CN113054979A - Control method and device for key fool-proofing, computer equipment and storage medium - Google Patents

Control method and device for key fool-proofing, computer equipment and storage medium Download PDF

Info

Publication number
CN113054979A
CN113054979A CN202110220501.0A CN202110220501A CN113054979A CN 113054979 A CN113054979 A CN 113054979A CN 202110220501 A CN202110220501 A CN 202110220501A CN 113054979 A CN113054979 A CN 113054979A
Authority
CN
China
Prior art keywords
fool
key
keys
proofing
proof
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110220501.0A
Other languages
Chinese (zh)
Inventor
林正为
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Aricharge Technolog Co ltd
Original Assignee
Shenzhen Aricharge Technolog Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Aricharge Technolog Co ltd filed Critical Shenzhen Aricharge Technolog Co ltd
Priority to CN202110220501.0A priority Critical patent/CN113054979A/en
Publication of CN113054979A publication Critical patent/CN113054979A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03KPULSE TECHNIQUE
    • H03K17/00Electronic switching or gating, i.e. not by contact-making and –breaking
    • H03K17/94Electronic switching or gating, i.e. not by contact-making and –breaking characterised by the way in which the control signals are generated
    • H03K17/96Touch switches

Abstract

The application relates to the field of control development, in particular to a control method and device for preventing fool of a key, computer equipment and a storage medium, wherein the method comprises the following steps: acquiring an output signal of a key; counting the duration of the output signals with the same output value in a continuous time range; if the duration is greater than a preset time value, determining that the key is in an abnormal state; and acquiring fool-proof measures of the key, and implementing the fool-proof measures aiming at the key. According to the method and the device, the output signals of the keys are continuously monitored, fool-proofing measures are implemented aiming at the keys in abnormal states, the keys which make mistakes are automatically adjusted, and the correctness of the output signals of the keys is ensured.

Description

Control method and device for key fool-proofing, computer equipment and storage medium
Technical Field
The present application relates to the field of control development, and in particular, to a method and an apparatus for controlling fool-proofing of a key, a computer device, and a storage medium.
Background
The present machine equipment is mostly equipped with different keys, different keys control different functions, when the machine equipment is in operation, a phenomenon of operation error inevitably occurs, when the machine equipment has an error, the key on the machine equipment may have the error, and at present, the key on the machine equipment has the error, cannot be actively positioned, and cannot be actively adjusted and corrected, for example, the machine equipment continuously outputs a certain character, possibly because a certain key at the input end of the machine equipment has an abnormality, and at the moment, the machine equipment cannot be automatically adjusted, that is, if the key of the present machine equipment has an error or has the abnormality, the automatic adjustment cannot be realized.
Disclosure of Invention
The present application mainly aims to provide a method and an apparatus for controlling fool-proofing of a key, a computer device and a storage medium, and aims to solve the problem that the key cannot be automatically adjusted when a key is mistaken at present.
In order to achieve the above object, the present application provides a method for controlling fool-proofing of a key, including:
acquiring an output signal of a key;
counting the duration of the output signals with the same output value in a continuous time range;
if the duration is greater than a preset time value, determining that the key is in an abnormal state;
and acquiring fool-proof measures of the key, and implementing the fool-proof measures aiming at the key.
Further, the acquiring the output signal of the key includes:
defining a plurality of keys as a key group;
and acquiring the output signals of the key group.
Further, defining the plurality of keys as a key group includes:
acquiring the incidence relation of the keys;
and defining a plurality of keys with association relationship as a key group.
Further, the obtaining of the association relationship of the key includes:
acquiring a current application scene;
and determining the incidence relation of the keys according to the current application scene.
Further, after the obtaining of the fool-proof measure of the key and the implementing of the fool-proof measure for the key, the method further includes:
acquiring an output signal of the key after the fool-proofing measure is implemented;
if the output signal is a preset output value, determining that the fool-proofing measures are successfully implemented;
and if the output signal is not the preset output value, determining that the implementation of the fool-proof measure fails, and sending a message of the implementation failure of the fool-proof measure to a specified notification channel.
Further, the obtaining of the fool-proof measure of the key and implementing the fool-proof measure for the key include:
obtaining a plurality of fool-proofing measures of the key;
acquiring the success rate of the plurality of fool-proof measures for processing the abnormal state;
and selecting the fool-proof measure with the highest success rate as a target fool-proof measure, and implementing the target fool-proof measure aiming at the key.
Further, after the selecting the fool-proof measure with the highest success rate as a target fool-proof measure and implementing the target fool-proof measure for the key, the method further includes:
judging whether the target fool-proofing measure is implemented successfully or not;
if not, judging the danger level of the abnormal state;
and if the danger level meets the early warning level, controlling a line related to the key to stop working.
The application also provides a control device for preventing fool through keys, which comprises:
the signal monitoring module is used for acquiring an output signal of the key;
the duration counting module is used for counting the duration of the same output value of the output signals in a continuous time range;
the abnormity judgment module is used for determining that the key is in an abnormal state if the duration is greater than a preset time value;
and the fool-proof control module is used for acquiring the fool-proof measures of the key and implementing the fool-proof measures aiming at the key.
The application also provides computer equipment which comprises a memory and a processor, wherein the memory stores computer programs, and the processor realizes the steps of the key fool-proofing control method when executing the computer programs.
The present application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of any of the above-mentioned key fool-proofing control methods.
The embodiment of the application provides a key fool-proofing control method for automatically correcting abnormal signals appearing on keys, which continuously monitors the output signals of the keys by acquiring the output signals of the keys, can conveniently count the output values of the output signals of the keys for monitoring the output signals of the keys, counts the duration of the output signals with the same output value in a continuous time range, can judge that the keys are in an abnormal state if the duration of the output signals of the keys with the same output value in the continuous time range is greater than a preset time value, and can automatically adjust the keys with the abnormal states by acquiring the fool-proofing measures of the keys and implementing the fool-proofing measures aiming at the keys when different keys are in the abnormal states, the accuracy of the output signals of the keys is improved, and the correct execution of equipment with different keys is guaranteed.
Drawings
FIG. 1 is a schematic flow chart illustrating an embodiment of a method for controlling key fool proofing according to the present application;
FIG. 2 is a schematic flow chart illustrating another embodiment of a method for controlling key fool proofing according to the present application;
FIG. 3 is a schematic structural diagram of an embodiment of a fool-proof key control device according to the present application;
FIG. 4 is a block diagram illustrating a computer device according to an embodiment of the present invention.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
Referring to fig. 1, an embodiment of the present application provides a method for controlling a key fool-proofing, which includes steps S10-S40, and the steps of the method for controlling the key fool-proofing are described in detail as follows.
And S10, acquiring the output signal of the key.
The embodiment is applied to equipment with keys, different working signals can be output when the keys in a product are in different states, the embodiment acquires output signals of the keys, in an implementation mode, when the equipment is provided with a plurality of different keys, each key is an independent key, and the output signal of each key is acquired at the moment so as to monitor and control the output signals of the keys.
And S20, counting the duration of the output signal with the same output value in a continuous time range.
In this embodiment, the output signals of the keys are monitored, the monitoring of the output signals of the keys can facilitate statistics of the output values of the output signals of the keys, and statistics of the output values of the keys at which time period or which time point is performed, so that the output signals of the keys can be accurately monitored.
And S30, if the duration is greater than a preset time value, determining that the key is in an abnormal state.
After the output values of the output signals of the keys are counted, if the duration of the output signals of the keys, which are the same output value in a continuous time range, is greater than a preset time value, it can be determined that the keys are in an abnormal state, the keys are in the abnormal state and include short circuit phenomena of circuits of the keys, the output signals of the keys are always the same output value, and the keys are in the abnormal state and include the keys which are continuously pressed, and the output signals of the keys are always the same output value.
And S40, obtaining fool-proof measures of the key, and implementing the fool-proof measures aiming at the key.
When the fact that the key is in the abnormal state is determined, different keys have different corresponding measures for abnormality occurrence, the measure for processing the key abnormality occurrence is defined as a fool-proof measure, then the fool-proof measure of the key in the abnormal state is obtained, and the fool-proof measure is implemented aiming at the key with the abnormality occurrence; in another embodiment, if the key is in an abnormal state, the fool-proofing measure of the key is obtained by disconnecting the output circuit of the key, and the fool-proofing measure is implemented for the key at this time, and the output circuit of the key is set to be disconnected, so that the output signal of the key is monitored in real time, the fool-proofing measure is implemented for the abnormal key, and the execution stability of the device equipped with the key is improved.
The embodiment provides a method for controlling foolproof of a key, which automatically corrects abnormal signals of the key, continuously monitors the output signals of the key by obtaining the output signals of the key, monitors the output signals of the key, can conveniently count the output values of the output signals of the key, counts the duration of the same output value of the output signals in a continuous time range, can judge that the key is in an abnormal state if the duration of the same output value of the output signals of the key in the continuous time range is greater than a preset time value, obtains foolproof measures of the key when different keys are determined to be in the abnormal state, and automatically adjusts the key in the abnormal state by implementing the foolproof measures against the key, the accuracy of the output signals of the keys is improved, and the correct execution of equipment with different keys is guaranteed.
In one embodiment, the acquiring the output signal of the key includes:
defining a plurality of keys as a key group;
and acquiring the output signals of the key group.
In this embodiment, the device includes a plurality of different keys, the different keys have independent output signals, further, there is an association relationship between the different keys, when obtaining the output signals of the keys, a plurality of keys having the association relationship are defined as a key group, the output signals of the keys included in one key group have a relationship of mutual influence, then the output signals of the key group are obtained, a plurality of different keys included in the device are grouped, then the output signals of the key group are monitored, then the duration that the output signals of the key group are the same output value in a continuous time range is counted, if the duration is greater than a preset time value, it can be determined that the key group is in an abnormal state, when the number of keys included in the device is large, the resource consumption required for monitoring the output signals of the keys can be reduced by the scheme of this embodiment, only need monitor the output signal of the key group of a plurality of buttons constitutions to can discover the unusual button group of output signal fast, carry out the investigation to the subassembly that contains in the button group again, thereby improve the monitoring efficiency to the button.
Further, the defining the plurality of keys as a key group includes:
acquiring the incidence relation of the keys;
and defining a plurality of keys with association relationship as a key group.
In this embodiment, different keys have a certain association relationship therebetween, and when a plurality of keys are defined as a key group, the association relationship of the keys is obtained, and then a plurality of keys having the association relationship are defined as a key group, for example, the device includes five keys of keys A, B, C, D, E, an output signal of key a affects an output signal of key B, E, an output signal of key C affects an output signal of key D, at this time, key a and key B are defined as key group 1, key a and key E are defined as key group 2, and key C and key D are defined as key group 3, so that output signals of different key groups can be monitored simultaneously, and the efficiency of monitoring multiple keys simultaneously is improved.
In one embodiment, the obtaining the association relationship of the key includes:
acquiring a current application scene;
and determining the incidence relation of the keys according to the current application scene.
In the embodiment, different keys need to be divided into key groups in a specific application scene, including that in a test scene, the key groups are divided by the permutation and combination of a plurality of keys included in the device, so that the influence of output signals among the keys can be accurately tested; in a production scene, each functional module of the equipment divides a plurality of keys contained in the equipment into key groups, so that the output signals of each functional module of the equipment can be rapidly monitored, specifically, when the keys are defined as the key group, acquiring a current application scene, wherein the current application scene can be determined by initial output signals of the keys, each key is initially set before being powered on, the output signals of the keys under the initial setting are the initial output signals, the current application scene is determined according to the initial output signals of different keys, in one embodiment, the current application scenario is determined based on the initial output signal of the designated key, for example, the initial output signal for designated key a is s1, the initial output signal for designated key B is s2, determining a current application scene as a test scene according to the initial output signals of the designated key A and the designated key B; and determining that the current application scene is a production scene according to the initial output signals of the designated key A and the designated key B, wherein the initial output signal of the designated key A is s2, and the initial output signal of the designated key B is s 1. And then determining the incidence relation of the keys according to the current application scene, wherein the incidence relation of the keys is different in different application scenes, and then defining a plurality of keys with the incidence relation as key groups, thereby generating the key groups in different application scenes, facilitating the monitoring and fool-proof control of the key groups in different application scenes and improving the application universality of the application scenes.
In one embodiment, after the obtaining the fool-proof measure of the key and implementing the fool-proof measure for the key, the method further includes:
acquiring an output signal of the key after the fool-proofing measure is implemented;
if the output signal is a preset output value, determining that the fool-proofing measures are successfully implemented;
and if the output signal is not the preset output value, determining that the implementation of the fool-proof measure fails, and sending a message of the implementation failure of the fool-proof measure to a specified notification channel.
In this embodiment, after obtaining the fool-proof measure of the key and implementing the fool-proof measure for the key, it is further required to continue to monitor whether the output signal of the key can be successfully corrected, specifically, after implementing the fool-proof measure for the key, obtain the output signal of the key after implementing the fool-proof measure, then judge whether the output signal of the key after implementing the fool-proof measure is the same as the preset output value of the key, if the output signal is the preset output value, it is determined that the fool-proof measure is successfully implemented, the key is successfully reset, and it is ensured that the output signal of the key can be corrected; if the output signal is not the preset output value, the implementation failure of the fool-proof measure is determined, the output signal of the key cannot be automatically corrected through the fool-proof measure, and at the moment, a message of the implementation failure of the fool-proof measure is sent to a specified notification channel, so that maintenance personnel are notified of the message of the implementation failure of the fool-proof measure through the key at the first time, and the maintenance efficiency of the equipment is improved. In this embodiment, when each fool-proof measure is successfully or unsuccessfully implemented, the fool-proof measure is associated with the abnormal state of the key as the basic data of big data statistics, so as to more quickly determine the fool-proof measure capable of solving the key with different abnormal states through the big data statistics.
In an embodiment, as shown in fig. 2, the obtaining the fool-proofing measure of the key and implementing the fool-proofing measure for the key include:
s41: obtaining a plurality of fool-proofing measures of the key;
s42: acquiring the success rate of the plurality of fool-proof measures for processing the abnormal state;
s43: and selecting the fool-proof measure with the highest success rate as a target fool-proof measure, and implementing the target fool-proof measure aiming at the key.
In this embodiment, several fool-proof measures for solving different abnormal states are prepared for the abnormal state occurring in the same case, after the key is determined to be in the abnormal state, several fool-proof measures for the abnormal state of the key are obtained, for example, the abnormal state of the key occurs in the application scene 1, the matched fool-proof measures include X1, X2, and X3, the abnormal state of the key occurs in the application scene 2, the matched fool-proof measures include H1, H2, and H3, and then the success rate of the several fool-proof measures for processing the abnormal state is obtained, specifically, several fool-proof measures of the key are obtained from a preset fool-proof measure database, the different fool-proof measures prepared for the same key of the same equipment are collected by the fool-proof measure database, and each fool-proof measure has a corresponding success rate, which represents the success rate of the fool-proof measure for processing the abnormal state occurring in the key, and then selecting the fool-proof measure with the highest success rate as a target fool-proof measure, and implementing the target fool-proof measure aiming at the key, wherein in one implementation mode, the processing success rates of the fool-proof measure and the abnormal state can be obtained from a fool-proof measure database counted by big data, then the target fool-proof measure of the current abnormal state of the key is matched from the fool-proof measures, namely the fool-proof measure with the high processing success rate aiming at the current abnormal state of the key is preferentially matched as the target fool-proof measure, and then the target fool-proof measure is implemented aiming at the key, so that the implementation success rate of the fool-proof measure is ensured. Further, when the target fool-proofing measure with the highest power cannot be successfully implemented, selecting other fool-proofing measures as the target fool-proofing measures in sequence from the matched fool-proofing measures from high to low according to the success rate, and implementing the target fool-proofing measures aiming at the key.
In an embodiment, after the selecting the fool-proof measure with the highest success rate as a target fool-proof measure and implementing the target fool-proof measure for the key, the method further includes:
judging whether the target fool-proofing measure is implemented successfully or not;
if not, judging the danger level of the abnormal state;
and if the danger level meets the early warning level, controlling a line related to the key to stop working.
In this embodiment, for a target fool-proof measure with the highest success rate for the abnormal state of the key, after the target fool-proof measure is implemented, it is determined whether the target fool-proof measure is implemented successfully, in an implementation manner, it is determined whether the target fool-proof measure is implemented successfully, if not, other fool-proof measures are sequentially selected from a plurality of matched fool-proof measures as the target fool-proof measures according to the success rate from high to low, and then the target fool-proof measure is implemented until all matched fool-proof measures cannot be implemented successfully, and it is determined that the target fool-proof measure cannot be implemented successfully. If the target fool-proofing measure cannot be successfully implemented, the abnormal state of the key is represented as incapable of being automatically corrected, the danger level of the abnormal state is judged at the moment, when the danger level meets the early warning level, the related circuit of the key is controlled to stop working, in one implementation mode, different functions controlled by the key are different, the danger level of the key which is abnormal is determined according to the safety levels of the different functions, and if the safety level of the function controlled by the key is higher, the danger level of the abnormal state is higher when the key is abnormal; if the security level of the function controlled by the key is low, the danger level of the abnormal state is high when the key is abnormal. The equipment associated with the key can be protected by self, and the danger caused by continuous error work of the key is avoided.
Referring to fig. 3, the present application further provides a control device for preventing fool of a key, including:
the signal monitoring module 10 is used for acquiring an output signal of the key;
a duration counting module 20, configured to count duration of the same output value of the output signal in a continuous time range;
the abnormality judgment module 30 is configured to determine that the key is in an abnormal state if the duration is greater than a preset time value;
and the fool-proof control module 40 is used for acquiring the fool-proof measures of the keys and implementing the fool-proof measures aiming at the keys.
As described above, it can be understood that the components of the key fool-proofing control device proposed in the present application can implement the functions of any one of the above-described key fool-proofing control methods.
In one embodiment, the signal monitoring module 10 further performs:
defining a plurality of keys as a key group;
and acquiring the output signals of the key group.
In one embodiment, the signal monitoring module 10 further performs:
acquiring the incidence relation of the keys;
and defining a plurality of keys with association relationship as a key group.
In one embodiment, the signal monitoring module 10 further performs:
acquiring a current application scene;
and determining the incidence relation of the keys according to the current application scene.
In one embodiment, the key fool-proofing control device further comprises a feedback module;
the feedback module is used for acquiring an output signal of the key after the foolproof measure is implemented;
if the output signal is a preset output value, determining that the fool-proofing measures are successfully implemented;
and if the output signal is not the preset output value, determining that the implementation of the fool-proof measure fails, and sending a message of the implementation failure of the fool-proof measure to a specified notification channel.
In one embodiment, the fool-proof control module 40 further performs:
obtaining a plurality of fool-proofing measures of the key;
acquiring the success rate of the plurality of fool-proof measures for processing the abnormal state;
and selecting the fool-proof measure with the highest success rate as a target fool-proof measure, and implementing the target fool-proof measure aiming at the key.
In one embodiment, the fool-proof control module 40 further performs:
judging whether the target fool-proofing measure is implemented successfully or not;
if not, judging the danger level of the abnormal state;
and if the danger level meets the early warning level, controlling a line related to the key to stop working.
Referring to fig. 4, a computer device, which may be a mobile terminal and whose internal structure may be as shown in fig. 4, is also provided in the embodiment of the present application. The computer equipment comprises a processor, a memory, a network interface, a display device and an input device which are connected through a system bus. Wherein, the network interface of the computer equipment is used for communicating with an external terminal through network connection. The display device of the computer device is used for displaying the offline application. The input device of the computer device is used for receiving the input of the user in offline application. The computer designed processor is used to provide computational and control capabilities. The memory of the computer device includes non-volatile storage media. The non-volatile storage medium stores an operating system, a computer program, and a database. The database of the computer device is used for storing the original data. The computer program is executed by a processor to realize a control method for preventing fool of the key.
The processor executes the control method for preventing the fool of the key, and comprises the following steps: acquiring an output signal of a key; counting the duration of the output signals with the same output value in a continuous time range; if the duration is greater than a preset time value, determining that the key is in an abnormal state; and acquiring fool-proof measures of the key, and implementing the fool-proof measures aiming at the key. The computer equipment provides a key fool-proofing control method for automatically correcting abnormal signals of keys, continuously monitoring the output signals of the keys by obtaining the output signals of the keys, conveniently counting the output values of the output signals of the keys for monitoring the output signals of the keys, counting the duration of the output signals with the same output value in a continuous time range, judging that the keys are in an abnormal state if the duration of the output signals of the keys with the same output value in the continuous time range is greater than a preset time value, obtaining fool-proofing measures of the keys when different keys are in the abnormal state according to different measures for the abnormal occurrence after the keys are determined to be in the abnormal state, implementing the fool-proofing measures aiming at the keys, and automatically adjusting the keys in the abnormal state, the accuracy of the output signals of the keys is improved, and the correct execution of equipment with different keys is guaranteed.
An embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by the processor, implements a method for controlling fool-proofing of a key, and the method includes: acquiring an output signal of a key; counting the duration of the output signals with the same output value in a continuous time range; if the duration is greater than a preset time value, determining that the key is in an abnormal state; and acquiring fool-proof measures of the key, and implementing the fool-proof measures aiming at the key. The computer readable storage medium provides a key fool-proofing control method for automatically correcting abnormal signals of keys, continuously monitoring the output signals of the keys by acquiring the output signals of the keys, conveniently counting the output values of the output signals of the keys for monitoring the output signals of the keys, counting the duration of the output signals with the same output value in a continuous time range, judging that the keys are in an abnormal state if the duration of the output signals of the keys with the same output value in the continuous time range is greater than a preset time value, acquiring fool-proofing measures of the keys when determining that the keys are in the abnormal state, implementing the fool-proofing measures for the keys, and automatically adjusting the keys with the abnormal state, the accuracy of the output signals of the keys is improved, and the correct execution of equipment with different keys is guaranteed.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium provided herein and used in the examples may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double-rate SDRAM (SSRSDRAM), Enhanced SDRAM (ESDRAM), synchronous link (Synchlink) DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and bus dynamic RAM (RDRAM).
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (10)

1. A control method for preventing fool of keys is characterized by comprising the following steps:
acquiring an output signal of a key;
counting the duration of the output signals with the same output value in a continuous time range;
if the duration is greater than a preset time value, determining that the key is in an abnormal state;
and acquiring fool-proof measures of the key, and implementing the fool-proof measures aiming at the key.
2. The method for controlling fool-proofing of keys according to claim 1, wherein said obtaining the output signal of the key comprises:
defining a plurality of keys as a key group;
and acquiring the output signals of the key group.
3. The method for controlling fool-proofing of keys according to claim 2, wherein said defining a plurality of keys as a group of keys comprises:
acquiring the incidence relation of the keys;
and defining a plurality of keys with association relationship as a key group.
4. The method for controlling key fool-proofing according to claim 3, wherein said obtaining the association relationship of the key comprises:
acquiring a current application scene;
and determining the incidence relation of the keys according to the current application scene.
5. The method for controlling fool-proofing of keys according to claim 1, wherein after obtaining the fool-proofing measure of the keys and implementing the fool-proofing measure for the keys, further comprising:
acquiring an output signal of the key after the fool-proofing measure is implemented;
if the output signal is a preset output value, determining that the fool-proofing measures are successfully implemented;
and if the output signal is not the preset output value, determining that the implementation of the fool-proof measure fails, and sending a message of the implementation failure of the fool-proof measure to a specified notification channel.
6. The method for controlling fool-proofing of keys according to claim 1, wherein said obtaining fool-proofing measures of said keys and implementing said fool-proofing measures against said keys comprises:
obtaining a plurality of fool-proofing measures of the key;
acquiring the success rate of the plurality of fool-proof measures for processing the abnormal state;
and selecting the fool-proof measure with the highest success rate as a target fool-proof measure, and implementing the target fool-proof measure aiming at the key.
7. The method for controlling fool-proofing of keys according to claim 6, wherein said selecting the fool-proofing measure with the highest success rate as the target fool-proofing measure and implementing the target fool-proofing measure for the keys further comprises:
judging whether the target fool-proofing measure is implemented successfully or not;
if not, judging the danger level of the abnormal state;
and if the danger level meets the early warning level, controlling a line related to the key to stop working.
8. A control device for preventing fool of keys is characterized by comprising:
the signal monitoring module is used for acquiring an output signal of the key;
the duration counting module is used for counting the duration of the same output value of the output signals in a continuous time range;
the abnormity judgment module is used for determining that the key is in an abnormal state if the duration is greater than a preset time value;
and the fool-proof control module is used for acquiring the fool-proof measures of the key and implementing the fool-proof measures aiming at the key.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method for controlling fool-proofing of keys according to any of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method for fool-proofing a key according to any one of claims 1 to 7.
CN202110220501.0A 2021-02-26 2021-02-26 Control method and device for key fool-proofing, computer equipment and storage medium Pending CN113054979A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110220501.0A CN113054979A (en) 2021-02-26 2021-02-26 Control method and device for key fool-proofing, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110220501.0A CN113054979A (en) 2021-02-26 2021-02-26 Control method and device for key fool-proofing, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113054979A true CN113054979A (en) 2021-06-29

Family

ID=76509257

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110220501.0A Pending CN113054979A (en) 2021-02-26 2021-02-26 Control method and device for key fool-proofing, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113054979A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114413441A (en) * 2022-01-04 2022-04-29 珠海格力电器股份有限公司 Key control method, key control device, computer equipment, storage medium and program product

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104636833A (en) * 2015-03-13 2015-05-20 华北电力大学 Method and device for selecting configuration measures
CN104765466A (en) * 2015-05-04 2015-07-08 广东欧珀移动通信有限公司 Key control method and device for mobile terminal
US20150325109A1 (en) * 2014-05-09 2015-11-12 Looq System Inc. Quick Remote Control Method and Device
US20170010696A1 (en) * 2015-07-06 2017-01-12 Dexin Corporation Input device adaptable to use habit and adapting method therefor
CN109061452A (en) * 2018-07-09 2018-12-21 珠海格力智能装备有限公司 The detection method and device of key
CN110471806A (en) * 2019-07-23 2019-11-19 九阳股份有限公司 A kind of exception button processing method and a kind of cooking apparatus
CN111381686A (en) * 2018-12-29 2020-07-07 龙芯中科技术有限公司 Key processing method, device, equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150325109A1 (en) * 2014-05-09 2015-11-12 Looq System Inc. Quick Remote Control Method and Device
CN104636833A (en) * 2015-03-13 2015-05-20 华北电力大学 Method and device for selecting configuration measures
CN104765466A (en) * 2015-05-04 2015-07-08 广东欧珀移动通信有限公司 Key control method and device for mobile terminal
US20170010696A1 (en) * 2015-07-06 2017-01-12 Dexin Corporation Input device adaptable to use habit and adapting method therefor
CN109061452A (en) * 2018-07-09 2018-12-21 珠海格力智能装备有限公司 The detection method and device of key
CN111381686A (en) * 2018-12-29 2020-07-07 龙芯中科技术有限公司 Key processing method, device, equipment and storage medium
CN110471806A (en) * 2019-07-23 2019-11-19 九阳股份有限公司 A kind of exception button processing method and a kind of cooking apparatus

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114413441A (en) * 2022-01-04 2022-04-29 珠海格力电器股份有限公司 Key control method, key control device, computer equipment, storage medium and program product

Similar Documents

Publication Publication Date Title
CN111143163B (en) Data monitoring method, device, computer equipment and storage medium
CN109709923B (en) Test control method, device, system and computer readable storage medium
CN111385123A (en) WEB service distributed intelligent monitoring method, device, computer equipment and storage medium
CN113054979A (en) Control method and device for key fool-proofing, computer equipment and storage medium
CN110762769A (en) Unit debugging method and device, debugging equipment, medium and air conditioning system
WO2017048751A1 (en) Systems and methods for monitoring weld quality
CN113709126A (en) Network protocol security fuzzy test method, device, equipment and storage medium
CN112291904A (en) Intelligent street lamp equipment integrated control method, server, system and medium
CN110908855A (en) Micro-service operation maintenance device and method and electronic equipment
CN112667424A (en) Abnormal data processing method and device, computer equipment and storage medium
CN112000582A (en) Server-side automatic test early warning method, device, equipment and storage medium
CN111159139B (en) Data processing method and device, storage medium and monitoring equipment
CN102650528A (en) Security processing system and method
CN115277229A (en) Network security situation perception method and system
CN114301812A (en) Method, device, equipment and storage medium for monitoring message processing result
US20080228336A1 (en) Method and means for self calibrating a valid operating range
CN114695924A (en) Fuel cell anode side pressure fluctuation diagnostic method and system
JP2007004507A (en) Management apparatus
CN111090586B (en) Method and device for reporting code coverage rate data file and computer equipment
CN114356617B (en) Error injection testing method, device, system and computing equipment
CN117007898B (en) Method and device for testing aging state of target electronic speed regulator
CN109067956B (en) Method and device for detecting terminal for police system and police system
CN112235163B (en) Method, device, equipment and medium for preventing data from being blocked for FPGA (field programmable Gate array) architecture
KR20040050973A (en) Total management system and control method for realtime monitoring of time interlock
CN113485284B (en) Message data processing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination