CN113205194A - Operation safety card control method based on authorization code - Google Patents

Operation safety card control method based on authorization code Download PDF

Info

Publication number
CN113205194A
CN113205194A CN202110474268.9A CN202110474268A CN113205194A CN 113205194 A CN113205194 A CN 113205194A CN 202110474268 A CN202110474268 A CN 202110474268A CN 113205194 A CN113205194 A CN 113205194A
Authority
CN
China
Prior art keywords
authorization code
card control
task
control method
producer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110474268.9A
Other languages
Chinese (zh)
Inventor
彭鸣明
张永亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zte System Integration Technology Co ltd
Original Assignee
Shenzhen Zte System Integration Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zte System Integration Technology Co ltd filed Critical Shenzhen Zte System Integration Technology Co ltd
Priority to CN202110474268.9A priority Critical patent/CN113205194A/en
Publication of CN113205194A publication Critical patent/CN113205194A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/20Administration of product repair or maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Abstract

The invention relates to the technical field of operation safety, in particular to an operation safety card control method based on an authorization code, which is an operation safety card control method based on the authorization code.

Description

Operation safety card control method based on authorization code
Technical Field
The invention relates to the technical field of operation safety, in particular to an operation safety card control method based on an authorization code.
Background
At present, various public facilities, factory building equipment and facilities are more and more diversified, intelligent, and use is frequent day by day, and the daily maintenance of these equipment is the incessant normal operating's of guarantee equipment important means. For example, equipment in subways and high-speed rails normally and safely operates, and whether the travel of numerous people is safe and smooth is very noticeable, some of the equipment are very critical and some are very dangerous; however, the existing plant equipment is generally controlled manually in the maintenance process, and the equipment is easy to operate by mistake in the maintenance process, so that the equipment is very unsafe for maintenance personnel and is easy to have an accident.
Disclosure of Invention
The invention provides an operation safety card control method based on an authorization code aiming at the problems in the prior art.
In order to solve the technical problems, the invention adopts the following technical scheme:
the invention provides an operation safety card control method based on an authorization code, which comprises the following steps:
step A, the system generates a maintenance task through a task generation module according to the received content, judges whether safety card control is needed or not, and synchronously generates an operation card control module producer;
b, the system generates a produced maintenance task to a maintenance task execution module through a task conveying interface, the maintenance task execution module judges whether safety card control is needed or not according to the built-in requirement, and an operation card control module producer generates an operation card control template;
c, the maintenance task execution module loads the maintenance task into the intelligent terminal through the task transmission interface, and the operation card control template judges whether the safety card control needs to be started or not according to an internal program and outputs a corresponding result;
d, if the maintenance task execution module judges that the safety card control is needed, the operation card control module verifies the safety card control, and if the verification is passed, the system starts an authorization code producer to generate an authorization code;
and step E, an authorization code receiver of the overhaul task execution module receives the authorization code generated by the authorization code producer, sends the received authorization code to the authorization code verification module for verification, if the verification is passed, the safety card control process is ended, overhaul data of the overhaul task is sent to the server through the task transmission interface, and otherwise, the steps A to D are repeated until the verification is successful.
Further, the authorization code is a two-dimensional code authorization code or a digital authorization code.
Further, the authorization code verification module is responsible for decoding and analyzing the received digital authorization code value.
Further, the authorization code producer comprises an acoustic wave communication exciter and a two-dimensional code generator, wherein the authorization code producer firstly starts the acoustic wave communication exciter to send the digital authorization code, and when the sending fails for multiple times, the two-dimensional code generator is started.
Further, the authorization code producer may produce the authorization code for one or more uses.
Further, the authorization code generator generates the authorization codes with timeliness and regionality.
Furthermore, the overhaul task execution module is a mobile terminal with a communication function, and the system is a computer terminal.
Furthermore, the server is a cloud server, the overhaul task execution module has a signature function, and manual signature is needed when overhaul data of the overhaul task is sent to the server through the task transmission interface.
The invention has the beneficial effects that: the invention relates to an operation safety card control method based on authorization codes, which does not need manual verification in an operation-approval task, and simultaneously issues an overhaul task and a safety inspection task in a matching way, thereby improving the operation efficiency.
Drawings
FIG. 1 is a block flow diagram of the present invention.
Detailed Description
In order to facilitate understanding of those skilled in the art, the present invention will be further described with reference to the following examples and drawings, which are not intended to limit the present invention. The present invention is described in detail below with reference to the attached drawings.
The invention provides an operation safety card control method based on an authorization code, which comprises the following steps:
step A, the system generates a maintenance task through a task generation module according to the received content, judges whether safety card control is needed or not, and synchronously generates an operation card control module producer;
b, the system generates a produced maintenance task to a maintenance task execution module through a task conveying interface, the maintenance task execution module judges whether safety card control is needed or not according to the built-in requirement, and an operation card control module producer generates an operation card control template;
c, the maintenance task execution module loads the maintenance task into the intelligent terminal through the task transmission interface, and the operation card control template judges whether the safety card control needs to be started or not according to an internal program and outputs a corresponding result;
d, if the maintenance task execution module judges that the safety card control is needed, the operation card control module verifies the safety card control, and if the verification is passed, the system starts an authorization code producer to generate an authorization code;
and step E, an authorization code receiver of the overhaul task execution module receives the authorization code generated by the authorization code producer, sends the received authorization code to the authorization code verification module for verification, if the verification is passed, the safety card control process is ended, overhaul data of the overhaul task is sent to the server through the task transmission interface, and otherwise, the steps A to D are repeated until the verification is successful.
In this embodiment: the authorization code generator is used for starting the acoustic wave communication exciter to send the digital authorization code, and when the two-dimensional code generator fails to send for multiple times, the two-dimensional code generator is started.
In this embodiment: and the authorization code verification module is responsible for decoding and analyzing the received digital authorization code value.
In this embodiment: the authorization code generator can generate the authorization code to be used once or for multiple times, and the setting can be adjusted according to requirements when the authorization code generator is used.
In this embodiment: the authorization code generator generates the authorization code with timeliness and regionality, the authorization code generator generates the authorization code valid within a specific time, specifically within 2 minutes, and similarly, the authorization code generator generates the authorization code valid within a specific region.
In this embodiment: the maintenance task execution module is a mobile terminal with a communication function, and the system is a computer terminal.
In this embodiment: the server is a cloud server, the overhaul task execution module has a signature function, and manual signature is needed when overhaul data of the overhaul task is sent to the server through the task transmission interface.
In this embodiment: the operator performs authentication using an ID card or a dynamic password.
In this embodiment: the card control task module can generate characters, images and videos, and transmits back the images and videos when the card control task finishes collection.
In this embodiment: when the network is failed, the off-line calibration is performed for temporary storage.
Although the present invention has been described with reference to the above preferred embodiments, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (8)

1. An operation safety card control method based on an authorization code is characterized in that: the method comprises the following steps:
step A, the system generates a maintenance task through a task generation module according to the received content, judges whether safety card control is needed or not, and synchronously generates an operation card control module producer;
b, the system generates a produced maintenance task to a maintenance task execution module through a task conveying interface, the maintenance task execution module judges whether safety card control is needed or not according to the built-in requirement, and an operation card control module producer generates an operation card control template;
c, the maintenance task execution module loads the maintenance task into the intelligent terminal through the task transmission interface, and the operation card control template judges whether the safety card control needs to be started or not according to an internal program and outputs a corresponding result;
d, if the maintenance task execution module judges that the safety card control is needed, the operation card control module verifies the safety card control, and if the verification is passed, the system starts an authorization code producer to generate an authorization code;
and step E, an authorization code receiver of the overhaul task execution module receives the authorization code generated by the authorization code producer, sends the received authorization code to the authorization code verification module for verification, if the verification is passed, the safety card control process is ended, overhaul data of the overhaul task is sent to the server through the task transmission interface, and otherwise, the steps A to D are repeated until the verification is successful.
2. The authorization code-based operation security card control method according to claim 1, wherein: the authorization code is a two-dimensional code authorization code or a digital authorization code.
3. The authorization code-based operation security card control method according to claim 1, wherein: and the authorization code verification module is responsible for decoding and analyzing the received digital authorization code value.
4. The authorization code-based operation security card control method according to claim 1, wherein: the authorization code producer comprises an acoustic wave communication exciter and a two-dimensional code generator, wherein the authorization code producer firstly starts the acoustic wave communication exciter to send a digital authorization code, and when the sending fails for multiple times, the two-dimensional code generator is started.
5. The authorization code-based operation security card control method according to claim 1, wherein: the authorization code generator generates the authorization code for one or more uses.
6. The authorization code-based operation security card control method according to claim 5, wherein: the authorization code producer generates the authorization code with timeliness and regionality.
7. The authorization code-based operation security card control method according to claim 1, wherein: the maintenance task execution module is a mobile terminal with a communication function, and the system is a computer terminal.
8. The authorization code-based operation security card control method according to claim 1, wherein: the server is a cloud server, the overhaul task execution module has a signature function, and manual signature is needed when overhaul data of the overhaul task is sent to the server through the task transmission interface.
CN202110474268.9A 2021-04-29 2021-04-29 Operation safety card control method based on authorization code Pending CN113205194A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110474268.9A CN113205194A (en) 2021-04-29 2021-04-29 Operation safety card control method based on authorization code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110474268.9A CN113205194A (en) 2021-04-29 2021-04-29 Operation safety card control method based on authorization code

Publications (1)

Publication Number Publication Date
CN113205194A true CN113205194A (en) 2021-08-03

Family

ID=77027763

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110474268.9A Pending CN113205194A (en) 2021-04-29 2021-04-29 Operation safety card control method based on authorization code

Country Status (1)

Country Link
CN (1) CN113205194A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102951190A (en) * 2012-10-25 2013-03-06 中国铁道科学研究院 Method and system for safety control on dispatching commands
CN105564465A (en) * 2015-12-23 2016-05-11 兰州交通大学 System and method for controlling maintenance operation of railway electrical service signal equipment
CN106218671A (en) * 2016-09-06 2016-12-14 兰州铁路局 The control method of station train travel operation and device
CN108876206A (en) * 2018-07-27 2018-11-23 深圳市中兴系统集成技术有限公司 A kind of safety card prosecutor method, electronic equipment and storage medium
CN109254570A (en) * 2018-09-27 2019-01-22 卡斯柯信号有限公司 A kind of Intelligent closed-loop control system applied to high-speed rail signal equipment repair
CN109782703A (en) * 2018-12-13 2019-05-21 湖南铁路科技职业技术学院 A kind of railway standardization operation control system based on intelligent glasses
US20190158486A1 (en) * 2016-08-29 2019-05-23 Jrd Communication (Shenzhen) Ltd Method for authorization code verification and server

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102951190A (en) * 2012-10-25 2013-03-06 中国铁道科学研究院 Method and system for safety control on dispatching commands
CN105564465A (en) * 2015-12-23 2016-05-11 兰州交通大学 System and method for controlling maintenance operation of railway electrical service signal equipment
US20190158486A1 (en) * 2016-08-29 2019-05-23 Jrd Communication (Shenzhen) Ltd Method for authorization code verification and server
CN106218671A (en) * 2016-09-06 2016-12-14 兰州铁路局 The control method of station train travel operation and device
CN108876206A (en) * 2018-07-27 2018-11-23 深圳市中兴系统集成技术有限公司 A kind of safety card prosecutor method, electronic equipment and storage medium
CN109254570A (en) * 2018-09-27 2019-01-22 卡斯柯信号有限公司 A kind of Intelligent closed-loop control system applied to high-speed rail signal equipment repair
CN109782703A (en) * 2018-12-13 2019-05-21 湖南铁路科技职业技术学院 A kind of railway standardization operation control system based on intelligent glasses

Similar Documents

Publication Publication Date Title
CN102300182B (en) Short-message-based authentication method, system and device
CN103941676B (en) A kind of long-range control method of electromechanical equipment maintaining
CN102291376B (en) Method and system for realizing mobile terminal-supporting electronic transaction
CN106022046A (en) Special equipment permitted operation monitoring method
CN103916366A (en) Login method, maintenance terminal, data management service equipment and login system
CN103401868A (en) Temporary authorization method for mobile communication equipment of authorizing party and authorized party and temporary authorization management method and device for manager
CN106161448A (en) The authority control method of large-sized unit air-conditioning, Apparatus and system
CN107989514A (en) There is the safety box of dynamic password
CN105323094A (en) Safety management method based on equipment identification and system thereof
CN105376208A (en) Secure data verification method, system and computer readable storage medium
CN108259445A (en) MS windows desktops Security Login System and its login method based on smart mobile phone
CN104243026B (en) Method for sending information, message receiving method, device and system
CN105791206A (en) Local area network service acquiring method and device
CN110348545B (en) AR intelligent operation ticket method and device based on ERP system
CN113205194A (en) Operation safety card control method based on authorization code
CN109684802A (en) A kind of method and system providing a user artificial intelligence platform
CN107395580B (en) Data verification method and device
CN105530094B (en) A kind of identity identifying method, device, system and scrambler
CN102195943B (en) Safety information interaction method and system
CN104933798A (en) Power plant safety management system and method based on two-dimensional code and electronic key
CN103312673A (en) Enterprise mobile application system and application method
CN108965326A (en) A kind of boss's station secure communication control method and system based on user identity authentication
CN105095704A (en) Identity recognition method based on multiple dynamic authentication
CN103260153B (en) Satellite communication service system
CN116186734A (en) Power grid dispatching instruction information processing method in block chain network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 518000 floor 10, building E1, international e city, TCL Science Park, Zhongshan Park Road, Xili street, Nanshan District, Shenzhen, Guangdong

Applicant after: ZTE System Technology Co.,Ltd.

Address before: 518000 floor 10, building E1, international e city, TCL Science Park, Zhongshan Park Road, Xili street, Nanshan District, Shenzhen, Guangdong

Applicant before: SHENZHEN ZTE SYSTEM INTEGRATION TECHNOLOGY Co.,Ltd.