifying at least two pieces of verification information after the authenticity of the verification information passes verification; and when the verification of at least two pieces of verification information passes, reporting the inspection result to a background management system. Therefore, the steps from the receiving of the routing inspection task, the execution of the routing inspection task to the generation of the routing inspection result can be completed, at least two pieces of verification information corresponding to the routing inspection result are further verified, the routing inspection result is reported to the background management system, the execution and processing processes of the whole routing inspection task are completed, and the task processing efficiency is improved.
In an embodiment, optionally, the polling task is a task that is generated by polling enterprise data in a preset enterprise database for the background management system according to a preset time to obtain target enterprise data, and according to a target polling item corresponding to the target enterprise data and a task deadline.
The preset time refers to the time that each patrol task needs to be executed. The enterprise database refers to information of enterprises needing to be patrolled, and comprises information of enterprise names, enterprise categories, enterprise properties and the like. The target inspection item refers to an item needing to inspect the enterprise. The task deadline refers to a completion deadline of the patrol task.
Specifically, the related staff establishes an enterprise file on the background management system, including information such as enterprise name, enterprise category, enterprise nature, and the like, to obtain a plurality of enterprise data (preset enterprise database). The background management system polls enterprise data according to preset task generation rules according to preset time to obtain target enterprise data conforming to the filing, generates a polling task according to a target polling item and a task time limit corresponding to the enterprise after obtaining the target enterprise data, and sends the polling task to the terminal equipment after the preset time is reached, so that related workers complete the task execution and processing process according to the polling task on the terminal equipment, and the task processing efficiency is improved.
In one embodiment, as shown in fig. 2, a schematic flow chart of an implementation manner of step S100 includes:
and step S110, receiving the inspection task and a first identification code corresponding to the inspection task.
Step S120, receiving first authentication information corresponding to the first identification code.
Step S130, in response to a first verification result formed by verifying the first authentication information, displaying the inspection task on the verification device when the first verification result is passed.
The first identification code is an identification code for verifying the identity of a worker holding the terminal equipment corresponding to the inspection task, and the identification code can be a two-dimensional code or other verification identification codes. The first authentication information is information for authenticating the identity of the worker who is identified by the terminal.
Specifically, when the terminal device receives the polling task, the terminal device receives a first identification code corresponding to the polling task, and displays the first identification code on a display interface of the terminal device. For example, when the first identification code is a graphical two-dimensional code, relevant workers perform code scanning verification, after the code is scanned, the terminal device receives first authentication information corresponding to the first identification code, and the terminal device or the background management system verifies the first authentication information to obtain a corresponding first verification result. When the first verification result is that the inspection task passes, the fact that the worker is a legal worker capable of performing the inspection task at this time is indicated, at the moment, the inspection task is displayed on the terminal equipment, and the worker can conveniently perform inspection according to the inspection task on the terminal equipment.
Optionally, the inspection task (or the inspection work order, the inspection list) is given a task time limit after being generated, and the inspection content of the inspection task needs to be completed within the task time limit and reported to the system. The inspection task comprises a plurality of inspection items, the inspection items comprise necessary inspection items and optional inspection items, the necessary inspection items are items which need to be inspected, the optional inspection items provide references for workers, and whether the workers check the inspection items can be determined.
In the embodiment, the inspection task and the first identification code corresponding to the inspection task are received; receiving first identity verification information corresponding to the first identification code; and responding to a first verification result formed by verifying the first identity verification information, and displaying the routing inspection task when the first verification result is passed. Therefore, on the premise of ensuring information safety, the information of the inspection task is provided for the staff who executes the inspection task, and the inspection task is prevented from being acquired or tampered by illegal staff.
In one embodiment, as shown in fig. 3, which is a schematic flow chart of an implementable method before step S200, the method includes:
step S201, generating a second identification code in response to the operation on the inspection assistance application of the display interface.
Step S202, receiving second authentication information corresponding to the second identification code.
Step S203, responding to a second verification result formed by verifying the second identity verification information, and displaying the inspection task when the second verification result is passed.
Wherein, the second identification code is the identification code of the staff's identity that the help of verifying patrols and examines, and this identification code can be the two-dimensional code, also can be other verification identification codes. The first verification information is information for verifying the identity of the staff assisting the inspection.
Specifically, can show on terminal equipment's the display interface and patrol and examine the task except, can also show and patrol and examine assistance application button, and the task volume of patrolling and examining the task is great, when needing extra staff to add into this task, can click and patrol and examine assistance application button, and the application is patrolled and examined assistance, and terminal equipment responds to the operation on patrolling and examining the assistance application of show interface, receives the second identification code to show this second identification code at terminal equipment's display interface. For example, when the second identification code is a graphical two-dimensional code, a worker assisting in inspection performs code scanning verification, after the code is scanned, the terminal device receives second authentication information corresponding to the second identification code, and the terminal device or the background management system verifies the second authentication information to obtain a corresponding second verification result. When the second verification result is that the inspection task passes, the inspection task assisting staff is legal staff who can perform the inspection task, and at the moment, the inspection task is displayed on the terminal equipment, so that the inspection task can be conveniently performed by the staff according to the inspection task on the terminal equipment.
Optionally, staff A and staff B learn that the enterprise scale is bigger when the inspection according to the in-process of patrolling and examining the task, need staff C to assist temporarily. Staff A or staff B apply for through patrolling and examining the assistance, apply for staff C and patrol and examine jointly. Staff C arrives and converges with staff A and staff B after the scene, and staff C scans the second identification code, through verifying the back, and staff C then can participate in this time together and patrol and examine.
Optionally, acquiring verification information corresponding to the second identification code; and adding the verification information corresponding to the second identification code to at least two pieces of verification information.
Specifically, when the inspection task is only executed by the worker a and the worker B, after an inspection result is obtained, the worker a and the worker B are required to sign together to obtain two pieces of verification information, and the authenticity of the verification information is verified. And when the authenticity of the verification information passes the verification, verifying the at least two verification information, and reporting the inspection result to a background management system after the verification of the at least two verification information passes. And after the worker C is added into the execution process of the inspection task, after the inspection result is obtained, signing by the worker C is needed to obtain third verification information, the authenticity of the verification information is verified, after the authenticity of the verification information passes the verification, at least two pieces of verification information are verified, and after the verification of at least two pieces of verification information passes, the inspection result is reported to the background management system.
In the embodiment, the second identification code is received in response to the operation on the inspection assistance application of the display interface; receiving second identity verification information corresponding to the second identification code; and responding to a second verification result formed by verifying the second identity verification information, and displaying the routing inspection task when the second verification result is passed. Therefore, on the premise of ensuring information safety, the information of the inspection task is provided for the staff who executes the inspection task, and the inspection task is prevented from being acquired or tampered by illegal staff.
In one embodiment, as shown in fig. 4, a schematic flow chart of a law enforcement application includes:
and step S610, if the inspection result is unqualified, acquiring law enforcement application information.
And S620, sending the inspection result to a background management system.
And step S630, receiving a law enforcement result generated by the background management system according to the law enforcement application information.
And step S640, executing a corresponding inspection task according to the law enforcement result.
The law enforcement application information refers to information for applying law enforcement personnel to enforce law after the inspection result is not appropriate.
Specifically, when the inspection result is qualified, the task may be ended after the inspection task is completed. And when the inspection result is unqualified, the staff can issue an adjustment and modification suggestion and select a period to inspect again, after at least one inspection is repeated, the final inspection result is still unqualified, the staff can acquire law enforcement application information and apply for law enforcement, the inspection result is sent to the background management system, and the background management system is requested to perform law enforcement analysis and law enforcement. And the staff of the background management system checks the law enforcement application information and determines whether to perform law enforcement. After deciding to enforce the law, arranging law enforcement personnel to enforce the law and sending the law enforcement result to the terminal equipment. And the terminal equipment receives a law enforcement result generated by the background management system according to the law enforcement application information and executes a corresponding routing inspection task according to the law enforcement result.
Optionally, the law enforcement result is a result generated by the background management system configuring law enforcement resources according to the law enforcement application information and preset law enforcement rules.
Specifically, the staff of the background management system analyzes and checks the law enforcement application information, the law enforcement application can be processed through a law enforcement management module of the background management system, whether the law enforcement application is accepted or not is checked, the staff is turned to an approver to perform re-check of case confirmation and case execution after the application is accepted, law enforcement resources are configured according to preset law enforcement rules after the approval is passed, the law enforcement staff needs to be selected, a responsible law enforcement staff needs to be designated by selecting a multi-person common law enforcement rule, and the responsible staff fills in a law enforcement record and reports to the system to end the case.
In the embodiment, if the routing inspection result is unqualified, the law enforcement application information is acquired; sending the inspection result to a background management system; receiving a law enforcement result generated by the background management system according to the law enforcement application information; and executing a corresponding inspection task according to the law enforcement result. Therefore, the whole process from inspection results, law enforcement to task termination can be completed, offline coordination of multiple doors is not needed, and the task processing efficiency is improved.
In one embodiment, the emergency gridding system comprises terminal equipment and a background management system, wherein the terminal equipment can be various personal computers, notebook computers, smart phones, tablet computers and portable wearable equipment, and the inspection task processing method can be executed on the terminal equipment. The system provides a unified operation platform for community security personnel and emergency departments, and the operation process starts from enterprise filing made by the security personnel. The emergency gridding system is configured with an inspection list, the terminal equipment establishes an enterprise file, the content of the inspection list is dynamically acquired according to an enterprise label of the file, the inspection content is completed, and the inspection content can be reported to the emergency gridding system in real time. If the department is needed to assist law enforcement, a law enforcement request can be initiated, and after approval, the department dispatcher transfers the request to a corresponding law enforcement team of the department for law enforcement investigation. Meanwhile, the relevant information of the enterprise can be checked at the small program end of the enterprise by the check record and the handling document of a security officer each time. As shown in fig. 5, a schematic diagram of a display interface on a terminal device is shown, which includes a work order generation date, a work order inspection period, a work order serial number, an item for checking whether an item is qualified, an image recording evidence obtaining entry, and an inspection record checking entry. As shown in fig. 6, a schematic diagram of a display interface on a background management system includes management of a managed object, a basic element, and a managed object information list, where the managed object information list includes information required for completing an enterprise file, including a name, address information, a unified credit code, update time, and the like of an enterprise.
As for the generation of the emergency patrol work order (patrol task), as shown in fig. 7, a schematic diagram is generated for the patrol work order. The emergency work order generation is divided into three steps: firstly, a security officer needs to establish an enterprise file, and when filling in the enterprise file, the type of a label of the enterprise needs to be selected according to label options provided by a system, so as to establish the file. And then setting a timing task, wherein the background management system defaults to start a timing task generated by a work order during running, and the timing task polls enterprise data with established files according to configured generation rules and filters and acquires the enterprise data conforming to filing. And finally, after enterprise data needing to be filed is obtained, the program can generate the corresponding inspection items according to the enterprise tags to be stored in a work order table, and the enterprise and the work order establish a 1-to-many relation. And finishing the generation of the work order.
After the emergency work order is generated, the inspection needs to be performed according to the emergency work order, as shown in fig. 8, the inspection is performed on the emergency work order. After the work order is generated, each work order inspection time limit is given, and the work order inspection content needs to be completed within the time limit and reported to the system. After receiving the work order by using the APP, a security officer needs to scan the code and load the inspection item of the enterprise, wherein the inspection item is configured on the label by the operation of a manager; after the inspection items are loaded, emergency necessary inspection items and selective inspection items are displayed according to the system marks, the necessary inspection items are certain to submit inspection results, and the selective inspection items are determined by a security officer to check or not. After the inspection filling result is completed, the other security personnel who need to follow signs, and the self signing party can submit the inspection result.
Optionally, as shown in fig. 9, a schematic diagram of a help patrol process is shown, where the schematic diagram includes: the inspection assisting process is a process for distributing tasks to people when a security officer needs to temporarily participate in the inspection process. Firstly, a security officer A and a security officer B receive and patrol the work order and then scan the code to obtain the check item check, learn that the enterprise scale ratio is large when checking, need security officer C to assist temporarily, security officer C arrives and converges with security officer A and B after the scene, security officer A or B initiate to assist and patrol the application and obtain the help two-dimensional code, security officer C uses APP to scan the help two-dimensional code, security officer C then can participate in this check together, the check result that submits simultaneously also can record the result that security officer C submitted.
After the specific inspection personnel are determined, as shown in fig. 10, the inspection flow is a schematic diagram, when a security officer starts inspection, a code needs to be scanned to obtain an inspection list, after inspection, the security officer who arrives at the field needs to sign and confirm, and the inspection result can be submitted only by signing by two inspected security officers; if all the inspection results are qualified, finishing the inspection; if more than one unqualified item exists, a security officer decides the next review time, if the review result does not meet the standard again, the security officer has the right to apply for law enforcement, fills in a law enforcement application form and then sends the law enforcement application form to a branch office, and the branch office approves the law enforcement form and enters a law enforcement process. Specifically, as shown in fig. 11, which is a schematic diagram of a law enforcement flow, after a security officer fills out a law enforcement application form and applies for law enforcement, a branch office administrator can process the law enforcement application in a law enforcement management module of the system; firstly, an auditor is required to audit whether the law enforcement application is accepted or not, the auditor is switched to for re-checking the case to confirm and execute the case, the auditor is required to select the law enforcement officer after the approval is passed, the law enforcement officer is required to be appointed when the law enforcement officer is selected to jointly execute the law enforcement application, and the officer fills the law enforcement record and reports to the system to finish the case.
Through the emergency gridding management system, paperless operation tools can be provided for security officers by means of mobile internet, meanwhile, responsibility lists of the security officers are guided, daily security officer tasks are defined, and management requirements such as visualization, intellectualization and the like are met. The emergency department can supervise the working condition and the latest dynamic condition of the security officer in real time and can remedy the hidden danger problem in advance.
It should be understood that although the various steps in the flow charts of fig. 1-11 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 1-4 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed in turn or alternately with other steps or at least some of the other steps.
In one embodiment, as shown in fig. 12, there is provided an inspection task processing apparatus including: the task receiving module 121, the inspection result generating module 122, the verification information obtaining module 123, the verifying module 124 and the data reporting module 125, wherein:
the task receiving module 121 is configured to receive the inspection task and display the inspection task;
the inspection result generating module 122 is configured to generate an inspection result in response to an operation on the inspection task;
the verification information obtaining module 123 is configured to obtain at least two pieces of verification information corresponding to the inspection result;
the verification module 124 is used for verifying the authenticity of the verification information, and verifying at least two pieces of verification information after the authenticity of the verification information passes verification;
and a data reporting module 125, configured to report the polling result to the background management system after the at least two pieces of verification information are verified.
In one embodiment, the polling task is a task which is generated by polling enterprise data in a preset enterprise database for the background management system according to preset time to obtain target enterprise data and according to a target polling item corresponding to the target enterprise data and a task deadline.
In one embodiment, the task receiving module is further configured to receive the inspection task and a first identification code corresponding to the inspection task; receiving first identity verification information corresponding to the first identification code; and responding to a first verification result formed by verifying the first identity verification information, and displaying the routing inspection task when the first verification result is passed.
In one embodiment, the inspection task processing device further comprises an inspection assisting module, which is used for responding to the operation on the inspection assisting application of the display interface and receiving the second identification code; receiving second identity verification information corresponding to the second identification code; and responding to a second verification result formed by verifying the second identity verification information, and displaying the routing inspection task when the second verification result is passed.
In one embodiment, the patrol assisting module is further configured to: acquiring verification information corresponding to the second identification code; and adding the verification information corresponding to the second identification code to at least two pieces of verification information.
In one embodiment, the inspection task processing device further comprises a law enforcement application module, which is used for acquiring law enforcement application information if the inspection result is unqualified; sending the inspection result to a background management system; receiving a law enforcement result generated by the background management system according to the law enforcement application information; and executing a corresponding inspection task according to the law enforcement result.
In one embodiment, the law enforcement result is a result generated by the background management system configuring law enforcement resources according to the law enforcement application information and preset law enforcement rules.
For the specific definition of the inspection task processing device, reference may be made to the above definition of the method at the inspection task, and details are not described here. All or part of each module in the inspection task processing device can be realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 13. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer equipment is used for storing data at the routing inspection task. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a patrol task handling method.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 13. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a patrol task processing method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 13 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program:
receiving the polling task and displaying the polling task;
responding to the operation on the polling task, and generating a polling result;
acquiring at least two pieces of verification information corresponding to the inspection result;
verifying the authenticity of the verification information, and verifying at least two pieces of verification information after the authenticity of the verification information passes verification;
and when the verification of at least two pieces of verification information passes, reporting the inspection result to a background management system.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and polling tasks, namely polling enterprise data in a preset enterprise database by the background management system according to preset time to obtain target enterprise data, and generating the tasks according to target polling items and task deadlines corresponding to the target enterprise data.
In one embodiment, the processor, when executing the computer program, further performs the steps of: receiving an inspection task and a first identification code corresponding to the inspection task; receiving first identity verification information corresponding to the first identification code; and responding to a first verification result formed by verifying the first identity verification information, and displaying the routing inspection task when the first verification result is passed.
In one embodiment, the processor, when executing the computer program, further performs the steps of: responding to the operation on the inspection assistance application of the display interface, and receiving a second identification code; receiving second identity verification information corresponding to the second identification code; and responding to a second verification result formed by verifying the second identity verification information, and displaying the routing inspection task when the second verification result is passed.
In one embodiment, the processor, when executing the computer program, further performs the steps of: acquiring verification information corresponding to the second identification code; and adding the verification information corresponding to the second identification code to at least two pieces of verification information.
In one embodiment, the processor, when executing the computer program, further performs the steps of: if the inspection result is unqualified, acquiring law enforcement application information; sending the inspection result to a background management system; receiving a law enforcement result generated by the background management system according to the law enforcement application information; and executing a corresponding inspection task according to the law enforcement result.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and the law enforcement result is a result generated by the background management system configuring law enforcement resources according to the law enforcement application information and preset law enforcement rules.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
receiving the polling task and displaying the polling task;
responding to the operation on the polling task, and generating a polling result;
acquiring at least two pieces of verification information corresponding to the inspection result;
verifying the authenticity of the verification information, and verifying at least two pieces of verification information after the authenticity of the verification information passes verification;
and when the verification of at least two pieces of verification information passes, reporting the inspection result to a background management system.
In one embodiment, the computer program when executed by the processor further performs the steps of: and polling tasks, namely polling enterprise data in a preset enterprise database by the background management system according to preset time to obtain target enterprise data, and generating the tasks according to target polling items and task deadlines corresponding to the target enterprise data.
In one embodiment, the computer program when executed by the processor further performs the steps of: receiving an inspection task and a first identification code corresponding to the inspection task; receiving first identity verification information corresponding to the first identification code; and responding to a first verification result formed by verifying the first identity verification information, and displaying the routing inspection task when the first verification result is passed.
In one embodiment, the computer program when executed by the processor further performs the steps of: responding to the operation on the inspection assistance application of the display interface, and receiving a second identification code; receiving second identity verification information corresponding to the second identification code; and responding to a second verification result formed by verifying the second identity verification information, and displaying the routing inspection task when the second verification result is passed.
In one embodiment, the computer program when executed by the processor further performs the steps of: acquiring verification information corresponding to the second identification code; and adding the verification information corresponding to the second identification code to at least two pieces of verification information.
In one embodiment, the computer program when executed by the processor further performs the steps of: if the inspection result is unqualified, acquiring law enforcement application information; sending the inspection result to a background management system; receiving a law enforcement result generated by the background management system according to the law enforcement application information; and executing a corresponding inspection task according to the law enforcement result.
In one embodiment, the computer program when executed by the processor further performs the steps of: and the law enforcement result is a result generated by the background management system configuring law enforcement resources according to the law enforcement application information and preset law enforcement rules.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for processing a routing inspection task is characterized by comprising the following steps:
receiving an inspection task and displaying the inspection task;
responding to the operation on the routing inspection task, and generating a routing inspection result;
acquiring at least two pieces of verification information corresponding to the inspection result;
verifying the authenticity of the verification information, and verifying the at least two pieces of verification information after the authenticity of the verification information passes verification;
and when the verification of the at least two verification information passes, reporting the inspection result to a background management system.
2. The method according to claim 1, wherein the polling task is a task which is generated by polling enterprise data in a preset enterprise database for the background management system according to preset time to obtain target enterprise data and according to a target polling item and a task deadline corresponding to the target enterprise data.
3. The method of claim 1, wherein receiving the inspection task and presenting the inspection task comprises:
receiving the inspection task and a first identification code corresponding to the inspection task;
receiving first identity verification information corresponding to the first identification code;
and responding to a first verification result formed by verifying the first identity verification information, and displaying the inspection task when the first verification result is passed.
4. The method of claim 1, wherein generating the inspection results in response to the operation on the inspection task is preceded by:
responding to the operation on the inspection assistance application of the display interface, and receiving a second identification code;
receiving second identity verification information corresponding to the second identification code;
and responding to a second verification result formed by verifying the second identity verification information, and displaying the inspection task when the second verification result is passed.
5. The method according to claim 4, wherein the obtaining of the at least two verification information corresponding to the inspection result comprises:
acquiring verification information corresponding to the second identification code;
and adding verification information corresponding to the second identification code to the at least two pieces of verification information.
6. The method of claim 1, further comprising:
if the inspection result is unqualified, acquiring law enforcement application information;
sending the inspection result to the background management system;
receiving a law enforcement result generated by the background management system according to the law enforcement application information;
and executing a corresponding inspection task according to the law enforcement result.
7. The method according to claim 6, wherein the law enforcement result is a result generated by the background management system configuring law enforcement resources according to preset law enforcement rules according to the law enforcement application information.
8. An inspection task processing apparatus, characterized in that the apparatus comprises:
the task receiving module is used for receiving the inspection task and displaying the inspection task;
the inspection result generating module is used for responding to the operation on the inspection task and generating an inspection result;
the verification information acquisition module is used for acquiring at least two pieces of verification information corresponding to the inspection result;
the verification module is used for verifying the authenticity of the verification information, and verifying the at least two pieces of verification information after the authenticity of the verification information passes verification;
and the data reporting module is used for reporting the inspection result to a background management system after the at least two pieces of verification information are verified.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202110096114.0A 2021-01-25 2021-01-25 Inspection task processing method and device, computer equipment and storage medium Pending CN112835694A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110096114.0A CN112835694A (en) 2021-01-25 2021-01-25 Inspection task processing method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110096114.0A CN112835694A (en) 2021-01-25 2021-01-25 Inspection task processing method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112835694A true CN112835694A (en) 2021-05-25

Family

ID=75930863

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110096114.0A Pending CN112835694A (en) 2021-01-25 2021-01-25 Inspection task processing method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112835694A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114120464A (en) * 2021-10-22 2022-03-01 深圳中科德能科技有限公司 Automatic inspection information display method, device, medium and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104299285A (en) * 2014-08-28 2015-01-21 广东建邦计算机软件有限公司 Tour-inspection task management method and apparatus thereof
CN111311777A (en) * 2020-02-14 2020-06-19 北京明略软件系统有限公司 Dynamic inspection method, server, terminal, storage medium and equipment
CN111784306A (en) * 2020-07-14 2020-10-16 广东广宇科技发展有限公司 Multi-person cooperative fire safety inspection method, device, system, terminal and medium
CN111835585A (en) * 2020-06-19 2020-10-27 深圳奇迹智慧网络有限公司 Inspection method and device for Internet of things equipment, computer equipment and storage medium
CN112070456A (en) * 2020-07-31 2020-12-11 深圳市优必选科技股份有限公司 Task issuing method, terminal equipment, robot and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104299285A (en) * 2014-08-28 2015-01-21 广东建邦计算机软件有限公司 Tour-inspection task management method and apparatus thereof
CN111311777A (en) * 2020-02-14 2020-06-19 北京明略软件系统有限公司 Dynamic inspection method, server, terminal, storage medium and equipment
CN111835585A (en) * 2020-06-19 2020-10-27 深圳奇迹智慧网络有限公司 Inspection method and device for Internet of things equipment, computer equipment and storage medium
CN111784306A (en) * 2020-07-14 2020-10-16 广东广宇科技发展有限公司 Multi-person cooperative fire safety inspection method, device, system, terminal and medium
CN112070456A (en) * 2020-07-31 2020-12-11 深圳市优必选科技股份有限公司 Task issuing method, terminal equipment, robot and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114120464A (en) * 2021-10-22 2022-03-01 深圳中科德能科技有限公司 Automatic inspection information display method, device, medium and electronic equipment

Similar Documents

Publication Publication Date Title
CN107945015B (en) Man-machine question and answer auditing method, device, equipment and computer readable storage medium
US11928907B2 (en) Information processing apparatus, control program of communication terminal, and entrance and exit management method
CN111191221A (en) Method and device for configuring authority resources and computer readable storage medium
CN112581081B (en) Computer examination informatization-based machine room seat management method, device and equipment
CN110659569A (en) Electronic signature method, device, storage medium and electronic equipment
CN108806015A (en) Meeting signature method, apparatus and terminal device
US20120101837A1 (en) Systems and methods for managing clinical trial site visit reports
CN113486316A (en) User identity authentication method and device, electronic equipment and readable storage medium
CN114004639A (en) Preferential information recommendation method and device, computer equipment and storage medium
CN112835694A (en) Inspection task processing method and device, computer equipment and storage medium
CN114066413A (en) Digitalized talent recruitment interview method and system
CN113221529A (en) Event investigation method and device
CN109285068A (en) Online loan inquiry method, apparatus, equipment and storage medium
KR102442133B1 (en) System and method for proceding proposal evaluation in block chain environment
CN111754658B (en) Training management method and device and electronic equipment
US20200311741A1 (en) Methods and systems for validating order request
JP2018173718A (en) Employment contract management system, employment contract management device, employment contract management method, and employment contract management program
CN111091885A (en) Method, device, system and computer equipment for on-line application of birth medicine certification
CN110737760A (en) Litigation case processing method, litigation case processing device, litigation case processing equipment and storage medium
CN115037471B (en) Method, device and storage medium for checking job qualification
CN115809863B (en) Work management method and system based on block chain
CN111798189A (en) Service processing method, device, computer equipment and storage medium
JP7244037B1 (en) CONSTRUCTION MANAGEMENT SYSTEM, CONSTRUCTION MANAGEMENT METHOD, AND CONSTRUCTION MANAGEMENT PROGRAM
US20200279202A1 (en) Construction project management
CN117057721A (en) Service bill auditing method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination