CN114333098A - Patrol method, patrol device, electronic equipment and computer readable medium - Google Patents
Patrol method, patrol device, electronic equipment and computer readable medium Download PDFInfo
- Publication number
- CN114333098A CN114333098A CN202111615906.0A CN202111615906A CN114333098A CN 114333098 A CN114333098 A CN 114333098A CN 202111615906 A CN202111615906 A CN 202111615906A CN 114333098 A CN114333098 A CN 114333098A
- Authority
- CN
- China
- Prior art keywords
- patrol
- night
- authentication
- plan
- personnel
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 66
- 238000004080 punching Methods 0.000 claims abstract description 109
- 238000005516 engineering process Methods 0.000 claims abstract description 14
- 238000004590 computer program Methods 0.000 claims description 22
- 230000008569 process Effects 0.000 claims description 22
- 238000012545 processing Methods 0.000 claims description 22
- 238000004458 analytical method Methods 0.000 claims description 13
- 238000012795 verification Methods 0.000 claims description 12
- 238000001514 detection method Methods 0.000 claims description 6
- 238000010586 diagram Methods 0.000 description 17
- 238000007726 management method Methods 0.000 description 16
- 238000004891 communication Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 6
- 230000001680 brushing effect Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000003203 everyday effect Effects 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02A—TECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE
- Y02A90/00—Technologies having an indirect contribution to adaptation to climate change
- Y02A90/10—Information and communication technologies [ICT] supporting adaptation to climate change, e.g. for weather forecasting or climate simulation
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a night patrol method, a night patrol device, electronic equipment and a computer readable medium, and relates to the technical field of sensing technology service of the Internet of things. One embodiment of the method comprises: calling a patrol plan generating engine to enable the patrol plan generating engine to generate a patrol plan according to the set patrol elements; the patrol plan is used for indicating a patrol route, a patrol position and a combined authentication mode for patrol personnel to perform patrol card punching at patrol time; sending the patrol plan to a terminal of a patrol worker, so that the patrol worker can use an authentication factor specified by a combined authentication mode to carry out patrol card punching at a patrol position according to a patrol route in patrol time; and receiving a patrol card-punching request, performing credible identity authentication on authentication information corresponding to the patrol point location carried by the patrol card-punching request, and determining that patrol personnel completes patrol card-punching of the patrol point location after the authentication is passed. The method can effectively prevent the phenomenon of card punching in the night patrol generation, and meanwhile, the identity information of night patrol personnel is protected.
Description
Technical Field
The invention relates to the technical field of sensing technology service of the Internet of things, in particular to a night patrol method, a night patrol device, electronic equipment and a computer readable medium.
Background
The patrol refers to the patrol of patrol personnel at each patrol position according to a preset patrol route, and meanwhile, the safety of the patrol personnel is also protected. At present, most of patrol ways adopt mediums such as a patrol stick, a Radio Frequency Identification (RFID) tag, a fingerprint and an identity card for patrol, and a patrol route is completed by using a portable medium for card punching in the patrol process.
In the patrol mode, the cards are punched at each patrol position by depending on the medium, the identity of patrol personnel is not verified, and the modern punching condition is easy to appear; and use the ID card to be the mode of patrolling of medium, need read ID card certificate information, can cause the revealing of patrolling personnel's identity information, in addition under the ID card condition of losing, can't accomplish the task of patrolling.
Disclosure of Invention
In view of this, embodiments of the present invention provide a patrol method, an apparatus, an electronic device, and a computer-readable medium, where the method sets a combined authentication manner for each patrol location on a patrol route of a patrol officer in a patrol plan, so that when a patrol card-punching request of the patrol officer is received, the patrol officer is authenticated with a trusted identity based on authentication information corresponding to the combined authentication manner, thereby effectively preventing a patrol card-punching phenomenon for an era, and protecting identity information of the patrol officer.
To achieve the above object, according to an aspect of the embodiments of the present invention, a patrol method based on trusted identity authentication is provided.
The embodiment of the invention provides a night patrol method based on trusted identity authentication, which comprises the following steps: calling a patrol plan generating engine so that the patrol plan generating engine generates a patrol plan according to the set patrol elements; the patrol plan is used for indicating a patrol route, a patrol position and a corresponding combined authentication mode for patrol personnel to perform patrol card punching at the patrol time according to the weather of the patrol time and whether the patrol time belongs to the working day;
sending the patrol plan to a terminal of the patrol personnel so that the patrol personnel can use the authentication factor specified by the combined authentication mode to carry out patrol card punching at the patrol point according to the patrol route within the patrol time;
and receiving a patrol card punching request from a card punching device, performing credible identity authentication on authentication information corresponding to the patrol point location carried by the patrol card punching request, and determining that the patrol personnel completes patrol card punching of the patrol point location after the authentication is passed.
Optionally, the patrol element further includes: the patrol personnel, the patrol route, the patrol time, the patrol position and a combined authentication mode corresponding to the patrol position;
the generating of the patrol plan according to the set patrol elements includes:
setting patrol time for patrolmen to perform patrol card punching at the patrol position;
and setting a night patrol route for night patrol personnel and a combined authentication mode of night patrol points on the night patrol route according to the weather of the night patrol time and whether the night patrol time belongs to a working day.
Optionally, the setting of the patrol route for the patrol personnel includes:
dividing a plurality of patrol point locations according to the patrol point locations belonging to an internal office area, an internal non-office area or an external area to obtain a corresponding patrol point location set;
if the patrol time is determined to be a working day and is a first target weather, planning a patrol route which does not affect the office for the patrol point location set belonging to the internal office area, and respectively planning a shortest patrol route for the patrol point location sets belonging to the internal non-office area and the external area;
determining that the night patrol time is a working day and is a second target weather, planning the night patrol route which does not affect the office for the night patrol point location set belonging to the internal office area, planning the shortest night patrol route for the internal non-office area, and setting the night patrol state of the night patrol point location set belonging to the external area as a checked state;
and if the patrol time is determined to be a non-working day, respectively planning the shortest patrol route for the plurality of patrol point location sets.
Optionally, the performing trusted identity authentication on authentication information corresponding to the patrol location carried by the patrol card-punching request includes:
calling a trusted identity authentication interface to perform trusted identity authentication on authentication information corresponding to the patrol point location carried by the patrol card-punching request;
in the trusted identity authentication process, one or more of a liveness detection technology, an encryption technology, an IP address and a physical address control are used to prevent attacks.
Optionally, the method further comprises:
calling the patrol plan generating engine to enable the patrol plan generating engine to generate a corresponding patrol plan according to a set emergency scene; wherein the patrol plan is used for indicating a processing flow for the patrol personnel under the condition that the emergency scene occurs.
Optionally, the method further comprises:
recording the patrol progress of the patrol personnel in real time and the identity authentication record of the patrol personnel at the patrol position of the patrol route;
and carrying out patrol analysis according to the patrol progress and the identity authentication record.
Optionally, the combined authentication manner is any one or a combination of a plurality of the following authentication factors: biological information, a dynamic two-dimensional code, a credible identity password and a dynamic verification code.
In order to achieve the above object, according to another aspect of the embodiments of the present invention, a night patrol device based on trusted identity authentication is provided.
The embodiment of the invention provides a night patrol device based on credible identity authentication, which comprises: the system comprises a plan generating module, a data processing module and a data processing module, wherein the plan generating module is used for calling a patrol plan generating engine so as to enable the patrol plan generating engine to generate a patrol plan according to set patrol elements; the patrol plan is used for indicating a patrol route, a patrol position and a corresponding combined authentication mode for patrol personnel to perform patrol card punching at the patrol time according to the weather of the patrol time and whether the patrol time belongs to the working day;
the plan sending module is used for sending the patrol plan to a terminal of the patrol personnel so that the patrol personnel can carry out patrol card punching at the patrol position by using the authentication factor specified by the combined authentication mode according to the patrol route in the patrol time;
and the authentication card punching module is used for receiving the patrol card punching request from the card punching equipment, performing credible identity authentication on authentication information corresponding to the patrol point location carried by the patrol card punching request, and determining that the patrol personnel completes patrol card punching of the patrol point location after the authentication is passed.
Optionally, the patrol element further includes: the patrol personnel, the patrol route, the patrol time, the patrol position and a combined authentication mode corresponding to the patrol position;
the plan generating module is further used for setting patrol time for the patrol personnel to perform patrol card punching at the patrol position; and
and setting a night patrol route for night patrol personnel and a combined authentication mode of night patrol points on the night patrol route according to the weather of the night patrol time and whether the night patrol time belongs to a working day.
Optionally, the plan generation module is further configured to
Dividing a plurality of patrol point locations according to the patrol point locations belonging to an internal office area, an internal non-office area or an external area to obtain a corresponding patrol point location set;
if the patrol time is determined to be a working day and is a first target weather, planning a patrol route which does not affect the office for the patrol point location set belonging to the internal office area, and respectively planning a shortest patrol route for the patrol point location sets belonging to the internal non-office area and the external area;
determining that the night patrol time is a working day and is a second target weather, planning the night patrol route which does not affect the office for the night patrol point location set belonging to the internal office area, planning the shortest night patrol route for the internal non-office area, and setting the night patrol state of the night patrol point location set belonging to the external area as a checked state; and
and if the patrol time is determined to be a non-working day, respectively planning the shortest patrol route for the plurality of patrol point location sets.
Optionally, the authentication card punching module is further used for
Calling a trusted identity authentication interface to perform trusted identity authentication on authentication information corresponding to the patrol point location carried by the patrol card-punching request;
in the trusted identity authentication process, one or more of a liveness detection technology, an encryption technology, an IP address and a physical address control are used to prevent attacks.
Optionally, the apparatus further comprises:
the plan generating module is used for calling the night patrol plan generating engine so that the night patrol plan generating engine generates a corresponding night patrol plan according to a set emergency scene; wherein the patrol plan is used for indicating a processing flow for the patrol personnel under the condition that the emergency scene occurs.
Optionally, the apparatus further comprises:
the patrol analysis module is used for recording the patrol progress of the patrol personnel in real time and the identity authentication record of the patrol personnel at the patrol position of the patrol route;
and carrying out patrol analysis according to the patrol progress and the identity authentication record.
Optionally, the combined authentication manner is any one or a combination of a plurality of the following authentication factors: biological information, a dynamic two-dimensional code, a credible identity password and a dynamic verification code.
To achieve the above object, according to still another aspect of an embodiment of the present invention, there is provided an electronic apparatus.
An electronic device of an embodiment of the present invention includes: one or more processors; the storage device is used for storing one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors implement the patrol method based on the trusted identity authentication of the embodiment of the invention.
To achieve the above object, according to still another aspect of embodiments of the present invention, there is provided a computer-readable medium.
A computer-readable medium of an embodiment of the present invention stores thereon a computer program, and when the computer program is executed by a processor, the computer program implements a night watching method based on trusted identity authentication of an embodiment of the present invention.
To achieve the above object, according to still another aspect of an embodiment of the present invention, there is provided a computer program product.
A computer program product according to an embodiment of the present invention includes a computer program, and when the computer program is executed by a processor, the patrol method according to an embodiment of the present invention based on trusted identity authentication is implemented.
One embodiment of the above invention has the following advantages or benefits: whether the night watching time belongs to the night watching route of night watching personnel or not is determined according to the weather of the night watching time in the night watching plan and whether the night watching time belongs to the working day, and the combined authentication mode of each night watching point position on the night watching route enables the night watching personnel to carry out credible identity authentication based on the authentication information corresponding to the combined authentication mode when a night watching card punching request of the night watching personnel is received, so that the phenomenon of replacing card punching in the night watching can be effectively prevented, and meanwhile, the identity information of the night watching personnel is protected.
The patrol plan is made based on a plurality of patrol elements such as patrol personnel, patrol routes, patrol time, patrol positions and combined authentication modes corresponding to the patrol positions, different identity authentication modes are used for different patrol positions, so that the patrol plan is more reasonable and good in flexibility. When a patrol plan is formulated, a plurality of patrol factors such as weather, working days and the like are considered, so that the patrol route is ensured not to influence the office work of office staff, and the patrol of the patrol staff is facilitated.
By using various technical means to perform black-proof management in the process of credible identity authentication, the hacker can be effectively prevented from attacking. Through generating the patrol plan for the emergency scene, the patrol personnel can process according to the patrol plan at the first time, and the response capability of the patrol personnel for responding the emergency scene is improved. Through collecting the patrol data and analyzing the patrol data, the patrol condition of patrol personnel can be conveniently known, and the follow-up patrol task can be guided. The credible identity authentication supports various modes and has good flexibility.
Further effects of the above-mentioned non-conventional alternatives will be described below in connection with the embodiments.
Drawings
The drawings are included to provide a better understanding of the invention and are not to be construed as unduly limiting the invention. Wherein:
fig. 1 is a schematic diagram of the main steps of a patrol method based on trusted identity authentication according to a first embodiment of the present invention;
fig. 2 is a schematic diagram of a patrol process based on trusted identity authentication according to a second embodiment of the present invention;
fig. 3 is a schematic diagram of a main flow of a patrol method based on trusted identity authentication according to a second embodiment of the present invention;
fig. 4 is a schematic diagram of a main flow of a patrol method based on trusted identity authentication according to a third embodiment of the present invention;
fig. 5 is a schematic diagram of the main modules of a night patrol device based on trusted identity authentication according to an embodiment of the present invention;
FIG. 6 is an exemplary system architecture diagram in which embodiments of the present invention may be employed;
FIG. 7 is a block diagram of a computer system suitable for use with the electronic device to implement an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present invention are described below with reference to the accompanying drawings, in which various details of embodiments of the invention are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
According to the technical scheme, the data acquisition, storage, use, processing and the like meet relevant regulations of national laws and regulations.
Example one
Fig. 1 is a schematic diagram of main steps of a night patrol method based on trusted identity authentication according to an embodiment of the present invention. As shown in fig. 1, a patrol method based on trusted identity authentication according to an embodiment of the present invention is implemented by a patrol device based on trusted identity authentication, and mainly includes the following steps:
step S101: and calling a patrol plan generating engine so that the patrol plan generating engine generates a patrol plan according to the set patrol elements. The patrol elements comprise patrol personnel, patrol routes, patrol time, patrol positions and combined authentication modes corresponding to the patrol positions, and any one or more of weather and working days. The night patrol plan is used for indicating night patrol routes, night patrol positions and corresponding combined authentication modes for night patrol personnel to perform night patrol and card punching at night patrol time according to the weather of the night patrol time and whether the night patrol time belongs to working days.
The combined authentication mode can be any one or combination of multiple authentication factors as follows: biological information, a two-dimensional code, a credible identity password and a verification code. The biological information may be face information, fingerprint information, iris information, or the like. The two-dimension code and the verification code are both codes which are sent to a terminal used by the patrol personnel by the patrol device and used for identity authentication, and are preferably dynamic two-dimension codes and dynamic verification codes so as to further prevent the phenomenon of card punching. The trusted identity password is a password set for the online copy of the identity card by the user on the trusted identity authentication service platform.
In an embodiment, the patrol plan generating engine may set, for the patrol person, patrol time for performing patrol checking at the patrol location according to information such as age, sex, and shift time of the patrol person, and further set, for the patrol person, a patrol route based on weather of the patrol time and whether the patrol time belongs to a working day, a combined authentication manner of each patrol location on the patrol route, and patrol time for performing patrol checking at the patrol location to obtain the patrol plan.
Step S102: and sending the patrol plan to a terminal of the patrol personnel so that the patrol personnel can use the authentication factor specified by the combined authentication mode to carry out patrol card punching at the patrol point according to the patrol route in the patrol time. And the patrol device generates a patrol plan for the patrol personnel and then sends the patrol plan to the terminal of the patrol personnel. And after receiving the patrol plan, the patrol personnel performs patrol card punching through the card punching equipment according to the patrol time specified by the patrol plan, the patrol route and the authentication factors corresponding to the combined authentication modes set at each patrol point. The card punching equipment collects the authentication information, generates a patrol card punching request and sends the patrol card punching request to the patrol device.
Step S103: and receiving a patrol card punching request from a card punching device, performing credible identity authentication on authentication information corresponding to the patrol point carried by the patrol card punching request, and determining that the patrol personnel completes patrol card punching after the authentication is passed. The patrol checking request comprises a patrol route, a patrol position and authentication information which are requested to be checked by a patrol worker, the patrol device carries out credible identity authentication on the corresponding authentication information according to a combined authentication mode set for the patrol position, and after the authentication is passed, the patrol worker is determined to finish patrol checking of the patrol position.
The credible identity authentication is digital identity authentication based on the second generation identity card and the exit and entry certificate. The credible identity authentication requires that the user can use the card after passing the verification, and the validity of the identity verification is ensured by freely appointing the authentication factor for identity authentication in the patrol card punching process, so that the problem of replacing the card punching of patrol personnel is solved. Meanwhile, the credible identity authentication is desensitized at the front end, and the identity information of the night patrol personnel can be protected only by using the two-dimensional code or the encrypted electronic file as a medium on the premise of background real-name authentication.
Example two
Fig. 2 is a schematic diagram of a patrol process based on trusted identity authentication according to a second embodiment of the present invention. As shown in fig. 2, the patrol process based on trusted identity authentication in the second embodiment of the present invention is: and the night patrol personnel performs combined authentication of corresponding authentication factors (such as face brushing, dynamic two-dimensional codes, password input, dynamic verification codes and the like) at each night patrol point according to the night patrol plan and the night patrol route, and sends authentication information to the night patrol device based on credible identity authentication.
The patrol device performs credible identity authentication on the authentication information to ensure validity, safety and accuracy of identity authentication, and simultaneously records video pictures of patrol personnel on-site patrol and card punching. The manager of the patrol device can check the patrol progress of the patrol personnel in real time through the patrol device and call the monitoring video pictures of the patrol point positions, so that the manager can conveniently inquire and check.
Fig. 3 is a schematic diagram of a main flow of a patrol method based on trusted identity authentication according to a second embodiment of the present invention. As shown in fig. 3, the patrol method based on trusted identity authentication according to the second embodiment of the present invention is implemented by a patrol device based on trusted identity authentication, and mainly includes the following steps:
step S301: the patrol device acquires patrol management information. The manager manages the night patrol personnel, night patrol routes, night patrol time, night patrol plans and the like on the management page of the night patrol device. The management of the patrol personnel mainly manages the patrol personnel who are on duty every day, including the name, sex, duty time and the like of the patrol personnel.
The management of the patrol route mainly comprises the steps of determining patrol positions (such as a certain position in an office building and a certain position outside the office building) which need to be reached by patrol personnel every day, card punching equipment (such as a camera, a face brushing panel machine, a fingerprint machine and the like) of each patrol position, and a combined authentication mode supported by different patrol positions.
The management of the patrol time mainly manages the time of needing patrol card punching in the patrol area, such as needing to punch a card at the time of T1 at the location of L1, punching a card at the time of T2 at the location of L2, and the like.
The night patrol plan refers to a pre-made countermeasure aiming at a sudden scene which may occur in the night patrol process. The emergency scene may include a fire, a people gathering, a faint, etc. For example, in order to deal with a fire or an emergency scene of an open fire, the positions of fire extinguishers placed at various patrol positions in a patrol area and a use method need to be marked in advance, and in the patrol process, if patrol personnel encounter a fire early warning at a certain position in the patrol area, the fire early warning can be processed according to an instruction in a patrol plan at the first time.
The management personnel operate the management contents of the night patrol personnel, the night patrol route, the night patrol time and the night patrol plan on the management page to form night patrol management information.
Step S302: the night patrol device calls the night patrol plan generating engine so that the night patrol plan generating engine generates a night patrol plan and a night patrol plan according to the night patrol management information and sends the night patrol plan and the night patrol plan to the terminal of the night patrol personnel. When the patrol plan is generated, the patrol plan generation engine generates the patrol plan after comprehensive analysis according to patrol factors such as patrol personnel, patrol routes, patrol time, patrol positions, combined authentication modes corresponding to the patrol positions, weather, working days and the like. The patrol plan comprises a patrol route, patrol positions and a corresponding combined authentication mode, wherein the patrol route and the patrol positions are required to be patrolled and checked by patrol personnel at each patrol time.
Specifically, according to the patrol management information, a patrol route, a combined authentication mode of each patrol position on the patrol route, and patrol time for performing patrol checking at the patrol position are set for the patrol personnel, so that a patrol plan is generated.
When the patrol route is set, firstly, a plurality of patrol positions are divided according to the patrol positions belonging to an internal office area, an internal non-office area or an external area, so as to obtain a corresponding patrol position set. The internal office area refers to a non-outdoor office area in the patrol area, such as an office area in an office building; the interior non-office area refers to a non-office area in the night patrol area, such as a non-office area in an office building; the outside area refers to an area in the open air in a patrol area, such as an area outside an office building. The above-mentioned processing divides the patrol location into three categories, and places patrol locations belonging to the same category in a patrol location set.
And then planning a night patrol route according to whether the night patrol time is a working day or not and the weather condition of the day. Specifically, if the night patrol time is a working day and the first target weather, one or more night patrol routes which do not affect the office are planned for the night patrol location sets belonging to the internal office area, and the shortest night patrol routes are respectively planned for the night patrol location sets belonging to the internal non-office area and the external area. The first target weather is weather which does not affect patrol of the patrol personnel in the external area, such as sunny days, cloudy days, and the like.
And if the night patrol time is a working day and is a second target weather, planning one or more night patrol routes which do not influence the office for the night patrol point location set belonging to the internal office area, planning the shortest night patrol route for the night patrol point location set belonging to the internal non-office area, and setting the night patrol state of the night patrol point location set belonging to the external area as a checked state. The second target weather is weather affecting patrol of the patrol officer in the external area, and is more than the following rainy days, snowy days and the like.
If the patrol time is a non-working day (such as holidays and holidays), the shortest patrol route can be respectively planned for all patrol point location sets. Or further considering the weather condition, when the weather at the night patrol time is the second target weather, only planning the shortest night patrol route for the night patrol location set belonging to the internal office area and the night patrol location set belonging to the internal non-office area, and setting the night patrol state of the night patrol location set belonging to the external area as the checked card.
In the embodiment, the tour route can be planned by separately considering the weather condition of the tour time. Specifically, if the patrol time is the first target weather, the shortest patrol route may be planned for all patrol location sets, respectively. If the night patrol time is the second target weather, the shortest night patrol route can be planned for the night patrol location set belonging to the internal office area and the night patrol location set belonging to the internal non-office area, and the night patrol state of the night patrol location set belonging to the external area is set to be in a checked state.
The above-mentioned processing makes the night watching personnel not only conveniently night watching when night watching, but also can not influence office regional office workers, and the weather of night watching time is when the second target weather, night watching positions of the outside region are together night watching and card punching, and inconvenience brought by the back and forth movement of the inside and outside region due to weather influence is avoided.
When the patrol plan is generated, calling a patrol plan generating engine so that the patrol plan generating engine generates a corresponding patrol plan according to a set emergency scene; the night patrol plan is used for indicating a processing flow for night patrol personnel under the condition that an emergency scene occurs. For example, if the emergency scene is a fire, the patrol plan includes the positions of fire extinguishers at various patrol positions and the using method.
Step S303: and when the terminal receives an opening instruction from the night watching personnel, displaying a corresponding night watching plan and/or night watching plan on a user interface. And the night patrol personnel uses the authentication factors appointed by the combined authentication mode to carry out night patrol and card punching at night patrol positions according to the night patrol plan and the night patrol time. In case of an emergency, the night patrol personnel can process the emergency according to the instructions of the night patrol plan at the first time.
Step S304: the card punching equipment collects the authentication information of the patrol personnel who patrol and punch the card at the patrol position, generates a patrol and punch request according to the authentication information and sends the patrol and punch request to the patrol device. The card punching equipment can be a terminal used by a patrol worker, and also can be a camera, a face brushing panel machine, a fingerprint machine and the like which are arranged at a patrol position. The certification information is generated when the patrol personnel carries out certification of the corresponding certification factors according to the combined certification mode of the patrol point specified in the patrol plan. For example, the combined authentication method includes face brushing and a dynamic verification code, and the authentication information includes face information and a dynamic verification code of the night patrol person.
After the card punching equipment collects the authentication information, a corresponding patrol card punching request is generated and sent to the patrol device by combining the patrol route and the patrol point position of the patrol personnel.
Step S305: and the patrol device performs credible identity authentication on authentication information corresponding to the patrol location carried by the patrol card-punching request, and after the authentication is passed, the patrol personnel is determined to complete patrol card-punching of the patrol location. And the patrol device calls the credible identity authentication interface to carry out credible identity authentication on authentication information corresponding to the patrol point carried by the patrol card punching request.
In the trusted identity authentication process, one or more of liveness detection technology, encryption technology, IP address and physical address control can be used to prevent malicious attacks. The living body detection technology is used for preventing a night patrol person from using a photo or a fake face for authentication, and the encryption technology is used for preventing data from being tampered.
EXAMPLE III
Fig. 4 is a schematic diagram of a main flow of a patrol method based on trusted identity authentication according to a third embodiment of the present invention. As shown in fig. 4, the patrol method based on trusted identity authentication according to the third embodiment of the present invention is implemented by a patrol device based on trusted identity authentication, and mainly includes the following steps:
step S401: the patrol device acquires patrol management information. The specific implementation of this step is shown in step S301, which is not described herein.
Step S402: the night patrol device calls a night patrol plan generating engine so that the night patrol plan generating engine generates a night patrol plan and night patrol plans in different emergency scenes according to the night patrol management information and sends the night patrol plans to the terminals of night patrol personnel. The specific implementation of this step is shown in step S302, which is not described herein.
Step S403: and the terminal receives the night patrol plan and night patrol plans of different emergency scenes.
Step S404: and when the terminal receives a plan opening instruction from the night watching staff, displaying a corresponding night watching plan on a user interface so that the night watching staff can carry out night watching and card punching according to the night watching plan. And the night patrol personnel opens the night patrol plan through the terminal so as to carry out night patrol card punching by using the authentication factor specified by the combined authentication mode at the night patrol position according to the night patrol plan and the night patrol route in night patrol time.
Step S405: in the card punching process, when the terminal receives a plan opening instruction from the patrol officer, the corresponding patrol plan is displayed on the user interface so that the patrol officer can process the emergency scene according to the patrol plan, and after the processing is finished, the relevant information of the emergency scene is uploaded and the patrol card punching is continued. In the process of patrol checking, when patrolling personnel find that a sudden scene, such as a fire, occurs in a patrolling area, a patrol plan corresponding to the sudden scene of the fire is opened through a terminal, so that fire extinguishers are taken out from a specified position according to the indication of the patrol plan to perform fire extinguishing treatment.
After the fire extinguishing is finished, the related information of the emergency scene is recorded, wherein the related information can comprise the time for finding the fire, fire processing information, processing finishing time, property loss conditions, casualty conditions and the like, and the recorded content is uploaded to the night patrol device. Meanwhile, after the fire extinguishing is finished, the patrol checking of patrol positions can be continuously carried out.
Step S406: and the night watching device receives and records the relevant information of the burst scene. The record can be used for further improving the patrol plan subsequently, and can also be used for managing the patrol state of the patrol personnel based on the time for finding the fire and the processing ending time, for example, the patrol state of the patrol point is set to be checked, so that the situation that the patrol personnel delays the card punching, does not punch the card and the like due to the fact that the patrol personnel processes the emergent scene is avoided, and the card punching failure is caused.
Step S407: the card punching equipment collects the authentication information of the patrol personnel who patrol and punch the card at the patrol position, generates a patrol and punch request according to the authentication information and sends the patrol and punch request to the patrol device. The specific implementation of this step is shown in step S304, which is not described herein.
Step S408: and the patrol device performs credible identity authentication on authentication information corresponding to the patrol location carried by the patrol card-punching request, and after the authentication is passed, the patrol personnel is determined to complete patrol card-punching of the patrol location. The specific implementation of this step is shown in step S305, which is not described herein again.
In an optional embodiment, the patrol schedule of the patrol personnel and the identity authentication records of the patrol personnel at the patrol positions of the patrol route can be recorded in real time; and then, carrying out night patrol analysis according to the night patrol progress and the identity authentication record. Through the recording operation, a manager can check the current patrol progress and the identity authentication records of each patrol point position on the patrol route in real time.
In another optional embodiment, patrol data can be acquired, and patrol analysis is performed on the patrol data. The patrol data may include a patrol schedule and an authentication record. The patrol analysis can analyze the completion condition of the patrol plan, the statistics of the patrol route, the patrol completion degree, the identity authentication condition of each patrol point, the patrol completion condition of each patrol person (such as the patrol duration and the number of patrol points), and the like.
Fig. 5 is a schematic diagram of main modules of a night patrol device based on trusted identity authentication according to an embodiment of the present invention. As shown in fig. 5, the night patrol apparatus 500 based on trusted identity authentication according to the embodiment of the present invention mainly includes:
the plan generating module 501 is configured to invoke a patrol plan generating engine, so that the patrol plan generating engine generates a patrol plan according to the set patrol elements. The patrol plan generating engine can set a patrol route for the patrol personnel according to the information of the age, the sex, the duty time and the like of the patrol personnel, and carry out patrol time of patrol card punching at the patrol positions in a combined authentication mode of each patrol position on the patrol route to obtain the patrol plan.
A plan sending module 502, configured to send the patrol plan to the terminal of the patrol person, so that the patrol person performs patrol checking at the patrol point according to the patrol route and the authentication factor specified by the combined authentication manner. The module generates a patrol plan for the patrol officer and then sends the patrol plan to the terminal of the patrol officer.
And after receiving the patrol plan, the patrol personnel performs patrol card punching through the card punching equipment according to the patrol time specified by the patrol plan, the patrol route and the authentication factors corresponding to the combined authentication modes set at each patrol point. And the card punching equipment collects the authentication information, generates a patrol card punching request and sends the patrol card punching request to the authentication card punching module.
And the authentication card punching module 503 is configured to receive a patrol card punching request from a card punching device, perform trusted identity authentication on authentication information corresponding to the patrol point location carried by the patrol card punching request, and after the authentication is passed, determine that the patrol personnel completes patrol card punching of the patrol point location. The patrol checking-in request comprises a patrol route, patrol position and authentication information which are requested to be checked by the patrol personnel.
The module performs credible identity authentication on corresponding authentication information according to a combined authentication mode set for the patrol location, and determines that the patrol personnel completes patrol card punching of the patrol location after the authentication is passed.
In addition, the night patrol device 500 based on trusted identity authentication according to the embodiment of the present invention may further include: a protocol generation module and a patrol analysis module (not shown in fig. 5). The plan generating module is used for calling the night patrol plan generating engine so that the night patrol plan generating engine generates a corresponding night patrol plan according to a set emergency scene; wherein the patrol plan is used for indicating a processing flow for the patrol personnel under the condition that the emergency scene occurs.
The patrol analysis module is used for recording the patrol progress of the patrol personnel in real time and the identity authentication record of the patrol personnel at the patrol position of the patrol route; and carrying out patrol analysis according to the patrol progress and the identity authentication record.
From the above description, it can be seen that, by means of the combined authentication manner of deciding whether the patrol schedule belongs to the patrol route of the patrol officer on the basis of the weather of the patrol schedule and whether the patrol schedule belongs to the working days, and the combined authentication manner of each patrol point on the patrol route, when the patrol card punching request of the patrol officer is received, the credible identity authentication is performed on the patrol officer on the basis of the authentication information corresponding to the combined authentication manner, the phenomenon of card punching for the patrol officer can be effectively prevented, and meanwhile, the identity information of the patrol officer is protected.
Fig. 6 illustrates an exemplary system architecture 600 of a patrol method based on trusted identity authentication or a patrol device based on trusted identity authentication, to which an embodiment of the present invention may be applied.
As shown in fig. 6, the system architecture 600 may include terminal devices 601, 602, 603, a network 604, and a server 605. The network 604 serves to provide a medium for communication links between the terminal devices 601, 602, 603 and the server 605. Network 604 may include various types of connections, such as wire, wireless communication links, or fiber optic cables, to name a few.
A user may use the terminal devices 601, 602, 603 to interact with the server 605 via the network 604 to receive or send messages or the like. Various communication client applications can be installed on the terminal devices 601, 602, 603. The terminal devices 601, 602, 603 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 605 may be a server that provides various services, such as a background management server that processes patrol card punching requests transmitted by users using the terminal devices 601, 602, and 603. The background management server can perform processing such as trusted identity authentication on the received night patrol card punching request, and feed back a processing result (for example, an authentication result) to the terminal device.
It should be noted that the patrol method based on the trusted identity authentication provided by the embodiment of the present invention is generally executed by the server 605, and accordingly, the patrol apparatus based on the trusted identity authentication is generally disposed in the server 605.
It should be understood that the number of terminal devices, networks, and servers in fig. 6 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
The invention also provides an electronic device, a computer readable medium and a computer program product according to the embodiments of the invention.
The electronic device of the present invention includes: one or more processors; the storage device is used for storing one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors implement the patrol method based on the trusted identity authentication of the embodiment of the invention.
The computer readable medium of the present invention stores thereon a computer program, which when executed by a processor implements a method for night patrol based on trusted identity authentication according to an embodiment of the present invention.
The computer program product of the present invention includes a computer program, and when the program is executed by a processor, the computer program implements a night patrol method based on trusted identity authentication according to an embodiment of the present invention.
Referring now to FIG. 7, shown is a block diagram of a computer system 700 suitable for use with the electronic device implementing an embodiment of the present invention. The terminal device shown in fig. 7 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 7, the computer system 700 includes a Central Processing Unit (CPU)701, which can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. In the RAM 703, various programs and data necessary for the operation of the system 700 are also stored. The CPU 701, the ROM 702, and the RAM 703 are connected to each other via a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
The following components are connected to the I/O interface 705: an input portion 706 including a keyboard, a mouse, and the like; an output section 707 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 708 including a hard disk and the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. A drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read out therefrom is mounted into the storage section 708 as necessary.
In particular, according to the embodiments of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program can be downloaded and installed from a network through the communication section 709, and/or installed from the removable medium 711. The computer program performs the above-described functions defined in the system of the present invention when executed by the Central Processing Unit (CPU) 701.
It should be noted that the computer readable medium shown in the present invention can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present invention, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present invention, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules described in the embodiments of the present invention may be implemented by software or hardware. The described modules may also be provided in a processor, which may be described as: a processor includes a plan generation module, a plan transmission module, and an authentication punch-in module. The names of these modules do not limit the modules themselves in some cases, and for example, the plan generation module may also be described as a "module that calls the patrol plan generation engine to generate a patrol plan according to the set patrol elements".
As another aspect, the present invention also provides a computer-readable medium that may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to comprise: calling a patrol plan generating engine so that the patrol plan generating engine generates a patrol plan according to the set patrol elements; the patrol plan is used for indicating a patrol route, a patrol position and a corresponding combined authentication mode for patrol personnel to perform patrol card punching at the patrol time according to the weather of the patrol time and whether the patrol time belongs to the working day; sending the patrol plan to a terminal of the patrol personnel so that the patrol personnel can use the authentication factor specified by the combined authentication mode to carry out patrol card punching at the patrol point according to the patrol route within the patrol time; and receiving a patrol card punching request from a card punching device, performing credible identity authentication on authentication information corresponding to the patrol point location carried by the patrol card punching request, and determining that the patrol personnel completes patrol card punching of the patrol point location after the authentication is passed.
According to the technical scheme of the embodiment of the invention, the patrol route of the patrol personnel is customized according to the weather of the patrol time, whether the patrol time belongs to the working day or not in the patrol plan and the combined authentication mode of each patrol point on the patrol route, so that when the patrol card-punching request of the patrol personnel is received, the credible identity authentication is carried out on the patrol personnel based on the authentication information corresponding to the combined authentication mode, the phenomenon of punching the card for the patrol generation can be effectively prevented, and meanwhile, the identity information of the patrol personnel is protected.
The above-described embodiments should not be construed as limiting the scope of the invention. Those skilled in the art will appreciate that various modifications, combinations, sub-combinations, and substitutions can occur, depending on design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (17)
1. A night patrol method based on trusted identity authentication is characterized by comprising the following steps:
calling a patrol plan generating engine so that the patrol plan generating engine generates a patrol plan according to the set patrol elements; the patrol plan is used for indicating a patrol route, a patrol position and a corresponding combined authentication mode for patrol personnel to perform patrol card punching at the patrol time according to the weather of the patrol time and whether the patrol time belongs to the working day;
sending the patrol plan to a terminal of the patrol personnel so that the patrol personnel can use the authentication factor specified by the combined authentication mode to carry out patrol card punching at the patrol point according to the patrol route within the patrol time;
and receiving a patrol card punching request from a card punching device, performing credible identity authentication on authentication information corresponding to the patrol point location carried by the patrol card punching request, and determining that the patrol personnel completes patrol card punching of the patrol point location after the authentication is passed.
2. The method of claim 1, wherein the patrol element further comprises: the patrol personnel, the patrol route, the patrol time, the patrol position and a combined authentication mode corresponding to the patrol position;
the generating of the patrol plan according to the set patrol elements includes:
setting patrol time for patrolmen to perform patrol card punching at the patrol position;
and setting a night patrol route for night patrol personnel and a combined authentication mode of night patrol points on the night patrol route according to the weather of the night patrol time and whether the night patrol time belongs to a working day.
3. The method according to claim 2, wherein the setting of the patrol route for the patrol personnel comprises:
dividing a plurality of patrol point locations according to the patrol point locations belonging to an internal office area, an internal non-office area or an external area to obtain a corresponding patrol point location set;
if the patrol time is determined to be a working day and is a first target weather, planning a patrol route which does not affect the office for the patrol point location set belonging to the internal office area, and respectively planning a shortest patrol route for the patrol point location sets belonging to the internal non-office area and the external area;
determining that the night patrol time is a working day and is a second target weather, planning the night patrol route which does not affect the office for the night patrol point location set belonging to the internal office area, planning the shortest night patrol route for the internal non-office area, and setting the night patrol state of the night patrol point location set belonging to the external area as a checked state;
and if the patrol time is determined to be a non-working day, respectively planning the shortest patrol route for the plurality of patrol point location sets.
4. The method according to claim 1, wherein the performing trusted identity authentication on the authentication information corresponding to the patrol location carried by the patrol checking request comprises:
calling a trusted identity authentication interface to perform trusted identity authentication on authentication information corresponding to the patrol point location carried by the patrol card-punching request;
in the trusted identity authentication process, one or more of a liveness detection technology, an encryption technology, an IP address and a physical address control are used to prevent attacks.
5. The method of claim 1, further comprising:
calling the patrol plan generating engine to enable the patrol plan generating engine to generate a corresponding patrol plan according to a set emergency scene; wherein the patrol plan is used for indicating a processing flow for the patrol personnel under the condition that the emergency scene occurs.
6. The method of claim 1, further comprising:
recording the patrol progress of the patrol personnel in real time and the identity authentication record of the patrol personnel at the patrol position of the patrol route;
and carrying out patrol analysis according to the patrol progress and the identity authentication record.
7. The method according to any one of claims 1 to 6, wherein the combined authentication manner is any one or more of the following combinations of authentication factors: biological information, a dynamic two-dimensional code, a credible identity password and a dynamic verification code.
8. A night patrol device based on trusted identity authentication is characterized by comprising:
the system comprises a plan generating module, a data processing module and a data processing module, wherein the plan generating module is used for calling a patrol plan generating engine so as to enable the patrol plan generating engine to generate a patrol plan according to set patrol elements; the patrol plan is used for indicating a patrol route, a patrol position and a corresponding combined authentication mode for patrol personnel to perform patrol card punching at the patrol time according to the weather of the patrol time and whether the patrol time belongs to the working day;
the plan sending module is used for sending the patrol plan to a terminal of the patrol personnel so that the patrol personnel can carry out patrol card punching at the patrol position by using the authentication factor specified by the combined authentication mode according to the patrol route in the patrol time;
and the authentication card punching module is used for receiving the patrol card punching request from the card punching equipment, performing credible identity authentication on authentication information corresponding to the patrol point location carried by the patrol card punching request, and determining that the patrol personnel completes patrol card punching of the patrol point location after the authentication is passed.
9. The apparatus of claim 8, wherein the patrol element further comprises: the patrol personnel, the patrol route, the patrol time, the patrol position and a combined authentication mode corresponding to the patrol position;
the plan generating module is further used for setting patrol time for the patrol personnel to perform patrol card punching at the patrol position; and
and setting a night patrol route for night patrol personnel and a combined authentication mode of night patrol points on the night patrol route according to the weather of the night patrol time and whether the night patrol time belongs to a working day.
10. The apparatus of claim 9, wherein the plan generation module is further configured to generate the plan
Dividing a plurality of patrol point locations according to the patrol point locations belonging to an internal office area, an internal non-office area or an external area to obtain a corresponding patrol point location set;
if the patrol time is determined to be a working day and is a first target weather, planning a patrol route which does not affect the office for the patrol point location set belonging to the internal office area, and respectively planning a shortest patrol route for the patrol point location sets belonging to the internal non-office area and the external area;
determining that the night patrol time is a working day and is a second target weather, planning the night patrol route which does not affect the office for the night patrol point location set belonging to the internal office area, planning the shortest night patrol route for the internal non-office area, and setting the night patrol state of the night patrol point location set belonging to the external area as a checked state; and
and if the patrol time is determined to be a non-working day, respectively planning the shortest patrol route for the plurality of patrol point location sets.
11. The apparatus of claim 8, wherein the authentication card module is further configured to authenticate the card
Calling a trusted identity authentication interface to perform trusted identity authentication on authentication information corresponding to the patrol point location carried by the patrol card-punching request;
in the trusted identity authentication process, one or more of a liveness detection technology, an encryption technology, an IP address and a physical address control are used to prevent attacks.
12. The apparatus of claim 8, further comprising:
the plan generating module is used for calling the night patrol plan generating engine so that the night patrol plan generating engine generates a corresponding night patrol plan according to a set emergency scene; wherein the patrol plan is used for indicating a processing flow for the patrol personnel under the condition that the emergency scene occurs.
13. The apparatus of claim 8, further comprising:
the patrol analysis module is used for recording the patrol progress of the patrol personnel in real time and the identity authentication record of the patrol personnel at the patrol position of the patrol route;
and carrying out patrol analysis according to the patrol progress and the identity authentication record.
14. The apparatus according to any one of claims 8 to 13, wherein the combined authentication manner is any one or more of the following combinations of authentication factors: biological information, a dynamic two-dimensional code, a credible identity password and a dynamic verification code.
15. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-7.
16. A computer-readable medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-7.
17. A computer program product comprising a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111615906.0A CN114333098B (en) | 2021-12-27 | 2021-12-27 | Night patrol method, night patrol device, electronic equipment and computer readable medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111615906.0A CN114333098B (en) | 2021-12-27 | 2021-12-27 | Night patrol method, night patrol device, electronic equipment and computer readable medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114333098A true CN114333098A (en) | 2022-04-12 |
CN114333098B CN114333098B (en) | 2024-03-08 |
Family
ID=81012348
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111615906.0A Active CN114333098B (en) | 2021-12-27 | 2021-12-27 | Night patrol method, night patrol device, electronic equipment and computer readable medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114333098B (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003242202A (en) * | 2002-02-14 | 2003-08-29 | Fujitsu Ltd | Construction site safety management method, program and device |
US20070299599A1 (en) * | 2006-06-27 | 2007-12-27 | Microsoft Corporation | Collaborative route planning for generating personalized and context-sensitive routing recommendations |
JP2008134715A (en) * | 2006-11-27 | 2008-06-12 | Hitachi Ltd | Information processing system and information processing method |
CN105606109A (en) * | 2014-09-04 | 2016-05-25 | 威斯通全球技术公司 | Determining a route based on a preference |
JP2017045321A (en) * | 2015-08-27 | 2017-03-02 | 前田建設工業株式会社 | Information management system, information management method, and information management program |
US20170098181A1 (en) * | 2015-10-06 | 2017-04-06 | Numerica Corporation | Systems and methods for dynamically generating patrol schedules based on historic demand data |
CN107613460A (en) * | 2017-09-27 | 2018-01-19 | 邓方舟 | The control method and device of a kind of distance |
KR20200048929A (en) * | 2018-10-31 | 2020-05-08 | 삼성에스디에스 주식회사 | Apparatus and method for patrol management |
CN112016735A (en) * | 2020-07-17 | 2020-12-01 | 厦门大学 | Patrol route planning method and system based on traffic violation hotspot prediction and readable storage medium |
CN112270375A (en) * | 2020-11-10 | 2021-01-26 | 中煤航测遥感集团有限公司 | Method, device and equipment for determining accompanying track and storage medium |
CN112734973A (en) * | 2020-12-24 | 2021-04-30 | 深圳市兴海物联科技有限公司 | Point location patrol method and point location patrol system |
CN112767216A (en) * | 2021-01-22 | 2021-05-07 | 上海高诚智能科技有限公司 | Flood prevention facility inspection management system and method |
-
2021
- 2021-12-27 CN CN202111615906.0A patent/CN114333098B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003242202A (en) * | 2002-02-14 | 2003-08-29 | Fujitsu Ltd | Construction site safety management method, program and device |
US20070299599A1 (en) * | 2006-06-27 | 2007-12-27 | Microsoft Corporation | Collaborative route planning for generating personalized and context-sensitive routing recommendations |
JP2008134715A (en) * | 2006-11-27 | 2008-06-12 | Hitachi Ltd | Information processing system and information processing method |
CN105606109A (en) * | 2014-09-04 | 2016-05-25 | 威斯通全球技术公司 | Determining a route based on a preference |
JP2017045321A (en) * | 2015-08-27 | 2017-03-02 | 前田建設工業株式会社 | Information management system, information management method, and information management program |
US20170098181A1 (en) * | 2015-10-06 | 2017-04-06 | Numerica Corporation | Systems and methods for dynamically generating patrol schedules based on historic demand data |
CN107613460A (en) * | 2017-09-27 | 2018-01-19 | 邓方舟 | The control method and device of a kind of distance |
KR20200048929A (en) * | 2018-10-31 | 2020-05-08 | 삼성에스디에스 주식회사 | Apparatus and method for patrol management |
CN112016735A (en) * | 2020-07-17 | 2020-12-01 | 厦门大学 | Patrol route planning method and system based on traffic violation hotspot prediction and readable storage medium |
CN112270375A (en) * | 2020-11-10 | 2021-01-26 | 中煤航测遥感集团有限公司 | Method, device and equipment for determining accompanying track and storage medium |
CN112734973A (en) * | 2020-12-24 | 2021-04-30 | 深圳市兴海物联科技有限公司 | Point location patrol method and point location patrol system |
CN112767216A (en) * | 2021-01-22 | 2021-05-07 | 上海高诚智能科技有限公司 | Flood prevention facility inspection management system and method |
Also Published As
Publication number | Publication date |
---|---|
CN114333098B (en) | 2024-03-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20180182179A1 (en) | Comprehensive system and method for real-time monitoring and management of security patrolling operations | |
US20200034919A1 (en) | Blockchain-based service rental methods and devices | |
CN110706371B (en) | Block chain-based driving safety management method, system and storage medium | |
CN110933103B (en) | Anti-crawler method, device, equipment and medium | |
US20150302362A1 (en) | Time tracking device and method | |
CN110689460A (en) | Traffic accident data processing method, device, equipment and medium based on block chain | |
CN111915789A (en) | Visitor reservation management method, device, equipment and storage medium | |
CN113962672A (en) | Information checking system, mobile terminal, checking machine and information checking method | |
CN110689693A (en) | Path monitoring method, device, equipment and storage medium | |
CN105491102A (en) | Intelligent monitoring system based on cloud computing technology and device thereof | |
CN110069911A (en) | Access control method, device, system, electronic equipment and readable storage medium | |
CN108123961A (en) | Information processing method, apparatus and system | |
CN110825776B (en) | Air quality detection report processing method and device, computing equipment and storage medium | |
US11790638B2 (en) | Monitoring devices at enterprise locations using machine-learning models to protect enterprise-managed information and resources | |
US20190065286A1 (en) | Video kiosk inmate assistance system | |
CN111386711A (en) | Method, device and system for managing electronic fingerprints of electronic files | |
CN110781833A (en) | Authentication method and device and electronic equipment | |
CN110945508A (en) | Information confidentiality processing method and device, access control robot and access control system | |
CN114333098B (en) | Night patrol method, night patrol device, electronic equipment and computer readable medium | |
CN114066155A (en) | On-site operation method, on-site operation device, electronic device, and storage medium | |
CN114077749A (en) | Data processing method based on block chain and related equipment thereof | |
CN112702566A (en) | Power line patrol unmanned aerial vehicle communication system and method | |
CN113783828A (en) | Business system monitoring method and device | |
CN110851185A (en) | Automatic configuration method and device for equipment, electronic equipment and storage medium | |
CN108200380A (en) | Intelligent monitor system and equipment based on technology of Internet of things |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |