CN114268440A - Production operation room management system and method - Google Patents
Production operation room management system and method Download PDFInfo
- Publication number
- CN114268440A CN114268440A CN202111565656.4A CN202111565656A CN114268440A CN 114268440 A CN114268440 A CN 114268440A CN 202111565656 A CN202111565656 A CN 202111565656A CN 114268440 A CN114268440 A CN 114268440A
- Authority
- CN
- China
- Prior art keywords
- user
- terminal
- computer
- management server
- production
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004519 manufacturing process Methods 0.000 title claims abstract description 139
- 238000000034 method Methods 0.000 title claims abstract description 19
- 238000012545 processing Methods 0.000 claims abstract description 69
- 238000012795 verification Methods 0.000 claims abstract description 51
- 238000007726 management method Methods 0.000 claims description 104
- 238000004891 communication Methods 0.000 claims description 6
- 238000012544 monitoring process Methods 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 6
- 238000011161 development Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000010146 3D printing Methods 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000008707 rearrangement Effects 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Landscapes
- Alarm Systems (AREA)
- General Factory Administration (AREA)
Abstract
The embodiment of the invention discloses a production operation room management system and a method. The system comprises at least one operating computer, a terminal scanner corresponding to the operating computer, a user terminal and a management server, wherein the user terminal comprises a terminal processing module; the terminal processing module is used for generating and displaying key information corresponding to a user on a user terminal when the personnel identity verification of the user is detected to pass, the terminal scanner is used for acquiring the key information displayed by the user terminal and sending the key information to the management server, the management server is used for verifying whether the user has the use permission for operating the computer according to the key information, and if yes, the use permission for operating the computer is controlled to be opened. The system realizes the verification of the use permission of the operating computer based on the key information generated by the terminal in real time, and ensures the monitoring and the anti-tampering of the permission of the operating user through the key information calculated in real time, thereby ensuring the information security of the operating computer.
Description
Technical Field
The embodiment of the invention relates to the field of monitoring of production operation rooms, in particular to a system and a method for managing the production operation rooms.
Background
With the continuous development of science and technology, various APP and website systems are developed in a large number, and the products which are different day by day bring more convenient and faster lives to people. With the development of artificial intelligence, 5G and block chain technology, the iteration speed of the digital system is faster and faster, and the optimization and upgrade of small versions are more and more frequent. Under the background, the anti-theft means of the production operation room is also required to be continuously promoted, and the traditional means of manually swiping the card to enter the password is increasingly difficult to meet the requirement of safe production.
At present, in most production operation rooms of network systems, people access is verified in modes of card swiping, passwords, face recognition and the like. However, the prior art mainly relies on card swiping, password and biological identification technologies, the methods are independent of each other, and the anti-counterfeiting capability is not cooperated. If the card is lost or the password is forgotten, unnecessary troubles are generated, and the biometric identification technology is most extensive in fingerprint identification and face identification, and along with the development of the 3D printing technology, the two biometric identification technologies meet unprecedented challenges, illegal means such as embezzlement and stealing are layered endlessly, and certain potential safety hazards exist in a production operation room.
Disclosure of Invention
The embodiment of the invention provides a production operation room management system and a production operation room management method, which are used for improving the safety of production operation rooms.
In a first aspect, an embodiment of the present invention provides a production operation room management system, where the system includes at least one operation computer, a terminal scanner corresponding to the operation computer, a user terminal, and a management server, where the user terminal includes a terminal processing module; wherein,
the terminal processing module is used for generating key information corresponding to the user and displaying the key information on a display interface of the user terminal when the personnel identity verification of the user is detected to be passed;
the terminal scanner is connected with the management server and used for scanning a display interface of the user terminal, acquiring key information displayed by the user terminal and sending the key information to the management server;
and the management server is used for judging whether the user has the use authority of the operation computer or not according to the key information, and if so, opening the use authority of the operation computer.
Optionally, the key information includes location information and identity information corresponding to the user, and the management server is specifically configured to determine an operating computer associated with the user according to the location information and/or the identity information, and determine whether the user has the usage right of the operating computer, and if so, open the usage right of the operating computer.
Optionally, the terminal scanner is further configured to send a user leave signal to the management server when it is detected that the user terminal interrupts displaying of the key information;
the management server is further used for judging whether the operation computer is in a use state or not when the user temporarily leaving signal is received, and controlling the operation computer to be changed from the use state to a screen locking state if the operation computer is in the use state.
Optionally, the terminal processing module is further configured to, when it is detected that the user is located in a production operation room, acquire face scanning data and/or fingerprint identification data of the user, and perform personnel identity verification on the user based on the face scanning data and/or the fingerprint identification data.
Optionally, the system further includes a positioning device, and the user terminal further includes a positioning processing module;
the positioning processing module is used for sending a positioning signal to the positioning device;
the positioning device is in communication connection with the terminal processing module and is used for determining the current position of the user terminal based on each received positioning signal and sending the current position to the terminal processing module;
and the terminal processing module is also used for judging whether the user is positioned in the production operation room or not based on the current position.
Optionally, the terminal processing module is further configured to determine whether the user leaves the production operation room based on the current position, and if so, send a user leaving signal to the management server;
the management server is further used for judging whether the operation computer is in a use state or a screen locking state when the user leaving signal is received, and if yes, the management server feeds back login prompt information to the terminal processing module.
Optionally, the system further includes a scanning transmitter and a radio frequency chip corresponding to the operating computer, where the radio frequency chip is disposed in the employee card of the user;
the scanning emitter is used for receiving the radio frequency signals fed back by the radio frequency chips, determining the chips to be checked within the set range of the operation computer according to the signal intensity of each radio frequency signal, performing authority verification on the radio frequency signals corresponding to the chips to be checked, and generating alarm signals to be sent to the management server if the radio frequency signals which do not pass the authority verification exist.
Optionally, the scanning emitter is further configured to receive a calibration-free chip sent by another associated scanning emitter, and remove the calibration-free chip from the chip to be calibrated.
Optionally, the management server is further configured to obtain each production task and production information corresponding to each production task, and determine a production order of each production task and an operation computer corresponding to each production task based on a production window corresponding to the operation computer, a scheduled task corresponding to the operation computer, and a pre-trained production planning model.
In a second aspect, an embodiment of the present invention further provides a production bay management method, where the method includes:
when the fact that the personnel identity of the user passes the verification is detected, key information corresponding to the user is generated through a terminal processing module and displayed on a display interface of a user terminal;
scanning a display interface of the user terminal based on a terminal scanner corresponding to an operating computer to acquire key information displayed by the user terminal;
and judging whether the user has the use authority of the operation computer or not according to the key information through a management server, and if so, starting the use authority of the operation computer.
The embodiment of the invention has the following advantages or beneficial effects:
the production operation room management system comprises at least one operation computer, a terminal scanner corresponding to the operation computer, a user terminal and a management server, wherein the user terminal comprises a terminal processing module; the terminal processing module is used for generating key information corresponding to a user and displaying the key information on a display interface of a user terminal when the personnel identity verification of the user is detected to pass, the terminal scanner is used for scanning the display interface of the user terminal, obtaining the key information displayed by the user terminal and sending the key information to the management server, and the management server is used for verifying whether the user has the use permission for operating the computer according to the key information, and if so, the use permission for operating the computer is controlled to be opened. The system realizes the verification of the computer use permission in the production operation room through the key information generated by the terminal in real time, ensures the monitoring and the anti-tampering of the permission of the operation user through calculating the transmitted key information in real time, further ensures the information safety of operating the computer, solves the potential safety hazard caused by the reasons of card embezzlement or password forgetting and the like in the prior art, and further improves the safety of the production operation room.
Drawings
In order to more clearly illustrate the technical solutions of the exemplary embodiments of the present invention, a brief description is given below of the drawings used in describing the embodiments. It should be clear that the described figures are only views of some of the embodiments of the invention to be described, not all, and that for a person skilled in the art, other figures can be derived from these figures without inventive effort.
Fig. 1 is a schematic structural diagram of a production bay management system according to an embodiment of the present invention;
fig. 2 is a schematic positioning diagram according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a production bay management system according to a third embodiment of the present invention;
fig. 4 is a schematic flow chart of a production bay management method according to a fourth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a schematic structural diagram of a production bay management system according to an embodiment of the present invention. As shown in fig. 1, the production operation room management system provided in this embodiment includes at least one operation computer 11, a terminal scanner 12 corresponding to the operation computer, a user terminal 13, and a management server 14, where the user terminal 13 includes a terminal processing module 131; the terminal processing module 131 is configured to generate key information corresponding to the user and display the key information on a display interface of the user terminal 13 when it is detected that the personnel identity check of the user passes; the terminal scanner 12 is connected with the management server 14, and is configured to scan a display interface of the user terminal 13, obtain key information displayed by the user terminal 13, and send the key information to the management server 14; and the management server 14 is used for judging whether the user has the use authority for operating the computer 11 or not according to the key information, and if so, opening the use authority for operating the computer 11.
Wherein, the operation computer 11 can be a computer in the production operation room for executing the production task, and the production task can be updating the system or the software version; in the present embodiment, the number of the operation computers 11 in the production operation room may be one or more.
The terminal scanners 12 corresponding to the operating computers may be devices for scanning terminal display interfaces, and it should be noted that each operating computer corresponds to one terminal scanner 12, that is, the number of the terminal scanners 12 is the same as that of the operating computers 11. Alternatively, the terminal scanner 12 may be provided on a desktop of an office desk on which the operation computer 11 is installed, or the terminal scanner may be provided on a top of a host computer of the operation computer 11, or the like.
The terminal processing module 131 may be an application on the user terminal 13 for managing the production operation room. Specifically, the terminal processing module 131 may generate the key information in real time and display the key information on the display interface of the user terminal 13 when detecting that the person identity of the user passes the verification. The key information may be generated by the terminal processing module 131 through automatic encryption of information such as the current time, the user identity, and the like. Still alternatively, the terminal processing module 131 is connected to the management server 14 in a communication manner, and the terminal processing module 131 may issue a key request to the management server 14 and receive key information sent by the management server 14.
In this embodiment, after the terminal processing module 131 generates the key information, the user may place the user terminal 13 on the terminal scanner 12, so that the display interface of the user terminal 13 is aligned with the scanning area of the terminal scanner 12. Further, the terminal scanner 12 may scan the display interface of the user terminal 13, acquire the key information on the display interface, and transmit the key information to the management server 14.
The management server 14 may be an indoor server within a production operations room, or a cloud server. Specifically, the terminal scanner 12 may perform data transmission with the management server 14 through a wireless connection, a bluetooth connection, or the like. In this embodiment, after receiving the key information, the management server 14 may verify the key information to determine whether the user has the usage right to operate the computer 11, and if so, the management server 11 may unlock the usage right to operate the computer 11. For example, the management server 11 may turn on the operation computer 11, control the operation computer 11 to automatically turn on, or remove the login restriction of the operation computer 11.
In one embodiment, the management server 14 may determine whether the user has the right to use the operation computer 11 in any of the production operation rooms based on the key information. The key information may include time information, location information, and identity information.
In another embodiment, the management server 14 may only determine whether the user has the usage right of the operation computer 11 associated with the user (e.g., the operation computer 11 closest to the user, or the operation computer 11 bound to the user identity). That is, optionally, the key information includes location information and identity information corresponding to the user, and the management server 14 is specifically configured to determine the operation computer 11 associated with the user according to the location information and/or the identity information, and determine whether the user has the usage right of the operation computer 11, and if so, open the usage right of the operation computer 11.
Specifically, since the user usually places the user terminal 13 on the terminal scanner 12 corresponding to the operation computer 11 to be used, the management server 14 may determine the operation computer 11 closest to the user according to the location information, and perform the usage right verification on the operation computer 11; or, the management server 14 may determine the operation computer 11 bound to the user according to the identity information, and perform the usage right verification on the operation computer, for example, the a user and the B user may only use the operation computer Co _1 within a certain period of time; alternatively, the management server 14 may verify the usage right of the operation computer 11 bound to the user and closest to the user based on the location information and the identity information. Through the optional implementation mode, the permission verification of the available operation computer which is specified for the user in advance can be realized, the permission verification of the operation computer which is closest to the user can also be realized, the permission verification of all the operation computers in the production operation room is avoided, and the verification efficiency and the use safety of the operation computers are improved.
Of course, the terminal processing module 131 of this embodiment may also be used to perform access right verification between production operations. Specifically, the terminal processing module 131 may be bound to a user identifier corresponding to the user terminal 13, when the user needs a production operation room, the terminal processing module 131 may generate graphical encoded information corresponding to the user and display the graphical encoded information on a display interface of the user terminal, and an employee card scanning device in the production operation room may scan the graphical encoded information to verify whether the graphical encoded information has an access right. In the optional implementation mode, the original card swiping mode is replaced by the user terminal swiping mode, so that the safety of the production operation room is improved, and meanwhile, the condition that the employee card cannot enter the production operation room due to loss is also prevented.
The production operation room management system provided by the embodiment comprises at least one operation computer, a terminal scanner corresponding to the operation computer, a user terminal and a management server, wherein the user terminal comprises a terminal processing module; the terminal processing module is used for generating key information corresponding to a user and displaying the key information on a display interface of a user terminal when the personnel identity verification of the user is detected to pass, the terminal scanner is used for scanning the display interface of the user terminal, obtaining the key information displayed by the user terminal and sending the key information to the management server, and the management server is used for verifying whether the user has the use permission for operating the computer according to the key information, and if so, the use permission for operating the computer is controlled to be opened. The system realizes the verification of the computer use permission in the production operation room through the key information generated by the terminal in real time, ensures the monitoring and the anti-tampering of the permission of the operation user through calculating the transmitted key information in real time, further ensures the information safety of operating the computer, solves the potential safety hazard caused by the reasons of card embezzlement or password forgetting and the like in the prior art, and further improves the safety of the production operation room.
Optionally, in the technical solution of this embodiment, the terminal scanner 12 is further configured to send a user temporarily leaving signal to the management server 14 when detecting that the user terminal 13 interrupts displaying of the key information; the management server 14 is further configured to determine whether the operation computer 11 is in a use state when receiving the user pause signal, and if so, control the operation computer 11 to change from the use state to the screen locking state.
Specifically, if the display interface of the user terminal 13 is continuously aligned with the terminal scanner 12, that is, the user places the user terminal 13 on the terminal scanner 12, the terminal scanner 12 can keep the detection of the key information, and the operating computer 11 can be normally used by the user; if the user leaves the user terminal 13 for a while, the terminal scanner 12 cannot scan the key information, and the management server 14 cannot acquire the key information of the user terminal 13. At this time, in order to ensure that the production data in the operation computer 11 is not tampered, the management server 14 may change the operation computer 11 from the use state to the screen locking state, that is, automatically lock the screen of the operation computer 11 to protect the production data from being tampered, further improve the data security of the operation computer, and prevent the user from forgetting to log out the stolen identity information.
Of course, in consideration of the situation that the user picks up the user terminal 13 due to answering a call or the like in the process of using the operation computer 11, at this time, the automatic screen locking of the operation computer 11 may not be controlled, and the influence on the use process of the user is avoided. Therefore, in an alternative embodiment, the terminal scanner 12 may also send the user suspend signal to the management server 14 when detecting that the duration of time for which the user terminal 13 interrupts the display of the key information exceeds a preset threshold. Namely, when the time for withdrawing the user terminal by the user exceeds the preset threshold value, the control operation computer 11 automatically locks the screen.
The management server 14 in this embodiment may also perform data statistics and analysis on historical production tasks, provide an optimal production window for each operation computer 11, plan an optimal execution sequence of the production tasks for each operation computer 11, predict production time required for each production task, predict optimal production execution time of each production task, and the like.
For example, the management server 14 may be further configured to obtain each production task and production information corresponding to each production task, and determine a production order of each production task and an operation computer corresponding to each production task based on a production window corresponding to the operation computer 11, a scheduled task corresponding to the operation computer 11, and a pre-trained production planning model.
Specifically, the management server 14 may monitor and count the historical operating time and the historical production frequency of each operating computer 11 in the production operation room, and construct a production planning model according to the version iteration cycle, the production release time, the proficiency of the operator, the production version completion rate, the production execution time, the production execution sequence, the time required for production, and other information of each historical production task. Through the production planning model, the production sequence of each production task which needs to be estimated currently and the operation computer corresponding to each production task can be predicted, or the information such as the production required time and the production execution time of each production task which needs to be estimated currently can be predicted.
Optionally, the management server 14 may also train the commissioning planning model according to information such as code update amount of the historical commissioning task, function points in the requirement document, development and test time, and the like, so that the commissioning planning model may predict workload and update complexity of the commissioning task, and further determine information such as commissioning sequence, corresponding operating computer, commissioning required time, commissioning execution time, and the like according to the workload and the update complexity. The management server 14 can also adaptively adjust the update iteration production frequency of each system in the production operation room, and learn the historical statistical data to obtain a set of recommended production system time schedule, so that the problem of long-time queue waiting caused by too concentrated number of users in the production operation room is avoided, the waiting time of the production operation room is reduced, and the working efficiency of the whole operation is improved.
Of course, the management server 14 may also determine the production window of each operation computer 11 according to the historical production situation of each operation computer 11. The management server 14 may further determine a standby computer for the emergency operation among the plurality of operation computers 11, where the standby computer is a computer reserved for executing an emergency operation task, and may be dynamically adjusted according to an operation requirement at the time of the day, so as to fully utilize each computer, and improve the overall research and development operation efficiency.
Example two
On the basis of the foregoing embodiment, optionally, the terminal processing module 131 is further configured to, when it is detected that the user is located in the production operation room, obtain face scanning data and/or fingerprint identification data of the user, and perform personnel identity verification on the user based on the face scanning data and/or the fingerprint identification data.
Specifically, the production operation room management system provided in this embodiment includes at least one operation computer, a terminal scanner corresponding to the operation computer, a user terminal, and a management server, where the user terminal includes a terminal processing module; the terminal processing module is used for acquiring face scanning data and/or fingerprint identification data of a user when the user is detected to be positioned in a production operation room, and verifying the personnel identity of the user based on the face scanning data and/or the fingerprint identification data; and when the personnel identity verification of the user is detected to pass, generating key information corresponding to the user and displaying the key information on a display interface of the user terminal.
In this embodiment, the terminal processing module generates key information corresponding to the user when detecting that the personnel identity of the user passes the verification. Specifically, the terminal processing module may perform the personnel identity verification of the user according to the face scanning data and/or the fingerprint identification data of the user.
For example, in this embodiment, the location of the user may be located by the locating device, and if the terminal processing module detects that the user is located in the production operation room or the user is seated, the terminal processing module may initiate face recognition and/or fingerprint recognition on the user by using the user terminal, and acquire face scanning data and/or fingerprint recognition data of the user by using the user terminal. Further, the acquired face scanning data and/or fingerprint identification data are verified to verify the personnel identity of the user, and when the personnel identity verification is passed, key information corresponding to the user is generated.
Illustratively, the production operation room management system provided by this embodiment further includes a positioning device, and the user terminal further includes a positioning processing module; the positioning processing module is used for sending a positioning signal to the positioning device; the positioning device is in communication connection with the terminal processing module and used for determining the current position of the user terminal based on the received positioning signals and sending the current position to the terminal processing module; and the terminal processing module is also used for judging whether the user is positioned in the production operation room or not based on the current position.
The positioning device can be a multi-antenna group preset in a production operation room, and the multi-antenna group can be used as a signal transmitter and a signal receiver; the positioning processing module may be a bluetooth signal positioning module inside the user terminal, for example, may include a multi-antenna group inside the user terminal.
For example, the multi-antenna group in the positioning processing module may transmit a set of positioning signals simultaneously transmitted by multiple antennas at a set time interval, each antenna in the antenna group in the positioning device may determine an included angle between the user terminal and the antenna after receiving the positioning signal, and based on the included angle between each antenna and the user terminal, the current position of the user terminal may be determined.
As shown in fig. 2, a schematic positioning diagram is shown, where the receivers may be antennas in the positioning device, the transmitters may be antennas in the positioning processing module, each receiver may determine the direction of the transmitter, and the intersection point of the straight lines of the directions determined by the receivers is the position of the transmitter. Of course, it is also possible to use multiple antenna groups as the transmitter and the receiver respectively, activate each transmitting antenna through different time schedules, and transmit signals simultaneously transmitted by a group of multiple antennas at a special time interval after traversing a single antenna; the antennas are optimally grouped at the receiver end according to different directions, more dense receiving antennas are arranged at intervals, and the antennas are weighted by different numbers to obtain an average value so as to finally position the user. Or, the positioning device may also be a bluetooth node, and the direction-finding model is established by using the strength of the positioning signal received by each bluetooth node, and the user terminal is automatically identified and positioned after entering the scanning area.
Further, the terminal processing module judges whether the current position is located in the production operation room after obtaining the current position of the user terminal, and if so, initiates face recognition and/or fingerprint recognition of the user.
The production operation room is often limited in the user login link, but no judgment is made on login-out after login and whether the account is locked after the personnel leave temporarily. Therefore, in an optional implementation manner, the terminal processing module is further configured to determine whether the user leaves the production operation room based on the current position, and if so, send a user leaving signal to the management server; and the management server is also used for judging whether the operation computer is in a use state or a screen locking state when receiving the user leaving signal, and if so, feeding back the login prompt information to the terminal processing module.
Specifically, in this embodiment, it is considered that the user has left the production operation room but has not closed the computer or has not logged out the operation account, and at this time, information for operating the computer may be leaked. Therefore, the terminal processing module can also send a user leaving signal to the management server when judging that the user leaves the production operation room, further, after receiving the user leaving signal, the management server judges whether the operation computer is in a use state or a screen locking state, if so, the terminal processing module feeds back login prompt information to the terminal processing module to prompt the user to return to the production operation room for login operation, and information leakage of the operation computer is avoided.
The terminal processing module in the production operation room management system provided in this embodiment may acquire the face scanning data and/or the fingerprint identification data of the user when detecting that the user is located in the production operation room, and perform the personnel identity verification of the user based on the face scanning data and/or the fingerprint identification data, so as to generate the key information after the verification is passed, thereby implementing the personnel identity verification before generating the key information. The system can realize the verification of personnel identity and use permission, and the use permission of the operation computer is opened only when both the personnel identity and the use permission pass, so that the safety of production operation is further improved.
In addition, in this embodiment, the terminal processing module in the user terminal is used to verify the personnel identity of the user in real time. To the part production operation room that has not deployed devices such as face identification and fingerprint identification, because the collection equipment who has face identification and fingerprint identification has been integrated in the cell-phone, consequently, can gather the biological information of face and fingerprint through cell-phone APP, verify and pass through the APP after and generate key information and terminal scanner scanning key information (near field communication technique), verify user's permission of use, need not to produce and carry out hardware upgrade between the operation room, have maneuverability, convenient and fast, advantage that factor of safety is high, and simultaneously, still realized the multiple verification that the user used the operation computer, the security level of operation computer has been improved.
EXAMPLE III
Fig. 3 is a schematic structural diagram of a production operation room management system according to a third embodiment of the present invention, as shown in fig. 3, the production operation room management system according to the third embodiment includes at least one operation computer 31, a terminal scanner 32 corresponding to the operation computer, a user terminal 33, a management server 34, a scan emitter 35 corresponding to the operation computer 31, and a radio frequency chip 36, where the user terminal 33 includes a terminal processing module 331, and the radio frequency chip 36 is disposed in a employee card of a user.
The terminal processing module 331 is configured to generate key information corresponding to the user and display the key information on a display interface of the user terminal 33 when it is detected that the personnel identity check of the user passes; a terminal scanner 32 connected to the management server 34, configured to scan a display interface of the user terminal 33, obtain key information displayed by the user terminal 33, and send the key information to the management server 34; a management server 34 for judging whether the user has the use authority to operate the computer 31 according to the key information, if yes, opening the use authority to operate the computer; and the scanning emitter 35 is configured to receive the radio frequency signals fed back by the radio frequency chip 36, determine a chip to be verified within a set range of the operation computer 31 according to the signal strength of each radio frequency signal, perform permission verification on the radio frequency signal corresponding to the chip to be verified, and generate an alarm signal and send the alarm signal to the management server 34 if there is a radio frequency signal that does not pass the permission verification.
Wherein, the scanning transmitter 35 corresponding to the operation computer 31 may be an NFC (Near Field Communication) transmitter, and the scanning transmitter 35 may be disposed on a desk on which the operation computer 31 is disposed. The rf chip 36 may be an RFID (Radio Frequency Identification) chip, and is disposed in an employee card of a user.
Specifically, the scanning transmitter 35 disposed on the table top can receive the rf signals fed back by the rf chips 36. The scanning transmitter 35 may rank the received rf signals according to their signal strengths, and determine the rf chips 36, i.e., chips to be verified, located within the setting range of the operation computer 31 based on the ranking result. The setting range of the operation computer 31 may be a preset safety range of the operation computer 31, and a user in the setting range needs to have the use authority of the operation computer. For example, the setting range of the operation computer 31 may be a sector area with the operation computer 31 as a vertex, and the scanning transmitter 35 on the table top may determine the rf chip 36 located in the sector area according to the signal strength of each rf signal.
Further, the scan emitter 35 may perform authority verification on the radio frequency signal corresponding to each chip to be verified, if there is a chip to be verified whose authority verification does not pass, the scan emitter 35 may generate an alarm signal and send the alarm signal to the management server 34, and the management server 34 may generate an alarm prompt message and display the alarm prompt message on the screen of the operation computer 31. By scanning the transmitter 35 and the radio frequency chip 36, the identity authority of the operator near the operating computer is monitored, and other persons without authority can be prevented from being illegally intruded.
Considering that there is a case that the scanning transmitter 35 determines the radio frequency chip of the user on the adjacent table as the chip to be verified, optionally, the scanning transmitter 35 is further configured to receive the verification-free chip sent by the associated other scanning transmitter, and remove the verification-free chip from the chip to be verified. Wherein the associated other scanning emitter may be a scanning emitter corresponding to an operating computer adjacent to the operating computer corresponding to the current scanning emitter, i.e. the associated other scanning emitter may be an adjacent scanning emitter.
Specifically, each scanning transmitter 35 may send the radio frequency chip with the highest signal strength received by itself as a verification-free chip to other scanning transmitters associated therewith, so that the other scanning transmitters associated therewith delete the radio frequency signal corresponding to the verification-free chip from the radio frequency signal list, or delete the verification-free chip from each chip to be verified, so as to avoid the authority verification of the verification-free chip. In other words, the rank of the strength of the rf signal received by each scan emitter 35 can be individually arranged, and the rf chip (or user id) corresponding to the rf signal with the strongest response signal is removed from the list of chips to be verified of the scan emitter 35 at the neighboring table.
Through the optional implementation mode, the authority verification range of the scanning transmitter is optimized, the condition that the authority verification range is too large is prevented, for example, the authority verification of users at adjacent tables can be avoided, and therefore wrong alarm signals are avoided.
The production operation room management system provided by this embodiment receives the radio frequency signals fed back by each radio frequency chip through the scanning transmitter corresponding to the operation computer, determines the chip to be checked within the set range of the operation computer according to the signal strength of each radio frequency signal, further performs authority verification on the radio frequency signal corresponding to the chip to be checked, generates an alarm signal to send to the management server if there is a radio frequency signal that does not pass the authority verification, realizes authority verification on all users within the preset safe working range of the operation computer, monitors whether unauthorized persons exist within the preset safe working range of the operation computer, avoids information leakage of the operation computer, and improves the use safety between the operation computer and the production operation room.
Example four
Fig. 4 is a schematic flow diagram of a production operation room management method according to a fourth embodiment of the present invention, where this embodiment is applicable to a case where a user in a production operation room verifies a usage right of an operating computer, and the method may be executed by a production operation room management system, where the system may be implemented by hardware and/or software, and the method specifically includes the following steps:
and S410, generating key information corresponding to the user through the terminal processing module when the personnel identity verification of the user is detected to be passed, and displaying the key information on a display interface of the user terminal.
And S420, scanning a display interface of the user terminal based on a terminal scanner corresponding to the operating computer, and acquiring key information displayed by the user terminal.
And S430, judging whether the user has the use authority of the operation computer or not according to the key information through the management server, and if so, starting the use authority of the operation computer.
Optionally, the determining, according to the key information, whether the user has the usage right of operating the computer includes: and determining an operation computer associated with the user according to the position information and/or the identity information, and judging whether the user has the use authority of the operation computer.
Optionally, the method further includes: and if the terminal scanner detects that the user terminal interrupts the display of the key information, judging whether the operating computer is in a use state or not through the management server, and if so, controlling the operating computer to change from the use state to a screen locking state.
Optionally, the method further includes: through the terminal processing module, when the user is detected to be located in a production operation room, face scanning data and/or fingerprint identification data of the user are/is acquired, and personnel identity verification of the user is carried out based on the face scanning data and/or the fingerprint identification data.
Optionally, the method further includes: and receiving positioning signals sent by a positioning processing module on the user terminal through a positioning device, determining the current position of the user terminal based on the received positioning signals, and judging whether the user is positioned in the production operation room based on the current position.
Optionally, the method further includes: and judging whether the user leaves the production operation room or not based on the current position through the terminal processing module, if so, judging whether the operation computer is in a use state or a screen locking state through the management server, and if so, feeding back login prompt information to the terminal processing module.
Optionally, the method further includes: and receiving radio frequency signals sent by radio frequency chips arranged in the employee cards of the users through scanning transmitters corresponding to the operation computers, determining chips to be verified which are positioned in a set range of the operation computers according to the signal intensity of the radio frequency signals, performing authority verification on the radio frequency signals corresponding to the chips to be verified, and generating alarm signals if the radio frequency signals which do not pass the authority verification exist.
Optionally, the method further includes: and receiving the verification-free chip sent by other associated scanning transmitters through the scanning transmitter, and removing the verification-free chip from the chip to be verified.
Optionally, the method further includes: and acquiring each production task and production information corresponding to each production task through the management server, and determining the production sequence of each production task and the operation computer corresponding to each production task based on a production window corresponding to the operation computer, a scheduled task corresponding to the operation computer and a pre-trained production planning model.
According to the technical scheme, when the fact that personnel identity verification of a user passes is detected, key information corresponding to the user is generated and displayed on a display interface of a user terminal, the display interface of the user terminal is scanned through a terminal scanner, the key information displayed by the user terminal is obtained and sent to a management server, whether the user has the use permission for operating a computer or not is verified through the management server according to the key information, if yes, the use permission of the operating computer is controlled to be opened, verification of the use permission of the computer in a production operation room through the key information generated by the terminal in real time is achieved, information safety of the operating computer is guaranteed, potential safety hazards caused by card embezzlement or password forgetting and the like in the prior art are solved, and safety of the production operation room is further improved.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.
Claims (10)
1. A production operation room management system is characterized by comprising at least one operation computer, a terminal scanner corresponding to the operation computer, a user terminal and a management server, wherein the user terminal comprises a terminal processing module; wherein,
the terminal processing module is used for generating key information corresponding to the user and displaying the key information on a display interface of the user terminal when the personnel identity verification of the user is detected to be passed;
the terminal scanner is connected with the management server and used for scanning a display interface of the user terminal, acquiring key information displayed by the user terminal and sending the key information to the management server;
and the management server is used for judging whether the user has the use authority of the operation computer or not according to the key information, and if so, opening the use authority of the operation computer.
2. The system according to claim 1, wherein the key information includes location information and identity information corresponding to the user, and the management server is specifically configured to determine an operating computer associated with the user according to the location information and/or the identity information, and determine whether the user has the usage right of the operating computer, and if so, open the usage right of the operating computer.
3. The system of claim 1, wherein the terminal scanner is further configured to send a user suspend signal to the management server when detecting that the user terminal interrupts the display of the key information;
the management server is further used for judging whether the operation computer is in a use state or not when the user temporarily leaving signal is received, and controlling the operation computer to be changed from the use state to a screen locking state if the operation computer is in the use state.
4. The system according to claim 1, wherein the terminal processing module is further configured to, when it is detected that the user is located in a production operation room, obtain face scanning data and/or fingerprint identification data of the user, and perform personnel identity verification of the user based on the face scanning data and/or the fingerprint identification data.
5. The system according to claim 4, wherein the system further comprises a positioning device, the user terminal further comprises a positioning processing module;
the positioning processing module is used for sending a positioning signal to the positioning device;
the positioning device is in communication connection with the terminal processing module and is used for determining the current position of the user terminal based on each received positioning signal and sending the current position to the terminal processing module;
and the terminal processing module is also used for judging whether the user is positioned in the production operation room or not based on the current position.
6. The system of claim 5, wherein the terminal processing module is further configured to determine whether the user leaves the production operation room based on the current location, and if so, send a user leaving signal to the management server;
the management server is further used for judging whether the operation computer is in a use state or a screen locking state when the user leaving signal is received, and if yes, the management server feeds back login prompt information to the terminal processing module.
7. The system of claim 1, further comprising a scanning transmitter corresponding to the operating computer and a radio frequency chip disposed in an employee card of the user;
the scanning emitter is used for receiving the radio frequency signals fed back by the radio frequency chips, determining the chips to be checked within the set range of the operation computer according to the signal intensity of each radio frequency signal, performing authority verification on the radio frequency signals corresponding to the chips to be checked, and generating alarm signals to be sent to the management server if the radio frequency signals which do not pass the authority verification exist.
8. The system of claim 7, wherein the scan emitter is further configured to receive a verification-free chip sent by another associated scan emitter, and to remove the verification-free chip from the chip to be verified.
9. The system of claim 1, wherein the management server is further configured to obtain each production task and production information corresponding to each production task, and determine a production order of each production task and an operation computer corresponding to each production task based on a production window corresponding to the operation computer, a scheduled task corresponding to the operation computer, and a pre-trained production planning model.
10. A method for production bay management, the method comprising:
when the fact that the personnel identity of the user passes the verification is detected, key information corresponding to the user is generated through a terminal processing module and displayed on a display interface of a user terminal;
scanning a display interface of the user terminal based on a terminal scanner corresponding to an operating computer to acquire key information displayed by the user terminal;
and judging whether the user has the use authority of the operation computer or not according to the key information through a management server, and if so, starting the use authority of the operation computer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111565656.4A CN114268440B (en) | 2021-12-20 | 2021-12-20 | Production operation room management system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111565656.4A CN114268440B (en) | 2021-12-20 | 2021-12-20 | Production operation room management system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114268440A true CN114268440A (en) | 2022-04-01 |
CN114268440B CN114268440B (en) | 2024-03-26 |
Family
ID=80828148
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111565656.4A Active CN114268440B (en) | 2021-12-20 | 2021-12-20 | Production operation room management system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114268440B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107944577A (en) * | 2017-10-31 | 2018-04-20 | 珠海格力电器股份有限公司 | Equipment use method, device, medium, mobile terminal, server and equipment |
CN112330855A (en) * | 2020-10-15 | 2021-02-05 | 成都市以太节点科技有限公司 | Electronic lock safety management method, equipment and system |
CN112419026A (en) * | 2020-11-25 | 2021-02-26 | 山东浪潮商用系统有限公司 | Method for realizing interaction with tax terminal equipment based on mobile intelligent terminal |
CN112672344A (en) * | 2019-09-30 | 2021-04-16 | 菜鸟智能物流控股有限公司 | Data communication method and device between terminals |
CN112785772A (en) * | 2020-12-29 | 2021-05-11 | 江苏华册物联网科技有限公司 | Cash deposit and payment machine and working method thereof |
US20210243332A1 (en) * | 2020-02-04 | 2021-08-05 | Toshiba Tec Kabushiki Kaisha | System and method for processing cost accounting for multiple device functions |
CN113554252A (en) * | 2020-04-23 | 2021-10-26 | 广西民族师范学院 | Laboratory management system |
-
2021
- 2021-12-20 CN CN202111565656.4A patent/CN114268440B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107944577A (en) * | 2017-10-31 | 2018-04-20 | 珠海格力电器股份有限公司 | Equipment use method, device, medium, mobile terminal, server and equipment |
CN112672344A (en) * | 2019-09-30 | 2021-04-16 | 菜鸟智能物流控股有限公司 | Data communication method and device between terminals |
US20210243332A1 (en) * | 2020-02-04 | 2021-08-05 | Toshiba Tec Kabushiki Kaisha | System and method for processing cost accounting for multiple device functions |
CN113554252A (en) * | 2020-04-23 | 2021-10-26 | 广西民族师范学院 | Laboratory management system |
CN112330855A (en) * | 2020-10-15 | 2021-02-05 | 成都市以太节点科技有限公司 | Electronic lock safety management method, equipment and system |
CN112419026A (en) * | 2020-11-25 | 2021-02-26 | 山东浪潮商用系统有限公司 | Method for realizing interaction with tax terminal equipment based on mobile intelligent terminal |
CN112785772A (en) * | 2020-12-29 | 2021-05-11 | 江苏华册物联网科技有限公司 | Cash deposit and payment machine and working method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN114268440B (en) | 2024-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3736714B1 (en) | Systems and methods for remote access rights and verification | |
CN108475447B (en) | System and method for controlling access to a physical space | |
US10447334B2 (en) | Methods and systems for comprehensive security-lockdown | |
CN105957202B (en) | A kind of Ground Connection in Intelligent Building integral passage safety management system | |
CN104167040A (en) | Remote control method and system of electronic lock | |
CN204143429U (en) | A kind of tele-control system of electronic lock | |
AU2005304438A1 (en) | Actuating a security system using a wireless device | |
US11469789B2 (en) | Methods and systems for comprehensive security-lockdown | |
US10515343B1 (en) | Method and system for reporting and monitoring location-related activities of mobile devices | |
CN102236565A (en) | Method and system for cooperatively installing computer application | |
CN109493469A (en) | Authority setting method and management equipment of intelligent door lock | |
CN104468690A (en) | Method performed by device in distributed system and device of distributed system | |
CN105957203A (en) | Concentrated safety management system for overall corridors of apartment | |
CN114268440B (en) | Production operation room management system and method | |
US20230016625A1 (en) | Methods and Systems for Comprehensive Security-Lockdown | |
KR20220072541A (en) | Integrated system for blocking leakage of core technology information | |
CN205302421U (en) | Mobile terminal , gate host computer and entrance guard system of unblanking in entrance guard system of unblanking | |
TW201800652A (en) | Door access control system with automatic unlocking function and unlocking method thereof that comprises a door lock controller and an electronic device carried by a user such that when the electronic device is approaching the door lock controller, the door lock controller, upon identifying the user, automatically unlock the door lock | |
WO2020080191A1 (en) | Computer lock system and computer lock system operation method | |
CN220933525U (en) | Door lock control system | |
JP6919763B2 (en) | Wireless communication device and entry / exit management system | |
KR102705622B1 (en) | Access control system using wireless module | |
WO2021076578A1 (en) | Methods and systems for comprehensive security-lockdown | |
CN115468678A (en) | Employee body temperature detection system and method | |
CN117994885A (en) | Management method, management device, management platform, storage medium and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |