CN113205194A - Operation safety card control method based on authorization code - Google Patents
Operation safety card control method based on authorization code Download PDFInfo
- Publication number
- CN113205194A CN113205194A CN202110474268.9A CN202110474268A CN113205194A CN 113205194 A CN113205194 A CN 113205194A CN 202110474268 A CN202110474268 A CN 202110474268A CN 113205194 A CN113205194 A CN 113205194A
- Authority
- CN
- China
- Prior art keywords
- authorization code
- card control
- task
- control method
- producer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000013475 authorization Methods 0.000 title claims abstract description 75
- 238000000034 method Methods 0.000 title claims abstract description 23
- 238000012423 maintenance Methods 0.000 claims description 27
- 238000012795 verification Methods 0.000 claims description 19
- 230000005540 biological transmission Effects 0.000 claims description 9
- 238000004891 communication Methods 0.000 claims description 8
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/20—Administration of product repair or maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Abstract
The invention relates to the technical field of operation safety, in particular to an operation safety card control method based on an authorization code, which is an operation safety card control method based on the authorization code.
Description
Technical Field
The invention relates to the technical field of operation safety, in particular to an operation safety card control method based on an authorization code.
Background
At present, various public facilities, factory building equipment and facilities are more and more diversified, intelligent, and use is frequent day by day, and the daily maintenance of these equipment is the incessant normal operating's of guarantee equipment important means. For example, equipment in subways and high-speed rails normally and safely operates, and whether the travel of numerous people is safe and smooth is very noticeable, some of the equipment are very critical and some are very dangerous; however, the existing plant equipment is generally controlled manually in the maintenance process, and the equipment is easy to operate by mistake in the maintenance process, so that the equipment is very unsafe for maintenance personnel and is easy to have an accident.
Disclosure of Invention
The invention provides an operation safety card control method based on an authorization code aiming at the problems in the prior art.
In order to solve the technical problems, the invention adopts the following technical scheme:
the invention provides an operation safety card control method based on an authorization code, which comprises the following steps:
step A, the system generates a maintenance task through a task generation module according to the received content, judges whether safety card control is needed or not, and synchronously generates an operation card control module producer;
b, the system generates a produced maintenance task to a maintenance task execution module through a task conveying interface, the maintenance task execution module judges whether safety card control is needed or not according to the built-in requirement, and an operation card control module producer generates an operation card control template;
c, the maintenance task execution module loads the maintenance task into the intelligent terminal through the task transmission interface, and the operation card control template judges whether the safety card control needs to be started or not according to an internal program and outputs a corresponding result;
d, if the maintenance task execution module judges that the safety card control is needed, the operation card control module verifies the safety card control, and if the verification is passed, the system starts an authorization code producer to generate an authorization code;
and step E, an authorization code receiver of the overhaul task execution module receives the authorization code generated by the authorization code producer, sends the received authorization code to the authorization code verification module for verification, if the verification is passed, the safety card control process is ended, overhaul data of the overhaul task is sent to the server through the task transmission interface, and otherwise, the steps A to D are repeated until the verification is successful.
Further, the authorization code is a two-dimensional code authorization code or a digital authorization code.
Further, the authorization code verification module is responsible for decoding and analyzing the received digital authorization code value.
Further, the authorization code producer comprises an acoustic wave communication exciter and a two-dimensional code generator, wherein the authorization code producer firstly starts the acoustic wave communication exciter to send the digital authorization code, and when the sending fails for multiple times, the two-dimensional code generator is started.
Further, the authorization code producer may produce the authorization code for one or more uses.
Further, the authorization code generator generates the authorization codes with timeliness and regionality.
Furthermore, the overhaul task execution module is a mobile terminal with a communication function, and the system is a computer terminal.
Furthermore, the server is a cloud server, the overhaul task execution module has a signature function, and manual signature is needed when overhaul data of the overhaul task is sent to the server through the task transmission interface.
The invention has the beneficial effects that: the invention relates to an operation safety card control method based on authorization codes, which does not need manual verification in an operation-approval task, and simultaneously issues an overhaul task and a safety inspection task in a matching way, thereby improving the operation efficiency.
Drawings
FIG. 1 is a block flow diagram of the present invention.
Detailed Description
In order to facilitate understanding of those skilled in the art, the present invention will be further described with reference to the following examples and drawings, which are not intended to limit the present invention. The present invention is described in detail below with reference to the attached drawings.
The invention provides an operation safety card control method based on an authorization code, which comprises the following steps:
step A, the system generates a maintenance task through a task generation module according to the received content, judges whether safety card control is needed or not, and synchronously generates an operation card control module producer;
b, the system generates a produced maintenance task to a maintenance task execution module through a task conveying interface, the maintenance task execution module judges whether safety card control is needed or not according to the built-in requirement, and an operation card control module producer generates an operation card control template;
c, the maintenance task execution module loads the maintenance task into the intelligent terminal through the task transmission interface, and the operation card control template judges whether the safety card control needs to be started or not according to an internal program and outputs a corresponding result;
d, if the maintenance task execution module judges that the safety card control is needed, the operation card control module verifies the safety card control, and if the verification is passed, the system starts an authorization code producer to generate an authorization code;
and step E, an authorization code receiver of the overhaul task execution module receives the authorization code generated by the authorization code producer, sends the received authorization code to the authorization code verification module for verification, if the verification is passed, the safety card control process is ended, overhaul data of the overhaul task is sent to the server through the task transmission interface, and otherwise, the steps A to D are repeated until the verification is successful.
In this embodiment: the authorization code generator is used for starting the acoustic wave communication exciter to send the digital authorization code, and when the two-dimensional code generator fails to send for multiple times, the two-dimensional code generator is started.
In this embodiment: and the authorization code verification module is responsible for decoding and analyzing the received digital authorization code value.
In this embodiment: the authorization code generator can generate the authorization code to be used once or for multiple times, and the setting can be adjusted according to requirements when the authorization code generator is used.
In this embodiment: the authorization code generator generates the authorization code with timeliness and regionality, the authorization code generator generates the authorization code valid within a specific time, specifically within 2 minutes, and similarly, the authorization code generator generates the authorization code valid within a specific region.
In this embodiment: the maintenance task execution module is a mobile terminal with a communication function, and the system is a computer terminal.
In this embodiment: the server is a cloud server, the overhaul task execution module has a signature function, and manual signature is needed when overhaul data of the overhaul task is sent to the server through the task transmission interface.
In this embodiment: the operator performs authentication using an ID card or a dynamic password.
In this embodiment: the card control task module can generate characters, images and videos, and transmits back the images and videos when the card control task finishes collection.
In this embodiment: when the network is failed, the off-line calibration is performed for temporary storage.
Although the present invention has been described with reference to the above preferred embodiments, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (8)
1. An operation safety card control method based on an authorization code is characterized in that: the method comprises the following steps:
step A, the system generates a maintenance task through a task generation module according to the received content, judges whether safety card control is needed or not, and synchronously generates an operation card control module producer;
b, the system generates a produced maintenance task to a maintenance task execution module through a task conveying interface, the maintenance task execution module judges whether safety card control is needed or not according to the built-in requirement, and an operation card control module producer generates an operation card control template;
c, the maintenance task execution module loads the maintenance task into the intelligent terminal through the task transmission interface, and the operation card control template judges whether the safety card control needs to be started or not according to an internal program and outputs a corresponding result;
d, if the maintenance task execution module judges that the safety card control is needed, the operation card control module verifies the safety card control, and if the verification is passed, the system starts an authorization code producer to generate an authorization code;
and step E, an authorization code receiver of the overhaul task execution module receives the authorization code generated by the authorization code producer, sends the received authorization code to the authorization code verification module for verification, if the verification is passed, the safety card control process is ended, overhaul data of the overhaul task is sent to the server through the task transmission interface, and otherwise, the steps A to D are repeated until the verification is successful.
2. The authorization code-based operation security card control method according to claim 1, wherein: the authorization code is a two-dimensional code authorization code or a digital authorization code.
3. The authorization code-based operation security card control method according to claim 1, wherein: and the authorization code verification module is responsible for decoding and analyzing the received digital authorization code value.
4. The authorization code-based operation security card control method according to claim 1, wherein: the authorization code producer comprises an acoustic wave communication exciter and a two-dimensional code generator, wherein the authorization code producer firstly starts the acoustic wave communication exciter to send a digital authorization code, and when the sending fails for multiple times, the two-dimensional code generator is started.
5. The authorization code-based operation security card control method according to claim 1, wherein: the authorization code generator generates the authorization code for one or more uses.
6. The authorization code-based operation security card control method according to claim 5, wherein: the authorization code producer generates the authorization code with timeliness and regionality.
7. The authorization code-based operation security card control method according to claim 1, wherein: the maintenance task execution module is a mobile terminal with a communication function, and the system is a computer terminal.
8. The authorization code-based operation security card control method according to claim 1, wherein: the server is a cloud server, the overhaul task execution module has a signature function, and manual signature is needed when overhaul data of the overhaul task is sent to the server through the task transmission interface.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110474268.9A CN113205194A (en) | 2021-04-29 | 2021-04-29 | Operation safety card control method based on authorization code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110474268.9A CN113205194A (en) | 2021-04-29 | 2021-04-29 | Operation safety card control method based on authorization code |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113205194A true CN113205194A (en) | 2021-08-03 |
Family
ID=77027763
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110474268.9A Pending CN113205194A (en) | 2021-04-29 | 2021-04-29 | Operation safety card control method based on authorization code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113205194A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102951190A (en) * | 2012-10-25 | 2013-03-06 | 中国铁道科学研究院 | Method and system for safety control on dispatching commands |
CN105564465A (en) * | 2015-12-23 | 2016-05-11 | 兰州交通大学 | System and method for controlling maintenance operation of railway electrical service signal equipment |
CN106218671A (en) * | 2016-09-06 | 2016-12-14 | 兰州铁路局 | The control method of station train travel operation and device |
CN108876206A (en) * | 2018-07-27 | 2018-11-23 | 深圳市中兴系统集成技术有限公司 | A kind of safety card prosecutor method, electronic equipment and storage medium |
CN109254570A (en) * | 2018-09-27 | 2019-01-22 | 卡斯柯信号有限公司 | A kind of Intelligent closed-loop control system applied to high-speed rail signal equipment repair |
CN109782703A (en) * | 2018-12-13 | 2019-05-21 | 湖南铁路科技职业技术学院 | A kind of railway standardization operation control system based on intelligent glasses |
US20190158486A1 (en) * | 2016-08-29 | 2019-05-23 | Jrd Communication (Shenzhen) Ltd | Method for authorization code verification and server |
-
2021
- 2021-04-29 CN CN202110474268.9A patent/CN113205194A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102951190A (en) * | 2012-10-25 | 2013-03-06 | 中国铁道科学研究院 | Method and system for safety control on dispatching commands |
CN105564465A (en) * | 2015-12-23 | 2016-05-11 | 兰州交通大学 | System and method for controlling maintenance operation of railway electrical service signal equipment |
US20190158486A1 (en) * | 2016-08-29 | 2019-05-23 | Jrd Communication (Shenzhen) Ltd | Method for authorization code verification and server |
CN106218671A (en) * | 2016-09-06 | 2016-12-14 | 兰州铁路局 | The control method of station train travel operation and device |
CN108876206A (en) * | 2018-07-27 | 2018-11-23 | 深圳市中兴系统集成技术有限公司 | A kind of safety card prosecutor method, electronic equipment and storage medium |
CN109254570A (en) * | 2018-09-27 | 2019-01-22 | 卡斯柯信号有限公司 | A kind of Intelligent closed-loop control system applied to high-speed rail signal equipment repair |
CN109782703A (en) * | 2018-12-13 | 2019-05-21 | 湖南铁路科技职业技术学院 | A kind of railway standardization operation control system based on intelligent glasses |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102300182B (en) | Short-message-based authentication method, system and device | |
CN103941676B (en) | A kind of long-range control method of electromechanical equipment maintaining | |
CN102291376B (en) | Method and system for realizing mobile terminal-supporting electronic transaction | |
CN106022046A (en) | Special equipment permitted operation monitoring method | |
CN103916366A (en) | Login method, maintenance terminal, data management service equipment and login system | |
CN103401868A (en) | Temporary authorization method for mobile communication equipment of authorizing party and authorized party and temporary authorization management method and device for manager | |
CN106161448A (en) | The authority control method of large-sized unit air-conditioning, Apparatus and system | |
CN107989514A (en) | There is the safety box of dynamic password | |
CN105323094A (en) | Safety management method based on equipment identification and system thereof | |
CN105376208A (en) | Secure data verification method, system and computer readable storage medium | |
CN108259445A (en) | MS windows desktops Security Login System and its login method based on smart mobile phone | |
CN104243026B (en) | Method for sending information, message receiving method, device and system | |
CN105791206A (en) | Local area network service acquiring method and device | |
CN110348545B (en) | AR intelligent operation ticket method and device based on ERP system | |
CN113205194A (en) | Operation safety card control method based on authorization code | |
CN109684802A (en) | A kind of method and system providing a user artificial intelligence platform | |
CN107395580B (en) | Data verification method and device | |
CN105530094B (en) | A kind of identity identifying method, device, system and scrambler | |
CN102195943B (en) | Safety information interaction method and system | |
CN104933798A (en) | Power plant safety management system and method based on two-dimensional code and electronic key | |
CN103312673A (en) | Enterprise mobile application system and application method | |
CN108965326A (en) | A kind of boss's station secure communication control method and system based on user identity authentication | |
CN105095704A (en) | Identity recognition method based on multiple dynamic authentication | |
CN103260153B (en) | Satellite communication service system | |
CN116186734A (en) | Power grid dispatching instruction information processing method in block chain network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 518000 floor 10, building E1, international e city, TCL Science Park, Zhongshan Park Road, Xili street, Nanshan District, Shenzhen, Guangdong Applicant after: ZTE System Technology Co.,Ltd. Address before: 518000 floor 10, building E1, international e city, TCL Science Park, Zhongshan Park Road, Xili street, Nanshan District, Shenzhen, Guangdong Applicant before: SHENZHEN ZTE SYSTEM INTEGRATION TECHNOLOGY Co.,Ltd. |